Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
test.exe

Overview

General Information

Sample name:test.exe
Analysis ID:1524536
MD5:2a98009ebc2e830e2e2de723312ee8a6
SHA1:4d767fa5085f36a9d6c8a70de8106b5e4a6a6802
SHA256:0f28c564a6268c2f3203bf3d594cb519dde447032911eebf3b430e925a94915a
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
DLL reload attack detected
Multi AV Scanner detection for dropped file
Submitted sample is a known malware sample
AI detected suspicious sample
Contains functionality to inject threads in other processes
Drops executables to the windows directory (C:\Windows) and starts them
Found stalling execution ending in API Sleep call
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Writes to foreign memory regions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • test.exe (PID: 6616 cmdline: "C:\Users\user\Desktop\test.exe" MD5: 2A98009EBC2E830E2E2DE723312EE8A6)
    • explorer.exe (PID: 984 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • @AE2AF6.tmp.exe (PID: 2084 cmdline: "C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe" MD5: 252EE18EB5E305056FDC9915B278656F)
        • cmd.exe (PID: 4948 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user0.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WdExt.exe (PID: 6788 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe" MD5: 7942494EAC73B2B3281E4A8E94C39376)
            • cmd.exe (PID: 5228 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 4564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • launch.exe (PID: 2720 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe" /i 6788 MD5: DAAC1781C9D22F5743ADE0CB41FEAEBF)
                • cmd.exe (PID: 2020 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user2.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                  • conhost.exe (PID: 2084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                  • wtmps.exe (PID: 4480 cmdline: "C:\Users\user\AppData\Local\Temp\wtmps.exe" MD5: 75C1467042B38332D1EA0298F29FB592)
                    • mscaps.exe (PID: 6612 cmdline: "C:\Windows\system32\mscaps.exe" /C:\Users\user\AppData\Local\Temp\wtmps.exe MD5: 78D3C8705F8BAF7D34E6A6737D1CFA18)
        • cmd.exe (PID: 2140 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • test.exe (PID: 2196 cmdline: "C:\Users\user\Desktop\test.exe" MD5: AA2C0EDAD4DE949A1347F8C6A346AAAB)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe, ProcessId: 2720, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Extension
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: test.exeAvira: detected
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeAvira: detection malicious, Label: TR/Rogue.kdv.685680
Source: C:\Users\user\AppData\Roaming\Microsoft\Caches\Files\usd.dllAvira: detection malicious, Label: TR/Spy.Agent.auk
Source: C:\Windows\SysWOW64\mscaps.exeAvira: detection malicious, Label: TR/Spy.Agent.auh
Source: C:\Users\user\AppData\Roaming\Microsoft\Shared\Modules\fil.dllAvira: detection malicious, Label: TR/Crypt.FKM.1350
Source: C:\Users\user\AppData\Roaming\Microsoft\Repairs\sha.dllAvira: detection malicious, Label: BDS/Fynloski.IG
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Addins\att.dllAvira: detection malicious, Label: TR/Spy.Agent.aul
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeAvira: detection malicious, Label: TR/Drop.Daws.awfy
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeAvira: detection malicious, Label: TR/PSW.Agent.pzuba
Source: C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dllAvira: detection malicious, Label: TR/Spy.Agent.rddod
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeAvira: detection malicious, Label: BDS/Nanocore.MG
Source: C:\Users\user\AppData\Roaming\Microsoft\Common\Shared\dis.dllAvira: detection malicious, Label: BDS/Fynloski.BA
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeReversingLabs: Detection: 100%
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeReversingLabs: Detection: 100%
Source: C:\Users\user\AppData\Roaming\Microsoft\Caches\Files\usd.dllReversingLabs: Detection: 91%
Source: C:\Users\user\AppData\Roaming\Microsoft\Common\Shared\dis.dllReversingLabs: Detection: 91%
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeReversingLabs: Detection: 100%
Source: C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dllReversingLabs: Detection: 95%
Source: C:\Users\user\AppData\Roaming\Microsoft\Repairs\sha.dllReversingLabs: Detection: 86%
Source: C:\Users\user\AppData\Roaming\Microsoft\Shared\Modules\fil.dllReversingLabs: Detection: 91%
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Addins\att.dllReversingLabs: Detection: 87%
Source: C:\Windows\SysWOW64\mscaps.exeReversingLabs: Detection: 100%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeJoe Sandbox ML: detected
Source: C:\Windows\SysWOW64\mscaps.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dllJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeJoe Sandbox ML: detected
Source: test.exeJoe Sandbox ML: detected
Source: test.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00401466 FindFirstFileW,FindClose,2_2_00401466
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00404D6B FindFirstFileW,FindClose,2_2_00404D6B
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_004012A4 FindFirstFileW,FindClose,11_2_004012A4
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_004034D3 FindFirstFileW,FindClose,11_2_004034D3
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00403177 DeleteFileA,FindFirstFileA,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,15_2_00403177
Source: test.exe.1.drString found in binary or memory: https://github.com/Denvi/Candle/

System Summary

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeDropped file: MD5: fffa05401511ad2a89283c52d0c86472 Family: Lazarus Group Alias: Operation DarkSeoul, Dark Seoul, Hidden Cobra, Hastati Group, Andariel Group, Unit 121, Bureau 121, NewRomanic Cyber Army Team, Bluenoroff, Group 77, Labyrinth Chollima, Operation Troy, Operation GhostSecret, Guardians of Peace, ZINC, NICKEL ACADEMY, APT-C-26, Silent Chollima, Lazarus Group Description: Lazarus Group, active since at least 2009, is an APT group that has been attributed to the North Korean. There are lots of campaigns connected, including Operation Blockbuster, Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, Ten Days of Rain, etc.In November 2014, it carried out destructive wiping attack against Sony Pictures Entertainment. In 2016, it attacked Bangladesh central banks and stole US$81 million. In the middle of 2017, the WannaCry malware which leverages the leaked EternalBlue exploits affected as many as 300,000 computers worldwide. References: Data Source: https://github.com/RedDrip7/APT_Digital_Weapon
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeDropped file: MD5: 78d3c8705f8baf7d34e6a6737d1cfa18 Family: Lazarus Group Alias: Operation DarkSeoul, Dark Seoul, Hidden Cobra, Hastati Group, Andariel Group, Unit 121, Bureau 121, NewRomanic Cyber Army Team, Bluenoroff, Group 77, Labyrinth Chollima, Operation Troy, Operation GhostSecret, Guardians of Peace, ZINC, NICKEL ACADEMY, APT-C-26, Silent Chollima, Lazarus Group Description: Lazarus Group, active since at least 2009, is an APT group that has been attributed to the North Korean. There are lots of campaigns connected, including Operation Blockbuster, Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, Ten Days of Rain, etc.In November 2014, it carried out destructive wiping attack against Sony Pictures Entertainment. In 2016, it attacked Bangladesh central banks and stole US$81 million. In the middle of 2017, the WannaCry malware which leverages the leaked EternalBlue exploits affected as many as 300,000 computers worldwide. References: Data Source: https://github.com/RedDrip7/APT_Digital_Weapon
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeFile created: C:\Windows\SysWOW64\mscaps.exe
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_004040692_2_00404069
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040A8DB2_2_0040A8DB
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_004065502_2_00406550
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040B9652_2_0040B965
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00403D172_2_00403D17
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_004035D52_2_004035D5
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_004039DA2_2_004039DA
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_004159BF2_2_004159BF
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040866E2_2_0040866E
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00407E7F2_2_00407E7F
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040AECE2_2_0040AECE
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_004042F02_2_004042F0
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_004103342_2_00410334
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040A3BD2_2_0040A3BD
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_1000A69F2_2_1000A69F
Source: C:\Users\user\Desktop\test.exeCode function: 3_2_004077533_2_00407753
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeCode function: 8_2_1000A69F8_2_1000A69F
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_0040247F11_2_0040247F
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_004074EC11_2_004074EC
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_0040214211_2_00402142
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_00401D3D11_2_00401D3D
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_0040C1C411_2_0040C1C4
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_00404DCD11_2_00404DCD
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_004055BC11_2_004055BC
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_00402A5811_2_00402A58
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_00407A6811_2_00407A68
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_00406FCE11_2_00406FCE
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_004027D111_2_004027D1
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_0040FF9911_2_0040FF99
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_1000A69F11_2_1000A69F
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_00407F2C14_2_00407F2C
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_004015A014_2_004015A0
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00401F7015_2_00401F70
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_0040A13C15_2_0040A13C
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_004071EE15_2_004071EE
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\wtmps.exe 3B20C853D4CA23240CD338B8CAB16F1027C540DDFE9C4FFDCA1624D2F923B373
Source: C:\Users\user\Desktop\test.exeCode function: String function: 00472F40 appears 478 times
Source: C:\Users\user\Desktop\test.exeCode function: String function: 00452670 appears 83 times
Source: C:\Users\user\Desktop\test.exeCode function: String function: 00471AA0 appears 51 times
Source: test.exe, 00000000.00000000.1700270642.00000000004BE000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCandle.exe. vs test.exe
Source: test.exe, 00000003.00000000.1705827339.00000000004BE000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCandle.exe. vs test.exe
Source: test.exeBinary or memory string: OriginalFilenameCandle.exe. vs test.exe
Source: test.exeBinary or memory string: OriginalFilenameWdExt.exe vs test.exe
Source: test.exe.1.drBinary or memory string: OriginalFilenameCandle.exe. vs test.exe
Source: test.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal100.evad.winEXE@35/29@0/0
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_1000180D CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,GetCurrentThreadId,OpenThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,2_2_1000180D
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_00401080 LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FindResourceA,LoadResource,LockResource,GetModuleFileNameA,CopyFileA,ExitProcess,RegCreateKeyExA,RegOpenKeyExA,RegQueryValueExA,RegSetValueExA,RegCloseKey,BeginUpdateResourceA,UpdateResourceA,EndUpdateResourceA,14_2_00401080
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\MessengerJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:428:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2084:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7124:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4564:120:WilError_03
Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user0.bat" "
Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: test.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\explorer.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\test.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: test.exeString found in binary or memory: Dlibgcc_s_dw2-1.dll__register_frame_infolibgcj-13.dll_Jv_RegisterClasses__deregister_frame_info/translations/_.qmdefaultlocale:qt_1.1.7QWidget {font-size: 8pt}Operation was cancelled by userSpindle (%1).txt.nc.ncc.ngc.tap.mapCheckScrollAutoscrollCheck modeGC:|\[|\]|G[01234]\s|M[0345]+\s|\sF[\d\.]+|\sS[\d\.]+overrided!~^GRBL|GCARVIN\s\d\.\d.Overriding- (%1/%2/%3) (%1/%2)CJogdefaultupdating border drawerCandlefrmMain&OpenE&xit&Settings&New&SaveSave &as...&About&ClearSave &transformed as...G-code programIsometric viewTop viewFront viewLeft viewFitHeightmap settingsBorder:X:H:Y:W:Show borderAutoProbe grid:Zb:Zt:Show gridInterpolation grid:Type:BicubicShowOpenResetSendPauseAbortStateWork coordinates:X0YZMachine coordinates:Status:statusControlHome...Z-probeZero XYZero ZRestore originSafe positionUnlockUser commandsSpindle on/offHeightmapUse heightmapMap:AbsentCreateEdit modeX-Y-X+Y+Z+Z-Stop10010510.10.01ContinuouslyStep:Feed:2000100050050Keyboard controlConsoleSend commandClear console&File&Recent files&Service&Help/*QWidget {
Source: C:\Users\user\Desktop\test.exeFile read: C:\Users\user\Desktop\test.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\test.exe "C:\Users\user\Desktop\test.exe"
Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe "C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe"
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Users\user\Desktop\test.exe "C:\Users\user\Desktop\test.exe"
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user0.bat" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe "C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe "C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe" /i 6788
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user2.bat" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\wtmps.exe "C:\Users\user\AppData\Local\Temp\wtmps.exe"
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeProcess created: C:\Windows\SysWOW64\mscaps.exe "C:\Windows\system32\mscaps.exe" /C:\Users\user\AppData\Local\Temp\wtmps.exe
Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe "C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe" Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Users\user\Desktop\test.exe "C:\Users\user\Desktop\test.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user0.bat" "Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe "C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe "C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe" /i 6788
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user2.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\wtmps.exe "C:\Users\user\AppData\Local\Temp\wtmps.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeProcess created: C:\Windows\SysWOW64\mscaps.exe "C:\Windows\system32\mscaps.exe" /C:\Users\user\AppData\Local\Temp\wtmps.exe
Source: C:\Users\user\Desktop\test.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: qt5core.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: qt5gui.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: qt5opengl.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: qt5serialport.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: qt5widgets.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: qt5winextras.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: libgcc_s_dw2-1.dllJump to behavior
Source: C:\Users\user\Desktop\test.exeSection loaded: libstdc++-6.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeSection loaded: aclayers.dll
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeSection loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeSection loaded: sfc.dll
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeSection loaded: sfc_os.dll
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeSection loaded: dhcpcsvc.dll
Source: C:\Windows\SysWOW64\mscaps.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\mscaps.exeSection loaded: iphlpapi.dll
Source: C:\Windows\SysWOW64\mscaps.exeSection loaded: dhcpcsvc.dll
Source: C:\Windows\SysWOW64\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: test.exeStatic file information: File size 2614323 > 1048576
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00402056 __EH_prolog,GetComputerNameW,GetUserNameW,GetSystemDefaultLangID,GetAdaptersInfo,GetAdaptersInfo,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryA,GetProcAddress,InternetGetConnectedState,FreeLibrary,GetTempPathW,GetTempFileNameW,GetTempFileNameW,GetTempFileNameW,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,2_2_00402056
Source: test.exe.1.drStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00401650 push eax; ret 0_2_0040167E
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040C8A0 push eax; ret 2_2_0040C8BE
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040D510 push eax; ret 2_2_0040D53E
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_10005978 push eax; ret 2_2_10005996
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_10005380 push eax; ret 2_2_100053AE
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeCode function: 8_2_10005978 push eax; ret 8_2_10005996
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeCode function: 8_2_10005380 push eax; ret 8_2_100053AE
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_00408950 push eax; ret 11_2_0040896E
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_00409E10 push eax; ret 11_2_00409E3E
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_10005978 push eax; ret 11_2_10005996
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_10005380 push eax; ret 11_2_100053AE
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_004026D0 push eax; ret 14_2_004026FE
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00403090 push eax; ret 15_2_004030BE

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeExecutable created and started: C:\Windows\SysWOW64\mscaps.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dllJump to dropped file
Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Common\Shared\dis.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Repairs\sha.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Addins\att.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Shared\Modules\fil.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Local\Temp\wtmps.exeJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Caches\Files\usd.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeFile created: C:\Windows\SysWOW64\mscaps.exeJump to dropped file
Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Desktop\test.exeJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeFile created: C:\Windows\SysWOW64\mscaps.exeJump to dropped file
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00401D10 GetTempPathA,GetTempFileNameA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,DeleteFileA,15_2_00401D10
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Defender ExtensionJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Defender ExtensionJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeModule Loaded: Original DLL: C:\USERS\user\APPDATA\ROAMING\TEMP\MYDLL.DLL reload: C:\WINDOWS\SYSWOW64\WS2_32.DLL
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeModule Loaded: Original DLL: C:\USERS\user\APPDATA\ROAMING\TEMP\MYDLL.DLL reload: C:\WINDOWS\SYSWOW64\WS2_32.DLL
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_00401080 LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FindResourceA,LoadResource,LockResource,GetModuleFileNameA,CopyFileA,ExitProcess,RegCreateKeyExA,RegOpenKeyExA,RegQueryValueExA,RegSetValueExA,RegCloseKey,BeginUpdateResourceA,UpdateResourceA,EndUpdateResourceA,14_2_00401080
Source: C:\Users\user\Desktop\test.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeStalling execution: Execution stalls by calling Sleep
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_1000180D CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,GetCurrentThreadId,OpenThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,2_2_1000180D
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: __EH_prolog,GetComputerNameW,GetUserNameW,GetSystemDefaultLangID,GetAdaptersInfo,GetAdaptersInfo,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryA,GetProcAddress,InternetGetConnectedState,FreeLibrary,GetTempPathW,GetTempFileNameW,GetTempFileNameW,GetTempFileNameW,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,2_2_00402056
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: GetAdaptersInfo,GetAdaptersInfo,inet_addr,inet_addr,2_2_00401CB0
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,GetProcessHeap,HeapFree,14_2_00401D20
Source: C:\Windows\SysWOW64\mscaps.exeCode function: GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,GetProcessHeap,HeapFree,15_2_00402600
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Common\Shared\dis.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Repairs\sha.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Shared\Modules\fil.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Addins\att.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Caches\Files\usd.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe TID: 6784Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00401466 FindFirstFileW,FindClose,2_2_00401466
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00404D6B FindFirstFileW,FindClose,2_2_00404D6B
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_004012A4 FindFirstFileW,FindClose,11_2_004012A4
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_004034D3 FindFirstFileW,FindClose,11_2_004034D3
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00403177 DeleteFileA,FindFirstFileA,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,15_2_00403177
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040318C GetVersionExW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,GetModuleHandleW,GetProcAddress,GetSystemMetrics,2_2_0040318C
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeThread delayed: delay time: 120000Jump to behavior
Source: WdExt.exe, 00000008.00000002.1776161415.0000000000650000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
Source: @AE2AF6.tmp.exe, 00000002.00000002.1732872130.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, @AE2AF6.tmp.exe, 00000002.00000002.1732872130.00000000006E5000.00000004.00000020.00020000.00000000.sdmp, WdExt.exe, 00000008.00000002.1776161415.000000000061E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeAPI call chain: ExitProcess graph end nodegraph_2-18953
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\mscaps.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_1000180D CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,GetCurrentThreadId,OpenThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,2_2_1000180D
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00402056 __EH_prolog,GetComputerNameW,GetUserNameW,GetSystemDefaultLangID,GetAdaptersInfo,GetAdaptersInfo,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryA,GetProcAddress,InternetGetConnectedState,FreeLibrary,GetTempPathW,GetTempFileNameW,GetTempFileNameW,GetTempFileNameW,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,2_2_00402056
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00404732 VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualAlloc,VirtualAlloc,2_2_00404732
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00411746 SetUnhandledExceptionFilter,2_2_00411746
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00411758 SetUnhandledExceptionFilter,2_2_00411758
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_1000BA64 SetUnhandledExceptionFilter,2_2_1000BA64
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_1000BA76 SetUnhandledExceptionFilter,2_2_1000BA76
Source: C:\Users\user\Desktop\test.exeCode function: 3_2_00401179 Sleep,Sleep,SetUnhandledExceptionFilter,_acmdln,malloc,strlen,malloc,memcpy,__initenv,_cexit,_amsg_exit,_initterm,GetStartupInfoA,_initterm,exit,3_2_00401179
Source: C:\Users\user\Desktop\test.exeCode function: 3_2_00451880 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,3_2_00451880
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeCode function: 8_2_1000BA64 SetUnhandledExceptionFilter,8_2_1000BA64
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeCode function: 8_2_1000BA76 SetUnhandledExceptionFilter,8_2_1000BA76
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_0040C6A6 SetUnhandledExceptionFilter,11_2_0040C6A6
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_0040C6B8 SetUnhandledExceptionFilter,11_2_0040C6B8
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_1000BA64 SetUnhandledExceptionFilter,11_2_1000BA64
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeCode function: 11_2_1000BA76 SetUnhandledExceptionFilter,11_2_1000BA76
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_00406250 SetUnhandledExceptionFilter,14_2_00406250
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_0040623E SetUnhandledExceptionFilter,14_2_0040623E
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeCode function: 14_2_00401AD0 SetUnhandledExceptionFilter,14_2_00401AD0
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00408007 SetUnhandledExceptionFilter,15_2_00408007
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_004024A0 SetUnhandledExceptionFilter,15_2_004024A0
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00407FF5 SetUnhandledExceptionFilter,15_2_00407FF5

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\mscaps.exeCode function: 15_2_00401950 DeleteFileA,OpenProcess,GetModuleHandleA,GetProcAddress,VirtualAllocEx,CloseHandle,WriteProcessMemory,CreateRemoteThread,VirtualFreeEx,Sleep,Sleep,GetExitCodeThread,CloseHandle,CloseHandle,VirtualFreeEx,CloseHandle,15_2_00401950
Source: C:\Users\user\Desktop\test.exeMemory written: PID: 984 base: 1279C0 value: 55Jump to behavior
Source: C:\Users\user\Desktop\test.exeMemory written: PID: 984 base: 127F80 value: 04Jump to behavior
Source: C:\Users\user\Desktop\test.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 1279C0Jump to behavior
Source: C:\Users\user\Desktop\test.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 127F80Jump to behavior
Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe "C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe" Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Users\user\Desktop\test.exe "C:\Users\user\Desktop\test.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user0.bat" "Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe "C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe "C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe" /i 6788
Source: C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user2.bat" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\wtmps.exe "C:\Users\user\AppData\Local\Temp\wtmps.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\wtmps.exeProcess created: C:\Windows\SysWOW64\mscaps.exe "C:\Windows\system32\mscaps.exe" /C:\Users\user\AppData\Local\Temp\wtmps.exe
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040B8D2 GetSystemTime,2_2_0040B8D2
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00402056 __EH_prolog,GetComputerNameW,GetUserNameW,GetSystemDefaultLangID,GetAdaptersInfo,GetAdaptersInfo,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryA,GetProcAddress,InternetGetConnectedState,FreeLibrary,GetTempPathW,GetTempFileNameW,GetTempFileNameW,GetTempFileNameW,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,2_2_00402056
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_00412794 InterlockedDecrement,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,2_2_00412794
Source: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exeCode function: 2_2_0040318C GetVersionExW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,GetModuleHandleW,GetProcAddress,GetSystemMetrics,2_2_0040318C
Source: C:\Users\user\Desktop\test.exeCode function: 3_2_0043B9C0 _ZNK13QOpenGLBuffer9isCreatedEv,_ZNK24QOpenGLVertexArrayObject9isCreatedEv,_ZN13QOpenGLBuffer4bindEv,_ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE,_ZN13QOpenGLBuffer7releaseEv,_ZN13QOpenGLBuffer8allocateEPKvi,_ZN10QArrayData10deallocateEPS_jj,_ZN13QOpenGLBuffer7releaseEv,_ZN24QOpenGLVertexArrayObject4bindEv,_ZN24QOpenGLVertexArrayObject7releaseEv,_ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE,_ZNK20QOpenGLShaderProgram17attributeLocationEPKc,_ZN20QOpenGLShaderProgram20enableAttributeArrayEi,_ZN20QOpenGLShaderProgram18setAttributeBufferEijiii,_ZN24QOpenGLVertexArrayObject7releaseEv,_Z9qBadAllocv,_Z9qBadAllocv,3_2_0043B9C0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts2
Command and Scripting Interpreter
1
Scripting
311
Process Injection
121
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
11
Virtualization/Sandbox Evasion
LSASS Memory121
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt11
DLL Side-Loading
11
DLL Side-Loading
311
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
DLL Side-Loading
Cached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
System Network Configuration Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
File and Directory Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow4
System Information Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1524536 Sample: test.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 100 80 Antivirus detection for dropped file 2->80 82 Antivirus / Scanner detection for submitted sample 2->82 84 Multi AV Scanner detection for dropped file 2->84 86 3 other signatures 2->86 14 test.exe 2->14         started        process3 signatures4 110 Injects code into the Windows Explorer (explorer.exe) 14->110 112 Writes to foreign memory regions 14->112 17 explorer.exe 3 14->17         started        process5 file6 56 C:\Users\user\Desktop\test.exe, PE32 17->56 dropped 58 C:\Users\user\AppData\...\@AE2AF6.tmp.exe, PE32 17->58 dropped 20 @AE2AF6.tmp.exe 19 17->20         started        24 test.exe 17->24         started        process7 file8 60 C:\Users\user\AppData\Roaming\...\WdExt.exe, PE32 20->60 dropped 88 Antivirus detection for dropped file 20->88 90 Multi AV Scanner detection for dropped file 20->90 92 DLL reload attack detected 20->92 94 Machine Learning detection for dropped file 20->94 26 cmd.exe 1 20->26         started        28 cmd.exe 1 20->28         started        signatures9 process10 process11 30 WdExt.exe 38 26->30         started        34 conhost.exe 26->34         started        36 conhost.exe 28->36         started        file12 62 C:\Users\user\AppData\Roaming\...\att.dll, PE32 30->62 dropped 64 C:\Users\user\AppData\Roaming\...\fil.dll, PE32 30->64 dropped 66 C:\Users\user\AppData\Roaming\...\sha.dll, PE32 30->66 dropped 68 5 other malicious files 30->68 dropped 114 Antivirus detection for dropped file 30->114 116 DLL reload attack detected 30->116 118 Submitted sample is a known malware sample 30->118 120 Machine Learning detection for dropped file 30->120 38 cmd.exe 30->38         started        signatures13 process14 process15 40 launch.exe 1 4 38->40         started        43 conhost.exe 38->43         started        signatures16 104 Antivirus detection for dropped file 40->104 106 Multi AV Scanner detection for dropped file 40->106 108 Machine Learning detection for dropped file 40->108 45 cmd.exe 1 40->45         started        process17 process18 47 wtmps.exe 45->47         started        51 conhost.exe 45->51         started        file19 70 C:\Windows\SysWOW64\mscaps.exe, PE32 47->70 dropped 72 Antivirus detection for dropped file 47->72 74 Multi AV Scanner detection for dropped file 47->74 76 Submitted sample is a known malware sample 47->76 78 3 other signatures 47->78 53 mscaps.exe 47->53         started        signatures20 process21 signatures22 96 Antivirus detection for dropped file 53->96 98 Multi AV Scanner detection for dropped file 53->98 100 Machine Learning detection for dropped file 53->100 102 Contains functionality to inject threads in other processes 53->102

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
test.exe100%AviraTR/Drop.Daws.awfy
test.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\wtmps.exe100%AviraTR/Rogue.kdv.685680
C:\Users\user\AppData\Roaming\Microsoft\Caches\Files\usd.dll100%AviraTR/Spy.Agent.auk
C:\Windows\SysWOW64\mscaps.exe100%AviraTR/Spy.Agent.auh
C:\Users\user\AppData\Roaming\Microsoft\Shared\Modules\fil.dll100%AviraTR/Crypt.FKM.1350
C:\Users\user\AppData\Roaming\Microsoft\Repairs\sha.dll100%AviraBDS/Fynloski.IG
C:\Users\user\AppData\Roaming\Microsoft\Windows\Addins\att.dll100%AviraTR/Spy.Agent.aul
C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe100%AviraTR/Drop.Daws.awfy
C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe100%AviraTR/PSW.Agent.pzuba
C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dll100%AviraTR/Spy.Agent.rddod
C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe100%AviraBDS/Nanocore.MG
C:\Users\user\AppData\Roaming\Microsoft\Common\Shared\dis.dll100%AviraBDS/Fynloski.BA
C:\Users\user\AppData\Local\Temp\wtmps.exe100%Joe Sandbox ML
C:\Windows\SysWOW64\mscaps.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dll100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe100%ReversingLabsWin32.Infostealer.BZub
C:\Users\user\AppData\Local\Temp\wtmps.exe100%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\AppData\Roaming\Microsoft\Caches\Files\usd.dll91%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\AppData\Roaming\Microsoft\Common\Shared\dis.dll92%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe100%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\AppData\Roaming\Microsoft\Identities\user\arc.dll96%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\AppData\Roaming\Microsoft\Repairs\sha.dll87%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\AppData\Roaming\Microsoft\Shared\Modules\fil.dll92%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\AppData\Roaming\Microsoft\Windows\Addins\att.dll88%ReversingLabsWin32.Worm.Faedevour
C:\Users\user\Desktop\test.exe0%ReversingLabs
C:\Windows\SysWOW64\mscaps.exe100%ReversingLabsWin32.Worm.Faedevour
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/Denvi/Candle/test.exe.1.drfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1524536
    Start date and time:2024-10-02 23:23:48 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:20
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:test.exe
    Detection:MAL
    Classification:mal100.evad.winEXE@35/29@0/0
    EGA Information:
    • Successful, ratio: 85.7%
    HCA Information:
    • Successful, ratio: 99%
    • Number of executed functions: 56
    • Number of non-executed functions: 305
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded IPs from analysis (whitelisted): 20.72.235.82
    • Excluded domains from analysis (whitelisted): redir.update.msft.com.trafficmanager.net, ocsp.digicert.com, slscr.update.microsoft.com, windowsupdate.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target test.exe, PID 2196 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    • Report size getting too big, too many NtSetInformationFile calls found.
    • VT rate limit hit for: test.exe
    TimeTypeDescription
    17:24:49API Interceptor1x Sleep call for process: WdExt.exe modified
    22:24:50AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows Defender Extension "C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe"
    22:25:11AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Windows Defender Extension "C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe"
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\wtmps.exeN1uYSp0Uxh.exeGet hashmaliciousUnknownBrowse
      WdExt.exeGet hashmaliciousUnknownBrowse
        WdExt.exeGet hashmaliciousUnknownBrowse
          PkW6FhsgXx.exeGet hashmaliciousUnknownBrowse
            K7DLe06XsR.exeGet hashmaliciousUnknownBrowse
              PkW6FhsgXx.exeGet hashmaliciousUnknownBrowse
                K7DLe06XsR.exeGet hashmaliciousUnknownBrowse
                  ZnOjZ2jrSH.exeGet hashmaliciousUnknownBrowse
                    LVaL5Icyef.exeGet hashmaliciousUnknownBrowse
                      ZnOjZ2jrSH.exeGet hashmaliciousUnknownBrowse
                        Process:C:\Windows\SysWOW64\mscaps.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):406
                        Entropy (8bit):5.350477861599205
                        Encrypted:false
                        SSDEEP:6:oWAGVISs4KHunXwBFq7+fAmvIHcDNeEc7vyx07WmnN/9udXiIP+KHuH1jIy4EE+h:lDVE45nXwu74Awq7sfeuh+KOVjiEE+hn
                        MD5:37512BCC96B2C0C0CF0AD1ED8CFAE5CD
                        SHA1:EDF7F17CE28E1C4C82207CAB8CA77F2056EA545C
                        SHA-256:27E678BF5DC82219D6EDD744F0B82567A26E40F8A9DCD6487205E13058E3ED1F
                        SHA-512:6D4252AB5AA441A76CE2127224FEFCB221259AB4D39F06437B269BD6BFDAAE009C8F34E9603EC734159553BC9F1359BDD70316CD426D73B171A9F17C41077641
                        Malicious:false
                        Preview:[ICO]..01=%SystemRoot%\system32..02=wtime32.dll..03=Software\Microsoft\Active Setup\Installed Components..04={ef2b00e3-19da-4e78-b118-6b6451b719f2}..05={a96adc11-e20e-4e21-bfac-3e483c40906e}..06=%SystemRoot%\explorer.exe..07=%APPDATA%\Microsoft\Protect\SETUP..08=wtime32.dll..09=Software\Microsoft\Windows\CurrentVersion\Run..10=JREUpdate..11=%SystemRoot%\explorer.exe..12=%SystemRoot%\system32\gdi32.dll..
                        Process:C:\Windows\SysWOW64\explorer.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):1797699
                        Entropy (8bit):7.976046783043414
                        Encrypted:false
                        SSDEEP:24576:OXdVtTj2i64T+jdxQCfgOFD3WSwd2QtBBw6xxhVxQtmibjOhZaiRu/4oMaop0UNd:mbTChxKCnFnQXBbrtgb/iQvu0UHO9y
                        MD5:252EE18EB5E305056FDC9915B278656F
                        SHA1:D4B1AC5389C7DE600CC7B63DF4F8DF545565A18A
                        SHA-256:B74969A67DF1BA88F4D93AF98D65898EDD91539AD4C7A74CB1102CB0D6E1CAA5
                        SHA-512:8772F4C8844B4D75280EB86F238AE3CA551CC5E67419077751E547654BB768D11B7BB2C04971AD0D6EE137761CB0F362BFDCE55870A946A54E8BC0DA5E388C93
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 100%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W..a..e2..e2..e2h.i2..e2..k2..e2..o2..e2..82..e2..d2j.e2..n2..e2..c2..e2Rich..e2........PE..L....^O.................f..........p.............@.............................................................................x....................................................................................................................text...Rd.......f.................. ..`.rdata..&............j..............@..@.data...|v....... ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:ASCII text, with very long lines (896), with no line terminators
                        Category:dropped
                        Size (bytes):896
                        Entropy (8bit):4.700288873450408
                        Encrypted:false
                        SSDEEP:24:keK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeK+DeKD:d1q1q1q1q1q1q1q1q1q1q1q1q1q1q1qo
                        MD5:BE49EE9D1B6DA594241CE3B7432C5D64
                        SHA1:D81E68B9BF84258AF2E6B5595C4F5C8D53B9C901
                        SHA-256:DB66D62796AE12BF459E514F27BB1A0D416D804365F44E8EC53DD760E3F7B8B8
                        SHA-512:0C15D8D86E0DFCCBCECD50B3DD5906F8F5B7C52511128D01BE82B394CCB08ED85A486A101BBB5D992A688D1E62F21FDA712DAEF1BF3A5ECBA9AAD152E47562F5
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:ASCII text, with very long lines (620), with no line terminators
                        Category:dropped
                        Size (bytes):620
                        Entropy (8bit):4.7002729531161505
                        Encrypted:false
                        SSDEEP:12:kvmNKzuXDvmNKzuXDvmNKzuXDvmNKzuXDvmNKzuXDvmNKzuXDvmNKzuXDvmNKzum:keK+DeK+DeK+DeK+DeK+DeK+DeK+DeKT
                        MD5:1D713C403B1DA202F059FCA73E0E6C61
                        SHA1:BA91DFDC9786177C0F6CB0ED2F324FFB1DD1F050
                        SHA-256:FB2BF10E6A64C014A8DB3F0DEA7E1B795B36632E4EDC532A2422975802632B0A
                        SHA-512:E88F3C0FA520EBC9B982B5404025E6484A9BED925D889915250797B1592CCD8B4218428BB8A0CAF0685BCCA5584E05151EC2F7FAF105347AFC94E1A955E4BC01
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUV
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):1796415
                        Entropy (8bit):4.70043971812567
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyp:F
                        MD5:6354B0F69E2257A69F01F15C2624B294
                        SHA1:B36C8CA0B00405373AAF1C65F61BE60BEF267225
                        SHA-256:A7651F484533E1C5B6D7235E0C129A450188341014D6FFCFFE8F7D633C0F4344
                        SHA-512:961DC74DD338DC0499B37D3CF1908226BD1841B3E43558E70448083C8D3EC77BCB5682AE0B28659987AD9B915DD2200AC05F09A04E3CFE7B1E0137A61269A69F
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:zlib compressed data
                        Category:dropped
                        Size (bytes):907
                        Entropy (8bit):7.774852528796053
                        Encrypted:false
                        SSDEEP:12:yVcca7jUJ6J4rDayFMdNWjx3V3aHn8aH4WjjKdP9e2J2i0odDwRlLiWicTvZNX+e:3U4JJogNWV3VKre9P2iP5ipZsG
                        MD5:C833778DEC21525FD7622C02BD6CCCAF
                        SHA1:300C4611EE736FB33A82E5EDEB1BFF18B760235B
                        SHA-256:41ED4FD4CCB449E108E99E25F0E7BA192A3DA0FD5A82C32468DD04D99A22B857
                        SHA-512:85C60D074E13E2ECCAA456AD5915FE5CC0264A6ED3DB9914AA73FF34A7307B5D7A1F1FD7879FFC7B9C276F7CD6AE89DBF3956D26A424ED9B3A9BAEB49B2AD807
                        Malicious:false
                        Preview:x......9..\...12..c.<........8\..(.....bBM.........].|vKj..[7J.8X.....tZ...F..8..V.m".q.B......}?(}...Gbn~"...r.......i:X.Xn."OvJ>X.L.Q).".....[....j....?1...o..i......t......F...<+.'.N."*...W@c.S............+.Y..@.y..q..U.....-A..k..6.P.r.<.)...i=.[.C..0.l...`.x-G...F...... .2..2.:..F...>....q..h....}....lQ.h..J.$K....L..2F.zB...e7j:........_..t>...a..h.Djd.............t*..|......V.<*K...n3.+.yR....9q..)....@....9Em.Q.l.#.]..%i........q..[_.....8......F.......$.a..\p.G..j...|......G..ef.....wB0...Wu*Vf0Q9.w..O.{.D..,.\....[~..ml ...N....`>@V,S,4lp!q.i..@).M.BKe.X1...t..1......X0.+....^xNe.\x..(.>....nY..O..v}.F!.....Z.x.O......}f...l...+-..F...#.....I\q...".*..F.J...Z.qL}..E..0...R*...n..(.S$k_..:$.G.:.<..5T..5...3p.U.k..P>uU.02-.@...-.._...W$rP,g1........,.....F..U......4.&0Hk.0.......a^F[..Q....@<`(5...p'~...3.....Y.mo8.oh.r.n..U[...CX.-..m
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):1053442
                        Entropy (8bit):4.700439718141092
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyK:O
                        MD5:DF2C63605573C2398D796370C11CB26C
                        SHA1:EFBA97E2184BA3941EDB008FCC61D8873B2B1653
                        SHA-256:07FFCDE2097D0AF67464907FEC6A4079B92DA11583013BAE7D3313FA32312FE8
                        SHA-512:D9726E33FCFA96415CC906BDB1B0E53EBA674EAF30ED77D41D245C1C59AA53E222246F691D82FA3A45F049FBF23D441768F9DA21370E489232770AD5AE91D32F
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):235266
                        Entropy (8bit):4.70043971626439
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyq:u
                        MD5:6F90E1169D19DFDE14D6F753F06C862B
                        SHA1:E9BCA93C68D7DF73D000F4A6E6EB73A343682AC5
                        SHA-256:70A392389AECD0F58251E72C3FD7E9159F481061D14209FF8708A0FD9FF584DC
                        SHA-512:F0C898222E9578C01EBE1BEFAC27A3FB68D8FB6E76C7D1DEC7A8572C1AA3201BACF1E69AA63859E95606790CF09962BCF7DC33B770A6846BED5BD7DED957B0B3
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):123650
                        Entropy (8bit):4.700439712479302
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy:u
                        MD5:F558C76B0376AF9273717FA24D99EBBF
                        SHA1:F84BCECE5C6138B62EF94E9D668CF26178EE14CC
                        SHA-256:01631353726DC51BCEA311DBC012572CF96775E516B1C79A2DE572EF15954B7A
                        SHA-512:2092D1E126D0420FEC5FC0311D6B99762506563F4890E4049E48E2D87DDE5AC3E2E2ECC986AB305DE2C6CEB619F18879A69A815D3241CCF8140BC5EA00C6768D
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):129282
                        Entropy (8bit):4.700439711235807
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyK:u
                        MD5:02AE22335713A8F6D6ADF80BF418202B
                        SHA1:4C40C11F43DF761B92A5745F85A799DB7B389215
                        SHA-256:AE5697F849FA48DB6D3D13455C224FCF6CEB0602A1E8AC443E211DD0F32D50F4
                        SHA-512:727D16102BFC768535B52A37E4E7B5D894F5DAA268D220DF108382C36DCCE063AFDBC31FD495A7A61305263EC4CD7E92713D894FAA35B585C0B379217A1D929C
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):91394
                        Entropy (8bit):4.700439710541972
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyS:O
                        MD5:09203A9741B91F3A9ED01C82DCB8778D
                        SHA1:13E6F3FB169CD6AA5E4D450417A7E15665A2E140
                        SHA-256:63149AD45DB380F5DD15F65D9CEB2611D53A0A66E022483BEE4CE2FF7D2610E2
                        SHA-512:9E9E6FE0DD713417D0E28BA787CF862D55ECDA9EE9F3DF1EADA144657F6A3B6ADA1984FD05A3FFFCD597A9715383225A8E40B6E5D0D8D39EC0D3A64B8DEA9846
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):102146
                        Entropy (8bit):4.7004397081852405
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyq:u
                        MD5:9A27BFB55DD768AE81CA8716DB2DA343
                        SHA1:55DA0F4282BD838F72F435A5D4D24AC15B04482B
                        SHA-256:5EC8093EF5939D1ABCE1C576097B584FB600B94AD767C1DA897F7CB7F0063D26
                        SHA-512:D9BB49D2F282ED09C351A1D8EB2540781E6A7FB39265473FD59D146BFC162F27A4AB1405301ED7395C12929A80551A399437D7D794D7AC48650E9037B60EB69C
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):176386
                        Entropy (8bit):4.700439717028234
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyK:u
                        MD5:2634FA3A332C297711CB59D43F54FFCE
                        SHA1:8E2B68D0EE4E792EFB1945BA86ECEB87F07087D2
                        SHA-256:27C945CCB84AA024F1F063701327E829A7EF3A7EDE4A43B2FEBBB1DDDBDF8740
                        SHA-512:84E4799B9B18A7CC7BE685C793A9B4FB135EA331D1D235FE823E1D7091130F131AB2FBAD1DA4DEA795E82547AA16B00F4E2A9FAAA96CB522D795F9ABFDA2FC53
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):282624
                        Entropy (8bit):4.700439717346398
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyX:T
                        MD5:E07C6A9E595F045FADC463DFDA44AB16
                        SHA1:E6B199272ADE02613F2003C365A4CB1487431E23
                        SHA-256:D2FA6F9686386A92253A9C5EA25ACE702A111483540B60C1300789235CEA7FDC
                        SHA-512:F3C630AE8381B99519AEEADBC2918810E7FB09A909F73EE6C46F4E9D3CF8C5051A5CF763DB6A775D6CD8713CCF95A63B18DF9ED756FA28276E8D7AB6A47F2CBF
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):282624
                        Entropy (8bit):7.055084803288937
                        Encrypted:false
                        SSDEEP:6144:Xaz/zwzFEN3MmUGvSQagFwDeSv3BU9T4/XGOUYM/mVz:Iz8qamFVa1D69T4RMmVz
                        MD5:75C1467042B38332D1EA0298F29FB592
                        SHA1:F92EA770C2DDB04CF0D20914578E4C482328F0F8
                        SHA-256:3B20C853D4CA23240CD338B8CAB16F1027C540DDFE9C4FFDCA1624D2F923B373
                        SHA-512:5C47C59AD222E2597CCDF2C100853C48F022E933F44C279154346EACF9E7E6F54214ADA541D43A10424035F160B56131AAB206C11512A9FD6EA614FBD3160AA0
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 100%
                        Joe Sandbox View:
                        • Filename: N1uYSp0Uxh.exe, Detection: malicious, Browse
                        • Filename: WdExt.exe, Detection: malicious, Browse
                        • Filename: WdExt.exe, Detection: malicious, Browse
                        • Filename: PkW6FhsgXx.exe, Detection: malicious, Browse
                        • Filename: K7DLe06XsR.exe, Detection: malicious, Browse
                        • Filename: PkW6FhsgXx.exe, Detection: malicious, Browse
                        • Filename: K7DLe06XsR.exe, Detection: malicious, Browse
                        • Filename: ZnOjZ2jrSH.exe, Detection: malicious, Browse
                        • Filename: LVaL5Icyef.exe, Detection: malicious, Browse
                        • Filename: ZnOjZ2jrSH.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......[...............d...........o.....................q...................Rich............PE..L...n..M.............................'............@..........................`.................................................P....................................................................................................................text...0|.......................... ..`.rdata..@...........................@..@.data...(*....... ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):102146
                        Entropy (8bit):6.672724217779346
                        Encrypted:false
                        SSDEEP:1536:AfVMTLl0+j+R3S6CVaTqifclr7MB3tY0ZHp8FkK4+3IOqFnToIfwCBztSoRa6A:Fl67CVgBbNEfZqtTBfwCptSw/A
                        MD5:F1C9F4A1F92588AEB82BE5D2D4C2C730
                        SHA1:3DC5A017B15BA74FAE2342937380905BF7E8FBD5
                        SHA-256:D3A46F71AA7467920B16B64C9D17EAF6C4E147F41CD1390DCCFF01E4A81F8DFA
                        SHA-512:6171E740CE318D8FC35C92663684F2C35E7B5374C9A8CE6F4DC1C28C9AE62064F9CF44116266C650089BD5A3D328E87F9BDBD63AC1123E0A33CE52A1D21CFFAD
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 91%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<a.R2.R2.R2f.\2.R2..X2f.R2&..2.R2.S2..R2..Y2..R2].T2.R2..V2.R2Rich.R2................PE..L....^O...........!......................... .......................................................................k.......b..P.......X............................................................................ ...............................text............................... ..`.rdata..JL... ...N..................@..@.data....l...p.......X..............@....rsrc...X............n..............@..@.reloc...............t..............@..B........................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):123650
                        Entropy (8bit):6.665333125659156
                        Encrypted:false
                        SSDEEP:3072:PWFWnu/0NPlE+qoytTBf+28aVytl34iQA:PW8nlQ+RytTBV2J
                        MD5:1FCC5B3ED6BC76D70CFA49D051E0DFF6
                        SHA1:3FFA43EFDC893A57DCAD3D45C9B14980DD52EB58
                        SHA-256:B0C0C49EED934E6D2ED990913D4C71108F6104352D23F72D3EF0A3EF4074D92E
                        SHA-512:8769438AACC26F0A720926F419A2564813DEE2F526B2DBB7A3F57D587DC385612BF5780F4E39CE2149DE5FB4C1AF839DCC099F3D77387989E16D2BC76C6DE929
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 92%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........{X..(X..(X..(..(A..(...(..(...(Q..(X..(...(...(B..(.(Y..(...(Y..(RichX..(........PE..L....^O...........!.....D...................`.....@.........................p......................................0..........<....@..h....................P..4....................................................`...............................text...mC.......D.................. ..`.rdata...W...`...X...H..............@..@.data....u..........................@....rsrc...h....@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):176386
                        Entropy (8bit):7.467006043338271
                        Encrypted:false
                        SSDEEP:3072:ng2TyMj3tEcWMkc5tTBfZOVxtDH2g3zd3jceABCODJRCyA:n7xqcWxc5tTBsJWKFGUOfCl
                        MD5:DAAC1781C9D22F5743ADE0CB41FEAEBF
                        SHA1:E2549EEEEA42A6892B89D354498FCAA8FFD9CAC4
                        SHA-256:6A7093440420306CF7DE53421A67AF8A1094771E0AAB9535ACBD748D08ED766C
                        SHA-512:190A7D5291E20002F996EDF1E04456BFDFF8B7B2F4EF113178BD42A9E5FD89FE6D410AE2C505DE0358C4F53F9654AC1CAAA8634665AFA6D9691640DD4EE86160
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 100%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................B......)...G.................)......y.......Rich............PE..L.....^O.................................... ....@..........................0..................................................P.... ............................................................................... ..P............................text............................... ..`.rdata..\.... ......................@..@.data...|k..........................@....rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):1053442
                        Entropy (8bit):7.383233334811567
                        Encrypted:false
                        SSDEEP:24576:XitBcqPTSNCs8Fm6nQbkkcCZIkj3tTkgbGqt/dKcMM1Wy/:SIqriCsmm6nYqkjdTkgSqNdKcMs/
                        MD5:2D9DF706D1857434FCAA014DF70D1C66
                        SHA1:75A65DD394941CD78234EE100D68C8D2F53F77C6
                        SHA-256:126593B3672E6985FE4E4903D656040E16A69264FAF91B1A416EF00565E17E7C
                        SHA-512:BC476A3AAF54323F1E77BB5EFFC05C407A1034A42B495DA3A374F2253002BA948929EBAAAF52A5204095AA0D66C740F5A2828E2FD3C46749544580966024CACC
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 96%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]0.^3c.^3c.^3c.B?c.^3c[B=c.^3c0A9c`^3c.Qlc.^3c.Qnc.^3c.^2ck^3c0A8c.^3c`X5c.^3c0A7c.^3cRich.^3c........................PE..L.....^O...........!................U.............. .................................................................X.......K..d....P.......................p...Z......................................................\............................text............................... ..`.rdata...i.......j..................@..@.data...L....`...D...@..............@....rsrc........P......................@..@.reloc..Lr...p...t..................@..B................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):1799318
                        Entropy (8bit):7.975944248689045
                        Encrypted:false
                        SSDEEP:24576:OXdVtTj2i64T+jdxQCfgOFD3WSwd2QtBBw6xxhVxQtmibjOhZaiRu/4oMaop0UNN:mbTChxKCnFnQXBbrtgb/iQvu0UHO9I
                        MD5:7942494EAC73B2B3281E4A8E94C39376
                        SHA1:88C3CD0A88E1C93CFFEEE72D372B1D79144F35AC
                        SHA-256:B9818299D1719F7DE6F22CE1F67AE8D3CB5770C945DE5746AE502656FE112984
                        SHA-512:8C22BD07628CFB865A72E44E2F271A1158BBBD250D9CD8356187648C08FD37974A0EAFF341D06ACBB4EECD217BC6B837489BFE4E3A0A301A183DC8FBBA5A36CD
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W..a..e2..e2..e2h.i2..e2..k2..e2..o2..e2..82..e2..d2j.e2..n2..e2..c2..e2Rich..e2........PE..L....^O.................f..........p.............@.............................................................................x....................................................................................................................text...Rd.......f.................. ..`.rdata..&............j..............@..@.data...|v....... ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):91394
                        Entropy (8bit):6.654533417168698
                        Encrypted:false
                        SSDEEP:1536:h5QmUNtCKcKcyR2zh5Te2D6grD5Z3MIOKFnToIf+VHutHaA:hItC42zhlGgrXCKtTBf+VOtHaA
                        MD5:6A9461F260EBB2556B8AE1D0BA93858A
                        SHA1:01E14B87B69DCE8272D84669F44F81D685DCF7C5
                        SHA-256:0B059565160C180DF60470349770A6DD225981A8051639385BB49D33D2A73632
                        SHA-512:263041E149A2E7CD95C16A614175179B5E1FEA8ECA137AAC02D903B45F107AD1C9467A3E790408CACA7250B0CB83DA77AA73887239F25B7B93B221CFFC02772B
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 87%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Al....uD..uD..uD..{D..uD...D..uD..(D..uD..tDj.uD..~D..uD..sD..uD..qD..uDRich..uD........PE..L....^O...........!.................y.............`.................................................................D.......=..P.......`...............................................................................h............................text............................... ..`.rdata...E.......F..................@..@.data....k...P.......0..............@....rsrc...`............D..............@..@.reloc..$............J..............@..B................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):129282
                        Entropy (8bit):6.621412156936795
                        Encrypted:false
                        SSDEEP:3072:h3Qj8Ajn/VzK9fmfiCunng05hlOytTBfitzImtw+FU16DA:h3Qjtz/qf1Cung05hlOytTBN+Fqb
                        MD5:D0C9ADA173DA923EFABB53D5A9B28D54
                        SHA1:0CEFE568D2A06BD44FE9DFAB65B1E27BD34DEF11
                        SHA-256:AD01AB517CF1C9F5D30B3EA749C91C5C8FC613E771D25287483023D2066E1523
                        SHA-512:6919CA6D0EB94402B470EF131362AA1FD35BE994161B857FABF4A7ACA7710A757BF490AD6E2F8B5618B53E9BF3390638A9340642035E6A71EA4EEDC94E403E27
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 92%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Z...;z..;z..;z...q..;z..'v..;z.T't..;z.?$p.Y;z..4'..;z..;{..;z.?$q..;z.o=|..;z.?$~..;z.Rich.;z.........................PE..L....^O...........!.....H...................`.....P................................................................ .......h...<....P..`....................`.......................................................`...............................text...BG.......H.................. ..`.rdata...N...`...P...L..............@..@.data............:..................@....rsrc...`....P......................@..@.reloc..r....`......................@..B................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):235266
                        Entropy (8bit):6.653536540157241
                        Encrypted:false
                        SSDEEP:6144:/fbIMsWVgui7vKbeDb2J1dZSbgOtTBpkFqAcURC:X3xu7vKiDb2nnegOtTnkFDC
                        MD5:FFFA05401511AD2A89283C52D0C86472
                        SHA1:99A9FBCAC39B9522D1D628620B69C4CD7CC110F1
                        SHA-256:41A712FD2111C5DDEC6FE58A29C80F19923CC72E88B4508D5A3DAEB236DDF1B8
                        SHA-512:468B9B50B342D0DEBBF81E37983C600E171BD35AB38680F495A8F52D8476735876E2329228D009F2631356E99770371740F97D77235383DB3E00F7ECD12DB6B3
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 88%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............q..q..q..q..q._....q.4.{.Z.q...,..q..p...q.4.z..q.d.w..q.4.u..q.Rich.q.........................PE..L....^O...........!.........8......5..............0.........................P.......................................F......85..........h.................... .......................................................................................text...f........................... ..`CODE.........0...................... ..`.rdata...V.......X..................@..@.data...$....P.......2..............@...DATA.................H..............@...BSS.....e............X..............@....rsrc...h............b..............@..@.reloc...)... ...*...h..............@..B................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):129
                        Entropy (8bit):4.660429712853706
                        Encrypted:false
                        SSDEEP:3:I5Pt+kiEaKC5Sufoms+L4AHSvKZOt+kiEaKC595Ytzvn:INwknaZ5SuMcyvKowknaZ5bsDn
                        MD5:5838B249DFFF3C4BCF6094F52325FB83
                        SHA1:7FB503ACAC1BF4BD0AFCDB4ED0A432CD9314422B
                        SHA-256:ECED495D7F070597196A9C2C800EC4B3A0901F2E40F919A230460DB54C79A352
                        SHA-512:D65D77AD5BF90DD7C32E0CC1E2E8DD711D682FBB46E3411034E6534EE884DDC6017CDDC846B31B89A2DA2CE7E4A216B6B96BA06E6C1C5EF74B751937AD2D5A54
                        Malicious:false
                        Preview:"C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe" ..del "C:\Users\user\AppData\Roaming\Temp\user0.bat"..
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):126
                        Entropy (8bit):4.8419035287667
                        Encrypted:false
                        SSDEEP:3:I5Pt+kiEaKC5SufhADu25U4AHwMF3vBkZOt+kiEaKC595YGjn:INwknaZ5SuJmv5U49wBkowknaZ5bJjn
                        MD5:5EAC731C619F72CF9DF1C72A2D734BE7
                        SHA1:DBD3300B67E578DF5CE04B6A125478BB9718D252
                        SHA-256:03E35825C4136DCCCF6E8BE6A919686A435736872DE16229304150EB47C25796
                        SHA-512:371A96D779D79756DA96C31888C5CE467D906B6ABE37824B8D714539AEF96487D31B57AA1FF46F3EF37B26374097F17FADC715506E35A9DF0D556EEA948CA4D0
                        Malicious:false
                        Preview:"C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe" /i 6788..del "C:\Users\user\AppData\Roaming\Temp\user1.bat"..
                        Process:C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):102
                        Entropy (8bit):4.594912323903514
                        Encrypted:false
                        SSDEEP:3:I5Pt+kiE2J5xAI8JlovKZOt+kiEaKC595YM+vn:INwkn23f8JyvKowknaZ5bEn
                        MD5:777A79CAA1236D029E5BB4C6577A1373
                        SHA1:181B61AB20B758E96304781BB503753948054499
                        SHA-256:575C47B3B66AA387BCBF9526B701F9455249EA114CD7C6574128EC5AAD2C30B6
                        SHA-512:36FFE4EFB594DD2A518405E82A0CA39F901AB2FD81B5A2E7C99218DAB5A02C0157017072A1CB66351583573CC76AFB0126FB0151DF09F7EA6D9B95465622DD65
                        Malicious:false
                        Preview:"C:\Users\user\AppData\Local\Temp\wtmps.exe" ..del "C:\Users\user\AppData\Roaming\Temp\user2.bat"..
                        Process:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):397728
                        Entropy (8bit):4.700439717593888
                        Encrypted:false
                        SSDEEP:96:/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyz:/
                        MD5:E1E47695A0B98432911311352B63EAED
                        SHA1:836142E550301E0FC13C1A047AAE5A2F4481D7CD
                        SHA-256:C67ED34D9254B31E611EE830125C3F2572A1E686F82DEB69E1580FB9A4614CD0
                        SHA-512:DA49234EE2E1D8F9956BA59D4A49FE04D3AB154F5DD60CF7A6C72E9D42DEFE8A4B0AEB38845444FE3A8D9C80976467D2101F7C992A48F98F6A9317D0E61CA961
                        Malicious:false
                        Preview:ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKL
                        Process:C:\Windows\SysWOW64\explorer.exe
                        File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                        Category:modified
                        Size (bytes):809472
                        Entropy (8bit):6.4977514182547225
                        Encrypted:false
                        SSDEEP:12288:8OorOSUTlyRQJok8n3edtG6bV2MEJi099ifVpiLngVqzw8s/KdWGd7rSfjLtVpRT:0OJTI+JL8n3YG6bVDZNUzY55Z
                        MD5:AA2C0EDAD4DE949A1347F8C6A346AAAB
                        SHA1:81D420887F3D87EAD91CA7A4BAFE827D9409BFD9
                        SHA-256:5B516BF84FA5FD2E4159EDCF70916AD775E71257790FF70B2D39A487D0F9DCA1
                        SHA-512:351BF8D28D8EA78FA34A9F3BE413F21458336AB4BDE2BE3DFB3744575B61DDC70C30162FBDD892E864730D9FAC76A06BD923A58250356000AEDC8FF4979035EE
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o............/..........V....................@..................................P........ .................................4.......................................................................................,............................text...(...........................`.P`.data...............................@.@..rdata...+.......,..................@.p@.eh_fram..... ......................@.0@.bss..................................`..idata..4...........................@.0..CRT....4............t..............@.0..tls.... ............v..............@.0..rsrc................x..............@.0.........................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\wtmps.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):204800
                        Entropy (8bit):7.357970003886077
                        Encrypted:false
                        SSDEEP:3072:34LGpbMkFAIk2GOytDDE1wYa+6NjQYryupFsjzuoAxWhZWkZu4pUBRrwCP8T:FbnDk2HcMZYQYcSovhc7AAcCPe
                        MD5:78D3C8705F8BAF7D34E6A6737D1CFA18
                        SHA1:9F09E248A29311DBEEFAE9D85937B13DA042A010
                        SHA-256:2C4C9EC8E9291BA5C73F641AF2E0C3E1BBD257AC40D9FB9D3FAAB7CEBC978905
                        SHA-512:9A3C3175276DA58F1BC8D1138E63238C8D8CCFBFA1A8A1338E88525ECA47F8D745158BB34396B7C3F25E4296BE5F45A71781DA33AD0BBDF7AD88A9C305B85609
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 100%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X....................).......B.......i..............B...............Rich............PE..L...O..M.....................`.......5............@..........................@..................................................x.......$%..............................................................................|............................text...P........................... ..`.rdata..z........ ..................@..@.data...p,..........................@....rsrc...$%.......0..................@..@........................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.703447785090587
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.83%
                        • Windows Screen Saver (13104/52) 0.13%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:test.exe
                        File size:2'614'323 bytes
                        MD5:2a98009ebc2e830e2e2de723312ee8a6
                        SHA1:4d767fa5085f36a9d6c8a70de8106b5e4a6a6802
                        SHA256:0f28c564a6268c2f3203bf3d594cb519dde447032911eebf3b430e925a94915a
                        SHA512:af07aeb62940d7fd562b759f2ca09a42a0955fc880793f2d153fc5bbfa529507dcfe4682ecbfef8cea1aa4c1a83c2b9d3641501c41626925e22abeeb76d3b7c5
                        SSDEEP:49152:5OJTDJA3+OW5ZOxbTChxKCnFnQXBbrtgb/iQvu0UHO9z:5OJvJAux5ZOx6hxvWbrtUTrUHO9z
                        TLSH:74C5D119FA01D474EF1B85B203C6EE7A56362D304A17CC47F9902E2855B3EB779E1B22
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........[....................J.......................................Rich............PE..L...c{TO...................................
                        Icon Hash:89a4b2e5e5cc9cd5
                        Entrypoint:0x40167f
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x4F547B63 [Mon Mar 5 08:37:55 2012 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:730073214094cd328547bf1f72289752
                        Instruction
                        push ebp
                        mov ebp, esp
                        push FFFFFFFFh
                        push 004020F8h
                        push 00401830h
                        mov eax, dword ptr fs:[00000000h]
                        push eax
                        mov dword ptr fs:[00000000h], esp
                        sub esp, 68h
                        push ebx
                        push esi
                        push edi
                        mov dword ptr [ebp-18h], esp
                        xor ebx, ebx
                        mov dword ptr [ebp-04h], ebx
                        push 00000002h
                        pop edi
                        push edi
                        call dword ptr [004020D4h]
                        pop ecx
                        or dword ptr [00403090h], FFFFFFFFh
                        or dword ptr [00403094h], FFFFFFFFh
                        call dword ptr [004020D0h]
                        mov ecx, dword ptr [0040308Ch]
                        mov dword ptr [eax], ecx
                        call dword ptr [004020CCh]
                        mov ecx, dword ptr [00403088h]
                        mov dword ptr [eax], ecx
                        mov eax, dword ptr [004020C8h]
                        mov eax, dword ptr [eax]
                        mov dword ptr [00403098h], eax
                        call 00007F97A0B143AAh
                        cmp dword ptr [00403070h], ebx
                        jne 00007F97A0B1427Eh
                        push 00401822h
                        call dword ptr [004020C4h]
                        pop ecx
                        call 00007F97A0B1437Ch
                        push 0040300Ch
                        push 00403008h
                        call 00007F97A0B14367h
                        mov eax, dword ptr [00403084h]
                        mov dword ptr [ebp-6Ch], eax
                        lea eax, dword ptr [ebp-6Ch]
                        push eax
                        push dword ptr [00403080h]
                        lea eax, dword ptr [ebp-64h]
                        push eax
                        lea eax, dword ptr [ebp-70h]
                        push eax
                        lea eax, dword ptr [ebp-60h]
                        push eax
                        call dword ptr [004020BCh]
                        push 00403004h
                        push 00403000h
                        Programming Language:
                        • [C++] VS98 (6.0) SP6 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x21040x64.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000xe0f4.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000xf4.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x83c0xa006dbb11cce72cc16b887018dd4c34d252False0.569921875data5.438914555753771IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x20000x5c60x600838666d924e8b6e9dfc84f930bd16733False0.515625data4.859194046971246IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x30000xbb0000x2007d6dcdf3bcb22dca4957ddb77c1c8cbfFalse0.130859375Matlab v4 mat-file (little endian) e, numeric, rows 0, columns 00.545273764156015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xbe0000xe0f40xe200e7c931bab9c2d389ac0ab577dc48d249False0.44571003871681414data5.885941048379587IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xbe21c0x4627PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9883623809788964
                        RT_ICON0xc28440x3a48Device independent bitmap graphic, 60 x 120 x 32, image size 0EnglishUnited States0.17868632707774798
                        RT_ICON0xc628c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.204149377593361
                        RT_ICON0xc88340x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0EnglishUnited States0.21893491124260356
                        RT_ICON0xca29c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.2450750469043152
                        RT_ICON0xcb3440x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0EnglishUnited States0.23662790697674418
                        RT_ICON0xcb9fc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.30230496453900707
                        RT_GROUP_ICON0xcbe640x68dataEnglishUnited States0.7596153846153846
                        RT_VERSION0xcbecc0x228dataEnglishUnited States0.4963768115942029
                        DLLImport
                        KERNEL32.dllResumeThread, WriteProcessMemory, VirtualProtectEx, GetModuleFileNameW, DuplicateHandle, GetCurrentProcess, SetFileTime, CopyFileW, GetDriveTypeW, GetFileTime, CreateFileW, SetErrorMode, GetTempFileNameW, GetTempPathW, ExitProcess, Sleep, DeleteFileW, CloseHandle, WaitForSingleObject, CreateProcessW, ReadProcessMemory, GetThreadSelectorEntry, GetThreadContext, GetLastError, lstrlenW, GetModuleHandleW, GetStartupInfoW
                        USER32.dllMessageBoxA
                        SHELL32.dllShellExecuteW
                        MSVCRT.dllmemset, wcscpy, free, _fileno, _chsize, wcsrchr, wcscat, malloc, fclose, fread, fwrite, fseek, _wfopen, sprintf, fflush, _exit, _XcptFilter, exit, _wcmdln, __wgetmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _except_handler3, _controlfp
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 2, 2024 23:25:02.103918076 CEST53624271.1.1.1192.168.2.4

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:17:24:42
                        Start date:02/10/2024
                        Path:C:\Users\user\Desktop\test.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\test.exe"
                        Imagebase:0x400000
                        File size:2'614'323 bytes
                        MD5 hash:2A98009EBC2E830E2E2DE723312EE8A6
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:17:24:42
                        Start date:02/10/2024
                        Path:C:\Windows\SysWOW64\explorer.exe
                        Wow64 process (32bit):true
                        Commandline:explorer.exe
                        Imagebase:0x40000
                        File size:4'514'184 bytes
                        MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:2
                        Start time:17:24:42
                        Start date:02/10/2024
                        Path:C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe"
                        Imagebase:0x400000
                        File size:1'797'699 bytes
                        MD5 hash:252EE18EB5E305056FDC9915B278656F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 100%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:3
                        Start time:17:24:42
                        Start date:02/10/2024
                        Path:C:\Users\user\Desktop\test.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\test.exe"
                        Imagebase:0x400000
                        File size:809'472 bytes
                        MD5 hash:AA2C0EDAD4DE949A1347F8C6A346AAAB
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Target ID:4
                        Start time:17:24:45
                        Start date:02/10/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user0.bat" "
                        Imagebase:0x240000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:17:24:45
                        Start date:02/10/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:17:24:45
                        Start date:02/10/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "
                        Imagebase:0x240000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:17:24:45
                        Start date:02/10/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:17:24:45
                        Start date:02/10/2024
                        Path:C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
                        Imagebase:0x400000
                        File size:1'799'318 bytes
                        MD5 hash:7942494EAC73B2B3281E4A8E94C39376
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        Reputation:low
                        Has exited:true

                        Target ID:9
                        Start time:17:24:49
                        Start date:02/10/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user1.bat" "
                        Imagebase:0x240000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:17:24:49
                        Start date:02/10/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:11
                        Start time:17:24:49
                        Start date:02/10/2024
                        Path:C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Defender\launch.exe" /i 6788
                        Imagebase:0x400000
                        File size:176'386 bytes
                        MD5 hash:DAAC1781C9D22F5743ADE0CB41FEAEBF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 100%, ReversingLabs
                        Reputation:moderate
                        Has exited:true

                        Target ID:12
                        Start time:17:24:52
                        Start date:02/10/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Temp\user2.bat" "
                        Imagebase:0x240000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:13
                        Start time:17:24:52
                        Start date:02/10/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:14
                        Start time:17:24:52
                        Start date:02/10/2024
                        Path:C:\Users\user\AppData\Local\Temp\wtmps.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\Temp\wtmps.exe"
                        Imagebase:0x400000
                        File size:282'624 bytes
                        MD5 hash:75C1467042B38332D1EA0298F29FB592
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 100%, ReversingLabs
                        Has exited:true

                        Target ID:15
                        Start time:17:24:53
                        Start date:02/10/2024
                        Path:C:\Windows\SysWOW64\mscaps.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\system32\mscaps.exe" /C:\Users\user\AppData\Local\Temp\wtmps.exe
                        Imagebase:0x400000
                        File size:204'800 bytes
                        MD5 hash:78D3C8705F8BAF7D34E6A6737D1CFA18
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 100%, ReversingLabs
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:93.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:36
                          Total number of Limit Nodes:7
                          execution_graph 126 4017f8 _exit 80 40167f __set_app_type __p__fmode __p__commode 81 4016f0 80->81 82 401704 81->82 83 4016f8 __setusermatherr 81->83 93 401810 _controlfp 82->93 83->82 85 401709 _initterm __wgetmainargs _initterm 86 401759 85->86 87 40176c GetStartupInfoW 85->87 89 4017b4 GetModuleHandleW 87->89 94 401435 89->94 93->85 95 401442 94->95 107 4014eb GetTempPathW lstrlenW 95->107 97 401461 98 401466 SetErrorMode GetModuleFileNameW 97->98 106 4014bd exit _XcptFilter 97->106 110 401588 _wfopen 98->110 100 401495 101 4014a5 _wfopen 100->101 100->106 102 4014c1 101->102 101->106 115 4015e1 malloc fseek 102->115 108 401549 lstrlenW 107->108 109 40155a CreateProcessW GetLastError 107->109 108->109 109->97 111 4015a0 110->111 112 4015a2 fseek fread 110->112 111->100 113 4015d2 112->113 114 4015d4 fclose 112->114 113->114 114->100 116 401632 free 115->116 117 40161d fread 115->117 118 4014d1 116->118 117->116 117->118 119 401000 CreateProcessW 118->119 120 401062 11 API calls 119->120 121 4012cd 119->121 125 401346 6 API calls 120->125 121->106 123 401252 124 401263 7 API calls 123->124 124->121 125->123

                          Callgraph

                          Control-flow Graph

                          APIs
                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000044,00000000,00000000,?,004017DA,00000002), ref: 00401058
                          • wcscpy.MSVCRT ref: 004011BF
                          • wcscpy.MSVCRT ref: 004011CD
                          • wcscpy.MSVCRT ref: 004011DB
                          • wcscpy.MSVCRT ref: 004011E6
                          • wcscpy.MSVCRT ref: 004011F1
                          • wcscpy.MSVCRT ref: 004011FC
                          • wcscpy.MSVCRT ref: 00401207
                          • GetCurrentProcess.KERNEL32(004017DA,?,00000000,00000000,00000000), ref: 00401227
                          • GetCurrentProcess.KERNEL32(00000000), ref: 0040122A
                          • DuplicateHandle.KERNELBASE(00000000), ref: 0040122D
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00401241
                            • Part of subcall function 00401346: Wow64GetThreadContext.KERNEL32(00401252,?,74DF2EE0,74DF2E80,75977310), ref: 00401366
                            • Part of subcall function 00401346: GetThreadSelectorEntry.KERNEL32(00401252,?,?), ref: 00401379
                            • Part of subcall function 00401346: ReadProcessMemory.KERNELBASE(004017DA,00401252,?,00000B2C,00000000), ref: 004013B5
                            • Part of subcall function 00401346: ReadProcessMemory.KERNELBASE(004017DA,?,?,000001D8,00000000), ref: 004013CE
                            • Part of subcall function 00401346: ReadProcessMemory.KERNELBASE(004017DA,?,004017DA,00000004,00000000), ref: 004013E5
                            • Part of subcall function 00401346: ReadProcessMemory.KERNELBASE(004017DA,59000000,?,00000018,00000000), ref: 004013FA
                          • VirtualProtectEx.KERNELBASE(004017DA,?,00000ABA,00000040,?), ref: 00401279
                          • WriteProcessMemory.KERNELBASE(004017DA,?,004017DA,00000000,00000000), ref: 0040128B
                          • WriteProcessMemory.KERNELBASE(004017DA,?,?,00000ABA,00000000), ref: 004012A8
                          • ResumeThread.KERNELBASE(00000000), ref: 004012B1
                          • CloseHandle.KERNELBASE(00000000), ref: 004012BA
                          • CloseHandle.KERNEL32(004017DA), ref: 004012BF
                          • free.MSVCRT ref: 004012C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1701404604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1701388428.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701420272.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701451740.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_test.jbxd
                          Similarity
                          • API ID: Process$wcscpy$Memory$Read$HandleThread$CloseCurrentWrite$ContextCreateDuplicateEntryFileModuleNameProtectResumeSelectorVirtualWow64free
                          • String ID: H0@$\
                          • API String ID: 2752700894-3173346701
                          • Opcode ID: ac48f256abe60f638106692655660bf668ea59fe7fa0b28b22a79a51fcc009a3
                          • Instruction ID: 8b8ae813a4a7e84dff6f5983beaa3dde5466e697ef8a21ee926d92c0f9824885
                          • Opcode Fuzzy Hash: ac48f256abe60f638106692655660bf668ea59fe7fa0b28b22a79a51fcc009a3
                          • Instruction Fuzzy Hash: A581A8B5A00319AFDB50DFA4DE44F9A7BF8FB09314F1044A6AA09F3290D7B4AA44CF55

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1701404604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1701388428.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701420272.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701451740.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_test.jbxd
                          Similarity
                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargsexit
                          • String ID:
                          • API String ID: 3327129161-0
                          • Opcode ID: a7e3de02016792ec4999e95f60872d58e145630f5871f36365fbc75c2c295fc9
                          • Instruction ID: dcf3f338402d9aae81c2f9e9b520dcb6328aedd0bbb1ca33c4f5cfcad8a8470b
                          • Opcode Fuzzy Hash: a7e3de02016792ec4999e95f60872d58e145630f5871f36365fbc75c2c295fc9
                          • Instruction Fuzzy Hash: 844160B69013049FC724AFA5DE49AA9BBB8FB04711F20423FEA55B72E0D7784941CB58

                          Control-flow Graph

                          APIs
                          • GetTempPathW.KERNEL32(00000104,?,?), ref: 00401527
                          • lstrlenW.KERNEL32(?), ref: 0040153A
                          • lstrlenW.KERNEL32(?), ref: 00401550
                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,004017DA), ref: 00401570
                          • GetLastError.KERNEL32 ref: 00401576
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1701404604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1701388428.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701420272.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701451740.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_test.jbxd
                          Similarity
                          • API ID: lstrlen$CreateErrorLastPathProcessTemp
                          • String ID: D$\
                          • API String ID: 3489217399-468123767
                          • Opcode ID: dc9c4cdb5cd2c179eff2efa93a4405172a76a7c619e023eed5e3e2870705a702
                          • Instruction ID: e41a149f76cc3bb6082800bb08762e11a74309c2223353c11ef59b11b956732b
                          • Opcode Fuzzy Hash: dc9c4cdb5cd2c179eff2efa93a4405172a76a7c619e023eed5e3e2870705a702
                          • Instruction Fuzzy Hash: 0201257280161CAEDF10DBE8DD4CADE77BCEB84301F104565D605F7150D6B45A49CB59

                          Control-flow Graph

                          APIs
                          • Wow64GetThreadContext.KERNEL32(00401252,?,74DF2EE0,74DF2E80,75977310), ref: 00401366
                          • GetThreadSelectorEntry.KERNEL32(00401252,?,?), ref: 00401379
                          • ReadProcessMemory.KERNELBASE(004017DA,00401252,?,00000B2C,00000000), ref: 004013B5
                          • ReadProcessMemory.KERNELBASE(004017DA,?,?,000001D8,00000000), ref: 004013CE
                          • ReadProcessMemory.KERNELBASE(004017DA,?,004017DA,00000004,00000000), ref: 004013E5
                          • ReadProcessMemory.KERNELBASE(004017DA,59000000,?,00000018,00000000), ref: 004013FA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1701404604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1701388428.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701420272.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701451740.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_test.jbxd
                          Similarity
                          • API ID: MemoryProcessRead$Thread$ContextEntrySelectorWow64
                          • String ID:
                          • API String ID: 2327994366-0
                          • Opcode ID: cc59c708fe6d56a024a7654490b93e11f8ec0de07c3e6b0a674b95a7b8557adb
                          • Instruction ID: 4c816a06d37d702bd32cf5e2019a19290309f903cb74dd37cfec48fec69cc10a
                          • Opcode Fuzzy Hash: cc59c708fe6d56a024a7654490b93e11f8ec0de07c3e6b0a674b95a7b8557adb
                          • Instruction Fuzzy Hash: 8A21EFB294011EBFDB50DB94DD85EEE77BCEB48304F0000B2B605E2151D674EB499F60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 35 4015e1-40161b malloc fseek 36 401632-40163c free 35->36 37 40161d-401630 fread 35->37 39 401640-401643 36->39 37->36 38 40163e 37->38 38->39
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1701404604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1701388428.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701420272.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701451740.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_test.jbxd
                          Similarity
                          • API ID: freadfreefseekmalloc
                          • String ID:
                          • API String ID: 3471334931-0
                          • Opcode ID: 44ac79e4b0f1bcf4dc7ae02b0996f741e120785c0b30b0b1d50e8aeaaf7d3969
                          • Instruction ID: 1d382d1c7b83fd7ead5be8ccf3c43d9436ab592656dc9468087f722dc2080258
                          • Opcode Fuzzy Hash: 44ac79e4b0f1bcf4dc7ae02b0996f741e120785c0b30b0b1d50e8aeaaf7d3969
                          • Instruction Fuzzy Hash: EBF0BB31304211AFDB148F389D5896B7696EB88711F144D3AF316E13E0D6768C15C76A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 40 401588-40159e _wfopen 41 4015a0-4015a1 40->41 42 4015a2-4015d0 fseek fread 40->42 43 4015d2 42->43 44 4015d4-4015e0 fclose 42->44 43->44
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1701404604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1701388428.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701420272.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701451740.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_test.jbxd
                          Similarity
                          • API ID: _wfopenfclosefreadfseek
                          • String ID:
                          • API String ID: 37012567-0
                          • Opcode ID: 58a0d6c72bc6984039d2a2ecf4c9038545cb79c90ea8f2b82e46258bfba3e950
                          • Instruction ID: e227e1178396003585923f979526c72ad7791703c8cdf5e963474d517e879b06
                          • Opcode Fuzzy Hash: 58a0d6c72bc6984039d2a2ecf4c9038545cb79c90ea8f2b82e46258bfba3e950
                          • Instruction Fuzzy Hash: 50F0E2322092607BE6340B2ABD0DF8B7F55EFC5732F104137F709A52E0C6744942C2A9

                          Control-flow Graph

                          APIs
                            • Part of subcall function 004014EB: GetTempPathW.KERNEL32(00000104,?,?), ref: 00401527
                            • Part of subcall function 004014EB: lstrlenW.KERNEL32(?), ref: 0040153A
                            • Part of subcall function 004014EB: lstrlenW.KERNEL32(?), ref: 00401550
                            • Part of subcall function 004014EB: CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,004017DA), ref: 00401570
                            • Part of subcall function 004014EB: GetLastError.KERNEL32 ref: 00401576
                          • SetErrorMode.KERNELBASE(00008003), ref: 0040146B
                          • GetModuleFileNameW.KERNEL32(00000000,00000000,00000104), ref: 0040147F
                            • Part of subcall function 00401588: _wfopen.MSVCRT ref: 00401592
                          • _wfopen.MSVCRT ref: 004014B1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1701404604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1701388428.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701420272.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1701451740.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_test.jbxd
                          Similarity
                          • API ID: Error_wfopenlstrlen$CreateFileLastModeModuleNamePathProcessTemp
                          • String ID:
                          • API String ID: 1387098578-0
                          • Opcode ID: 699a823cd1aa0335894426f21163e42a31b1eaad549d774e9f9875b55d5fa839
                          • Instruction ID: 01e8a217c8b558288f5a1d2cbcf5def80e225c71c86d6d92af73ecd0454d4b8c
                          • Opcode Fuzzy Hash: 699a823cd1aa0335894426f21163e42a31b1eaad549d774e9f9875b55d5fa839
                          • Instruction Fuzzy Hash: 2D114272910109AFDF11EBE4DD85EEE77BCAB04759F10057AF601F11E1DAB99A808A24

                          Execution Graph

                          Execution Coverage:12.8%
                          Dynamic/Decrypted Code Coverage:30.5%
                          Signature Coverage:4.8%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:217
                          execution_graph 18984 10002b03 18985 10002b13 18984->18985 18988 10002b41 18985->18988 18990 100059a2 18985->18990 18991 1000663f _rand 20 API calls 18990->18991 18992 10002b52 18991->18992 18992->18988 18993 100016d3 18992->18993 18994 10001030 18993->18994 18995 1000174c GetEnvironmentVariableW 18994->18995 18996 10001774 18995->18996 18997 100051cd 44 API calls 18996->18997 18998 100017ab CreateDirectoryW 18997->18998 18999 100017c0 GetLastError 18998->18999 19000 100017c6 _rand 18998->19000 18999->19000 19001 100051cd 44 API calls 19000->19001 19002 100017f8 InterlockedIncrement 19001->19002 19002->18988 19149 405e4b 19150 405e5f 19149->19150 19153 40d1b3 19150->19153 19156 40d135 19153->19156 19157 40f997 20 API calls 19156->19157 19158 40d13b 19157->19158 19167 40f9c3 19158->19167 19161 40d173 19163 40f9a0 LeaveCriticalSection 19161->19163 19162 40f9c3 21 API calls 19164 40d164 19162->19164 19165 405e69 19163->19165 19166 40d8c0 _wctomb_s 22 API calls 19164->19166 19166->19161 19168 40f7b8 ctype 20 API calls 19167->19168 19169 40f9cb ctype 19168->19169 19170 40f9eb 19169->19170 19171 40f9db 19169->19171 19177 40f819 LeaveCriticalSection 19170->19177 19176 40f819 LeaveCriticalSection 19171->19176 19174 40d146 19174->19161 19174->19162 19175 40f9f2 HeapSize 19175->19174 19176->19174 19177->19175 20098 40f369 20103 413ca9 20098->20103 20100 40f377 20101 40f3a9 20100->20101 20102 413c34 _wctomb_s 6 API calls 20100->20102 20102->20100 20104 413cc7 InterlockedIncrement 20103->20104 20107 413cb4 20103->20107 20105 413ced 20104->20105 20106 413ce3 InterlockedDecrement 20104->20106 20114 413d18 20105->20114 20108 40f7b8 ctype 20 API calls 20106->20108 20107->20100 20108->20105 20111 413d03 20120 40f819 LeaveCriticalSection 20111->20120 20112 413d0d InterlockedDecrement 20112->20107 20115 413d45 20114->20115 20119 413cfa 20114->20119 20116 413d63 20115->20116 20117 413c34 _wctomb_s 6 API calls 20115->20117 20116->20119 20121 4155cf 20116->20121 20117->20116 20119->20111 20119->20112 20120->20107 20122 41561b _wctomb_s 20121->20122 20123 4155ff LCMapStringW 20121->20123 20126 415681 20122->20126 20127 415664 LCMapStringA 20122->20127 20123->20122 20124 415623 LCMapStringA 20123->20124 20124->20122 20125 41575d 20124->20125 20125->20119 20126->20125 20128 415697 MultiByteToWideChar 20126->20128 20127->20125 20128->20125 20129 4156c1 _wctomb_s 20128->20129 20129->20125 20130 4156f7 MultiByteToWideChar 20129->20130 20130->20125 20131 415710 LCMapStringW 20130->20131 20131->20125 20132 41572b 20131->20132 20133 415731 20132->20133 20135 415771 _wctomb_s 20132->20135 20133->20125 20134 41573f LCMapStringW 20133->20134 20134->20125 20135->20125 20136 4157a9 LCMapStringW 20135->20136 20136->20125 20137 4157c1 WideCharToMultiByte 20136->20137 20137->20125 16254 40d770 GetVersion 16287 40faaf HeapCreate 16254->16287 16256 40d7ce 16257 40d7d3 16256->16257 16258 40d7db 16256->16258 16374 40d89c 16257->16374 16294 40e87c 16258->16294 16262 40d7e0 16263 40d7e4 16262->16263 16264 40d7ec 16262->16264 16265 40d89c 8 API calls 16263->16265 16304 411e10 16264->16304 16267 40d7eb 16265->16267 16267->16264 16268 40d7f6 16318 411d6f 16268->16318 16274 40d80f 16358 411921 16274->16358 16276 40d814 16277 40d819 GetStartupInfoW 16276->16277 16278 40d82b 16277->16278 16279 40d834 16278->16279 16280 40d83d GetModuleHandleA 16279->16280 16369 403057 16280->16369 16282 40d84f 16386 40f8d0 16282->16386 16288 40fae4 16287->16288 16289 40facf 16287->16289 16288->16256 16394 40faeb HeapAlloc 16289->16394 16292 40fae7 16292->16256 16293 40fad8 HeapDestroy 16293->16288 16396 40f78f InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 16294->16396 16296 40e882 TlsAlloc 16297 40e892 16296->16297 16298 40e8cc 16296->16298 16397 4136b5 16297->16397 16298->16262 16300 40e89b 16300->16298 16301 40e8a3 TlsSetValue 16300->16301 16301->16298 16302 40e8b4 16301->16302 16303 40e8ba GetCurrentThreadId 16302->16303 16303->16262 16305 40d239 ctype 20 API calls 16304->16305 16306 411e23 16305->16306 16307 411e31 GetStartupInfoA 16306->16307 16308 40d877 ctype 7 API calls 16306->16308 16310 411f50 16307->16310 16317 411e7f 16307->16317 16308->16307 16311 411fbb SetHandleCount 16310->16311 16312 411f7b GetStdHandle 16310->16312 16311->16268 16312->16310 16314 411f89 GetFileType 16312->16314 16313 40d239 ctype 20 API calls 16313->16317 16314->16310 16315 411ef6 16315->16310 16316 411f18 GetFileType 16315->16316 16316->16315 16317->16310 16317->16313 16317->16315 16319 411d88 GetCommandLineW 16318->16319 16320 411dac 16318->16320 16321 411d9a GetCommandLineA 16319->16321 16322 411d8e 16319->16322 16323 411db1 GetCommandLineW 16320->16323 16324 411da0 16320->16324 16321->16324 16330 40d7fb 16321->16330 16322->16323 16323->16330 16325 411dba GetCommandLineA MultiByteToWideChar 16324->16325 16324->16330 16326 411ddb 16325->16326 16325->16330 16327 40d239 ctype 20 API calls 16326->16327 16328 411de4 16327->16328 16329 411deb MultiByteToWideChar 16328->16329 16328->16330 16329->16330 16331 411dfe 16329->16331 16333 411c02 16330->16333 16332 40d2c5 ctype 20 API calls 16331->16332 16332->16330 16334 411c20 GetEnvironmentStringsW 16333->16334 16335 411c4c 16333->16335 16336 411c28 16334->16336 16338 411c34 GetEnvironmentStrings 16334->16338 16335->16336 16337 411c40 16335->16337 16340 411c61 16336->16340 16341 411c55 GetEnvironmentStringsW 16336->16341 16339 40d805 16337->16339 16342 411cac GetEnvironmentStrings 16337->16342 16347 411cb4 ctype 16337->16347 16338->16337 16338->16339 16380 4119d9 GetModuleFileNameW 16339->16380 16345 40d239 ctype 20 API calls 16340->16345 16341->16339 16341->16340 16342->16339 16342->16347 16343 411ce8 16346 40d239 ctype 20 API calls 16343->16346 16344 411cbb MultiByteToWideChar 16344->16339 16344->16347 16353 411c84 _wctomb_s 16345->16353 16348 411cf7 16346->16348 16347->16343 16347->16344 16350 411cfe FreeEnvironmentStringsA 16348->16350 16357 411d0d ctype 16348->16357 16349 411c8b FreeEnvironmentStringsW 16349->16339 16350->16339 16351 411d55 FreeEnvironmentStringsA 16351->16339 16352 411d16 MultiByteToWideChar 16355 411d5b 16352->16355 16352->16357 16353->16349 16356 40d2c5 ctype 20 API calls 16355->16356 16356->16351 16357->16351 16357->16352 16359 41192b 16358->16359 16360 40d239 ctype 20 API calls 16359->16360 16361 411954 16360->16361 16363 40d877 ctype 7 API calls 16361->16363 16368 411968 16361->16368 16362 4119b5 16364 40d2c5 ctype 20 API calls 16362->16364 16363->16368 16365 4119c1 16364->16365 16365->16276 16366 40d239 ctype 20 API calls 16366->16368 16367 40d877 ctype 7 API calls 16367->16368 16368->16362 16368->16366 16368->16367 16505 403068 16369->16505 16371 40305c 16372 403065 16371->16372 16510 402a96 16371->16510 16372->16282 16375 40d8a5 16374->16375 16376 40d8aa 16374->16376 16377 4120ac ctype 7 API calls 16375->16377 16378 4120e5 ctype 7 API calls 16376->16378 16377->16376 16379 40d8b3 ExitProcess 16378->16379 16381 411a06 16380->16381 16382 40d239 ctype 20 API calls 16381->16382 16383 411a2b 16382->16383 16384 411a3b 16383->16384 16385 40d877 ctype 7 API calls 16383->16385 16384->16274 16385->16384 18948 40f8f2 16386->18948 16389 411764 18964 40e8e3 GetLastError TlsGetValue 16389->18964 16391 411895 UnhandledExceptionFilter 16393 40d869 16391->16393 16392 41176f 16392->16391 16392->16393 16395 40fad4 16394->16395 16395->16292 16395->16293 16396->16296 16401 4136c8 ctype 16397->16401 16398 413701 HeapAlloc 16399 41372c _wctomb_s 16398->16399 16398->16401 16399->16300 16401->16398 16401->16399 16404 40f7b8 16401->16404 16419 40fe7f 16401->16419 16427 40f819 LeaveCriticalSection 16401->16427 16405 40f7d0 16404->16405 16406 40f80e EnterCriticalSection 16404->16406 16428 40d239 16405->16428 16406->16401 16409 40f7e6 16411 40f7b8 ctype 18 API calls 16409->16411 16412 40f7ee 16411->16412 16413 40f7f5 InitializeCriticalSection 16412->16413 16414 40f7ff 16412->16414 16415 40f804 16413->16415 16437 40d2c5 16414->16437 16450 40f819 LeaveCriticalSection 16415->16450 16418 40f80c 16418->16406 16424 40feb1 16419->16424 16420 40ff59 16501 410239 16420->16501 16422 40ff6d 16422->16401 16424->16420 16424->16422 16494 410188 16424->16494 16427->16401 16451 40d24b 16428->16451 16431 40d877 16432 40d880 16431->16432 16433 40d885 16431->16433 16466 4120ac 16432->16466 16472 4120e5 16433->16472 16438 40d30b 16437->16438 16439 40d2ce 16437->16439 16438->16415 16440 40f7b8 ctype 19 API calls 16439->16440 16441 40d2d5 ctype 16440->16441 16442 40d2e1 16441->16442 16443 40d2f4 16441->16443 16487 40fb54 16442->16487 16486 40f819 LeaveCriticalSection 16443->16486 16446 40d2e8 16493 40f819 LeaveCriticalSection 16446->16493 16447 40d2fb RtlFreeHeap 16447->16438 16449 40d2ef 16449->16415 16450->16418 16452 40d248 16451->16452 16454 40d252 ctype 16451->16454 16452->16409 16452->16431 16454->16452 16455 40d277 16454->16455 16456 40d285 16455->16456 16463 40d29b 16455->16463 16458 40f7b8 ctype 19 API calls 16456->16458 16457 40d2ad RtlAllocateHeap 16464 40d2a2 16457->16464 16459 40d28c 16458->16459 16460 40fe7f ctype 5 API calls 16459->16460 16461 40d292 16460->16461 16465 40f819 LeaveCriticalSection 16461->16465 16463->16457 16463->16464 16464->16454 16465->16463 16467 4120b6 16466->16467 16468 4120e3 16467->16468 16469 4120e5 ctype 7 API calls 16467->16469 16468->16433 16470 4120cd 16469->16470 16471 4120e5 ctype 7 API calls 16470->16471 16471->16468 16474 4120f8 16472->16474 16473 40d88e 16473->16409 16474->16473 16475 41220f ctype 16474->16475 16476 412138 16474->16476 16478 412222 GetStdHandle WriteFile 16475->16478 16476->16473 16477 412144 GetModuleFileNameA 16476->16477 16479 41215c ctype 16477->16479 16478->16473 16481 414f31 16479->16481 16482 414f3e LoadLibraryA 16481->16482 16483 414f80 16481->16483 16482->16483 16484 414f4f GetProcAddress 16482->16484 16483->16473 16484->16483 16485 414f66 GetProcAddress GetProcAddress 16484->16485 16485->16483 16486->16447 16489 40fb9b 16487->16489 16488 40fd8d VirtualFree 16490 40fdf1 16488->16490 16489->16488 16492 40fe47 ctype 16489->16492 16491 40fe00 VirtualFree HeapFree 16490->16491 16490->16492 16491->16492 16492->16446 16493->16449 16495 4101cb HeapAlloc 16494->16495 16496 41019b HeapReAlloc 16494->16496 16497 40ff50 16495->16497 16499 4101f1 VirtualAlloc 16495->16499 16496->16497 16498 4101ba 16496->16498 16497->16420 16497->16422 16498->16495 16499->16497 16500 41020b HeapFree 16499->16500 16500->16497 16502 41024b VirtualAlloc 16501->16502 16504 40ff5f 16502->16504 16504->16422 16506 403083 _wctomb_s 16505->16506 16507 40309f GetTempPathW lstrlenW 16506->16507 16508 4030ce lstrlenW 16507->16508 16509 4030df CreateProcessW GetLastError 16507->16509 16508->16509 16509->16371 16511 402aa0 __EH_prolog _wctomb_s 16510->16511 16583 401c0a 16511->16583 16514 402b9e 16514->16372 16518 402af3 16518->16514 16620 401238 16518->16620 16520 402b0e 16520->16514 16628 40d591 16520->16628 16523 402e5c 16867 401ee0 16523->16867 16524 402b2e _wctomb_s 16639 401cb0 16524->16639 16528 402b52 16528->16514 16531 402b60 WideCharToMultiByte 16528->16531 16529 402ba3 16651 401466 FindFirstFileW 16529->16651 16530 402e63 _wctomb_s 16874 4052ca 16530->16874 16531->16514 16533 402bad 16535 402d08 16533->16535 16537 401058 77 API calls 16533->16537 16654 401369 16535->16654 16536 402e9a 16538 402f40 16536->16538 16885 4056a3 16536->16885 16897 404fbf 16536->16897 16539 402be3 16537->16539 16541 401173 58 API calls 16538->16541 16539->16514 16539->16535 16856 401173 16539->16856 16544 402f68 16541->16544 16544->16514 16547 401238 45 API calls 16544->16547 16545 402d21 CopyFileW 16545->16514 16546 402d36 SetFileAttributesW 16545->16546 16662 402974 16546->16662 16550 402fa1 16547->16550 16550->16514 16552 402fa8 WideCharToMultiByte GetCurrentProcessId 16550->16552 16551 402c2c 16551->16535 16553 401238 45 API calls 16551->16553 16555 40d53f 39 API calls 16552->16555 16556 402c63 16553->16556 16554 402d9c WideCharToMultiByte 16779 1000967f 16554->16779 16793 1000232c 16554->16793 16811 1000555d 16554->16811 16819 10007c91 16554->16819 16557 402fff 16555->16557 16556->16535 16559 402c6e WideCharToMultiByte GetCurrentProcessId 16556->16559 16557->16514 16566 40302f Sleep 16557->16566 16862 40d53f 16559->16862 16560 402d64 _wctomb_s 16560->16554 16671 402056 16560->16671 16561 402dc3 16561->16514 16567 402df6 GetDriveTypeW 16561->16567 16566->16514 16567->16514 16568 402e0b WideCharToMultiByte 16567->16568 16581 1000555d 57 API calls 16568->16581 16582 1000967f 35 API calls 16568->16582 16834 10001c52 16568->16834 16570 402ce4 Sleep 16571 401466 2 API calls 16570->16571 16572 402ce2 16571->16572 16572->16535 16572->16570 16573 402d06 16572->16573 16573->16535 16581->16514 16582->16514 16900 401a36 16583->16900 16585 401c1e 16586 40d239 ctype 20 API calls 16585->16586 16593 401c24 16585->16593 16587 401c33 16586->16587 16914 4019b6 16587->16914 16589 401c75 16589->16593 16920 404732 16589->16920 16593->16514 16594 1000180d CreateToolhelp32Snapshot 16593->16594 16595 10001836 Thread32First 16594->16595 16596 402ac6 16594->16596 16597 10001851 16595->16597 16598 1000189f CloseHandle 16595->16598 16607 100026eb 16596->16607 16599 10001852 GetCurrentProcessId 16597->16599 16598->16596 16600 10001890 Thread32Next 16599->16600 16601 1000185d GetCurrentThreadId 16599->16601 16600->16599 16603 1000189e 16600->16603 16601->16600 16602 10001868 OpenThread 16601->16602 16602->16600 16604 1000187b 16602->16604 16603->16598 16605 10001881 ResumeThread 16604->16605 16606 1000188d CloseHandle 16604->16606 16605->16605 16605->16606 16606->16600 16608 1000272e 16607->16608 17198 100025b9 16608->17198 16611 401058 16612 401062 __EH_prolog _wctomb_s 16611->16612 16613 4052ca 58 API calls 16612->16613 16619 401113 16612->16619 16614 4010ac 16613->16614 16615 4056a3 58 API calls 16614->16615 16617 401124 16614->16617 16614->16619 17315 404fd6 16614->17315 16615->16614 16618 401238 45 API calls 16617->16618 16617->16619 16618->16619 16619->16518 16621 4012a5 16620->16621 16622 401295 16620->16622 16621->16520 16622->16621 16623 40130c GetEnvironmentVariableW 16622->16623 16623->16621 16624 40132c 16623->16624 16625 40cc98 44 API calls 16624->16625 16626 40134f 16625->16626 16627 401238 44 API calls 16626->16627 16627->16621 16629 40d5e9 InterlockedIncrement 16628->16629 16638 402b24 16628->16638 16630 40d5fd InterlockedDecrement 16629->16630 16633 40d60b 16629->16633 16631 40f7b8 ctype 20 API calls 16630->16631 16631->16633 16632 40f82e 14 API calls 16632->16633 16633->16632 16634 40d64a 16633->16634 16635 40d651 16634->16635 16636 40d65b InterlockedDecrement 16634->16636 17863 40f819 LeaveCriticalSection 16635->17863 16636->16638 16638->16523 16638->16524 16640 401de7 16639->16640 16641 401cd4 16639->16641 16640->16528 16640->16529 16641->16640 17864 40b8d2 GetSystemTime 16641->17864 16643 401cf7 16643->16640 16644 401d61 GetAdaptersInfo 16643->16644 16645 401d86 GetAdaptersInfo 16643->16645 16646 40d2c5 20 API calls ctype 16643->16646 16647 401d9a inet_addr inet_addr 16643->16647 16649 40d239 20 API calls ctype 16643->16649 16644->16643 16644->16645 16645->16643 16646->16643 16647->16643 16648 401de1 16647->16648 16650 40d2c5 ctype 20 API calls 16648->16650 16649->16643 16650->16640 16652 401484 16651->16652 16653 401488 FindClose 16651->16653 16652->16533 16653->16533 16655 401238 45 API calls 16654->16655 16657 4013a2 16655->16657 16656 401459 16656->16514 16656->16545 16657->16656 16658 401466 2 API calls 16657->16658 16659 4013e9 16658->16659 16659->16656 16660 401414 CreateDirectoryW 16659->16660 16660->16659 16661 401427 GetLastError 16660->16661 16661->16656 16661->16659 16663 40297e __EH_prolog _wctomb_s 16662->16663 16664 4052ca 58 API calls 16663->16664 16668 4029c3 16664->16668 16665 402a80 16665->16560 16666 4056a3 58 API calls 16666->16668 16667 404fd6 76 API calls 16667->16668 16668->16665 16668->16666 16668->16667 17866 405b75 16668->17866 17921 405004 16668->17921 16672 402060 __EH_prolog _wctomb_s 16671->16672 17995 4015ef 16672->17995 16674 4020c0 17999 4015ad 16674->17999 16676 4020d6 16677 401ee0 58 API calls 16676->16677 16678 402111 16677->16678 16679 40b8d2 GetSystemTime 16678->16679 16680 40212c 16679->16680 18002 40be9c 16680->18002 16682 402134 16683 40cc98 44 API calls 16682->16683 16684 40214c 16683->16684 18022 40310d 16684->18022 16686 40216b GetComputerNameW 16687 40cc98 44 API calls 16686->16687 16688 402197 16687->16688 16689 40310d 21 API calls 16688->16689 16690 4021b6 GetUserNameW 16689->16690 16691 40cc98 44 API calls 16690->16691 16692 4021e2 16691->16692 16693 40310d 21 API calls 16692->16693 16694 402201 16693->16694 18028 40318c 16694->18028 16780 100096cc 16779->16780 16781 1000968c 16779->16781 16782 100098e2 26 API calls 16780->16782 16781->16780 16783 100096a7 16781->16783 16784 100096d1 16782->16784 16785 1000b63a 22 API calls 16783->16785 16786 100098eb 26 API calls 16784->16786 16787 100096ae 16785->16787 16788 100096dc 16786->16788 18736 100096e4 16787->18736 16788->16561 16792 100096c4 16792->16561 16794 10002538 16793->16794 16795 1000233e 16793->16795 16794->16561 16796 10002354 GetUserNameW 16795->16796 16797 1000241d 16795->16797 16802 100051cd 44 API calls 16795->16802 16805 1000558e 57 API calls 16795->16805 16810 100054e0 40 API calls 16795->16810 16796->16795 16798 1000558e 57 API calls 16797->16798 16799 1000244e 16798->16799 16799->16794 16800 1000245b WideCharToMultiByte 16799->16800 16801 10002495 16800->16801 18759 100053af 16801->18759 16802->16795 16805->16795 16806 100054e0 40 API calls 16807 100024ba MultiByteToWideChar 16806->16807 16808 10002516 ShellExecuteW 16807->16808 16809 10002506 MultiByteToWideChar 16807->16809 16808->16794 16809->16808 16810->16795 18785 10007fec 16811->18785 16814 10005569 16814->16561 16817 10007321 2 API calls 16818 10005586 16817->16818 16818->16561 16820 1000b5f8 26 API calls 16819->16820 16821 10007c9d 16820->16821 16822 10007cdf 16821->16822 16823 10007cbd 16821->16823 16824 1000b5f8 26 API calls 16821->16824 18909 1000b579 16822->18909 16823->16822 16827 1000b5f8 26 API calls 16823->16827 16826 10007cb4 16824->16826 16829 1000b5f8 26 API calls 16826->16829 16830 10007cc9 CloseHandle 16827->16830 16829->16823 16830->16822 16833 10007cd5 GetLastError 16830->16833 16831 10007d09 16831->16561 16832 1000986f 26 API calls 16832->16831 16833->16822 16835 10001f7a 16834->16835 16843 10001c64 16834->16843 16835->16514 16836 10001c7a GetUserNameW 16836->16843 16837 1000558e 57 API calls 16838 10001d76 16837->16838 16838->16835 16839 10001d83 WideCharToMultiByte 16838->16839 16845 10001dd3 _rand 16839->16845 16840 100051cd 44 API calls 16840->16843 16841 1000558e 57 API calls 16841->16843 16842 10001d45 16842->16837 16843->16836 16843->16840 16843->16841 16843->16842 16844 100054e0 40 API calls 16843->16844 16844->16843 18918 100053eb 16845->18918 16847 10001e24 _rand 16848 100053eb 39 API calls 16847->16848 16849 10001e99 _rand 16848->16849 16850 100053eb 39 API calls 16849->16850 16851 10001f20 _rand 16850->16851 16852 100053af 41 API calls 16851->16852 16853 10001f52 16852->16853 16854 100054e0 40 API calls 16853->16854 16855 10001f5a ShellExecuteW 16854->16855 16855->16835 16857 40117d __EH_prolog _wctomb_s 16856->16857 16858 4052ca 58 API calls 16857->16858 16860 4011be 16858->16860 16859 4056a3 58 API calls 16859->16860 16860->16859 16861 40120b _wctomb_s 16860->16861 16861->16551 18923 410dfa 16862->18923 16865 402cc5 16865->16535 16865->16572 16866 40ea01 35 API calls 16866->16865 16868 402049 16867->16868 16869 401f2d _wctomb_s 16867->16869 16868->16530 16869->16868 16870 401fc5 MultiByteToWideChar CreateThread 16869->16870 16873 40202c TerminateThread 16869->16873 16870->16869 16871 401ffa WaitForSingleObject 16870->16871 18930 401ebe 16870->18930 16871->16869 16872 40200a GetExitCodeThread 16871->16872 16872->16868 16872->16869 16873->16869 16875 40531f 16874->16875 16882 405334 16874->16882 16876 40d4f4 57 API calls 16875->16876 16877 40532c 16876->16877 16878 40db7b 37 API calls 16877->16878 16877->16882 16884 405345 _wctomb_s 16878->16884 16879 40db7b 37 API calls 16879->16884 16880 4053e8 16881 40d30d 40 API calls 16880->16881 16881->16882 16882->16536 16883 40dc34 37 API calls 16883->16884 16884->16879 16884->16880 16884->16883 16886 4052ca 58 API calls 16885->16886 16887 4056bc 16886->16887 16888 405723 16887->16888 16889 40d4f4 57 API calls 16887->16889 16888->16536 16890 40571b 16889->16890 16890->16888 16891 40db7b 37 API calls 16890->16891 16894 405733 _wctomb_s 16891->16894 16892 40db7b 37 API calls 16892->16894 16893 4057c8 _wctomb_s 16895 40d30d 40 API calls 16893->16895 16894->16892 16894->16893 16896 40dc34 37 API calls 16894->16896 16895->16888 16896->16894 16898 4057f3 76 API calls 16897->16898 16899 404fd2 16898->16899 16899->16536 16941 401000 16900->16941 16903 401abb _wctomb_s 16904 401adf GetProcAddress 16903->16904 16905 401b01 _wctomb_s 16904->16905 16906 401b23 GetProcAddress 16905->16906 16907 401b3f _wctomb_s 16906->16907 16908 401b61 GetProcAddress 16907->16908 16909 401b7e _wctomb_s 16908->16909 16910 401ba3 GetProcAddress 16909->16910 16911 401bbc 16910->16911 16912 401bc2 _wctomb_s 16911->16912 16913 40d239 ctype 20 API calls 16911->16913 16912->16585 16913->16912 16915 4019c0 __EH_prolog 16914->16915 16943 4035d5 16915->16943 16917 4019f7 16957 4045ce 16917->16957 16919 401a0c ctype 16919->16589 16921 404748 16920->16921 16933 401c84 16920->16933 16922 404759 VirtualAlloc 16921->16922 16921->16933 16923 404776 VirtualAlloc 16922->16923 16924 40478a GetProcessHeap HeapAlloc VirtualAlloc VirtualAlloc 16922->16924 16923->16924 16923->16933 16925 4047de _wctomb_s 16924->16925 17030 404855 16925->17030 16927 4047f6 17036 404a39 16927->17036 16930 40483c 16930->16933 17063 404bbf 16930->17063 16933->16593 16937 404b35 16933->16937 16938 404b9b 16937->16938 16939 404b51 16937->16939 16938->16593 16939->16938 17189 4150d0 16939->17189 16942 401010 GetModuleHandleW 16941->16942 16942->16903 16944 4035e6 16943->16944 16948 403607 16943->16948 16979 40d68c 16944->16979 16946 4035f9 16983 40d736 RaiseException 16946->16983 16949 40d68c 20 API calls 16948->16949 16950 40363e 16948->16950 16952 403630 16949->16952 16951 40d68c 20 API calls 16950->16951 16956 40366f _wctomb_s 16950->16956 16953 403661 16951->16953 16984 40d736 RaiseException 16952->16984 16985 40d736 RaiseException 16953->16985 16956->16917 16958 4045e0 16957->16958 16959 4045fb 16957->16959 16960 40d68c 20 API calls 16958->16960 16961 404710 16959->16961 16964 404618 16959->16964 16963 4045ed 16960->16963 16962 40d68c 20 API calls 16961->16962 16965 40471d 16962->16965 16989 40d736 RaiseException 16963->16989 16967 40467e 16964->16967 16977 40461e _wctomb_s 16964->16977 17012 40d736 RaiseException 16965->17012 16968 4046e1 16967->16968 16978 404690 _wctomb_s 16967->16978 16970 404677 16968->16970 16973 4042f0 21 API calls 16968->16973 16970->16919 16971 40472b 16973->16968 16976 404580 21 API calls 16976->16978 16977->16970 16990 4042f0 16977->16990 16998 404580 16977->16998 16978->16970 16978->16976 17004 404069 16978->17004 16980 40d6a1 ctype 16979->16980 16986 40cde7 16980->16986 16982 40d6a8 ctype 16982->16946 16983->16948 16984->16950 16985->16956 16987 40d24b ctype 20 API calls 16986->16987 16988 40cdf2 16987->16988 16988->16982 16989->16959 16991 404301 16990->16991 16992 40431c 16990->16992 16993 40d68c 20 API calls 16991->16993 16994 404334 _wctomb_s 16992->16994 17014 403d17 16992->17014 16995 40430e 16993->16995 16994->16977 17013 40d736 RaiseException 16995->17013 16999 40458d 16998->16999 17000 4045a8 16998->17000 17001 40d68c 20 API calls 16999->17001 17000->16977 17002 40459a 17001->17002 17021 40d736 RaiseException 17002->17021 17005 404095 17004->17005 17006 40407a 17004->17006 17011 4040ad _wctomb_s 17005->17011 17023 4039da 17005->17023 17007 40d68c 20 API calls 17006->17007 17008 404087 17007->17008 17022 40d736 RaiseException 17008->17022 17011->16978 17012->16971 17013->16992 17015 403d44 17014->17015 17016 403d29 17014->17016 17015->16994 17017 40d68c 20 API calls 17016->17017 17018 403d36 17017->17018 17020 40d736 RaiseException 17018->17020 17020->17015 17021->17000 17022->17005 17024 403a07 17023->17024 17025 4039ec 17023->17025 17024->17011 17026 40d68c 20 API calls 17025->17026 17027 4039f9 17026->17027 17029 40d736 RaiseException 17027->17029 17029->17024 17031 40487e _wctomb_s 17030->17031 17034 4048fd 17030->17034 17032 4048c0 VirtualAlloc 17031->17032 17033 4048a0 VirtualAlloc 17031->17033 17031->17034 17032->17031 17035 4048bb _wctomb_s 17033->17035 17034->16927 17035->17031 17037 404a5f 17036->17037 17040 404812 17036->17040 17038 404a63 IsBadReadPtr 17037->17038 17039 404a7f LoadLibraryA 17037->17039 17037->17040 17038->17037 17038->17040 17039->17040 17042 404a97 17039->17042 17040->16930 17044 404902 17040->17044 17042->17038 17042->17040 17043 404af6 GetProcAddress 17042->17043 17072 40d8c0 17042->17072 17043->17042 17046 40481d 17044->17046 17048 404923 17044->17048 17045 404944 VirtualFree 17045->17048 17046->16930 17046->16933 17049 10009442 HeapCreate 17046->17049 17056 1000b20a 17046->17056 17047 404993 VirtualProtect 17047->17048 17048->17045 17048->17046 17048->17047 17050 10009462 17049->17050 17051 10009477 17049->17051 17086 10009e56 HeapAlloc 17050->17086 17051->16930 17054 1000947a 17054->16930 17055 1000946b HeapDestroy 17055->17051 17061 1000b21d _rand 17056->17061 17057 1000b256 HeapAlloc 17057->17061 17062 1000b281 _rand 17057->17062 17061->17057 17061->17062 17088 10007128 17061->17088 17103 1000a1ea 17061->17103 17111 10007189 LeaveCriticalSection 17061->17111 17062->16930 17064 404c34 17063->17064 17066 404bcb 17063->17066 17064->16933 17065 404c0f 17068 404c25 GetProcessHeap HeapFree 17065->17068 17069 404c18 VirtualFree 17065->17069 17066->17065 17067 404c07 17066->17067 17070 404bfa FreeLibrary 17066->17070 17071 40d2c5 ctype 20 API calls 17067->17071 17068->17064 17069->17068 17070->17066 17071->17065 17073 40d8db 17072->17073 17074 40d8cd 17072->17074 17076 40d8e2 17073->17076 17079 40d8f0 ctype _wctomb_s 17073->17079 17075 40d239 ctype 20 API calls 17074->17075 17080 40d8d5 17075->17080 17077 40d2c5 ctype 20 API calls 17076->17077 17077->17080 17078 40f7b8 ctype 20 API calls 17078->17079 17079->17078 17079->17080 17081 40d966 HeapAlloc 17079->17081 17082 40d9b8 HeapReAlloc 17079->17082 17083 40f819 LeaveCriticalSection ctype 17079->17083 17084 40fe7f ctype 5 API calls 17079->17084 17085 40fb54 VirtualFree VirtualFree HeapFree ctype 17079->17085 17080->17042 17081->17079 17082->17079 17083->17079 17084->17079 17085->17079 17087 10009467 17086->17087 17087->17054 17087->17055 17089 10007140 17088->17089 17090 1000717e EnterCriticalSection 17088->17090 17112 1000662d 17089->17112 17090->17061 17093 10007156 17095 10007128 _rand 18 API calls 17093->17095 17096 1000715e 17095->17096 17097 10007165 InitializeCriticalSection 17096->17097 17098 1000716f 17096->17098 17099 10007174 17097->17099 17121 100065e5 17098->17121 17134 10007189 LeaveCriticalSection 17099->17134 17102 1000717c 17102->17090 17107 1000a21c 17103->17107 17104 1000a2c4 17185 1000a5a4 17104->17185 17107->17104 17108 1000a2d8 17107->17108 17178 1000a4f3 17107->17178 17108->17061 17111->17061 17135 1000663f 17112->17135 17115 10005c91 17116 10005c9b 17115->17116 17117 10005cad 17116->17117 17150 100094f3 17116->17150 17156 1000952c 17117->17156 17122 1000662b 17121->17122 17123 100065ee 17121->17123 17122->17099 17124 10007128 _rand 19 API calls 17123->17124 17125 100065f5 ctype 17124->17125 17126 10006601 17125->17126 17127 10006614 17125->17127 17170 10009ebf 17126->17170 17177 10007189 LeaveCriticalSection 17127->17177 17130 10006608 17176 10007189 LeaveCriticalSection 17130->17176 17131 1000661b HeapFree 17131->17122 17133 1000660f 17133->17099 17134->17102 17136 1000663c 17135->17136 17138 10006646 _rand 17135->17138 17136->17093 17136->17115 17138->17136 17139 1000666b 17138->17139 17140 10006679 17139->17140 17147 1000668f 17139->17147 17141 10007128 _rand 19 API calls 17140->17141 17143 10006680 17141->17143 17142 100066a1 RtlAllocateHeap 17148 10006696 17142->17148 17144 1000a1ea _rand 5 API calls 17143->17144 17145 10006686 17144->17145 17149 10007189 LeaveCriticalSection 17145->17149 17147->17142 17147->17148 17148->17138 17149->17147 17151 100094fd 17150->17151 17152 1000952a 17151->17152 17153 1000952c _rand 7 API calls 17151->17153 17152->17117 17154 10009514 17153->17154 17155 1000952c _rand 7 API calls 17154->17155 17155->17152 17158 1000953f 17156->17158 17157 10009656 _rand 17160 10009669 GetStdHandle WriteFile 17157->17160 17158->17157 17159 1000957f 17158->17159 17164 10005cb6 17158->17164 17161 1000958b GetModuleFileNameA 17159->17161 17159->17164 17160->17164 17162 100095a3 _rand 17161->17162 17165 1000c300 17162->17165 17164->17093 17166 1000c30d LoadLibraryA 17165->17166 17167 1000c34f 17165->17167 17166->17167 17168 1000c31e GetProcAddress 17166->17168 17167->17164 17168->17167 17169 1000c335 GetProcAddress GetProcAddress 17168->17169 17169->17167 17171 10009f06 17170->17171 17172 1000a0f8 VirtualFree 17171->17172 17175 1000a1b2 ctype 17171->17175 17173 1000a15c 17172->17173 17174 1000a16b VirtualFree HeapFree 17173->17174 17173->17175 17174->17175 17175->17130 17176->17133 17177->17131 17179 1000a536 HeapAlloc 17178->17179 17180 1000a506 HeapReAlloc 17178->17180 17182 1000a2bb 17179->17182 17183 1000a55c VirtualAlloc 17179->17183 17181 1000a525 17180->17181 17180->17182 17181->17179 17182->17104 17182->17108 17183->17182 17184 1000a576 HeapFree 17183->17184 17184->17182 17186 1000a5b6 VirtualAlloc 17185->17186 17188 1000a2ca 17186->17188 17188->17108 17190 415123 17189->17190 17192 4150e8 17189->17192 17191 40f7b8 ctype 20 API calls 17190->17191 17196 415133 17190->17196 17191->17196 17192->16939 17193 41517a 17193->17192 17197 40f819 LeaveCriticalSection 17193->17197 17194 413d18 15 API calls _wctomb_s 17194->17196 17196->17193 17196->17194 17197->17192 17208 10001030 17198->17208 17201 10002659 17210 100051cd 17201->17210 17204 100026c5 LoadLibraryW 17205 100026cf 17204->17205 17206 402ad1 GetModuleFileNameW 17205->17206 17207 100026da GetProcAddress 17205->17207 17206->16611 17207->17206 17209 10001040 GetEnvironmentVariableW 17208->17209 17209->17201 17217 100068bc 17210->17217 17214 10005205 17215 100026ab CopyFileW 17214->17215 17216 100067a4 35 API calls 17214->17216 17215->17204 17215->17205 17216->17215 17218 100051fb 17217->17218 17221 100068e3 __aulldiv __aullrem _rand 17217->17221 17218->17214 17224 100067a4 17218->17224 17219 1000aa1d 31 API calls 17219->17221 17220 10007029 39 API calls 17220->17221 17221->17218 17221->17219 17221->17220 17222 1000705a 39 API calls 17221->17222 17223 10007009 39 API calls 17221->17223 17222->17221 17223->17221 17226 100067ba 17224->17226 17234 1000683e 17224->17234 17225 10006815 17227 10006886 17225->17227 17228 1000681f 17225->17228 17226->17225 17226->17234 17236 1000a9b0 17226->17236 17229 1000967f 35 API calls 17227->17229 17230 10006836 17228->17230 17233 10006846 17228->17233 17229->17234 17232 1000967f 35 API calls 17230->17232 17232->17234 17233->17234 17239 100098f4 17233->17239 17234->17214 17237 1000662d _rand 20 API calls 17236->17237 17238 1000a9c0 17237->17238 17238->17225 17240 10009941 17239->17240 17241 10009901 17239->17241 17273 100098e2 17240->17273 17241->17240 17242 1000991c 17241->17242 17253 1000b63a 17242->17253 17246 10009923 17262 10009959 17246->17262 17252 10009939 17252->17234 17254 1000b665 17253->17254 17255 1000b688 EnterCriticalSection 17253->17255 17256 10007128 _rand 20 API calls 17254->17256 17255->17246 17257 1000b66c 17256->17257 17258 1000b680 17257->17258 17259 1000b673 InitializeCriticalSection 17257->17259 17279 10007189 LeaveCriticalSection 17258->17279 17259->17258 17261 1000b687 17261->17255 17280 1000b5f8 17262->17280 17264 10009965 17265 10009978 SetFilePointer 17264->17265 17266 1000996b 17264->17266 17268 10009990 GetLastError 17265->17268 17270 10009998 17265->17270 17267 100098e2 26 API calls 17266->17267 17269 10009931 17267->17269 17268->17270 17272 1000b699 LeaveCriticalSection 17269->17272 17270->17269 17287 1000986f 17270->17287 17272->17252 17304 100089a1 GetLastError TlsGetValue 17273->17304 17275 100098e7 17276 100098eb 17275->17276 17277 100089a1 _rand 26 API calls 17276->17277 17278 100098f0 17277->17278 17278->17234 17279->17261 17281 1000b604 17280->17281 17282 1000b620 17281->17282 17283 100098e2 26 API calls 17281->17283 17282->17264 17284 1000b628 17283->17284 17285 100098eb 26 API calls 17284->17285 17286 1000b633 17285->17286 17286->17264 17288 100098eb 26 API calls 17287->17288 17289 10009875 17288->17289 17290 100098a8 17289->17290 17292 10009891 17289->17292 17291 100098e2 26 API calls 17290->17291 17293 100098ad 17291->17293 17294 100098b8 17292->17294 17296 1000989b 17292->17296 17293->17269 17295 100098d5 17294->17295 17297 100098c8 17294->17297 17298 100098e2 26 API calls 17295->17298 17299 100098e2 26 API calls 17296->17299 17300 100098e2 26 API calls 17297->17300 17301 100098da 17298->17301 17302 100098a0 17299->17302 17303 100098cd 17300->17303 17301->17269 17302->17269 17303->17269 17305 100089fc SetLastError 17304->17305 17306 100089bd 17304->17306 17305->17275 17307 1000b20a _rand 21 API calls 17306->17307 17308 100089c6 17307->17308 17309 100089f4 17308->17309 17310 100089ce TlsSetValue 17308->17310 17311 10005c91 _rand 7 API calls 17309->17311 17310->17309 17312 100089df _rand 17310->17312 17313 100089fb 17311->17313 17314 100089e5 GetCurrentThreadId 17312->17314 17313->17305 17314->17305 17318 4057f3 17315->17318 17319 4052ca 58 API calls 17318->17319 17320 405825 17319->17320 17366 404fe9 17320->17366 17367 40d4f4 17320->17367 17324 40db7b 37 API calls 17328 4058a1 _wctomb_s 17324->17328 17325 405b67 17326 40d30d 40 API calls 17325->17326 17326->17366 17328->17324 17328->17325 17329 405938 17328->17329 17377 40dc34 17328->17377 17330 40db7b 37 API calls 17329->17330 17331 405949 17330->17331 17361 4059b4 ctype _wctomb_s 17331->17361 17396 404d98 17331->17396 17333 405a60 17384 40d30d 17333->17384 17334 405971 17334->17325 17337 40597c 17334->17337 17336 40dc34 37 API calls 17336->17361 17404 404ec3 17337->17404 17340 405a76 17343 405b10 17340->17343 17344 405a81 17340->17344 17342 40d30d 40 API calls 17342->17340 17345 40d239 ctype 20 API calls 17343->17345 17419 40501b GetTempPathW GetTempFileNameW 17344->17419 17349 405b1f 17345->17349 17347 405aad 17347->17366 17421 40612e 17347->17421 17348 40d4f4 57 API calls 17350 4059a5 17348->17350 17349->17366 17392 406225 17349->17392 17350->17325 17352 4059b2 17350->17352 17352->17361 17355 405b36 17356 405b48 17355->17356 17357 405b50 _wctomb_s 17355->17357 17358 40d2c5 ctype 20 API calls 17356->17358 17364 40d2c5 ctype 20 API calls 17357->17364 17358->17366 17359 405ae8 CopyFileW 17360 405b01 17359->17360 17359->17366 17444 404cc9 17360->17444 17361->17333 17361->17336 17412 40d38a 17361->17412 17364->17366 17366->16614 17462 40d4c3 17367->17462 17369 40588c 17369->17366 17370 40db7b 17369->17370 17657 4106e6 17370->17657 17372 40db87 17663 40dba7 17372->17663 17375 410738 2 API calls 17376 40db9f 17375->17376 17376->17328 17378 4106e6 21 API calls 17377->17378 17379 40dc40 17378->17379 17752 40dc63 17379->17752 17382 410738 2 API calls 17383 40dc5b 17382->17383 17383->17328 17385 40d322 17384->17385 17391 405a68 17384->17391 17386 4106e6 21 API calls 17385->17386 17387 40d328 17386->17387 17781 40d33e 17387->17781 17390 410738 2 API calls 17390->17391 17391->17340 17391->17342 17393 40622e 17392->17393 17395 406238 17393->17395 17795 40dd4b 17393->17795 17395->17355 17398 404df5 17396->17398 17397 404dfb 17397->17334 17398->17397 17399 404e66 GetEnvironmentVariableW 17398->17399 17399->17397 17400 404e86 17399->17400 17821 40cc98 17400->17821 17402 404ea9 17403 404d98 44 API calls 17402->17403 17403->17397 17405 404d98 45 API calls 17404->17405 17407 404efc 17405->17407 17406 404fb3 17406->17325 17406->17348 17407->17406 17840 404d6b FindFirstFileW 17407->17840 17409 404f6e CreateDirectoryW 17410 404f81 GetLastError 17409->17410 17411 404f43 17409->17411 17410->17406 17410->17411 17411->17406 17411->17409 17413 4106e6 21 API calls 17412->17413 17414 40d396 17413->17414 17843 40d3b9 17414->17843 17417 410738 2 API calls 17418 40d3b1 17417->17418 17418->17361 17420 40507d 17419->17420 17420->17347 17422 40d4f4 57 API calls 17421->17422 17423 406141 17422->17423 17424 40614b 17423->17424 17425 40615c 17423->17425 17427 40dd4b 46 API calls 17424->17427 17426 40d4f4 57 API calls 17425->17426 17428 406169 17426->17428 17443 405ace 17427->17443 17429 406171 17428->17429 17430 40618b 17428->17430 17431 40dd4b 46 API calls 17429->17431 17849 405f41 17430->17849 17433 40617e 17431->17433 17435 40d30d 40 API calls 17433->17435 17434 406192 17436 40db7b 37 API calls 17434->17436 17439 406198 17434->17439 17435->17443 17437 4061ae 17436->17437 17856 40d9f8 17437->17856 17440 40d30d 40 API calls 17439->17440 17441 4061c5 17440->17441 17442 40d30d 40 API calls 17441->17442 17442->17443 17443->17359 17443->17366 17445 40d4f4 57 API calls 17444->17445 17446 404cd9 17445->17446 17447 404d10 17446->17447 17448 40db7b 37 API calls 17446->17448 17447->17366 17449 404ceb 17448->17449 17450 40d9f8 33 API calls 17449->17450 17451 404cf1 17450->17451 17452 40d30d 40 API calls 17451->17452 17453 404cf9 17452->17453 17454 40d4f4 57 API calls 17453->17454 17455 404d07 17454->17455 17455->17447 17456 40db7b 37 API calls 17455->17456 17460 404d1e ctype 17456->17460 17457 404d54 17460->17457 17461 40d38a 37 API calls 17460->17461 17461->17460 17470 410d32 17462->17470 17465 40d4cf 17465->17369 17469 40d4ec 17469->17369 17471 40f7b8 ctype 20 API calls 17470->17471 17480 410d40 17471->17480 17472 410d8b 17492 40f819 LeaveCriticalSection 17472->17492 17473 410d92 17475 40d239 ctype 20 API calls 17473->17475 17477 410d9c 17475->17477 17476 40d4c9 17476->17465 17482 410bbc 17476->17482 17477->17472 17479 410db2 InitializeCriticalSection EnterCriticalSection 17477->17479 17479->17472 17480->17472 17480->17473 17493 410715 17480->17493 17498 410767 17480->17498 17483 410bdc 17482->17483 17485 40d4e4 17483->17485 17504 414b9f 17483->17504 17486 410738 17485->17486 17487 410745 17486->17487 17488 41075c LeaveCriticalSection 17486->17488 17487->17488 17489 41074c 17487->17489 17488->17469 17656 40f819 LeaveCriticalSection 17489->17656 17491 41075a 17491->17469 17492->17476 17494 410729 EnterCriticalSection 17493->17494 17495 41071e 17493->17495 17494->17480 17496 40f7b8 ctype 20 API calls 17495->17496 17497 410727 17496->17497 17497->17480 17499 410770 17498->17499 17500 41077b LeaveCriticalSection 17498->17500 17503 40f819 LeaveCriticalSection 17499->17503 17500->17480 17502 410779 17502->17480 17503->17502 17510 414bbc 17504->17510 17505 414ca3 17588 4122ab 17505->17588 17509 414cb3 17509->17485 17510->17505 17511 414c78 17510->17511 17540 41482b 17511->17540 17514 414d25 17516 4122ab 26 API calls 17514->17516 17515 414d3f CreateFileW 17517 414d72 GetFileType 17515->17517 17518 414d5e GetLastError 17515->17518 17519 414d2a 17516->17519 17521 414d86 17517->17521 17522 414d7d CloseHandle 17517->17522 17594 412238 17518->17594 17523 4122b4 26 API calls 17519->17523 17555 41494e 17521->17555 17522->17518 17523->17509 17526 414d6a 17655 414aea LeaveCriticalSection 17526->17655 17530 414e08 17611 4124d6 17530->17611 17531 414def 17533 4122b4 26 API calls 17531->17533 17534 414df4 17533->17534 17534->17526 17574 41078a 17534->17574 17535 414e2f 17535->17534 17538 412322 28 API calls 17535->17538 17538->17534 17541 40f7b8 ctype 20 API calls 17540->17541 17542 41483b 17541->17542 17543 4148ef 17542->17543 17546 41488f EnterCriticalSection 17542->17546 17550 40f7b8 ctype 20 API calls 17542->17550 17552 4148ed 17542->17552 17553 41487a InitializeCriticalSection 17542->17553 17554 40f819 ctype LeaveCriticalSection 17542->17554 17544 40d239 ctype 20 API calls 17543->17544 17547 4148fa 17544->17547 17545 40f819 ctype LeaveCriticalSection 17549 414944 17545->17549 17546->17542 17548 41489f LeaveCriticalSection 17546->17548 17551 414a8b 22 API calls 17547->17551 17547->17552 17548->17542 17549->17514 17549->17515 17550->17542 17551->17552 17552->17545 17553->17542 17554->17542 17556 4149b1 17555->17556 17557 41495c 17555->17557 17558 4122ab 26 API calls 17556->17558 17557->17556 17562 41497b 17557->17562 17560 4149b6 17558->17560 17559 4149a7 17559->17526 17564 412322 17559->17564 17561 4122b4 26 API calls 17560->17561 17561->17559 17562->17559 17563 4149a1 SetStdHandle 17562->17563 17563->17559 17565 414a49 26 API calls 17564->17565 17566 41232e 17565->17566 17567 412341 SetFilePointer 17566->17567 17568 412334 17566->17568 17570 412361 17567->17570 17571 412359 GetLastError 17567->17571 17569 4122ab 26 API calls 17568->17569 17572 412339 17569->17572 17570->17572 17573 412238 26 API calls 17570->17573 17571->17570 17572->17530 17572->17531 17573->17572 17575 410797 17574->17575 17576 4107cf 17574->17576 17575->17576 17577 4107b2 17575->17577 17578 4122ab 26 API calls 17576->17578 17579 414a8b 22 API calls 17577->17579 17580 4107d4 17578->17580 17581 4107b9 17579->17581 17582 4122b4 26 API calls 17580->17582 17584 4107e7 29 API calls 17581->17584 17583 4107df 17582->17583 17583->17526 17585 4107bf 17584->17585 17586 414aea LeaveCriticalSection 17585->17586 17587 4107c7 17586->17587 17587->17526 17589 40e8e3 26 API calls 17588->17589 17590 4122b0 17589->17590 17591 4122b4 17590->17591 17592 40e8e3 26 API calls 17591->17592 17593 4122b9 17592->17593 17593->17509 17595 4122b4 26 API calls 17594->17595 17596 41223e 17595->17596 17597 412271 17596->17597 17599 41225a 17596->17599 17598 4122ab 26 API calls 17597->17598 17601 412276 17598->17601 17600 412281 17599->17600 17602 412264 17599->17602 17603 41229e 17600->17603 17605 412291 17600->17605 17601->17526 17604 4122ab 26 API calls 17602->17604 17606 4122ab 26 API calls 17603->17606 17607 412269 17604->17607 17608 4122ab 26 API calls 17605->17608 17609 4122a3 17606->17609 17607->17526 17610 412296 17608->17610 17609->17526 17610->17526 17613 4124f2 17611->17613 17621 412577 17611->17621 17612 412541 ReadFile 17614 41255a GetLastError 17612->17614 17622 412593 17612->17622 17613->17612 17613->17621 17615 412567 17614->17615 17616 41257b 17614->17616 17617 4122ab 26 API calls 17615->17617 17618 412238 26 API calls 17616->17618 17616->17621 17619 41256c 17617->17619 17618->17621 17620 4122b4 26 API calls 17619->17620 17620->17621 17621->17535 17627 4163f1 17621->17627 17622->17621 17623 41260c ReadFile 17622->17623 17624 41262a GetLastError 17623->17624 17625 412634 17623->17625 17624->17625 17625->17622 17626 412322 28 API calls 17625->17626 17626->17625 17628 4163fe _wctomb_s 17627->17628 17629 412322 28 API calls 17628->17629 17630 41640d 17629->17630 17631 416508 17630->17631 17632 412322 28 API calls 17630->17632 17631->17535 17633 416429 17632->17633 17633->17631 17634 4164b3 17633->17634 17635 41643e _wctomb_s 17633->17635 17636 4164af 17634->17636 17637 412322 28 API calls 17634->17637 17639 41685f 26 API calls 17635->17639 17638 412322 28 API calls 17636->17638 17640 4164c2 17637->17640 17638->17631 17646 41645e 17639->17646 17641 414a49 26 API calls 17640->17641 17642 4164ca SetEndOfFile 17641->17642 17642->17636 17643 4164e1 17642->17643 17645 4122ab 26 API calls 17643->17645 17644 410a31 32 API calls 17644->17646 17647 4164e6 GetLastError 17645->17647 17646->17644 17648 41648c 17646->17648 17650 41649b 17646->17650 17649 4122b4 26 API calls 17647->17649 17651 4122b4 26 API calls 17648->17651 17649->17636 17652 41685f 26 API calls 17650->17652 17653 416491 17651->17653 17652->17636 17653->17650 17654 4122ab 26 API calls 17653->17654 17654->17650 17655->17509 17656->17491 17658 4106f3 17657->17658 17659 41070a EnterCriticalSection 17657->17659 17658->17659 17660 4106fa 17658->17660 17659->17372 17661 40f7b8 ctype 20 API calls 17660->17661 17662 410708 17661->17662 17662->17372 17664 40dc23 17663->17664 17665 40dbb4 17663->17665 17667 4122ab 26 API calls 17664->17667 17665->17664 17666 40dbc6 17665->17666 17668 40dbd6 17666->17668 17674 40da1a 17666->17674 17673 40db95 17667->17673 17685 4108c3 17668->17685 17673->17375 17675 40da33 17674->17675 17676 4122bd 31 API calls 17675->17676 17677 40da3f 17676->17677 17678 40da9d 17677->17678 17680 40da6c 17677->17680 17681 40da53 17677->17681 17679 4122ab 26 API calls 17678->17679 17679->17681 17680->17681 17682 4122bd 31 API calls 17680->17682 17681->17668 17683 40db0a 17682->17683 17683->17681 17684 4122bd 31 API calls 17683->17684 17684->17681 17686 4108d9 17685->17686 17688 40dbe3 17685->17688 17686->17688 17703 4109cc 17686->17703 17689 4122bd 17688->17689 17690 41230a 17689->17690 17691 4122ca 17689->17691 17692 4122ab 26 API calls 17690->17692 17691->17690 17693 4122e5 17691->17693 17694 41230f 17692->17694 17695 414a8b 22 API calls 17693->17695 17696 4122b4 26 API calls 17694->17696 17697 4122ec 17695->17697 17699 41231a 17696->17699 17698 412322 28 API calls 17697->17698 17700 4122fa 17698->17700 17699->17673 17751 414aea LeaveCriticalSection 17700->17751 17702 412302 17702->17673 17704 410a19 17703->17704 17705 4109d9 17703->17705 17706 4122ab 26 API calls 17704->17706 17705->17704 17707 4109f4 17705->17707 17708 410a1e 17706->17708 17717 414a8b 17707->17717 17710 4122b4 26 API calls 17708->17710 17713 410a29 17710->17713 17711 4109fb 17726 410a31 17711->17726 17713->17688 17716 410a11 17716->17688 17718 414ab6 17717->17718 17719 414ad9 EnterCriticalSection 17717->17719 17720 40f7b8 ctype 20 API calls 17718->17720 17719->17711 17721 414abd 17720->17721 17722 414ad1 17721->17722 17723 414ac4 InitializeCriticalSection 17721->17723 17724 40f819 ctype LeaveCriticalSection 17722->17724 17723->17722 17725 414ad8 17724->17725 17725->17719 17727 410a51 17726->17727 17728 410a09 17726->17728 17729 410a7e 17727->17729 17730 412322 28 API calls 17727->17730 17750 414aea LeaveCriticalSection 17728->17750 17731 410b50 WriteFile 17729->17731 17736 410a8f 17729->17736 17730->17729 17733 410b72 GetLastError 17731->17733 17734 410b19 17731->17734 17732 410b8b 17732->17728 17735 4122ab 26 API calls 17732->17735 17733->17734 17734->17728 17734->17732 17740 410b29 17734->17740 17741 410ba5 17735->17741 17736->17732 17737 410adb WriteFile 17736->17737 17738 410b02 17737->17738 17739 410b45 GetLastError 17737->17739 17738->17736 17742 410b17 17738->17742 17739->17742 17743 410b31 17740->17743 17744 410b7d 17740->17744 17745 4122b4 26 API calls 17741->17745 17742->17734 17747 4122ab 26 API calls 17743->17747 17746 412238 26 API calls 17744->17746 17745->17728 17746->17728 17748 410b36 17747->17748 17749 4122b4 26 API calls 17748->17749 17749->17728 17750->17716 17751->17702 17753 40dc51 17752->17753 17755 40dc87 _wctomb_s 17752->17755 17753->17382 17755->17753 17757 412471 17755->17757 17771 412395 17755->17771 17758 4124be 17757->17758 17759 41247e 17757->17759 17761 4122ab 26 API calls 17758->17761 17759->17758 17760 412499 17759->17760 17762 414a8b 22 API calls 17760->17762 17763 4124c3 17761->17763 17765 4124a0 17762->17765 17764 4122b4 26 API calls 17763->17764 17766 4124ce 17764->17766 17767 4124d6 32 API calls 17765->17767 17766->17755 17768 4124ae 17767->17768 17777 414aea LeaveCriticalSection 17768->17777 17770 4124b6 17770->17755 17772 4123a5 17771->17772 17776 4123b1 17771->17776 17773 4123cc 17772->17773 17772->17776 17778 413759 17772->17778 17775 412471 35 API calls 17773->17775 17775->17776 17776->17755 17777->17770 17779 40d239 ctype 20 API calls 17778->17779 17780 413769 17779->17780 17780->17773 17782 40d32e 17781->17782 17783 40d34d 17781->17783 17782->17390 17784 4108c3 35 API calls 17783->17784 17785 40d353 17784->17785 17791 41086a 17785->17791 17788 41078a 32 API calls 17789 40d363 17788->17789 17789->17782 17790 40d2c5 ctype 20 API calls 17789->17790 17790->17782 17792 410876 17791->17792 17794 40d35b 17791->17794 17793 40d2c5 ctype 20 API calls 17792->17793 17792->17794 17793->17794 17794->17788 17796 410715 21 API calls 17795->17796 17797 40dd5b 17796->17797 17806 4126af 17797->17806 17801 40dd72 17817 41273c 17801->17817 17804 410767 2 API calls 17805 40dd83 17804->17805 17805->17395 17808 4126bc 17806->17808 17807 40dd61 17810 40eb19 17807->17810 17808->17807 17809 40d239 ctype 20 API calls 17808->17809 17809->17807 17811 40f23e 17810->17811 17814 40eb40 __aulldiv __aullrem ctype 17810->17814 17811->17801 17812 40f266 39 API calls 17812->17814 17813 4137c6 31 API calls 17813->17814 17814->17811 17814->17812 17814->17813 17815 40f286 39 API calls 17814->17815 17816 40f2b7 39 API calls 17814->17816 17815->17814 17816->17814 17818 40dd7b 17817->17818 17819 412744 17817->17819 17818->17804 17819->17818 17820 4108c3 35 API calls 17819->17820 17820->17818 17822 40eb19 44 API calls 17821->17822 17823 40ccc6 17822->17823 17824 40ccd0 17823->17824 17828 40ea01 17823->17828 17826 40cced 17824->17826 17827 40ea01 35 API calls 17824->17827 17826->17402 17827->17826 17829 40ea9b 17828->17829 17830 40ea17 17828->17830 17829->17824 17830->17829 17831 40ea72 17830->17831 17836 413759 20 API calls 17830->17836 17832 40eae3 17831->17832 17833 40ea7c 17831->17833 17834 4109cc 35 API calls 17832->17834 17835 40ea93 17833->17835 17838 40eaa3 17833->17838 17834->17829 17837 4109cc 35 API calls 17835->17837 17836->17831 17837->17829 17838->17829 17839 4122bd 31 API calls 17838->17839 17839->17829 17841 404d89 17840->17841 17842 404d8d FindClose 17840->17842 17841->17411 17842->17411 17846 40d3a7 17843->17846 17847 40d3dd _wctomb_s 17843->17847 17844 40ea01 35 API calls 17844->17847 17845 4108c3 35 API calls 17845->17847 17846->17417 17847->17844 17847->17845 17847->17846 17848 4109cc 35 API calls 17847->17848 17848->17847 17850 405f4e _wctomb_s 17849->17850 17851 406043 17850->17851 17852 40dc34 37 API calls 17850->17852 17851->17434 17854 405f98 17852->17854 17853 40d38a 37 API calls 17853->17854 17854->17851 17854->17853 17855 40dc34 37 API calls 17854->17855 17855->17854 17857 4106e6 21 API calls 17856->17857 17858 40da04 17857->17858 17859 40da1a 31 API calls 17858->17859 17860 40da0a 17859->17860 17861 410738 2 API calls 17860->17861 17862 40da12 17861->17862 17862->17439 17863->16638 17865 40b8ee 17864->17865 17865->16643 17867 4052ca 58 API calls 17866->17867 17868 405b8f 17867->17868 17869 40d4f4 57 API calls 17868->17869 17878 405e35 17868->17878 17870 405bf6 17869->17870 17871 40db7b 37 API calls 17870->17871 17870->17878 17872 405c0b 17871->17872 17873 40d9f8 33 API calls 17872->17873 17880 405c11 _wctomb_s 17873->17880 17874 40db7b 37 API calls 17874->17880 17875 40d9f8 33 API calls 17875->17880 17876 405e3c 17877 40d30d 40 API calls 17876->17877 17877->17878 17878->16668 17879 40dc34 37 API calls 17879->17880 17880->17874 17880->17875 17880->17876 17880->17879 17881 405cb2 17880->17881 17882 40d9f8 33 API calls 17881->17882 17883 405cb8 17882->17883 17884 40db7b 37 API calls 17883->17884 17885 405cc7 17884->17885 17886 40d9f8 33 API calls 17885->17886 17887 405ccd 17886->17887 17888 40501b 2 API calls 17887->17888 17889 405ce0 17888->17889 17889->17876 17890 40d4f4 57 API calls 17889->17890 17891 405cfc 17890->17891 17891->17876 17892 405d09 17891->17892 17893 40db7b 37 API calls 17892->17893 17897 405d13 17893->17897 17894 405d50 17895 40db7b 37 API calls 17894->17895 17905 405d5b 17895->17905 17896 40dc34 37 API calls 17896->17897 17897->17894 17897->17896 17899 40d38a 37 API calls 17897->17899 17898 405da1 17900 40d30d 40 API calls 17898->17900 17899->17897 17901 405da7 17900->17901 17903 40d4f4 57 API calls 17901->17903 17902 40dc34 37 API calls 17902->17905 17904 405db6 17903->17904 17904->17878 17907 40d30d 40 API calls 17904->17907 17905->17898 17905->17902 17906 40d38a 37 API calls 17905->17906 17906->17905 17908 405dca 17907->17908 17909 40d4f4 57 API calls 17908->17909 17910 405ddd 17909->17910 17910->17878 17911 40db7b 37 API calls 17910->17911 17924 4053f6 17921->17924 17925 40543a _wctomb_s 17924->17925 17926 405442 17925->17926 17927 405475 17925->17927 17928 40501b 2 API calls 17926->17928 17929 40d239 ctype 20 API calls 17927->17929 17931 405453 17928->17931 17930 405487 17929->17930 17953 405017 17930->17953 17986 4061d4 17930->17986 17931->17953 17963 406085 17931->17963 17934 405470 17935 40d4f4 57 API calls 17934->17935 17934->17953 17936 405501 17935->17936 17937 40db7b 37 API calls 17936->17937 17936->17953 17938 405519 17937->17938 17939 40d4f4 57 API calls 17938->17939 17955 40554f _wctomb_s 17938->17955 17940 405533 17939->17940 17941 405547 17940->17941 17942 40553c 17940->17942 17943 40db7b 37 API calls 17941->17943 17944 40d30d 40 API calls 17942->17944 17943->17955 17944->17953 17945 405616 17946 40d38a 37 API calls 17945->17946 17948 40564a 17946->17948 17947 40dc34 37 API calls 17947->17955 17949 40d30d 40 API calls 17948->17949 17950 405652 17949->17950 17951 405662 17950->17951 17952 40d30d 40 API calls 17950->17952 17951->17953 17954 40d2c5 ctype 20 API calls 17951->17954 17952->17951 17953->16668 17954->17953 17955->17945 17955->17947 17956 40d38a 37 API calls 17955->17956 17957 405678 17955->17957 17956->17955 17958 40d30d 40 API calls 17957->17958 17959 405680 17958->17959 17960 40568f 17959->17960 17961 40d30d 40 API calls 17959->17961 17960->17953 17962 40d2c5 ctype 20 API calls 17960->17962 17961->17960 17962->17953 17964 40d4f4 57 API calls 17963->17964 17965 406098 17964->17965 17966 4060a2 17965->17966 17967 4060b3 17965->17967 17968 40dd4b 46 API calls 17966->17968 17969 40d4f4 57 API calls 17967->17969 17985 4060af 17968->17985 17970 4060c0 17969->17970 17971 4060e2 17970->17971 17972 4060c8 17970->17972 17990 405e6b 17971->17990 17974 40dd4b 46 API calls 17972->17974 17976 4060d5 17974->17976 17975 4060eb 17978 40db7b 37 API calls 17975->17978 17980 4060f2 17975->17980 17977 40d30d 40 API calls 17976->17977 17977->17985 17979 406108 17978->17979 17981 40d9f8 33 API calls 17979->17981 17982 40d30d 40 API calls 17980->17982 17981->17980 17983 40611f 17982->17983 17984 40d30d 40 API calls 17983->17984 17984->17985 17985->17934 17987 4061dd 17986->17987 17988 40dd4b 46 API calls 17987->17988 17989 4061e7 17987->17989 17988->17989 17989->17934 17994 405e78 _wctomb_s 17990->17994 17991 40dc34 37 API calls 17991->17994 17992 405f29 17992->17975 17993 40d38a 37 API calls 17993->17994 17994->17991 17994->17992 17994->17993 17996 4015f9 17995->17996 17997 40160b 17995->17997 17996->17997 18060 40c07d 17996->18060 17997->16674 18063 40174d 17999->18063 18001 4015bd 18001->16676 18001->18001 18003 40c05a 18002->18003 18004 40beaf 18002->18004 18003->16682 18004->18003 18005 40cde7 20 API calls 18004->18005 18006 40bef9 18005->18006 18007 40bf20 wsprintfW 18006->18007 18008 40bf3a 18006->18008 18007->18008 18009 40bf51 wsprintfW 18008->18009 18010 40bf6b 18008->18010 18009->18010 18011 40bf82 wsprintfW 18010->18011 18012 40bf9c 18010->18012 18011->18012 18013 40bfcd 18012->18013 18014 40bfb3 wsprintfW 18012->18014 18015 40bfe4 wsprintfW 18013->18015 18016 40bffe 18013->18016 18014->18013 18015->18016 18017 40c015 wsprintfW 18016->18017 18018 40c02f 18016->18018 18017->18018 18164 40df73 18018->18164 18021 40c07d ctype 20 API calls 18021->18003 18023 403122 18022->18023 18024 403127 18022->18024 18025 40c088 21 API calls 18023->18025 18026 40174d 21 API calls 18024->18026 18027 40313a 18024->18027 18025->18024 18026->18027 18027->16686 18027->18027 18061 40d2c5 ctype 20 API calls 18060->18061 18062 40c086 18061->18062 18062->17997 18064 401762 18063->18064 18065 40175d 18063->18065 18067 4017a5 18064->18067 18068 40177a 18064->18068 18070 401776 18064->18070 18075 40c088 18065->18075 18069 401787 18067->18069 18071 4017c0 18067->18071 18074 4015ef 20 API calls 18067->18074 18068->18069 18073 4015ef 20 API calls 18068->18073 18069->18001 18070->18068 18070->18071 18071->18069 18085 4018c3 18071->18085 18073->18069 18074->18071 18076 40c092 __EH_prolog 18075->18076 18091 401571 18076->18091 18078 40c0a6 ctype 18095 40162c 18078->18095 18080 40c0bc 18098 40c0e2 18080->18098 18086 4018cd __EH_prolog 18085->18086 18087 40cde7 20 API calls 18086->18087 18088 401901 18087->18088 18089 4015ef 20 API calls 18088->18089 18090 401963 18089->18090 18090->18069 18092 40157b 18091->18092 18093 401590 18091->18093 18092->18093 18094 40c07d ctype 20 API calls 18092->18094 18093->18078 18094->18093 18107 4016c8 18095->18107 18097 40163c _wctomb_s 18097->18080 18099 40c0ec __EH_prolog 18098->18099 18100 40d68c 20 API calls 18099->18100 18101 40c106 18100->18101 18102 401571 ctype 20 API calls 18101->18102 18103 40c11d 18102->18103 18125 4014a3 18103->18125 18105 40c0cc 18106 40d736 RaiseException 18105->18106 18108 4016d5 18107->18108 18109 4016da 18107->18109 18110 40c088 21 API calls 18108->18110 18111 4016ee 18109->18111 18112 4016f2 18109->18112 18114 40171c 18109->18114 18110->18109 18111->18112 18118 401737 18111->18118 18113 4016ff 18112->18113 18117 401571 ctype 20 API calls 18112->18117 18113->18097 18114->18113 18115 401571 ctype 20 API calls 18114->18115 18114->18118 18115->18118 18117->18113 18118->18113 18119 4017d6 18118->18119 18120 4017e0 __EH_prolog 18119->18120 18121 40cde7 20 API calls 18120->18121 18123 40180f _wctomb_s 18121->18123 18122 401571 ctype 20 API calls 18124 401864 18122->18124 18123->18122 18124->18113 18126 4014b6 18125->18126 18127 4014bb 18125->18127 18139 40c2b4 18126->18139 18129 4014d1 18127->18129 18134 4014ef 18127->18134 18149 401661 18129->18149 18130 401532 18132 4016c8 21 API calls 18130->18132 18138 4014ed _wctomb_s 18132->18138 18134->18130 18136 401509 18134->18136 18137 401571 ctype 20 API calls 18136->18137 18137->18138 18138->18105 18140 40c2be __EH_prolog 18139->18140 18141 401571 ctype 20 API calls 18140->18141 18142 40c2d2 ctype 18141->18142 18143 40162c 21 API calls 18142->18143 18144 40c2e8 18143->18144 18145 40c0e2 21 API calls 18144->18145 18150 401674 18149->18150 18151 40166f 18149->18151 18158 401893 18150->18158 18152 40c2b4 21 API calls 18151->18152 18152->18150 18154 40167b ctype 18159 4018c0 18158->18159 18160 40189e 18158->18160 18159->18154 18160->18159 18161 401571 ctype 20 API calls 18160->18161 18162 4018b0 ctype 18161->18162 18165 40df87 18164->18165 18166 40d239 ctype 20 API calls 18165->18166 18167 40df96 18166->18167 18168 40c054 18167->18168 18169 40d239 ctype 20 API calls 18167->18169 18168->18021 18170 40dfa7 18169->18170 18171 40dfe3 18170->18171 18180 41342a InterlockedIncrement 18170->18180 18172 40d2c5 ctype 20 API calls 18171->18172 18181 41344c InterlockedDecrement 18180->18181 18184 413456 18180->18184 18737 10009704 18736->18737 18754 100096bc 18736->18754 18738 10009731 18737->18738 18740 10009959 28 API calls 18737->18740 18739 10009803 WriteFile 18738->18739 18744 10009742 18738->18744 18742 10009825 GetLastError 18739->18742 18743 100097ca 18739->18743 18740->18738 18741 1000983e 18746 100098e2 26 API calls 18741->18746 18741->18754 18742->18743 18743->18741 18749 100097dc 18743->18749 18743->18754 18744->18741 18744->18743 18745 1000978e WriteFile 18744->18745 18745->18744 18748 100097f8 GetLastError 18745->18748 18747 10009858 18746->18747 18750 100098eb 26 API calls 18747->18750 18748->18743 18751 10009830 18749->18751 18752 100097e4 18749->18752 18750->18754 18755 1000986f 26 API calls 18751->18755 18753 100098e2 26 API calls 18752->18753 18756 100097e9 18753->18756 18758 1000b699 LeaveCriticalSection 18754->18758 18755->18754 18757 100098eb 26 API calls 18756->18757 18757->18754 18758->16792 18760 100072cf 21 API calls 18759->18760 18761 100053bc 18760->18761 18770 10007373 18761->18770 18768 10007321 2 API calls 18769 100024b2 18768->18769 18769->16806 18771 10007380 18770->18771 18772 100053c2 18771->18772 18773 1000662d _rand 20 API calls 18771->18773 18774 1000742a 18772->18774 18773->18772 18775 100053d3 18774->18775 18777 1000744f __aulldiv __aullrem _rand 18774->18777 18781 10007400 18775->18781 18776 10007b6b 35 API calls 18776->18777 18777->18775 18777->18776 18778 1000b318 30 API calls 18777->18778 18779 10007ba0 35 API calls 18777->18779 18780 10007bd1 35 API calls 18777->18780 18778->18777 18779->18777 18780->18777 18782 10007408 18781->18782 18784 100053dc 18781->18784 18783 10007d6d 35 API calls 18782->18783 18782->18784 18783->18784 18784->18768 18786 10007128 _rand 20 API calls 18785->18786 18787 10007ffa 18786->18787 18788 1000804c 18787->18788 18796 10008045 18787->18796 18802 100072fe 18787->18802 18807 10007350 18787->18807 18790 1000662d _rand 20 API calls 18788->18790 18792 10008056 18790->18792 18791 10005563 18791->16814 18797 10007e76 18791->18797 18794 1000806c InitializeCriticalSection EnterCriticalSection 18792->18794 18792->18796 18794->18796 18801 10007189 LeaveCriticalSection 18796->18801 18800 10007e96 18797->18800 18798 1000557e 18798->16817 18800->18798 18813 1000b74e 18800->18813 18801->18791 18803 10007312 EnterCriticalSection 18802->18803 18804 10007307 18802->18804 18803->18787 18805 10007128 _rand 20 API calls 18804->18805 18806 10007310 18805->18806 18806->18787 18808 10007364 LeaveCriticalSection 18807->18808 18809 10007359 18807->18809 18808->18787 18812 10007189 LeaveCriticalSection 18809->18812 18811 10007362 18811->18787 18812->18811 18817 1000b76b 18813->18817 18814 1000b852 18815 100098e2 26 API calls 18814->18815 18816 1000b857 18815->18816 18818 100098eb 26 API calls 18816->18818 18817->18814 18820 1000b827 18817->18820 18819 1000b862 18818->18819 18819->18798 18849 1000b3da 18820->18849 18823 1000b8d4 18825 100098e2 26 API calls 18823->18825 18824 1000b8ee CreateFileW 18826 1000b921 GetFileType 18824->18826 18827 1000b90d GetLastError 18824->18827 18830 1000b8d9 18825->18830 18828 1000b935 18826->18828 18829 1000b92c CloseHandle 18826->18829 18831 1000986f 26 API calls 18827->18831 18864 1000b4fd 18828->18864 18829->18827 18832 100098eb 26 API calls 18830->18832 18835 1000b919 18831->18835 18832->18819 18901 1000b699 LeaveCriticalSection 18835->18901 18837 10009959 28 API calls 18838 1000b993 18837->18838 18839 1000b9b7 18838->18839 18840 1000b99e 18838->18840 18842 10009c7d 32 API calls 18839->18842 18841 100098eb 26 API calls 18840->18841 18843 1000b9a3 18841->18843 18844 1000b9c7 18842->18844 18843->18835 18846 10007c34 32 API calls 18843->18846 18845 1000b9de 18844->18845 18873 1000cc71 18844->18873 18845->18843 18847 10009959 28 API calls 18845->18847 18846->18835 18847->18843 18850 10007128 _rand 20 API calls 18849->18850 18861 1000b3ea 18850->18861 18851 1000b49e 18852 1000662d _rand 20 API calls 18851->18852 18856 1000b4a9 18852->18856 18853 1000b49c 18902 10007189 LeaveCriticalSection 18853->18902 18855 1000b43e EnterCriticalSection 18857 1000b44e LeaveCriticalSection 18855->18857 18855->18861 18856->18853 18860 1000b63a 22 API calls 18856->18860 18857->18861 18858 1000b4f3 18858->18823 18858->18824 18859 10007128 _rand 20 API calls 18859->18861 18860->18853 18861->18851 18861->18853 18861->18855 18861->18859 18862 1000b429 InitializeCriticalSection 18861->18862 18903 10007189 LeaveCriticalSection 18861->18903 18862->18861 18865 1000b560 18864->18865 18866 1000b50b 18864->18866 18867 100098e2 26 API calls 18865->18867 18866->18865 18872 1000b52a 18866->18872 18868 1000b565 18867->18868 18870 100098eb 26 API calls 18868->18870 18869 1000b556 18869->18835 18869->18837 18870->18869 18871 1000b550 SetStdHandle 18871->18869 18872->18869 18872->18871 18874 1000cc7e 18873->18874 18875 10009959 28 API calls 18874->18875 18901->18819 18902->18858 18903->18861 18910 1000b587 18909->18910 18911 1000b5df 18909->18911 18910->18911 18916 1000b5ad 18910->18916 18912 100098e2 26 API calls 18911->18912 18913 1000b5e4 18912->18913 18915 100098eb 26 API calls 18913->18915 18914 10007ce7 18914->16831 18914->16832 18915->18914 18916->18914 18917 1000b5cf SetStdHandle 18916->18917 18917->18914 18919 1000742a 39 API calls 18918->18919 18920 10005419 18919->18920 18921 10005423 18920->18921 18922 100067a4 35 API calls 18920->18922 18921->16847 18922->18921 18924 40d56d 18923->18924 18926 410e1f __aulldiv __aullrem ctype 18923->18926 18924->16865 18924->16866 18925 41153b 35 API calls 18925->18926 18926->18924 18926->18925 18927 411570 35 API calls 18926->18927 18928 4115a1 35 API calls 18926->18928 18929 414e6f 30 API calls 18926->18929 18927->18926 18928->18926 18929->18926 18933 401df4 18930->18933 18938 40cc00 18933->18938 18939 401e2e MultiByteToWideChar 18938->18939 18940 10002761 18939->18940 18941 100027ac 18940->18941 18942 100025b9 48 API calls 18941->18942 18943 100027be 18942->18943 18944 100027c2 gethostbyname 18943->18944 18945 401e4d GetCurrentThread TerminateThread 18943->18945 18944->18945 18946 100027cb _rand 18944->18946 18946->18945 18947 10002807 MultiByteToWideChar 18946->18947 18947->18945 18957 40f997 18948->18957 18951 40f903 GetCurrentProcess TerminateProcess 18952 40f914 18951->18952 18953 40f985 ExitProcess 18952->18953 18954 40f97e 18952->18954 18960 40f9a0 18954->18960 18958 40f7b8 ctype 20 API calls 18957->18958 18959 40f8f8 18958->18959 18959->18951 18959->18952 18963 40f819 LeaveCriticalSection 18960->18963 18962 40d858 18962->16389 18963->18962 18965 40e93e SetLastError 18964->18965 18966 40e8ff 18964->18966 18965->16392 18967 4136b5 21 API calls 18966->18967 18968 40e908 18967->18968 18969 40e910 TlsSetValue 18968->18969 18970 40e936 18968->18970 18969->18970 18971 40e921 18969->18971 18972 40d877 ctype 7 API calls 18970->18972 18974 40e927 GetCurrentThreadId 18971->18974 18973 40e93d 18972->18973 18973->18965 18974->18965 19412 10003639 19413 1000364d 19412->19413 19416 10005ada 19413->19416 19419 10005a5c 19416->19419 19430 10008c51 19419->19430 19424 10005a9a 19456 10008c5a 19424->19456 19425 10008db5 21 API calls 19427 10005a8b 19425->19427 19442 10008c7d 19427->19442 19431 10007128 _rand 20 API calls 19430->19431 19432 10005a62 19431->19432 19433 10008db5 19432->19433 19434 10007128 _rand 20 API calls 19433->19434 19435 10008dbd ctype 19434->19435 19436 10008ddd 19435->19436 19437 10008dcd 19435->19437 19460 10007189 LeaveCriticalSection 19436->19460 19459 10007189 LeaveCriticalSection 19437->19459 19440 10005a6d 19440->19424 19440->19425 19441 10008de4 HeapSize 19441->19440 19443 10008c98 19442->19443 19444 10008c8a 19442->19444 19446 10008c9f 19443->19446 19455 10008cad _rand ctype 19443->19455 19445 1000662d _rand 20 API calls 19444->19445 19449 10008c92 19445->19449 19447 100065e5 ctype 20 API calls 19446->19447 19447->19449 19448 10007128 _rand 20 API calls 19448->19455 19449->19424 19450 10008d23 HeapAlloc 19450->19455 19451 10008d75 HeapReAlloc 19451->19455 19452 10007189 LeaveCriticalSection _rand 19452->19455 19453 1000a1ea _rand 5 API calls 19453->19455 19454 10009ebf VirtualFree VirtualFree HeapFree ctype 19454->19455 19455->19448 19455->19449 19455->19450 19455->19451 19455->19452 19455->19453 19455->19454 19461 10007189 LeaveCriticalSection 19456->19461 19458 10003657 19459->19440 19460->19441 19461->19458 20171 416f16 20174 416b3d 20171->20174 20175 40f7b8 ctype 20 API calls 20174->20175 20176 416b4d 20175->20176 20185 416cea 20176->20185 20179 416b64 20198 40f819 LeaveCriticalSection 20179->20198 20181 416ce2 20183 416b89 GetCPInfo 20184 416b9f 20183->20184 20184->20179 20190 416d90 GetCPInfo 20184->20190 20186 416d0a 20185->20186 20187 416cfa GetOEMCP 20185->20187 20188 416b55 20186->20188 20189 416d0f GetACP 20186->20189 20187->20186 20188->20179 20188->20183 20188->20184 20189->20188 20191 416e7b 20190->20191 20194 416db3 20190->20194 20191->20179 20192 415486 _wctomb_s 6 API calls 20193 416e2f 20192->20193 20195 4155cf _wctomb_s 9 API calls 20193->20195 20194->20192 20196 416e53 20195->20196 20197 4155cf _wctomb_s 9 API calls 20196->20197 20197->20191 20198->20181 19488 40d21d 19493 40d1f4 19488->19493 19491 40d232 19492 40c07d ctype 20 API calls 19492->19491 19494 40f7b8 ctype 20 API calls 19493->19494 19495 40d204 19494->19495 19496 40d2c5 ctype 20 API calls 19495->19496 19498 40d212 19495->19498 19496->19498 19500 40f819 LeaveCriticalSection 19498->19500 19499 40d21a 19499->19491 19499->19492 19500->19499 20203 1000cb70 20204 1000cb81 20203->20204 20208 1000cb93 20203->20208 20205 10007128 _rand 20 API calls 20204->20205 20204->20208 20210 1000cbf1 20204->20210 20205->20210 20206 1000cc3f 20206->20208 20211 10007189 LeaveCriticalSection 20206->20211 20207 1000d219 15 API calls 20207->20210 20210->20206 20210->20207 20211->20208 19003 10001f83 19006 10002c82 19003->19006 19024 1000606a 19006->19024 19009 10001f8c 19014 100054e0 40 API calls 19015 10002cb2 19014->19015 19016 1000606a 57 API calls 19015->19016 19017 10002cc0 19016->19017 19017->19009 19018 10005f80 37 API calls 19017->19018 19022 10002cd7 _rand 19018->19022 19019 10002d0d 19020 100054e0 40 API calls 19019->19020 19021 10002d14 DeleteFileA 19020->19021 19021->19009 19022->19019 19023 10005cc4 37 API calls 19022->19023 19023->19022 19041 10006039 19024->19041 19026 10002c92 19026->19009 19027 10005f80 19026->19027 19028 100072cf 21 API calls 19027->19028 19029 10005f8c 19028->19029 19090 10005fac 19029->19090 19032 10007321 2 API calls 19033 10002ca4 19032->19033 19034 10005dfd 19033->19034 19035 100072cf 21 API calls 19034->19035 19036 10005e09 19035->19036 19037 10005e1f 31 API calls 19036->19037 19038 10005e0f 19037->19038 19039 10007321 2 API calls 19038->19039 19040 10002caa 19039->19040 19040->19014 19042 10007fec 24 API calls 19041->19042 19043 1000603f 19042->19043 19044 10006045 19043->19044 19049 100099cc 19043->19049 19044->19026 19047 10007321 2 API calls 19048 10006062 19047->19048 19048->19026 19050 100099eb 19049->19050 19052 1000605a 19050->19052 19053 1000c389 19050->19053 19052->19047 19056 1000c3a6 19053->19056 19054 1000c48d 19055 100098e2 26 API calls 19054->19055 19057 1000c492 19055->19057 19056->19054 19059 1000c462 19056->19059 19058 100098eb 26 API calls 19057->19058 19072 1000c49d 19058->19072 19060 1000b3da 25 API calls 19059->19060 19061 1000c506 19060->19061 19062 1000c529 CreateFileA 19061->19062 19063 1000c50f 19061->19063 19065 1000c548 GetLastError 19062->19065 19066 1000c55c GetFileType 19062->19066 19064 100098e2 26 API calls 19063->19064 19070 1000c514 19064->19070 19067 1000986f 26 API calls 19065->19067 19068 1000c570 19066->19068 19069 1000c567 CloseHandle 19066->19069 19075 1000c554 19067->19075 19074 1000b4fd 27 API calls 19068->19074 19069->19065 19071 100098eb 26 API calls 19070->19071 19071->19072 19072->19052 19076 1000c58b 19074->19076 19089 1000b699 LeaveCriticalSection 19075->19089 19076->19075 19077 10009959 28 API calls 19076->19077 19078 1000c5ce 19077->19078 19079 1000c5f2 19078->19079 19080 1000c5d9 19078->19080 19082 10009c7d 32 API calls 19079->19082 19081 100098eb 26 API calls 19080->19081 19083 1000c5de 19081->19083 19084 1000c602 19082->19084 19083->19075 19086 10007c34 32 API calls 19083->19086 19085 1000c618 19084->19085 19088 1000cc71 34 API calls 19084->19088 19085->19083 19087 10009959 28 API calls 19085->19087 19086->19075 19087->19083 19088->19085 19089->19072 19091 10006028 19090->19091 19092 10005fb9 19090->19092 19094 100098e2 26 API calls 19091->19094 19092->19091 19093 10005fcb 19092->19093 19095 10005fdb 19093->19095 19101 10005e1f 19093->19101 19096 10005f9a 19094->19096 19098 10007d6d 35 API calls 19095->19098 19096->19032 19099 10005fe8 19098->19099 19100 100098f4 31 API calls 19099->19100 19100->19096 19102 10005e38 19101->19102 19103 100098f4 31 API calls 19102->19103 19104 10005e44 19103->19104 19105 10005ea2 19104->19105 19107 10005e71 19104->19107 19111 10005e58 19104->19111 19106 100098e2 26 API calls 19105->19106 19106->19111 19108 100098f4 31 API calls 19107->19108 19107->19111 19109 10005f0f 19108->19109 19110 100098f4 31 API calls 19109->19110 19109->19111 19110->19111 19111->19095 19120 10002a88 19121 10002a95 FreeLibrary 19120->19121 19122 10002aa5 19120->19122 19126 10002be0 19121->19126 19144 10005997 19122->19144 19127 1000558e 57 API calls 19126->19127 19128 10002bf0 19127->19128 19129 10002c27 19128->19129 19130 10005f80 37 API calls 19128->19130 19129->19122 19131 10002c02 19130->19131 19132 10005dfd 33 API calls 19131->19132 19133 10002c08 19132->19133 19134 100054e0 40 API calls 19133->19134 19135 10002c10 19134->19135 19136 1000558e 57 API calls 19135->19136 19137 10002c1e 19136->19137 19137->19129 19138 10005f80 37 API calls 19137->19138 19141 10002c35 _rand 19138->19141 19139 100054e0 40 API calls 19140 10002c72 DeleteFileW 19139->19140 19140->19129 19142 10005cc4 37 API calls 19141->19142 19143 10002c6b 19141->19143 19142->19141 19143->19139 19145 100065e5 ctype 20 API calls 19144->19145 19146 10002aac 19145->19146 19597 4106d2 19609 41091f 19597->19609 19600 4106e5 19601 40f7b8 ctype 20 API calls 19608 4147b5 19601->19608 19603 414825 19604 41481d 19612 40f819 LeaveCriticalSection 19604->19612 19605 40d30d 40 API calls 19605->19608 19606 4147eb DeleteCriticalSection 19607 40d2c5 ctype 20 API calls 19606->19607 19607->19608 19608->19604 19608->19605 19608->19606 19613 410928 19609->19613 19612->19603 19614 40f7b8 ctype 20 API calls 19613->19614 19621 410936 19614->19621 19615 4109b5 19622 40f819 LeaveCriticalSection 19615->19622 19617 410715 21 API calls 19617->19621 19618 4106d7 19618->19600 19618->19601 19619 410767 2 API calls 19619->19621 19620 410895 37 API calls 19620->19621 19621->19615 19621->19617 19621->19619 19621->19620 19622->19618 19663 4162f0 19664 416301 19663->19664 19666 416313 19663->19666 19665 40f7b8 ctype 20 API calls 19664->19665 19664->19666 19668 416371 19664->19668 19665->19668 19667 4163bf 19667->19666 19671 40f819 LeaveCriticalSection 19667->19671 19668->19667 19670 413d18 15 API calls _wctomb_s 19668->19670 19670->19668 19671->19666 18975 40f8f2 18976 40f997 20 API calls 18975->18976 18977 40f8f8 18976->18977 18978 40f903 GetCurrentProcess TerminateProcess 18977->18978 18979 40f914 18977->18979 18978->18979 18980 40f985 ExitProcess 18979->18980 18981 40f97e 18979->18981 18982 40f9a0 LeaveCriticalSection 18981->18982 18983 40f983 18982->18983 19678 100072bb 19690 10007dc9 19678->19690 19681 100072ce 19682 10007128 _rand 20 API calls 19686 1000b2a2 19682->19686 19683 1000b30a 19693 10007189 LeaveCriticalSection 19683->19693 19685 1000b312 19686->19683 19687 1000b2d8 DeleteCriticalSection 19686->19687 19688 100054e0 40 API calls 19686->19688 19689 100065e5 ctype 20 API calls 19687->19689 19688->19686 19689->19686 19694 10007dd2 19690->19694 19693->19685 19695 10007128 _rand 20 API calls 19694->19695 19701 10007de0 19695->19701 19696 10007e5f 19703 10007189 LeaveCriticalSection 19696->19703 19698 100072c0 19698->19681 19698->19682 19699 100072fe 21 API calls 19699->19701 19700 10007350 2 API calls 19700->19701 19701->19696 19701->19699 19701->19700 19702 10007d3f 35 API calls 19701->19702 19702->19701 19703->19698 19112 4136b5 19116 4136c8 ctype 19112->19116 19113 413701 HeapAlloc 19114 41372c _wctomb_s 19113->19114 19113->19116 19115 40f7b8 ctype 20 API calls 19115->19116 19116->19113 19116->19114 19116->19115 19117 40fe7f ctype 5 API calls 19116->19117 19119 40f819 LeaveCriticalSection 19116->19119 19117->19116 19119->19116

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 40318c-4031d1 call 40c470 * 2 GetVersionExW 5 403556 0->5 6 4031d7-4031f4 GetModuleHandleW GetProcAddress 0->6 9 403558-40355c 5->9 7 4031f6-4031fc GetNativeSystemInfo 6->7 8 4031fe-403202 GetSystemInfo 6->8 10 403208-40320f 7->10 8->10 10->5 11 403215-40321c 10->11 11->5 12 403222-403239 call 40c40e 11->12 15 40334b-403352 12->15 16 40323f-403246 12->16 19 4034d4-4034e3 call 40cc7b 15->19 20 403358-40335f 15->20 17 403262-403269 16->17 18 403248-40324c 16->18 24 403285-4032b0 GetModuleHandleW GetProcAddress 17->24 25 40326b-40326f 17->25 21 403255 18->21 22 40324e-403253 18->22 42 403500-40352e call 40cc98 call 40c3e4 19->42 43 4034e5-4034fd call 40c3e4 * 2 19->43 26 403451-403458 20->26 27 403365-40336f GetSystemMetrics 20->27 30 40325a 21->30 22->30 49 4032b6 24->49 50 403339-40333c 24->50 32 403271-403276 25->32 33 403278 25->33 28 40348a-403491 26->28 29 40345a-40346b call 40c3e4 26->29 34 403371-403376 27->34 35 403378-40337c 27->35 28->19 44 403493-4034a4 call 40c3e4 28->44 63 403474 29->63 64 40346d-403472 29->64 41 40325b-403261 call 40c3e4 30->41 45 40327d-403284 call 40c3e4 32->45 33->45 36 4033ab-4033b7 call 40c3e4 34->36 37 403385-403389 35->37 38 40337e-403383 35->38 76 403444-40344b 36->76 77 4033bd-4033c2 36->77 47 403392-403396 37->47 48 40338b-403390 37->48 38->36 41->17 103 403530-403535 42->103 104 403552-403554 42->104 43->42 69 4034a6-4034ab 44->69 70 4034ad-4034b1 44->70 45->24 59 4033a6 47->59 60 403398-40339d 47->60 48->36 61 403332-403337 49->61 62 4032b8-4032bc 49->62 50->15 65 40333e 50->65 59->36 60->59 72 40339f-4033a4 60->72 74 403343-40334a call 40c3e4 61->74 62->15 73 4032c2 62->73 75 403479-403488 call 40c3e4 63->75 64->75 65->74 80 4034cc-4034d3 call 40c3e4 69->80 81 4034b3-4034b8 70->81 82 4034ba-4034be 70->82 72->36 73->15 84 403301-403306 73->84 85 403324-403329 73->85 86 4032e5-4032ea 73->86 87 403308-40330d 73->87 88 4032c9-4032ce 73->88 89 40332b-403330 73->89 90 4032ec-4032f1 73->90 91 40330f-403314 73->91 92 4032d0-4032d5 73->92 93 4032f3-4032f8 73->93 94 403316-40331b 73->94 95 4032d7-4032dc 73->95 96 4032fa-4032ff 73->96 97 40331d-403322 73->97 98 4032de-4032e3 73->98 74->15 75->19 75->28 76->19 76->26 101 4033c4-4033c8 77->101 102 4033de-4033e3 77->102 80->19 81->80 110 4034c0-4034c5 82->110 111 4034c7 82->111 84->74 85->74 86->74 87->74 88->74 89->74 90->74 91->74 92->74 93->74 94->74 95->74 96->74 97->74 98->74 106 4033d1-4033d5 101->106 107 4033ca-4033cf 101->107 108 4033e5-4033e9 102->108 109 403406-40340c 102->109 116 403537-40353c 103->116 117 40353e-403543 103->117 104->9 106->76 122 4033d7-4033dc 106->122 121 40343c-403443 call 40c3e4 107->121 114 4033f2-4033f6 108->114 115 4033eb-4033f0 108->115 118 403415-403417 109->118 119 40340e-403413 109->119 110->80 111->80 126 4033f8-4033fd 114->126 127 4033ff-403404 114->127 115->121 124 40354a-403551 call 40c3e4 116->124 117->104 125 403545 117->125 128 403420-403422 118->128 129 403419-40341e 118->129 119->121 121->76 122->121 124->104 125->124 126->121 127->121 132 403424-403429 128->132 133 40342b-40342e 128->133 129->121 132->121 135 403430-403435 133->135 136 403437 133->136 135->121 136->121
                          APIs
                          • GetVersionExW.KERNEL32(?,?,?,?,?,00000104,00000000), ref: 004031C9
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,00000104,00000000), ref: 004031E7
                          • GetProcAddress.KERNEL32(00000000), ref: 004031F0
                          • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,00000104,00000000), ref: 004031FA
                          • GetSystemInfo.KERNEL32(?,?,?,?,?,00000104,00000000), ref: 00403202
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetProductInfo,?,?,?,?,00000104,00000000), ref: 0040328F
                          • GetProcAddress.KERNEL32(00000000), ref: 00403292
                          • GetSystemMetrics.USER32(00000059), ref: 00403367
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: System$AddressHandleInfoModuleProc$MetricsNativeVersion
                          • String ID: $ (build %d)$, 32-bit$, 64-bit$Advanced Server$Business Edition$Cluster Server Edition$Compute Cluster Edition$Datacenter Edition$Datacenter Edition (core installation)$Datacenter Edition for Itanium-based Systems$Datacenter Server$Datacenter x64 Edition$Enterprise Edition$Enterprise Edition (core installation)$Enterprise Edition for Itanium-based Systems$Enterprise x64 Edition$GetNativeSystemInfo$GetProductInfo$Home Basic Edition$Home Edition$Home Premium Edition$Microsoft $Professional$Server$Small Business Server$Small Business Server Premium Edition$Standard Edition$Standard Edition (core installation)$Standard x64 Edition$Starter Edition$Ultimate Edition$Web Edition$Web Server Edition$Windows 2000 $Windows 7 $Windows Home Server$Windows Server 2003 R2, $Windows Server 2003, $Windows Server 2008 $Windows Server 2008 R2 $Windows Storage Server 2003$Windows Vista $Windows XP $Windows XP Professional x64 Edition$kernel32.dll
                          • API String ID: 3803635055-653857925
                          • Opcode ID: 7e5a2062480d9b40d16f40cbb051c6ac1362f930747b00ba83a2c01a469456f8
                          • Instruction ID: 052d8262fc2ca6c4471316aa09acfddedcf139bf951b45217982cd0803da5431
                          • Opcode Fuzzy Hash: 7e5a2062480d9b40d16f40cbb051c6ac1362f930747b00ba83a2c01a469456f8
                          • Instruction Fuzzy Hash: 66912A30B48328F6DF215F90AC86BEE6E6C5F25716F74417BE801711E1DA7C5B81861E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 137 402056-402265 call 40c8a0 call 40d510 call 40c470 call 40c433 call 4015ef call 40cc7b call 4015ad call 401ee0 call 40b8d2 call 40be9c call 40cc98 call 40cc7b call 40310d GetComputerNameW call 40cc98 call 40cc7b call 40310d GetUserNameW call 40cc98 call 40cc7b call 40310d call 40318c GetSystemDefaultLangID call 40cc98 call 40cc7b call 40310d call 40d239 186 402267-402274 GetAdaptersInfo 137->186 187 402289-402298 GetAdaptersInfo 137->187 186->187 188 402276-402288 call 40d2c5 call 40d239 186->188 189 40242d-402430 187->189 190 40229e-4022a3 187->190 188->187 191 402432-40243a call 40d2c5 189->191 192 40243b-40243e 189->192 190->192 194 4022a9-4023dd MultiByteToWideChar call 40cc98 call 40cc7b call 40310d call 40cc98 call 40cc7b call 40310d MultiByteToWideChar * 2 190->194 191->192 196 402440-402445 192->196 197 402447 192->197 226 4023e4-402427 call 40cc98 call 40cc7b call 40310d 194->226 227 4023df 194->227 201 40244c-4024dc call 40cc98 call 40cc7b call 40310d call 40cc7b call 40310d call 401031 LoadLibraryA 196->201 197->201 230 402554-402558 201->230 231 4024de-402542 call 401031 GetProcAddress 201->231 226->189 226->194 227->226 234 40258a-40258e 230->234 235 40255a-402585 call 40cc98 call 40cc7b call 40310d 230->235 243 402544-402549 InternetGetConnectedState 231->243 244 40254b-40254e FreeLibrary 231->244 237 4025c0-4025c4 234->237 238 402590-4025bb call 40cc98 call 40cc7b call 40310d 234->238 235->234 245 4025f6-4025fa 237->245 246 4025c6-4025f1 call 40cc98 call 40cc7b call 40310d 237->246 238->237 243->244 244->230 252 40262c-402630 245->252 253 4025fc-402627 call 40cc98 call 40cc7b call 40310d 245->253 246->245 256 402662-40276d call 40cc98 call 40cc7b call 40310d call 40cc98 call 40cc7b call 40310d GetTempPathW GetTempFileNameW * 2 call 40d4f4 252->256 257 402632-40265d call 40cc98 call 40cc7b call 40310d 252->257 253->252 290 402773-402778 256->290 291 402954 256->291 257->256 293 40277a 290->293 294 40277f-402800 call 40d38a call 40d30d call 40c8c0 * 2 call 10002541 290->294 292 402956-402973 call 4015ef 291->292 293->294 294->291 306 402806-4028bd call 405085 call 405147 call 404fed 294->306 312 4028c2-40294d WideCharToMultiByte * 2 306->312 312->291 315 40294f-402952 312->315 315->292
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040205B
                            • Part of subcall function 00401EE0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000104,?,00000104), ref: 00401FD6
                            • Part of subcall function 00401EE0: CreateThread.KERNEL32(00000000,00000000,00401EBE,?,00000000,?), ref: 00401FEE
                            • Part of subcall function 00401EE0: WaitForSingleObject.KERNEL32(00000000,00002710), ref: 00402000
                            • Part of subcall function 00401EE0: GetExitCodeThread.KERNEL32(00000000,?), ref: 00402014
                            • Part of subcall function 0040B8D2: GetSystemTime.KERNEL32(?,?,?,00401CF7,?,?,?,00424D98,00000104), ref: 0040B8DC
                            • Part of subcall function 0040BE9C: wsprintfW.USER32 ref: 0040BF29
                            • Part of subcall function 0040BE9C: wsprintfW.USER32 ref: 0040BF5A
                            • Part of subcall function 0040BE9C: wsprintfW.USER32 ref: 0040BF8B
                            • Part of subcall function 0040BE9C: wsprintfW.USER32 ref: 0040BFBC
                          • GetComputerNameW.KERNEL32(?,?), ref: 00402179
                          • GetUserNameW.ADVAPI32(?,?), ref: 004021C4
                            • Part of subcall function 0040318C: GetVersionExW.KERNEL32(?,?,?,?,?,00000104,00000000), ref: 004031C9
                            • Part of subcall function 0040318C: GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,00000104,00000000), ref: 004031E7
                            • Part of subcall function 0040318C: GetProcAddress.KERNEL32(00000000), ref: 004031F0
                            • Part of subcall function 0040318C: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,00000104,00000000), ref: 004031FA
                            • Part of subcall function 0040318C: GetModuleHandleW.KERNEL32(kernel32.dll,GetProductInfo,?,?,?,?,00000104,00000000), ref: 0040328F
                            • Part of subcall function 0040318C: GetProcAddress.KERNEL32(00000000), ref: 00403292
                          • GetSystemDefaultLangID.KERNEL32(?,00000000), ref: 0040220E
                          • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 0040226C
                          • GetAdaptersInfo.IPHLPAPI(?,?), ref: 00402291
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000100,?,00000100,?,?,?,00000000), ref: 004022D8
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000010,?,00000010,?,00000000,?,?,?,?,?,?,?,?), ref: 004023B5
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000010,?,00000010,?,?,?,?,?,?,?,?,00000000), ref: 004023CC
                          • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,00421154,00000000,?,00000000,?,?), ref: 004024D1
                          • GetProcAddress.KERNEL32(?,?), ref: 0040253A
                          • InternetGetConnectedState.WININET(?,00000000), ref: 00402549
                          • FreeLibrary.KERNEL32(?), ref: 0040254E
                          • GetTempPathW.KERNEL32(00000104,?,?,00000000,?,?,?,?,00000000), ref: 0040271E
                          • GetTempFileNameW.KERNEL32(?,004210C0,00000000,?,?,?,?,?,00000000), ref: 0040273E
                          • GetTempFileNameW.KERNEL32(?,004210B8,00000000,?,?,?,?,?,00000000), ref: 00402754
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000104,?,00000104,00000000,00000000), ref: 0040290E
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000104,?,00000104,00000000,00000000), ref: 00402936
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$Namewsprintf$AddressInfoProcSystemTemp$AdaptersFileHandleLibraryModuleThread$CodeComputerConnectedCreateDefaultExitFreeH_prologInternetLangLoadNativeObjectPathSingleStateTimeUserVersionWait
                          • String ID: $(DHCP)$)$-> IP: %s/%s %s$-> MAC: %02X-%02X-%02X-%02X-%02X-%02X$Adapter: %s$ComputerName: %s$LAN $MODEM $Network: Closed$Network: Internet$OFFLINE $OS: %s (language:0x%X)$PROXY $RAS $TTL: %d (initial:%d)$Time(UTC): %s$UserName: %s$col13[N)*+3K,@=<MnY7X-&Ze3 21<9
                          • API String ID: 2776397759-791159086
                          • Opcode ID: 714c95d6952ae8532d33d2ae3412cf31f457a6f50c4026011f6513dbd7ed768e
                          • Instruction ID: 82a2c2adfaedeff0a0092a37c3b46ab2e2a42cac6b12bc584979c085ee255e03
                          • Opcode Fuzzy Hash: 714c95d6952ae8532d33d2ae3412cf31f457a6f50c4026011f6513dbd7ed768e
                          • Instruction Fuzzy Hash: 014288B2900258AADB11DBA4DC85FDF777CAF09304F4405BBF209B7181DB799A848B69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 569 1000180d-10001830 CreateToolhelp32Snapshot 570 10001832-10001834 569->570 571 10001836-1000184f Thread32First 569->571 572 100018a4-100018a7 570->572 573 10001851 571->573 574 1000189f-100018a2 CloseHandle 571->574 575 10001852-1000185b GetCurrentProcessId 573->575 574->572 576 10001890-1000189c Thread32Next 575->576 577 1000185d-10001866 GetCurrentThreadId 575->577 576->575 579 1000189e 576->579 577->576 578 10001868-10001879 OpenThread 577->578 578->576 580 1000187b-1000187f 578->580 579->574 581 10001881-1000188b ResumeThread 580->581 582 1000188d-1000188e CloseHandle 580->582 581->581 581->582 582->576
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 10001826
                          • Thread32First.KERNEL32(00000000,00000000), ref: 10001842
                          • GetCurrentProcessId.KERNEL32(?,00000004,00000000), ref: 10001852
                          • GetCurrentThreadId.KERNEL32 ref: 1000185D
                          • OpenThread.KERNEL32(00000002,00000000,?,?,00000004,00000000), ref: 1000186F
                          • ResumeThread.KERNEL32(00000000,?,00000004,00000000), ref: 10001882
                          • CloseHandle.KERNEL32(00000000,?,00000004,00000000), ref: 1000188E
                          • Thread32Next.KERNEL32(00000000,0000001C), ref: 10001895
                          • CloseHandle.KERNEL32(00000000,00000004,00000000), ref: 100018A0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessResumeSnapshotToolhelp32
                          • String ID:
                          • API String ID: 859823506-0
                          • Opcode ID: 66e904a91da0d58909503a222a5da84082675bbe6a8bc6ed494a10005acb0f73
                          • Instruction ID: f2e930b831cbdd08f27b90cab4d865d1a0233698321c17ea87ca414643b385ec
                          • Opcode Fuzzy Hash: 66e904a91da0d58909503a222a5da84082675bbe6a8bc6ed494a10005acb0f73
                          • Instruction Fuzzy Hash: 70119E71900259ABF710EB748C85BEFB7ADEF003D0F108511F611B6089CBB4AA858B71

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 911 404732-404742 912 404847-404849 911->912 913 404748-404753 911->913 914 404850-404854 912->914 913->912 915 404759-404774 VirtualAlloc 913->915 916 404776-404784 VirtualAlloc 915->916 917 40478a-404801 GetProcessHeap HeapAlloc VirtualAlloc * 2 call 40c8c0 call 404855 915->917 916->912 916->917 922 404803-40480b call 4049bf 917->922 923 40480c-404815 call 404a39 917->923 922->923 928 404840-404846 call 404bbf 923->928 929 404817-404825 call 404902 923->929 928->912 934 404827-40482b 929->934 935 40484e 929->935 934->928 936 40482d-404834 934->936 935->914 937 404836-404839 936->937 938 40484b 936->938 940 40483a call 10009442 937->940 941 40483a call 1000b20a 937->941 938->935 939 40483c-40483e 939->928 939->938 940->939 941->939
                          APIs
                          • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00000000,?,?,?,?,00401C84,00000000,00000001), ref: 0040476D
                          • VirtualAlloc.KERNEL32(00000000,?,00002000,00000004,?,00000000,?,?,?,?,00401C84,00000000,00000001), ref: 0040477D
                          • GetProcessHeap.KERNEL32(00000000,00000014,?,00000000,?,?,?,?,00401C84,00000000,00000001), ref: 0040478E
                          • HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,?,00401C84,00000000,00000001), ref: 00404795
                          • VirtualAlloc.KERNEL32(00000001,?,00001000,00000004,?,00000000,?,?,?,?,00401C84,00000000,00000001), ref: 004047B9
                          • VirtualAlloc.KERNEL32(00000001,?,00001000,00000004,?,00000000,?,?,?,?,00401C84,00000000,00000001), ref: 004047C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Alloc$Virtual$Heap$Process
                          • String ID: t)W
                          • API String ID: 2020977634-2778948157
                          • Opcode ID: 0b5aed4809dcae3756cf1a22090440293038446c4a6b41401dda8afb1c322aa3
                          • Instruction ID: 537f02f18b8e21970bf095ebe7f34f1c2112e700200359e7f210670ce1f1b5cb
                          • Opcode Fuzzy Hash: 0b5aed4809dcae3756cf1a22090440293038446c4a6b41401dda8afb1c322aa3
                          • Instruction Fuzzy Hash: 1D3160B2600305BFD714AFA9DC85F6B7BA8AF88754F14843EF605E7281D774E9008B68
                          APIs
                          • FindFirstFileW.KERNEL32(00402BAD,?), ref: 00401479
                          • FindClose.KERNEL32(00000000), ref: 00401489
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 59c2e92a5655e99502496943e2282ba4184573f97bf7188561b506f46f133912
                          • Instruction ID: 85e77e974d2a6bc85b95dcb03606bac31f48628942dc84b9f603adafd2122286
                          • Opcode Fuzzy Hash: 59c2e92a5655e99502496943e2282ba4184573f97bf7188561b506f46f133912
                          • Instruction Fuzzy Hash: C7D0A73040050C6BCF105F74EC4D4DA3BAD9744369F404260ED21D21F0C730CA4979B8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 317 402a96-402ab4 call 40c8a0 call 40d510 call 401c0a 324 402aba-402af8 call 1000180d call 100026eb GetModuleFileNameW call 401058 317->324 325 40302b-40302d 317->325 324->325 331 402afe-402b13 call 401238 324->331 326 403048-403056 325->326 331->325 334 402b19-402b28 call 40d591 331->334 337 402e5c-402ea5 call 401ee0 call 40c470 call 40c433 call 4052ca 334->337 338 402b2e-402b50 call 40d510 call 401cb0 334->338 362 402f40-402f6d call 401173 337->362 363 402eab-402edc call 4056a3 337->363 347 402b52-402b5a 338->347 348 402ba3-402bb0 call 401466 338->348 350 403020-403026 347->350 351 402b60-402b9e WideCharToMultiByte 347->351 357 402bb6-402be8 call 401058 348->357 358 402d08 348->358 350->325 351->350 361 402d0a-402d1b call 401369 357->361 371 402bee-402bfb 357->371 358->361 361->350 372 402d21-402d30 CopyFileW 361->372 373 402f73-402fa6 call 401238 362->373 374 40301c 362->374 375 402f31-402f3a 363->375 376 402ede-402eed 363->376 371->350 377 402c01-402c31 call 401173 371->377 372->350 378 402d36-402d6b SetFileAttributesW call 402974 372->378 373->374 389 402fa8-40301a WideCharToMultiByte GetCurrentProcessId call 40d53f 373->389 374->350 375->362 375->363 380 402ef6-402ef8 376->380 381 402eef-402ef4 376->381 377->361 393 402c37-402c68 call 401238 377->393 395 402d9c-402dbf WideCharToMultiByte 378->395 396 402d6d-402d8a call 40d510 call 402056 378->396 385 402f17 380->385 386 402efa-402efe 380->386 381->375 381->380 392 402f1c 385->392 390 402f00-402f07 386->390 391 402f09-402f0c 386->391 389->374 414 40302f-40303f Sleep 389->414 390->375 390->391 398 402f1e-402f2e call 404fbf 391->398 399 402f0e-402f15 391->399 392->375 392->398 393->361 404 402c6e-402ce0 WideCharToMultiByte GetCurrentProcessId call 40d53f 393->404 430 402dc0 call 10007c91 395->430 431 402dc0 call 1000232c 395->431 432 402dc0 call 1000555d 395->432 433 402dc0 call 1000967f 395->433 413 402d8f-402d97 396->413 398->375 399->392 404->361 422 402ce2 404->422 406 402dc3-402dc5 406->350 411 402dcb-402e09 call 40c433 GetDriveTypeW 406->411 417 402e0b-402e47 WideCharToMultiByte 411->417 418 402e4c-402e57 411->418 413->395 421 403045-403047 414->421 435 402e49 call 10001c52 417->435 436 402e49 call 1000555d 417->436 437 402e49 call 1000967f 417->437 418->421 421->326 424 402ce4-402cfe Sleep call 401466 422->424 424->361 427 402d00-402d04 424->427 427->424 428 402d06 427->428 428->361 430->406 431->406 432->406 433->406 435->418 436->418 437->418
                          APIs
                          • __EH_prolog.LIBCMT ref: 00402A9B
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe,00000104,?,00000000,?,00403065,0040D84F,00000000), ref: 00402ADF
                            • Part of subcall function 00401058: __EH_prolog.LIBCMT ref: 0040105D
                          • Sleep.KERNEL32(0001D4C0), ref: 0040303F
                            • Part of subcall function 00401CB0: GetAdaptersInfo.IPHLPAPI(00000000,00000280), ref: 00401D66
                            • Part of subcall function 00401CB0: GetAdaptersInfo.IPHLPAPI(00000000,00000280), ref: 00401D8B
                            • Part of subcall function 00401CB0: inet_addr.WS2_32(000001B0), ref: 00401DA1
                            • Part of subcall function 00401CB0: inet_addr.WS2_32(000001C0), ref: 00401DB0
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe,00000104,?,00000104,00000000,00000000), ref: 00402B86
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000104,00000000,00000104,00000000,00000000), ref: 00402CAA
                          • GetCurrentProcessId.KERNEL32 ref: 00402CB0
                          • Sleep.KERNEL32(000003E8), ref: 00402CE9
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AdaptersByteCharH_prologInfoMultiSleepWideinet_addr$CurrentFileModuleNameProcess
                          • String ID: /i %d$/u %d$C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe$C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe$C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                          • API String ID: 3262664952-2187094131
                          • Opcode ID: 7d8fc5e4c102de3cf784049d0c6dc99a83b6fb1ce5ef76f9df1eee29df6d3955
                          • Instruction ID: 4bbd02dc5c401744a1b2f0d44b804cd0e1069e0a9cdfdf3ed85dd48fc2b4bb21
                          • Opcode Fuzzy Hash: 7d8fc5e4c102de3cf784049d0c6dc99a83b6fb1ce5ef76f9df1eee29df6d3955
                          • Instruction Fuzzy Hash: 34F1A5B2A00214ABEB20DBA4DC45BEB77BDEF89304F1004BAF504F61D1DA799E45CB59

                          Control-flow Graph

                          APIs
                          • GetUserNameW.ADVAPI32(?,?), ref: 1000239D
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 10002488
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,?), ref: 100024FD
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,?,?,?,?), ref: 10002514
                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 10002526
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ExecuteNameShellUser
                          • String ID: "%s" %sdel "%s"$%s%s%s%d.bat$\$open$tmp$wt+
                          • API String ID: 1071661744-3710747550
                          • Opcode ID: bc9a6e5162e27da9705036057f49e652a76dff2939cad07ee55e3e4b7bc04dc2
                          • Instruction ID: 1e5fc5fc54b0182e69e4d0566aa8bde90df0a13d479aede635db1cf34de350d7
                          • Opcode Fuzzy Hash: bc9a6e5162e27da9705036057f49e652a76dff2939cad07ee55e3e4b7bc04dc2
                          • Instruction Fuzzy Hash: A4514E72A00158ABEB25CBA4CC94EDFB7B9EB48340F1144AAF609E3150DA759FC58F50

                          Control-flow Graph

                          APIs
                          • GetUserNameW.ADVAPI32(?,?), ref: 10001CC5
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?), ref: 10001DAD
                          • ShellExecuteW.SHELL32(?,open,?), ref: 10001F6D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharExecuteMultiNameShellUserWide
                          • String ID: %s%s%s%d.bat$\$open$tmp$wt+
                          • API String ID: 1401121979-4278069354
                          • Opcode ID: b16f70ae5c3f3ee9d54a52924125b396119716f646ec8ce75c942e49535d2edc
                          • Instruction ID: b4101bf210db583b03f93a028528ca2c63661fc888a937a329b7782714303ac6
                          • Opcode Fuzzy Hash: b16f70ae5c3f3ee9d54a52924125b396119716f646ec8ce75c942e49535d2edc
                          • Instruction Fuzzy Hash: E291AA7294021CBAFB20DB94DC8AFDB736CEB04745F5044A6F309EA0C5EAB59BD48B51

                          Control-flow Graph

                          APIs
                          • GetEnvironmentVariableW.KERNEL32(?,?,00000104), ref: 10001762
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 100017B6
                          • GetLastError.KERNEL32 ref: 100017C0
                          • InterlockedIncrement.KERNEL32(1001103C), ref: 10001800
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CreateDirectoryEnvironmentErrorIncrementInterlockedLastVariable
                          • String ID: %s%s%c%c%c%c$%s\%c%c%c%c%c%c%c%c%c$\
                          • API String ID: 3633764033-1980533215
                          • Opcode ID: a1df38e7ae124333fa33ba4af8a962b120b187a8a8e3fac50d6a8624bacb1ebf
                          • Instruction ID: 75e7eb03eb993b12d01cc441aa5ef8f158e2bd3ceaf2a8d4126e0fd689ac5d56
                          • Opcode Fuzzy Hash: a1df38e7ae124333fa33ba4af8a962b120b187a8a8e3fac50d6a8624bacb1ebf
                          • Instruction Fuzzy Hash: 7631C4B5B403587AF720CA648C45FDB72ADEB48744F0044A5B749FB1C0DAF1AAD44B55

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 687 1000b74e-1000b769 688 1000b774-1000b778 687->688 689 1000b76b-1000b772 687->689 690 1000b77f-1000b786 688->690 689->690 691 1000b788-1000b78b 690->691 692 1000b799-1000b7a2 690->692 693 1000b795 691->693 694 1000b78d-1000b793 691->694 695 1000b7c0 692->695 696 1000b7a4-1000b7a5 692->696 693->692 694->692 694->693 699 1000b7c7-1000b7cd 695->699 697 1000b7b7-1000b7be 696->697 698 1000b7a7-1000b7a8 696->698 697->699 702 1000b852-1000b867 call 100098e2 call 100098eb 698->702 703 1000b7ae-1000b7b5 698->703 700 1000b7f5 699->700 701 1000b7cf-1000b7d2 699->701 707 1000b7f8-1000b80b 700->707 704 1000b7d4-1000b7d7 701->704 705 1000b7ec-1000b7f3 701->705 724 1000ba19-1000ba1d 702->724 703->699 708 1000b7e3-1000b7ea 704->708 709 1000b7d9-1000b7dc 704->709 705->707 711 1000b80d 707->711 712 1000b83e-1000b844 707->712 708->707 709->702 715 1000b7de-1000b7e1 709->715 717 1000b839-1000b83c 711->717 718 1000b80f-1000b811 711->718 713 1000b875 712->713 714 1000b846-1000b84c 712->714 719 1000b87c-1000b886 713->719 720 1000b86c-1000b873 714->720 721 1000b84e-1000b850 714->721 715->707 717->719 718->717 723 1000b813-1000b815 718->723 725 1000b888-1000b896 719->725 726 1000b89b-1000b89d 719->726 720->719 721->702 721->713 727 1000b830-1000b837 723->727 728 1000b817-1000b81d 723->728 725->726 729 1000b898-1000b89a 725->729 731 1000b8a9-1000b8ac 726->731 732 1000b89f-1000b8a5 726->732 727->719 728->720 730 1000b81f-1000b825 728->730 729->726 730->702 735 1000b827-1000b82e 730->735 733 1000b8b0-1000b8b2 731->733 734 1000b8ae 731->734 732->731 736 1000b8b4-1000b8ba 733->736 737 1000b8bc-1000b8be 733->737 734->733 735->719 738 1000b8c6-1000b8d2 call 1000b3da 736->738 737->738 739 1000b8c0 737->739 742 1000b8d4-1000b8e9 call 100098e2 call 100098eb 738->742 743 1000b8ee-1000b90b CreateFileW 738->743 739->738 742->724 745 1000b921-1000b92a GetFileType 743->745 746 1000b90d-1000b91c GetLastError call 1000986f 743->746 747 1000b935-1000b938 745->747 748 1000b92c-1000b933 CloseHandle 745->748 755 1000ba10-1000ba17 call 1000b699 746->755 752 1000b940-1000b943 747->752 753 1000b93a-1000b93e 747->753 748->746 756 1000b949-1000b97c call 1000b4fd 752->756 757 1000b945 752->757 753->756 755->724 763 1000b9f7-1000b9fb 756->763 764 1000b97e-1000b981 756->764 757->756 765 1000b9fd-1000ba01 763->765 766 1000ba0e 763->766 764->763 767 1000b983-1000b987 764->767 765->766 768 1000ba03-1000ba0a 765->768 766->755 767->763 769 1000b989-1000b99c call 10009959 767->769 768->766 772 1000b9b7-1000b9cc call 10009c7d 769->772 773 1000b99e-1000b9a9 call 100098eb 769->773 779 1000b9e5-1000b9f5 call 10009959 772->779 780 1000b9ce-1000b9d3 772->780 773->763 778 1000b9ab-1000b9b5 call 10007c34 773->778 778->755 779->763 779->778 780->779 782 1000b9d5-1000b9e3 call 1000cc71 780->782 782->778 782->779
                          APIs
                          • CreateFileW.KERNEL32(00000001,80000000,10002F8D,0000000C,00000001,00000080,00000000,00000001,00000000,00000000), ref: 1000B901
                          • GetLastError.KERNEL32 ref: 1000B90D
                          • GetFileType.KERNEL32(00000000), ref: 1000B922
                          • CloseHandle.KERNEL32(00000000), ref: 1000B92D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: File$CloseCreateErrorHandleLastType
                          • String ID: @$H
                          • API String ID: 1809617866-104103126
                          • Opcode ID: 135215ee96e25ee8a8efc5695d3880bda97763f3ee48cfb356986b8452ad0dcf
                          • Instruction ID: 7a42c947a19329fa8c6dd8419bcff967ddc10ced02f347353924d189b6712a32
                          • Opcode Fuzzy Hash: 135215ee96e25ee8a8efc5695d3880bda97763f3ee48cfb356986b8452ad0dcf
                          • Instruction Fuzzy Hash: 49813B31D08A5A9AFB10CF64CC807AD7BE4EF013E4F218669E965671E9CBB48D44C751

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 788 1000c389-1000c3a4 789 1000c3a6-1000c3ad 788->789 790 1000c3af-1000c3b3 788->790 791 1000c3ba-1000c3c1 789->791 790->791 792 1000c3c3-1000c3c6 791->792 793 1000c3d4-1000c3dd 791->793 794 1000c3d0 792->794 795 1000c3c8-1000c3ce 792->795 796 1000c3fb 793->796 797 1000c3df-1000c3e0 793->797 794->793 795->793 795->794 798 1000c402-1000c408 796->798 799 1000c3f2-1000c3f9 797->799 800 1000c3e2-1000c3e3 797->800 801 1000c430 798->801 802 1000c40a-1000c40d 798->802 799->798 803 1000c3e9-1000c3f0 800->803 804 1000c48d-1000c4a2 call 100098e2 call 100098eb 800->804 808 1000c433-1000c446 801->808 805 1000c427-1000c42e 802->805 806 1000c40f-1000c412 802->806 803->798 825 1000c653-1000c657 804->825 805->808 809 1000c414-1000c417 806->809 810 1000c41e-1000c425 806->810 812 1000c448 808->812 813 1000c479-1000c47f 808->813 809->804 816 1000c419-1000c41c 809->816 810->808 818 1000c474-1000c477 812->818 819 1000c44a-1000c44c 812->819 814 1000c4b0 813->814 815 1000c481-1000c487 813->815 820 1000c4b7-1000c4c1 814->820 821 1000c4a7-1000c4ae 815->821 822 1000c489-1000c48b 815->822 816->808 818->820 819->818 824 1000c44e-1000c450 819->824 826 1000c4c3-1000c4d1 820->826 827 1000c4d6-1000c4d8 820->827 821->820 822->804 822->814 828 1000c452-1000c458 824->828 829 1000c46b-1000c472 824->829 826->827 830 1000c4d3-1000c4d5 826->830 832 1000c4e4-1000c4e7 827->832 833 1000c4da-1000c4e0 827->833 828->821 831 1000c45a-1000c460 828->831 829->820 830->827 831->804 836 1000c462-1000c469 831->836 834 1000c4e9 832->834 835 1000c4eb-1000c4ed 832->835 833->832 834->835 837 1000c4f7-1000c4f9 835->837 838 1000c4ef-1000c4f5 835->838 836->820 839 1000c501-1000c50d call 1000b3da 837->839 840 1000c4fb 837->840 838->839 843 1000c529-1000c546 CreateFileA 839->843 844 1000c50f-1000c524 call 100098e2 call 100098eb 839->844 840->839 846 1000c548-1000c557 GetLastError call 1000986f 843->846 847 1000c55c-1000c565 GetFileType 843->847 844->825 856 1000c64a-1000c651 call 1000b699 846->856 849 1000c570-1000c573 847->849 850 1000c567-1000c56e CloseHandle 847->850 853 1000c575-1000c579 849->853 854 1000c57b-1000c57e 849->854 850->846 857 1000c584-1000c5b7 call 1000b4fd 853->857 854->857 858 1000c580 854->858 856->825 864 1000c631-1000c635 857->864 865 1000c5b9-1000c5bc 857->865 858->857 866 1000c637-1000c63b 864->866 867 1000c648 864->867 865->864 868 1000c5be-1000c5c2 865->868 866->867 869 1000c63d-1000c644 866->869 867->856 868->864 870 1000c5c4-1000c5d7 call 10009959 868->870 869->867 873 1000c5f2-1000c607 call 10009c7d 870->873 874 1000c5d9-1000c5e4 call 100098eb 870->874 880 1000c609-1000c60d 873->880 881 1000c61f-1000c62f call 10009959 873->881 874->864 879 1000c5e6-1000c5f0 call 10007c34 874->879 879->856 880->881 883 1000c60f-1000c61d call 1000cc71 880->883 881->864 881->879 883->879 883->881
                          APIs
                          • CreateFileA.KERNEL32(00000001,80000000,?,0000000C,00000001,00000080,00000000,?,00000000,00000000), ref: 1000C53C
                          • GetLastError.KERNEL32 ref: 1000C548
                          • GetFileType.KERNEL32(00000000), ref: 1000C55D
                          • CloseHandle.KERNEL32(00000000), ref: 1000C568
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: File$CloseCreateErrorHandleLastType
                          • String ID: @$H
                          • API String ID: 1809617866-104103126
                          • Opcode ID: 241ebd9ba73e3fade414ea2b0c9828dd4f23b00f0127123be1d71313763c1dc2
                          • Instruction ID: 567d32f5d40eb58ccd44413fef24414c47b30826c6c5fbd1b49f09f0f5995f8e
                          • Opcode Fuzzy Hash: 241ebd9ba73e3fade414ea2b0c9828dd4f23b00f0127123be1d71313763c1dc2
                          • Instruction Fuzzy Hash: 6781E571C0879E5AFB20CFA4CC50FAD7BA0FF013E4F218219E961A62D9C7B59E858751

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 889 401ee0-401f27 890 402049 889->890 891 401f2d-401f34 889->891 893 40204b-402055 890->893 892 401f35-401f48 891->892 894 401f79-401fbf call 40c470 call 401031 892->894 895 401f4a-401f77 call 40c470 call 401031 892->895 904 401fc5-401ff8 MultiByteToWideChar CreateThread 894->904 895->904 905 402034-402043 904->905 906 401ffa-402008 WaitForSingleObject 904->906 905->890 905->892 907 402025-40202a 906->907 908 40200a-402021 GetExitCodeThread 906->908 907->905 910 40202c-40202e TerminateThread 907->910 908->893 909 402023 908->909 909->905 910->905
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000104,?,00000104), ref: 00401FD6
                          • CreateThread.KERNEL32(00000000,00000000,00401EBE,?,00000000,?), ref: 00401FEE
                          • WaitForSingleObject.KERNEL32(00000000,00002710), ref: 00402000
                          • GetExitCodeThread.KERNEL32(00000000,?), ref: 00402014
                          • TerminateThread.KERNEL32(00000000,00000000), ref: 0040202E
                          Strings
                          • C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe, xrefs: 00401EE8
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Thread$ByteCharCodeCreateExitMultiObjectSingleTerminateWaitWide
                          • String ID: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                          • API String ID: 2084129242-1954932391
                          • Opcode ID: 10337f52fb143e34f1f805d398a030dc3978f2d891c98419bb57d7c270c50101
                          • Instruction ID: 239ba0d05ee60cf0674a408b2aeaa55976477d4996a500f9bd75b048c5916d61
                          • Opcode Fuzzy Hash: 10337f52fb143e34f1f805d398a030dc3978f2d891c98419bb57d7c270c50101
                          • Instruction Fuzzy Hash: 2441CC717883487AF3309A21DD4BFA7769EE788B44F00043EF748B91C1D6F995548665

                          Control-flow Graph

                          APIs
                          • GetEnvironmentVariableW.KERNEL32(?,?,00000104), ref: 10002647
                          • CopyFileW.KERNEL32(?,?,00000000), ref: 100026BA
                          • LoadLibraryW.KERNEL32(?), ref: 100026C6
                          • GetProcAddress.KERNEL32(?,?), ref: 100026DE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressCopyEnvironmentFileLibraryLoadProcVariable
                          • String ID: %s%s%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c$\
                          • API String ID: 1113758109-1100431915
                          • Opcode ID: 5c857b86d3b9db1595a9569733b948357d0aeefdeca943a408051796bc8a2eda
                          • Instruction ID: 6da3ee52d82f2b450fdcbe27bdb40211bc38835922def5947a7665048901805a
                          • Opcode Fuzzy Hash: 5c857b86d3b9db1595a9569733b948357d0aeefdeca943a408051796bc8a2eda
                          • Instruction Fuzzy Hash: D931B476B80358BAF730C664CC4AFCB736EAB84B44F004465B349BB1D5D6F16A908A54

                          Control-flow Graph

                          APIs
                          • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,00000000), ref: 004030AE
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,00000000), ref: 004030C1
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,00000000), ref: 004030D5
                          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,?,00000000), ref: 004030F5
                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 004030FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: lstrlen$CreateErrorLastPathProcessTemp
                          • String ID: \
                          • API String ID: 3489217399-2967466578
                          • Opcode ID: e3571185e1c746b7617ab9132659640be5aa7f4656a2ba5ded501037a61c0dd1
                          • Instruction ID: 0257e6b17935841fec469620f06e91c1c621e9a3f8a3c40a5195ff03cd617aa4
                          • Opcode Fuzzy Hash: e3571185e1c746b7617ab9132659640be5aa7f4656a2ba5ded501037a61c0dd1
                          • Instruction Fuzzy Hash: E911847280121CAECB10EBE9EC4CEDF7BBCEFC9705F11456AE605E2040E6745A48CB68
                          APIs
                          • CreateFileW.KERNEL32(00000001,80000000,?,0000000C,00000001,00000080,00000000,00000001,00000000,00000000), ref: 00414D52
                          • GetLastError.KERNEL32 ref: 00414D5E
                          • GetFileType.KERNEL32(00000000), ref: 00414D73
                          • CloseHandle.KERNEL32(00000000), ref: 00414D7E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: File$CloseCreateErrorHandleLastType
                          • String ID: @,S@
                          • API String ID: 1809617866-1817016226
                          • Opcode ID: 3e826eb931e5c1fc7bd965506deb645fb69a84a9def9e3e34e6e7f313f445755
                          • Instruction ID: b22405384b978b32f86057f3daa07e98a13ec70f44172869c59a16613b36f91f
                          • Opcode Fuzzy Hash: 3e826eb931e5c1fc7bd965506deb645fb69a84a9def9e3e34e6e7f313f445755
                          • Instruction Fuzzy Hash: 8E8149719042099AEF208F68CC443EF7B64AF81328F25421BE465AB3D1D7BC89C5C79E
                          APIs
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000100,00000000,00000000), ref: 00412550
                          • GetLastError.KERNEL32 ref: 0041255A
                          • ReadFile.KERNEL32(?,?,00000001,00000000,00000000), ref: 00412620
                          • GetLastError.KERNEL32 ref: 0041262A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ErrorFileLastRead
                          • String ID: @,S@
                          • API String ID: 1948546556-1817016226
                          • Opcode ID: 70d97e1d307b992346792c5f8cd5602eb05a1af0af6e0c409591ca3c1ae161dd
                          • Instruction ID: 2078f594b2b3751a6d52fa019bffb4031f7e7983a443e01007e5b9519ebc7202
                          • Opcode Fuzzy Hash: 70d97e1d307b992346792c5f8cd5602eb05a1af0af6e0c409591ca3c1ae161dd
                          • Instruction Fuzzy Hash: 2D51D530604385EFDF218F58C984BDA7BB1BF16304F54409BE855CB391D7B899A2CB1A
                          APIs
                          • WriteFile.KERNEL32(?,?,?,00000000,00000000,00414E2F,00000000,00001000), ref: 00410AF8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID: @,S@
                          • API String ID: 3934441357-1817016226
                          • Opcode ID: bdac9948307d1d99ba14741aac4a6466b3f909a0482d8b6be9aff8e03909965b
                          • Instruction ID: 45298e78308a274b476932748e67503fe90b06bcb34fc512e35019f82fa51ec6
                          • Opcode Fuzzy Hash: bdac9948307d1d99ba14741aac4a6466b3f909a0482d8b6be9aff8e03909965b
                          • Instruction Fuzzy Hash: DA519031904208EFCB11CFA8C984ADE7BB4FF55398F1481AAE815DB251D7B4EAC1CB59
                          APIs
                            • Part of subcall function 0040501B: GetTempPathW.KERNEL32(00000104,?,?), ref: 0040504A
                            • Part of subcall function 0040501B: GetTempFileNameW.KERNEL32(?,tmp,00000000,00000000), ref: 00405065
                          • CopyFileW.KERNEL32(?,?,00000000), ref: 00405AF7
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: FileTemp$CopyNamePath
                          • String ID: %eR@toPm|<#YKs$^$toPm|<#YKs$^$|<#YKs$^
                          • API String ID: 291496533-3958563027
                          • Opcode ID: 46f25c6ffa3f13151a9f36a544417d5587b15a13c2086594c4c673ce1e5127d7
                          • Instruction ID: ada56393937183257899d74d6c61394e5e9a94cfac53ea075563eef363fadbc8
                          • Opcode Fuzzy Hash: 46f25c6ffa3f13151a9f36a544417d5587b15a13c2086594c4c673ce1e5127d7
                          • Instruction Fuzzy Hash: 1FA1B2B2D00259AADF20EAA5CC45FDF7B7CDF01314F0440ABF504B61C1DA79AA448FA9
                          APIs
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000100,00000000,00000000), ref: 10009CF7
                          • GetLastError.KERNEL32 ref: 10009D01
                          • ReadFile.KERNEL32(?,?,00000001,00000000,00000000), ref: 10009DC7
                          • GetLastError.KERNEL32 ref: 10009DD1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ErrorFileLastRead
                          • String ID:
                          • API String ID: 1948546556-0
                          • Opcode ID: bfc86eb3975069c3503e58b30f01c7fa03bc72a3b8dcc1a19b649ed53bed725b
                          • Instruction ID: 112b51a9e9df8e17a4da5f6e900801004be0aa4b1eb9ffde17c4bbe6ab169035
                          • Opcode Fuzzy Hash: bfc86eb3975069c3503e58b30f01c7fa03bc72a3b8dcc1a19b649ed53bed725b
                          • Instruction Fuzzy Hash: 2B51AE34A043C99FFB21CF58C884B897BE4EF063C4F11859AE8A59B29AD370DD85CB11
                          APIs
                          • WriteFile.KERNEL32(?,?,?,?,00000000,00000002,00000000,00000000), ref: 100097AB
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 018c6b6fc8cfa1e5fd6981127b514c99a21702c1938d837151f9b58f2bca6904
                          • Instruction ID: 1da450f8c3b8c9d4468de0c4ede5f192845efbfc5bac6160383af9ab42e74039
                          • Opcode Fuzzy Hash: 018c6b6fc8cfa1e5fd6981127b514c99a21702c1938d837151f9b58f2bca6904
                          • Instruction Fuzzy Hash: E2518E71904258EFEB11CF68C884A9D7BF4FF467C0F21C1A9E9199B259DB70DA80DB60
                          APIs
                          • CreateDirectoryW.KERNEL32(00000000,00000000,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe,00000000,00000104), ref: 0040141D
                          • GetLastError.KERNEL32 ref: 00401427
                          Strings
                          • C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe, xrefs: 0040137C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                          • API String ID: 1375471231-2452780512
                          • Opcode ID: 6d5a5c38fac08dcdb88923f3b64a5fdc813761319cec5d26508c13ca6c91abe2
                          • Instruction ID: f6158145c072bfd1161d14a966cb37a0d493e4c537f281356958d61a106ee023
                          • Opcode Fuzzy Hash: 6d5a5c38fac08dcdb88923f3b64a5fdc813761319cec5d26508c13ca6c91abe2
                          • Instruction Fuzzy Hash: FE21D672900314A9EF306BA0EC45BD777A89F00318F10457FE955F61F2EBB899848B5A
                          APIs
                          • GetTempPathW.KERNEL32(00000104,?,?), ref: 0040504A
                          • GetTempFileNameW.KERNEL32(?,tmp,00000000,00000000), ref: 00405065
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Temp$FileNamePath
                          • String ID: tmp
                          • API String ID: 3285503233-753892680
                          • Opcode ID: 60ddd8d863f0bb8c70083f10fc5c7d9ade46887357d609d095e69c8898780b87
                          • Instruction ID: f7f4ea0963ff9731c5d172acee9a0c7bf278b3c5608c23117a7ff17804f99f7c
                          • Opcode Fuzzy Hash: 60ddd8d863f0bb8c70083f10fc5c7d9ade46887357d609d095e69c8898780b87
                          • Instruction Fuzzy Hash: 30F082B290021CBBDF109B54DC49FEA77BCBB54308F0045B5BA14E51A1EAB4AAC98F64
                          APIs
                          • HeapReAlloc.KERNEL32(00000000,00000060,?,00000000,1000A2BB,?,10002B52,?,100059AD,10002B52,00000001,10002B52), ref: 1000A51B
                          • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,1000A2BB,?,10002B52,?,100059AD,10002B52,00000001,10002B52), ref: 1000A54F
                          • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,1000A2BB,?,10002B52,?,100059AD,10002B52,00000001,10002B52), ref: 1000A569
                          • HeapFree.KERNEL32(00000000,?,?,00000000,1000A2BB,?,10002B52,?,100059AD,10002B52,00000001,10002B52), ref: 1000A580
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AllocHeap$FreeVirtual
                          • String ID:
                          • API String ID: 3499195154-0
                          • Opcode ID: e7d53fcb432b193359c2d3c762577acfbdeebbc602f74a7539a784fa40f94b59
                          • Instruction ID: f9b9bca051faa4c4395142488475ca9e6f1505f6ac6d4a224501308950da0d18
                          • Opcode Fuzzy Hash: e7d53fcb432b193359c2d3c762577acfbdeebbc602f74a7539a784fa40f94b59
                          • Instruction Fuzzy Hash: C2118C71600621AFF329CF18CCC49967BB6FB857A1B148719F151D25B4C772D882CF50
                          APIs
                          • HeapReAlloc.KERNEL32(00000000,?,00000000,00000000,0040FF50,00000000,?,?,?,0040D7E0), ref: 004101B0
                          • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,0040FF50,00000000,?,?,?,0040D7E0), ref: 004101E4
                          • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,0040D7E0), ref: 004101FE
                          • HeapFree.KERNEL32(00000000,?,?,0040D7E0), ref: 00410215
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AllocHeap$FreeVirtual
                          • String ID:
                          • API String ID: 3499195154-0
                          • Opcode ID: d4ebb6c3055726f3e021de0e7be60e321f02a85c7d07cb7f3145eaf994726d18
                          • Instruction ID: 4c941d701b1655fced5b36d5e2eaff67646d118412ca2d9b6e582d9a56b3a414
                          • Opcode Fuzzy Hash: d4ebb6c3055726f3e021de0e7be60e321f02a85c7d07cb7f3145eaf994726d18
                          • Instruction Fuzzy Hash: 7F119170302200AFD7718F58EC89D9A7BF6FBA87507918A7DF151C65B0CB789886CB08
                          APIs
                          • IsBadReadPtr.KERNEL32(00000000,00000014), ref: 00404A66
                          • LoadLibraryA.KERNEL32(?,?,00000001), ref: 00404A82
                          • GetProcAddress.KERNEL32(?,?), ref: 00404AFB
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcRead
                          • String ID:
                          • API String ID: 1160701153-0
                          • Opcode ID: eb3855e5d68afdffa96e803db3e488d9ef4465284e0f3de40d703cb68a80ee15
                          • Instruction ID: aa789371ac22be00fab353384b8dba6d33eb928b8a5bf093cb3fac925c739874
                          • Opcode Fuzzy Hash: eb3855e5d68afdffa96e803db3e488d9ef4465284e0f3de40d703cb68a80ee15
                          • Instruction Fuzzy Hash: 99319CB26042069FD710CF19C844B26B7F8FB85311F19853EEA519B390D778E809CBA9
                          APIs
                          • GetCurrentProcess.KERNEL32(?,?,0040F8DD,?,00000000,00000000,0040D858,00000000,00000000), ref: 0040F907
                          • TerminateProcess.KERNEL32(00000000,?,0040F8DD,?,00000000,00000000,0040D858,00000000,00000000), ref: 0040F90E
                          • ExitProcess.KERNEL32 ref: 0040F98F
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID:
                          • API String ID: 1703294689-0
                          • Opcode ID: fff0bef1090f52581fa5e801765930f7ae85e464ff4ad9afd2056aa9f12b3acd
                          • Instruction ID: b875da6c4a052fcc968e6b1edeaeb8b5d698a395de6a0a9d8143f0f48acd8947
                          • Opcode Fuzzy Hash: fff0bef1090f52581fa5e801765930f7ae85e464ff4ad9afd2056aa9f12b3acd
                          • Instruction Fuzzy Hash: 7101E5B2304251BFD730AB65FC45F5A7B94AB90710BA1403FE050629E1CB7C988A8B5D
                          APIs
                          Strings
                          • C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe, xrefs: 00401069
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                          • API String ID: 3519838083-1954932391
                          • Opcode ID: cfbaaa1b22c554bb31573ec703c7fd45f6d8fef36d6f38fbc9d3c5fcd145bfda
                          • Instruction ID: e4318dac4722833bd1ff42220be8e7e7d42a1610d27cf0ebc6c5280c9fdf8d93
                          • Opcode Fuzzy Hash: cfbaaa1b22c554bb31573ec703c7fd45f6d8fef36d6f38fbc9d3c5fcd145bfda
                          • Instruction Fuzzy Hash: 2831747290021CAADF11DB50CC85ADE77B9FF48354F0045B7FA08E6291DB399A958B94
                          APIs
                          Strings
                          • C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe, xrefs: 0040298A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                          • API String ID: 3519838083-2452780512
                          • Opcode ID: 4103c638aac2f931a59fb28560d504d7b0f24a04c04ce5252aae75c0725a5ff7
                          • Instruction ID: 704933a26061435bf67265672d9d4c74204cce8f33d6def4ef8f726a9b403be0
                          • Opcode Fuzzy Hash: 4103c638aac2f931a59fb28560d504d7b0f24a04c04ce5252aae75c0725a5ff7
                          • Instruction Fuzzy Hash: FA3186B290011D6ADF20AB91CD89BDB777DAB14344F0044B7AA09F3181D6785A888FA9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: DeleteFile
                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZ
                          • API String ID: 4033686569-2885122082
                          • Opcode ID: d3a1f1d499eb310ac9aae2e4afc16f8a77a404a22cbdc6eb422138bc75621a17
                          • Instruction ID: 92d17fa0b14a5af7329250172c5805927784a4bb7c7694fb9111e74194b93865
                          • Opcode Fuzzy Hash: d3a1f1d499eb310ac9aae2e4afc16f8a77a404a22cbdc6eb422138bc75621a17
                          • Instruction Fuzzy Hash: BD014C3A64061137F521E2345D4BF9F268EDF812E6F614426FD087E28FADAABD8100B5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: DeleteFile
                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZ
                          • API String ID: 4033686569-2885122082
                          • Opcode ID: 159033949d6d254564c68fa4ed14517349e41e72de2d5e47a14f798df58b5e7e
                          • Instruction ID: 69db9cab23b1fa9cd104ceeaaf3f448452a4a73fd5dc0a516e68a03c6d391f32
                          • Opcode Fuzzy Hash: 159033949d6d254564c68fa4ed14517349e41e72de2d5e47a14f798df58b5e7e
                          • Instruction Fuzzy Hash: 5301283A1406213AF521E2345D4FFAF368DDF812E7F510515FD487A28FADAABC8500A5
                          APIs
                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,00000000,00405B0D,?), ref: 00404D60
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: DeleteFile
                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZ
                          • API String ID: 4033686569-2885122082
                          • Opcode ID: ebf798424b031ede0e6352213d8cbf8d4c2279d9fef084fffa65cda67b932e63
                          • Instruction ID: 389f95961ebf70c1e5a1c39805fcc405ecefc2c21d2d8b8def11a56da08309aa
                          • Opcode Fuzzy Hash: ebf798424b031ede0e6352213d8cbf8d4c2279d9fef084fffa65cda67b932e63
                          • Instruction Fuzzy Hash: AD01D2B2A4122036D62132B56C47F9F16588FD1765F21053BFE04762D3AD7D6C4640AE
                          APIs
                            • Part of subcall function 100025B9: GetEnvironmentVariableW.KERNEL32(?,?,00000104), ref: 10002647
                            • Part of subcall function 100025B9: CopyFileW.KERNEL32(?,?,00000000), ref: 100026BA
                            • Part of subcall function 100025B9: LoadLibraryW.KERNEL32(?), ref: 100026C6
                          • gethostbyname.WS2_32(?), ref: 100027C5
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,00000104), ref: 1000280E
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharCopyEnvironmentFileLibraryLoadMultiVariableWidegethostbyname
                          • String ID:
                          • API String ID: 1796540264-0
                          • Opcode ID: 21b1d34c230ec8cde792df6b250d6c805b2cb3f97d722041a91c2ecf82f0f2ab
                          • Instruction ID: 4bf55e3d8553a2f2db0d4677d9c9547ac1be228fa81fd252a7f26e60b6d1d960
                          • Opcode Fuzzy Hash: 21b1d34c230ec8cde792df6b250d6c805b2cb3f97d722041a91c2ecf82f0f2ab
                          • Instruction Fuzzy Hash: 912160796403487FFB20CF64CC92FD977AAEB14744F008465BB08AB2D1D6B1AAA48B10
                          APIs
                          • VirtualFree.KERNELBASE(?,?,00004000,00000000,?,00000001,00000000,00000000,?,0040481D), ref: 0040494F
                          • VirtualProtect.KERNEL32(?,?,00000000,0040481D,00000000,?,00000001,00000000,00000000,?,0040481D), ref: 0040499C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Virtual$FreeProtect
                          • String ID:
                          • API String ID: 2581862158-0
                          • Opcode ID: b37fded90a9ee95ef88d2e65fd03ae813906012dff82cfeda412e0bc88bdd011
                          • Instruction ID: 23a1a8aed7d365f4658076222b0a7de0e3986e2618b3570fee8ed56a7c62751d
                          • Opcode Fuzzy Hash: b37fded90a9ee95ef88d2e65fd03ae813906012dff82cfeda412e0bc88bdd011
                          • Instruction Fuzzy Hash: DA21CCB19002049FDB08CB09D998BBB7BA5EB84305F0141ADEA466B2E5C738AD15CBA5
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,10009731,00000000,00000000,00000002,00000002,00000000,00000000), ref: 10009983
                          • GetLastError.KERNEL32 ref: 10009990
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 6aca38a825f181dc59ce418a07435b041ad8d9af8aa50f7243897de5077f33c8
                          • Instruction ID: 502b574fdaf890ed0d67a85e2c542a07d9da45366fc76386cc3438d010d73362
                          • Opcode Fuzzy Hash: 6aca38a825f181dc59ce418a07435b041ad8d9af8aa50f7243897de5077f33c8
                          • Instruction Fuzzy Hash: F1F0F4362156228AE610CB7D9C4868D3698EB863F1F21071DF661DB1E9DF31D8418352
                          APIs
                          • SetFilePointer.KERNEL32(00000000,00000100,00000000,00000000,00000100,00000000,00414DE4,00000000,000000FF,00000002), ref: 0041234C
                          • GetLastError.KERNEL32 ref: 00412359
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 7c0bcaa50f10cde8f29df42a8ff8e050c4b1dad4583fe5032ce29c40b013c853
                          • Instruction ID: cc9df2705e7d246d2e90aa0eed58d2a4bd7cfb1ff8d24d51888191b61044b12d
                          • Opcode Fuzzy Hash: 7c0bcaa50f10cde8f29df42a8ff8e050c4b1dad4583fe5032ce29c40b013c853
                          • Instruction Fuzzy Hash: E4F02D3221461597CA105B78DD049DE3758AF85334F21075FF971C72E1DFBCC9A2825A
                          APIs
                          • HeapCreate.KERNEL32(00000000,00001000,00000000,10005B3A,00000001), ref: 10009453
                            • Part of subcall function 10009E56: HeapAlloc.KERNEL32(00000000,00000140,10009467), ref: 10009E63
                          • HeapDestroy.KERNEL32 ref: 10009471
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Heap$AllocCreateDestroy
                          • String ID:
                          • API String ID: 2236781399-0
                          • Opcode ID: e66e29cdc271b43ae1db77c560582d15898b65baeb39c63ad38d1afc6279ffb6
                          • Instruction ID: f4472f837166203d5add59c709619122e036c8906bcc8431ca6e634266941605
                          • Opcode Fuzzy Hash: e66e29cdc271b43ae1db77c560582d15898b65baeb39c63ad38d1afc6279ffb6
                          • Instruction Fuzzy Hash: 29E05B713543519EFB548F708C49B6535D5FB447C2F018435F945C40BCF7B1C8909501
                          APIs
                          • HeapCreate.KERNEL32(00000000,00001000,00000000,0040D7CE,00000001), ref: 0040FAC0
                            • Part of subcall function 0040FAEB: HeapAlloc.KERNEL32(00000000,00000140,0040FAD4), ref: 0040FAF8
                          • HeapDestroy.KERNEL32 ref: 0040FADE
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Heap$AllocCreateDestroy
                          • String ID:
                          • API String ID: 2236781399-0
                          • Opcode ID: 60bc7874c0892740f5bf3f5d23c2057e67fbe65029b361d713d5196f1f0ec72a
                          • Instruction ID: 2b69f0e4cf7586cf50728afc9d602f6943fc834738f0166ecf41d45cdcb92224
                          • Opcode Fuzzy Hash: 60bc7874c0892740f5bf3f5d23c2057e67fbe65029b361d713d5196f1f0ec72a
                          • Instruction Fuzzy Hash: 15E012B13113016AEF205B31AC0976B37D59B487D2F10C83AF944D41E0EF7884419E18
                          APIs
                            • Part of subcall function 00401DF4: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,00000104), ref: 00401E35
                          • GetCurrentThread.KERNEL32 ref: 00401ECD
                          • TerminateThread.KERNEL32(00000000), ref: 00401ED4
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Thread$ByteCharCurrentMultiTerminateWide
                          • String ID:
                          • API String ID: 3738390375-0
                          • Opcode ID: b1bf82b93590effd6c2570a3584d88b96098e56c4bf512450ae0f0fa54bc6cdc
                          • Instruction ID: d81fb3dfb365e8c97b2ab233d75ed44bed5dac9a058e1f322600a32016f706a0
                          • Opcode Fuzzy Hash: b1bf82b93590effd6c2570a3584d88b96098e56c4bf512450ae0f0fa54bc6cdc
                          • Instruction Fuzzy Hash: 52C08C721021306FC60077A9ED0D8CB7E38EF183D2302843EFA0081170CF344845D6A8
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,39665300,00001000,00000004,00000000,00000000,?,00401C84,00000000), ref: 004048AB
                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,00000000,00000000,?,00401C84,00000000), ref: 004048CC
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: b43f2ccb3bde99bede24ae8d0d1ab885cc3ccf2a476ff53ea6ce85554c0f209f
                          • Instruction ID: 18aeadbba4ee41183083de854a9585785ae68afd4d8615a9ec6745384b5827e2
                          • Opcode Fuzzy Hash: b43f2ccb3bde99bede24ae8d0d1ab885cc3ccf2a476ff53ea6ce85554c0f209f
                          • Instruction Fuzzy Hash: 7E214CB6D00204EFDB10DF99C881F6AB7F8EF44304F10846AEA40AB391D374EA50DB54
                          APIs
                          • CloseHandle.KERNEL32(00000000,00000100,1000B9B1,10007C69,1000B9B1,1000B9B1,00000100,00000000,1000B9B1,00000000), ref: 10007CCB
                          • GetLastError.KERNEL32 ref: 10007CD5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CloseErrorHandleLast
                          • String ID:
                          • API String ID: 918212764-0
                          • Opcode ID: 4e6753dfeec659a6515f133fdc6bdf11e0025ebb5b9536e45a1ad1cdded0c35e
                          • Instruction ID: 1c43c5bac7add92881f3f25639eb8cc538f19979ff9e5f32e8d22aa856e4c6da
                          • Opcode Fuzzy Hash: 4e6753dfeec659a6515f133fdc6bdf11e0025ebb5b9536e45a1ad1cdded0c35e
                          • Instruction Fuzzy Hash: CF014236A0592292F620DB396C48EAA2394EF813F1B26012EF428D71CDDE28EC814121
                          APIs
                          • CloseHandle.KERNEL32(00000000,00000100,00414E02,004107BF,00414E02,00414E02,00000100,00000000,00414E02,00000000), ref: 00410821
                          • GetLastError.KERNEL32 ref: 0041082B
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CloseErrorHandleLast
                          • String ID:
                          • API String ID: 918212764-0
                          • Opcode ID: 15489ded154256aa0314b293602dccbd2caaddf08e040c775c46227e2981354c
                          • Instruction ID: 12507beaab73c8a92fdd184a0b995e36fd4d4dad8fe1e0d9cbcd53ee81901129
                          • Opcode Fuzzy Hash: 15489ded154256aa0314b293602dccbd2caaddf08e040c775c46227e2981354c
                          • Instruction Fuzzy Hash: 4601263311911095C620767AAC09AEF66189FC1374F2A062FF460CB2C1EEBCC8C280EE
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: 6605e5c714a23395e6ca3157e090a76eaeb6092df434bf0686e534e85d830608
                          • Instruction ID: 4e0bfbd715a92d40728436efd5e79f459a0278b0f7339945bf44ab8902b67496
                          • Opcode Fuzzy Hash: 6605e5c714a23395e6ca3157e090a76eaeb6092df434bf0686e534e85d830608
                          • Instruction Fuzzy Hash: CCF06D34900189EFEF15DF50C891AED7731FF143C0F0005AAB4A5661A9DB75AE99EB10
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,10002B43,?,?,1000664F,000000E0,100059AD,10002B52,00000001,10002B52), ref: 100066B0
                            • Part of subcall function 10007128: InitializeCriticalSection.KERNEL32(00000000,?,10002B52,?,10006680,00000009,?,?,1000664F,000000E0,100059AD,10002B52,00000001,10002B52), ref: 10007165
                            • Part of subcall function 10007128: EnterCriticalSection.KERNEL32(10002B52,10002B52,?,10006680,00000009,?,?,1000664F,000000E0,100059AD,10002B52,00000001,10002B52), ref: 10007180
                            • Part of subcall function 10007189: LeaveCriticalSection.KERNEL32(?,1000661B,00000009,10002B52,10007174,00000000,?,10002B52,?,10006680,00000009,?,?,1000664F,000000E0,100059AD), ref: 10007196
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalSection$AllocateEnterHeapInitializeLeave
                          • String ID:
                          • API String ID: 495028619-0
                          • Opcode ID: a124ef6f470b63a908ed55005ccaba26b7c42fa01b9ece875ac1777e8becf4c0
                          • Instruction ID: 0942ba4c2885353f4566518416193bf04d26edd6df8c11a2adb540413f6f63ff
                          • Opcode Fuzzy Hash: a124ef6f470b63a908ed55005ccaba26b7c42fa01b9ece875ac1777e8becf4c0
                          • Instruction Fuzzy Hash: 34E02B33E4063066F501E2585C41BCA3696EB857E1F260110FD487B1DEDAB27C8141D0
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0040D25B,000000E0,0040D248,?,0040F7D8,00000018,00000000,?,?,004136EB,00000009), ref: 0040D2BC
                            • Part of subcall function 0040F7B8: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F7F5
                            • Part of subcall function 0040F7B8: EnterCriticalSection.KERNEL32(?,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F810
                            • Part of subcall function 0040F819: LeaveCriticalSection.KERNEL32(?,0040D29B,00000009,?,00000009,00000000,?,0040D25B,000000E0,0040D248,?,0040F7D8,00000018,00000000,?), ref: 0040F826
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalSection$AllocateEnterHeapInitializeLeave
                          • String ID:
                          • API String ID: 495028619-0
                          • Opcode ID: d8f5ebb994ff6751785fd5dd1168b9b2bd6fb01eff549f90315b4ca8e928cb60
                          • Instruction ID: 18341a33d7748c63d1a54db78d9972d0c2dab86d02ebf2be6c965773c7472506
                          • Opcode Fuzzy Hash: d8f5ebb994ff6751785fd5dd1168b9b2bd6fb01eff549f90315b4ca8e928cb60
                          • Instruction Fuzzy Hash: F7E0E533E4192067C5313268AC02FCB22049B90760F2A017AFD043B2D1EBB99C0A01DD
                          APIs
                            • Part of subcall function 0040F7B8: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F7F5
                            • Part of subcall function 0040F7B8: EnterCriticalSection.KERNEL32(?,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F810
                          • RtlFreeHeap.NTDLL(00000000,?,?,0040F804,00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074), ref: 0040D305
                            • Part of subcall function 0040F819: LeaveCriticalSection.KERNEL32(?,0040D29B,00000009,?,00000009,00000000,?,0040D25B,000000E0,0040D248,?,0040F7D8,00000018,00000000,?), ref: 0040F826
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterFreeHeapInitializeLeave
                          • String ID:
                          • API String ID: 1934031791-0
                          • Opcode ID: abf12e635248a913374f4e699008c282f403e7966ff102dbaa17fb56d7602904
                          • Instruction ID: b62db35f07bedd583dbab6a1794776c129a564cf2fc88aebb07114b1f3df1ac8
                          • Opcode Fuzzy Hash: abf12e635248a913374f4e699008c282f403e7966ff102dbaa17fb56d7602904
                          • Instruction Fuzzy Hash: CDE0D83250212029E4303261BC26FCB2B089F41B28F09447FF504364D1DEB8584944AA
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 8c5c1e3144b280ec424f8760fa683ce219e3bc8bc87b2e2ac0836760bfc627cf
                          • Instruction ID: e7b2c27c3066a66a1e335c951f1cd26fe229dda2a60edd01389849d2b6cec8b2
                          • Opcode Fuzzy Hash: 8c5c1e3144b280ec424f8760fa683ce219e3bc8bc87b2e2ac0836760bfc627cf
                          • Instruction Fuzzy Hash: 26D022AB90C2800EFE10E770D84ACD63B5CDF022E43020C4AF020AF028DE24F885862D
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,00000104), ref: 00401E35
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide
                          • String ID:
                          • API String ID: 626452242-0
                          • Opcode ID: c0f6835731fd1eea5426c0defd6449a2a839c54598c13acd97ac2cc972fee249
                          • Instruction ID: f98c89c02a6e3b81cb18550de75389c9a1836c0a54d5ec48ea77f014a7d584b8
                          • Opcode Fuzzy Hash: c0f6835731fd1eea5426c0defd6449a2a839c54598c13acd97ac2cc972fee249
                          • Instruction Fuzzy Hash: A7219271A00114BFDB209B64DC88EEB3779FF49354F504269F915AB2E1CB719C46CB94
                          APIs
                          • HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000000,100089C6,00000001,00000074,?,1000AD29,00000000,?,00000000,?,10007016,00000000), ref: 1000B25F
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AllocHeap
                          • String ID:
                          • API String ID: 4292702814-0
                          • Opcode ID: 1a2534760b87700af9a20506a247ae1a3783fb516e94bb58213d7ab5230ec3e5
                          • Instruction ID: 230f29dcab697d8115d35d1c1f3a4268e90e38ad0d77f379f36a11c98e9109b0
                          • Opcode Fuzzy Hash: 1a2534760b87700af9a20506a247ae1a3783fb516e94bb58213d7ab5230ec3e5
                          • Instruction Fuzzy Hash: 6501FC37E01E2066F252EE281C81B9F2395EBC66F1F160235FD54BB2DEDA719C454191
                          APIs
                          • HeapAlloc.KERNEL32(00000008,?,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0041370A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AllocHeap
                          • String ID:
                          • API String ID: 4292702814-0
                          • Opcode ID: 6b805033be3dfd8aec8fba2a50e8b39a3f510794c423120b97b6b830a73cba6c
                          • Instruction ID: 0405488357d01b0d7d33f173714abb77fa443cb2f0d55b1e9c3abf510c1fdeb8
                          • Opcode Fuzzy Hash: 6b805033be3dfd8aec8fba2a50e8b39a3f510794c423120b97b6b830a73cba6c
                          • Instruction Fuzzy Hash: FC0168B360161076D6312A252D81BEB22459BD17B6F1A8237FDA4373D2D73C4D8541AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
                          • API String ID: 0-1157002505
                          • Opcode ID: fd718a4b1d25891a9623ba093a2e368119ea61908d8e7ede695203f28c067b3a
                          • Instruction ID: 7a40ff32b27998bf451d3fd510ff84ae5c4565cd2c8181801484e1d527ceae2d
                          • Opcode Fuzzy Hash: fd718a4b1d25891a9623ba093a2e368119ea61908d8e7ede695203f28c067b3a
                          • Instruction Fuzzy Hash: E1E1F231E95A09DEEB248F64D9853FE7BB1FB80344F68411BD401E6281E37C89C2CB59
                          APIs
                            • Part of subcall function 0040F7B8: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F7F5
                            • Part of subcall function 0040F7B8: EnterCriticalSection.KERNEL32(?,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F810
                            • Part of subcall function 0040F819: LeaveCriticalSection.KERNEL32(?,0040D29B,00000009,?,00000009,00000000,?,0040D25B,000000E0,0040D248,?,0040F7D8,00000018,00000000,?), ref: 0040F826
                          • GetTimeZoneInformation.KERNEL32(0000000C,00428674,00000001,74DEE860,0000000B,0000000B,?,00412785,00412FB0,00428674,00000001,74DEE860,?,00412C55,?,0040DFD0), ref: 004127E2
                          • WideCharToMultiByte.KERNEL32(00000220,0042713C,000000FF,0000003F,00000000,?,?,00412785,00412FB0,00428674,00000001,74DEE860,?,00412C55,?,0040DFD0), ref: 00412878
                          • WideCharToMultiByte.KERNEL32(00000220,00427190,000000FF,0000003F,00000000,?,?,00412785,00412FB0,00428674,00000001,74DEE860,?,00412C55,?,0040DFD0), ref: 004128B1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalSection$ByteCharMultiWide$EnterInformationInitializeLeaveTimeZone
                          • String ID: D'B
                          • API String ID: 3442286286-3401936599
                          • Opcode ID: ca0169f396f97780d5b4c72c5dba751821852e5422b26609a54334435c35daf0
                          • Instruction ID: bac85999667ab6fa4acd2a44ad9f7cf65d16d5179dd343f0d8393dd61ed5ec0b
                          • Opcode Fuzzy Hash: ca0169f396f97780d5b4c72c5dba751821852e5422b26609a54334435c35daf0
                          • Instruction Fuzzy Hash: A5612271B08141ABCB359F28AE41BA63BA8FB41314FA4013FE481D72A1D7F849E3971D
                          APIs
                            • Part of subcall function 0040B8D2: GetSystemTime.KERNEL32(?,?,?,00401CF7,?,?,?,00424D98,00000104), ref: 0040B8DC
                          • GetAdaptersInfo.IPHLPAPI(00000000,00000280), ref: 00401D66
                          • GetAdaptersInfo.IPHLPAPI(00000000,00000280), ref: 00401D8B
                          • inet_addr.WS2_32(000001B0), ref: 00401DA1
                          • inet_addr.WS2_32(000001C0), ref: 00401DB0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AdaptersInfoinet_addr$SystemTime
                          • String ID:
                          • API String ID: 3486824068-0
                          • Opcode ID: c70e5440fa235b82c573284c17a60fb24bf1905bdb5251d572d8fe752cd7b3c1
                          • Instruction ID: 54e8c12d576ca6b7caf344530300b328f00db62220261b197ce77c557f6b5e8a
                          • Opcode Fuzzy Hash: c70e5440fa235b82c573284c17a60fb24bf1905bdb5251d572d8fe752cd7b3c1
                          • Instruction Fuzzy Hash: 9D317076900205ABDB20EFE1C8C19EE73B9AF05315F10847FE901BB291DB78EA458B58
                          APIs
                          • FindFirstFileW.KERNEL32(CO@,?), ref: 00404D7E
                          • FindClose.KERNEL32(00000000), ref: 00404D8E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: CO@
                          • API String ID: 2295610775-2359359697
                          • Opcode ID: 59c2e92a5655e99502496943e2282ba4184573f97bf7188561b506f46f133912
                          • Instruction ID: 7997a3ce03a6632c997954cbab8bd1add13e5a71e7a97ac9a76e5e9aed3183c9
                          • Opcode Fuzzy Hash: 59c2e92a5655e99502496943e2282ba4184573f97bf7188561b506f46f133912
                          • Instruction Fuzzy Hash: A6D0A7704005086BCF105F74EC8D4E63BAD9B44379F004264E921D21E0C730C959A9B8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID: o*@
                          • API String ID: 0-2776488119
                          • Opcode ID: fdbe7896ae568621a81b7b57c219c87215e5e3eda7b1a3e510c3e11f171588a1
                          • Instruction ID: c8492ed10934067126d3085e3c6eb2a05f8fc1d052168f2954518de5219e02b6
                          • Opcode Fuzzy Hash: fdbe7896ae568621a81b7b57c219c87215e5e3eda7b1a3e510c3e11f171588a1
                          • Instruction Fuzzy Hash: 6E523470200A019FD734CF29C580A26B7F1FF55704B158A2ED89797B82D738F86ACB69
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID: o*@
                          • API String ID: 0-2776488119
                          • Opcode ID: 7fdfc5674a3c395f318b755db5e5700b5c8da01c6adf705441184529230558f0
                          • Instruction ID: cf0970e7dc5844527f2f93088e04cf856841487182f7d5d4fd2575ea2e9c4145
                          • Opcode Fuzzy Hash: 7fdfc5674a3c395f318b755db5e5700b5c8da01c6adf705441184529230558f0
                          • Instruction Fuzzy Hash: 15F19D761092418FC7058F14C8D89F57BE5EFA8324B2F82FAC8599F3A2D3319981CB56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-3916222277
                          • Opcode ID: cc39de3b1a29dd1e753ec60d2152355b3287580950938171bad13ad8d4974699
                          • Instruction ID: b62d34e8ca2a58c9b409f4ce41911bd90675e303d7a92e3c551e2aef61e422ab
                          • Opcode Fuzzy Hash: cc39de3b1a29dd1e753ec60d2152355b3287580950938171bad13ad8d4974699
                          • Instruction Fuzzy Hash: F7D1C0B15006499FDB28CF29C4806EA7BE9EF48315F14C43FE95AAB281D778A745CB18
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID: o*@
                          • API String ID: 0-2776488119
                          • Opcode ID: 9629e07ad3a23c31d4a4c507b061c531e8fcf7d54b7483547e05af43629d42f6
                          • Instruction ID: d3c5ef61e98080039596287ab7779ad48eb6a6bdcd7fd59c12b1c1b6b4b4b1ea
                          • Opcode Fuzzy Hash: 9629e07ad3a23c31d4a4c507b061c531e8fcf7d54b7483547e05af43629d42f6
                          • Instruction Fuzzy Hash: D1C15CB62082518FC7098F18C5D88F57BB5FF98314B2E82F9C94A5F3A2D371A981CB55
                          APIs
                          • GetSystemTime.KERNEL32(?,?,?,00401CF7,?,?,?,00424D98,00000104), ref: 0040B8DC
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: SystemTime
                          • String ID:
                          • API String ID: 2656138-0
                          • Opcode ID: 26923415602c39bdce9042173864df5b857c09fa3b62b70609fd367192be0909
                          • Instruction ID: 5b5284f3accbc16899fd182256fc60eb3f5370fc130b0bc18d9cf5fb0b9f1a2f
                          • Opcode Fuzzy Hash: 26923415602c39bdce9042173864df5b857c09fa3b62b70609fd367192be0909
                          • Instruction Fuzzy Hash: 74E0E5B490020DDFCF08DF94C8848ADBBB8BB08304B008069E515A7350DB34A904CB64
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_0000BA1E), ref: 1000BA69
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: da60e90880c41934350f99a2307c6ae7985fed395fc1f87130ece117c1b3260c
                          • Instruction ID: e74182e0a3c4a19c261303c78882b0aea27feb6a69fdaed8c5c719b8bfcbd79b
                          • Opcode Fuzzy Hash: da60e90880c41934350f99a2307c6ae7985fed395fc1f87130ece117c1b3260c
                          • Instruction Fuzzy Hash: 29A002B85026619BFB4C9FB58C895CC3AE0FB493A2F008469EB41E222CDB305470DF52
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_00011700), ref: 0041174B
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: e2bfd412b76bae2984f3f33c5c26d48bc328b691bc86d04d53dbb007f9897de1
                          • Instruction ID: 4f88e08222042b02ca5e58d0153aaa38bd4941cc0e458ae2a1781b23ef335445
                          • Opcode Fuzzy Hash: e2bfd412b76bae2984f3f33c5c26d48bc328b691bc86d04d53dbb007f9897de1
                          • Instruction Fuzzy Hash: 9AA002B5646300DBCB115FA1BE095843B60A7457F3B52D07AEE51813B8DF7900869F1D
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 1000BA7B
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: e7f75223f19c17c1f8635fb674e80c5fccc611b0be8749e2d318314e68517e21
                          • Instruction ID: 2cb8f8d43ab8341b38dc9022f785d75d96dc348357102a32110e8122763c71d2
                          • Opcode Fuzzy Hash: e7f75223f19c17c1f8635fb674e80c5fccc611b0be8749e2d318314e68517e21
                          • Instruction Fuzzy Hash:
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 0041175D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 16399e27035b4216d1d49b9e2c69565b7dbf4b95767e74660e1280de2fe6a825
                          • Instruction ID: 846f3daf239d59d0f3b999c64deea7e8ed28fef8115a8682c9cff1e9468243e4
                          • Opcode Fuzzy Hash: 16399e27035b4216d1d49b9e2c69565b7dbf4b95767e74660e1280de2fe6a825
                          • Instruction Fuzzy Hash:
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-3916222277
                          • Opcode ID: 07de6a45d12827bada51b8c62a929caaf6827b4f763e0a9a6a9521a6f6e2564f
                          • Instruction ID: a8fd5b00e422921a4810eb9676bbc095d2e2d0a1f74c7c47d296ed23bdbcb651
                          • Opcode Fuzzy Hash: 07de6a45d12827bada51b8c62a929caaf6827b4f763e0a9a6a9521a6f6e2564f
                          • Instruction Fuzzy Hash: E081B2B5A002499FCB05CF69C4809EEBBF1EF89314F1480AEE559EB352D634EA45CF58
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-3916222277
                          • Opcode ID: c1511bd0c8770e08a0ea41fa7c3abce3fb5a631a81c73275da93a9f90e3d2e51
                          • Instruction ID: 210e419feffe7ae8fe5d67e4afa69908a4be552131fcc5cb378c83bbdd227617
                          • Opcode Fuzzy Hash: c1511bd0c8770e08a0ea41fa7c3abce3fb5a631a81c73275da93a9f90e3d2e51
                          • Instruction Fuzzy Hash: 4F81B175A002489FCB05CF68C480AEEBBF5EF89318F24806EE559E7352D634AA55CF54
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7687e97c64ed50e4283743cd4c7f435c3b403562f7e94877b51a9eb223645143
                          • Instruction ID: 5fe9dd86b02d7d751ab855177b5b112a357d4b54f978e1ceb6792171e5ea2880
                          • Opcode Fuzzy Hash: 7687e97c64ed50e4283743cd4c7f435c3b403562f7e94877b51a9eb223645143
                          • Instruction Fuzzy Hash: E0825B71A00605DFCB24CFA8CA906AEBBF2FF44314F14456ED482A77D1DB78AA85DB44
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f7f0c90f2aabcbae6e7b2b57a3009e96eefef9ddf6974b9e37fc60db4b39574d
                          • Instruction ID: 731dc392cb9b640d91678dbff7036c970d93ae30cee7d5ba15d98b73a44ba6c8
                          • Opcode Fuzzy Hash: f7f0c90f2aabcbae6e7b2b57a3009e96eefef9ddf6974b9e37fc60db4b39574d
                          • Instruction Fuzzy Hash: AB327B70A04705DFDB24CF69C98066ABBF2FF54304F14857ED886A7392DB39AA45CB48
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: e356e33d35281ad90930b46335b016b8e6e083e8de737c30692d3a1a0f09bf93
                          • Instruction ID: c884a945cb9aeb6c66c38d18ffd164f97e9f24d3b013d654c7b349e826d78007
                          • Opcode Fuzzy Hash: e356e33d35281ad90930b46335b016b8e6e083e8de737c30692d3a1a0f09bf93
                          • Instruction Fuzzy Hash: A9B1AF75A191C59EDB05CFB984A04EAFFF2AF4E20074ED6EAC5D8AB313C530A605C794
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: b193a79c10ab1ef82c7d7d121995fda310db13f1d2a83f85b22ee7ef5de2d008
                          • Instruction ID: 6954941a9402ce2fb8904419fa0ce0908b8cc3de2b52907dabb8f9428c8b5c49
                          • Opcode Fuzzy Hash: b193a79c10ab1ef82c7d7d121995fda310db13f1d2a83f85b22ee7ef5de2d008
                          • Instruction Fuzzy Hash: 81B18E35A081D59EDB05CFB984904EAFFF3AF8E204B4EC2E6C998AB312C5706615C794
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                          • Instruction ID: 754a44b372b380c23ae24bf4ed424f9b4114d4bc42bbcdb81ae2a783c1755291
                          • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                          • Instruction Fuzzy Hash: 27B16C35A0024ADFEB15CF04C5D0A98BBE1FB49358F25C2ADD8595B386D731EE86CB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                          • Instruction ID: 84d1b603a421c56570a5ac6b4e09178991cd8bc7202d86f7cc5cf634adb95260
                          • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                          • Instruction Fuzzy Hash: E2B16B7590020ADFDB25CF04C5D0AE9BBA1BF58318F24C19ED95A5B342C775EE82CB94
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a3430db1d9f8a6228101d62a8065e73749940f66ed247ec47a898fa2d2bd510a
                          • Instruction ID: cf87a71cd981ae1b0bbb94abe23ccb71446de01f4929d75b65902012915092b9
                          • Opcode Fuzzy Hash: a3430db1d9f8a6228101d62a8065e73749940f66ed247ec47a898fa2d2bd510a
                          • Instruction Fuzzy Hash: 827110716541998BCB2CCF68ECF16A637A1FB5E300B06C43EDA26C7291D774A522CB48
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf268516a2157e3c5b1edc10c3384df3deabb20c418a1a20615e134fc864775c
                          • Instruction ID: 1a3213f8fd8969cd3c78d9e71a515505116e37426b332b17603b1e7f3b8446f0
                          • Opcode Fuzzy Hash: cf268516a2157e3c5b1edc10c3384df3deabb20c418a1a20615e134fc864775c
                          • Instruction Fuzzy Hash: 54515E76F002049FDB08CE5EC8916AEB7F6EBD8324F28C16AE404EB280D7759D468B44
                          APIs
                          • GetCurrentProcess.KERNEL32 ref: 10001448
                          • GetModuleHandleW.KERNEL32(?), ref: 10001456
                          • FreeLibrary.KERNEL32(00000000), ref: 1000145D
                          • LoadLibraryA.KERNEL32(?), ref: 100014A8
                          • GetProcAddress.KERNEL32(?,?), ref: 1000150B
                          • GetModuleFileNameExW.PSAPI(?,?,?,00000104), ref: 1000155C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: LibraryModule$AddressCurrentFileFreeHandleLoadNameProcProcess
                          • String ID: RemoteThread
                          • API String ID: 384485914-1527770381
                          • Opcode ID: 7f29649263da9fd249f9d903987e1f4995867d50850d77f501d422d16fcdfb8a
                          • Instruction ID: 54f2b5fe37813bdb6cbaa394ea52629edcace97c1cd76af53f02dcf4bb087067
                          • Opcode Fuzzy Hash: 7f29649263da9fd249f9d903987e1f4995867d50850d77f501d422d16fcdfb8a
                          • Instruction Fuzzy Hash: D38120B5A8035CBAFB30DB60CC46FDF7BADDB04B91F404051B708B90D5D6B6AE908A60
                          APIs
                            • Part of subcall function 0040BB38: __allrem.LIBCMT ref: 0040BB59
                            • Part of subcall function 0040BB38: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040BB68
                            • Part of subcall function 0040BB38: __allrem.LIBCMT ref: 0040BB7B
                            • Part of subcall function 0040BB38: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040BB89
                          • wsprintfW.USER32 ref: 0040BF29
                          • wsprintfW.USER32 ref: 0040BF5A
                          • wsprintfW.USER32 ref: 0040BF8B
                          • wsprintfW.USER32 ref: 0040BFBC
                          • wsprintfW.USER32 ref: 0040BFED
                          • wsprintfW.USER32 ref: 0040C01E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: wsprintf$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                          • String ID: %#n$%#s$%#u$%03d$Invalid datetime
                          • API String ID: 2900553612-886435284
                          • Opcode ID: e3cb1ede60b1f0cba4e2a4dc11ad36a7b25568725a8ba564b0ad4c99122eef0b
                          • Instruction ID: c8c36c93b72c69e4ee92b2371ce51bf7befbec509832ecd36b6b6c247a5f6846
                          • Opcode Fuzzy Hash: e3cb1ede60b1f0cba4e2a4dc11ad36a7b25568725a8ba564b0ad4c99122eef0b
                          • Instruction Fuzzy Hash: 3641D672B40218B6C6117BA26C82FBF3A6DDF61B48F54003BFD04B51E2E77D991096AD
                          APIs
                          • LCMapStringW.KERNEL32(00000000,00000100,0041F774,00000001,00000000,00000000,$+@,?,00428674,00000000,00424D98,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe,C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe), ref: 004143A3
                          • LCMapStringA.KERNEL32(00000000,00000100,0041F770,00000001,00000000,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe,C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe), ref: 004143BF
                          • LCMapStringW.KERNEL32(?,$+@,?,?,00424D98,00000000,$+@,?,00428674,00000000,00424D98,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe,C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe), ref: 00414408
                          • WideCharToMultiByte.KERNEL32(00428674,00000220,?,?,00000000,00000000,00000000,00000000,$+@,?,00428674,00000000,00424D98,?,?,00402B24), ref: 0041443B
                          • WideCharToMultiByte.KERNEL32(?,00000220,?,?,00000000,?,00000000,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe), ref: 00414492
                          • LCMapStringA.KERNEL32(?,$+@,00000000,?,00000000,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe), ref: 004144AE
                          • LCMapStringA.KERNEL32(?,?,?,?,?,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe), ref: 00414504
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID: $+@$$+@
                          • API String ID: 352835431-2210268641
                          • Opcode ID: 0e0567e7bf6d69f5348a680e30feec40899a33747b97d2795ff1e71acfe17187
                          • Instruction ID: bd0543e9003dd66f5c3d55ec1ea95815b24fd956480843ea7bfaa8e64d7287af
                          • Opcode Fuzzy Hash: 0e0567e7bf6d69f5348a680e30feec40899a33747b97d2795ff1e71acfe17187
                          • Instruction Fuzzy Hash: 4151A031900259FBCF228F95DC45AEF7F76FB48750F14402AFA28A5260C3398991DBA9
                          APIs
                          • LoadLibraryA.KERNEL32(?), ref: 10001954
                          • GetProcAddress.KERNEL32(?,?), ref: 100019AC
                          • GetProcAddress.KERNEL32(?,?), ref: 10001A04
                          • GetModuleHandleA.KERNEL32(?), ref: 10001A4D
                          • GetProcAddress.KERNEL32(?,?), ref: 10001A98
                          • FreeLibrary.KERNEL32(?), ref: 10001AB8
                          • OpenProcess.KERNEL32(0000043A,00000000,?), ref: 10001AE3
                          • FreeLibrary.KERNEL32(?), ref: 10001B06
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressLibraryProc$Free$HandleLoadModuleOpenProcess
                          • String ID: ernel32.dll
                          • API String ID: 1269845195-594813063
                          • Opcode ID: 1208e8b74169e1fa8a9f4041290d1ef900583441e8b20d599adfd41ea33e171c
                          • Instruction ID: 0f0f3e06b4fe35486ca1a1d6347558ff8203be8ce8feae1a5c9791bfbdf42504
                          • Opcode Fuzzy Hash: 1208e8b74169e1fa8a9f4041290d1ef900583441e8b20d599adfd41ea33e171c
                          • Instruction Fuzzy Hash: 8E6105B1B8035D7AFB34D6A08D4BFDA72ADDB04F81F400461B704BE0C5E6F5AE948A65
                          APIs
                          • LoadLibraryA.KERNEL32(?), ref: 1000200A
                          • GetProcAddress.KERNEL32(?,?), ref: 10002062
                          • GetProcAddress.KERNEL32(?,?), ref: 100020BA
                          • GetModuleHandleA.KERNEL32(?), ref: 10002106
                          • GetProcAddress.KERNEL32(?,?), ref: 10002155
                          • OpenProcess.KERNEL32(0000043A,00000000), ref: 100021BE
                          • GetModuleBaseNameA.PSAPI(00000000,?,00000000,00000104), ref: 100021E8
                          • CloseHandle.KERNEL32(00000000), ref: 10002203
                          • FreeLibrary.KERNEL32(?), ref: 10002218
                          • FreeLibrary.KERNEL32(?), ref: 1000222A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressLibraryProc$FreeHandleModule$BaseCloseLoadNameOpenProcess
                          • String ID:
                          • API String ID: 2877627430-0
                          • Opcode ID: 198c61c343d8d65844ce9acd5a12e9fc22120eaa794cbfc0f7411a9f00b2f379
                          • Instruction ID: 73c1d16a7ae2ba8ce2470e824ab43fcd253f6b7002b793fc18cd0c4f65eae655
                          • Opcode Fuzzy Hash: 198c61c343d8d65844ce9acd5a12e9fc22120eaa794cbfc0f7411a9f00b2f379
                          • Instruction Fuzzy Hash: 6D815771E80319BAFB21D790DC46FEE77BDEB48B81F400095B744B90C5E6F5ABA48A14
                          APIs
                          • GetStringTypeW.KERNEL32(00000001,0041F774,00000001,00000000,$+@,?,00428674,00000000,00424D98,?,?,00402B24), ref: 00416162
                          • GetStringTypeA.KERNEL32(00000000,00000001,0041F770,00000001,?,?,?,00402B24), ref: 0041617C
                          • GetStringTypeW.KERNEL32(?,$+@,?,?,$+@,?,00428674,00000000,00424D98,?,?,00402B24), ref: 004161A3
                          • WideCharToMultiByte.KERNEL32(?,00000220,$+@,?,00000000,00000000,00000000,00000000,$+@,?,00428674,00000000,00424D98,?,?,00402B24), ref: 004161D6
                          • WideCharToMultiByte.KERNEL32(?,00000220,?,?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,00402B24), ref: 0041623F
                          • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00402B24), ref: 004162AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide
                          • String ID: $+@$$+@
                          • API String ID: 3852931651-2210268641
                          • Opcode ID: 5a60bbccdf56786892d67aa7cdf5dc4e3dee70d9f666aaf44982346db2b07ba3
                          • Instruction ID: 1d612d5df6f568afd8e087b4164691ed10648b1d1f810b4c733d69fb9f15a378
                          • Opcode Fuzzy Hash: 5a60bbccdf56786892d67aa7cdf5dc4e3dee70d9f666aaf44982346db2b07ba3
                          • Instruction Fuzzy Hash: A3518E71900619EFCF219F99CC46AEF7FB8FF49714F22452AF514A2290D3349991CBA8
                          APIs
                          • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,10009650,?,Microsoft Visual C++ Runtime Library,00012010,?,1000E7D4,?,1000E824,?,?,?,Runtime Error!Program: ), ref: 1000C312
                          • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 1000C32A
                          • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 1000C33B
                          • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 1000C348
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                          • API String ID: 2238633743-4044615076
                          • Opcode ID: 128530e129fb6776b43ff053db9ad34881fa31f5cb0703661425cb77cf38f600
                          • Instruction ID: 3bcacc6b1598bac565da9c86e3d03fbacbd56148ee9f6cdd2c2eaa3ade7af819
                          • Opcode Fuzzy Hash: 128530e129fb6776b43ff053db9ad34881fa31f5cb0703661425cb77cf38f600
                          • Instruction Fuzzy Hash: 35015A31600366AEFB00CFF69CC0D9A3AE8EB886C0701C429F604E2128DB70C8159B61
                          APIs
                          • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00412209,?,Microsoft Visual C++ Runtime Library,00012010,?,0041F570,?,0041F5C0,?,?,?,Runtime Error!Program: ), ref: 00414F43
                          • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00414F5B
                          • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00414F6C
                          • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00414F79
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                          • API String ID: 2238633743-4044615076
                          • Opcode ID: ef0b2b88f1608e080d111fe0c269d9813dd26266f66e87f79009e77a88a1d14d
                          • Instruction ID: 3aeb20cd3d141d449aa641801d62b101dce212d2a3cfbef49429f3aa040938e9
                          • Opcode Fuzzy Hash: ef0b2b88f1608e080d111fe0c269d9813dd26266f66e87f79009e77a88a1d14d
                          • Instruction Fuzzy Hash: 61012C31708302EF8761DFB49C84A9B7BE8AB89790315047BF508C2361DB6D88879B7D
                          APIs
                          • CompareStringW.KERNEL32(00000000,00000000,0041F774,00000001,0041F774,00000001,00000000,-00000004,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000), ref: 004168FE
                          • CompareStringA.KERNEL32(00000000,00000000,0041F770,00000001,0041F770,00000001,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 0041691B
                          • CompareStringA.KERNEL32(?,00000000,00000000,0040DFD0,00000000,0040DFD0,00000000,-00000004,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000), ref: 00416979
                          • GetCPInfo.KERNEL32(0040DFD0,00000000,00000000,-00000004,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 004169CA
                          • MultiByteToWideChar.KERNEL32(0040DFD0,00000009,00000000,0040DFD0,00000000,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416A49
                          • MultiByteToWideChar.KERNEL32(0040DFD0,00000001,00000000,0040DFD0,0040DFD0,0040DFD0,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416AAA
                          • MultiByteToWideChar.KERNEL32(0040DFD0,00000009,00000000,0040DFD0,00000000,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416ABD
                          • MultiByteToWideChar.KERNEL32(0040DFD0,00000001,00000000,0040DFD0,?,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416B09
                          • CompareStringW.KERNEL32(?,00000000,0040DFD0,0040DFD0,?,00000000,?,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416B21
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharCompareMultiStringWide$Info
                          • String ID:
                          • API String ID: 1651298574-0
                          • Opcode ID: 04703151882954d6d92edba438c215b4450f96dbfc96dac07f87f9e465537dc8
                          • Instruction ID: f1cae54e8e48ec70fdba284df45739787bad953a687df2729b822c1be6aaf156
                          • Opcode Fuzzy Hash: 04703151882954d6d92edba438c215b4450f96dbfc96dac07f87f9e465537dc8
                          • Instruction Fuzzy Hash: 1671BD72904149EFCF219F959C81AEF7FBAEF09344F12402BF954A2260C739D891CB99
                          APIs
                          • LCMapStringW.KERNEL32(00000000,00000100,1000E864,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 1000CF97
                          • LCMapStringA.KERNEL32(00000000,00000100,1000E860,00000001,00000000,00000000), ref: 1000CFB3
                          • LCMapStringA.KERNEL32(?,00000100,00000020,00000001,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 1000CFFC
                          • MultiByteToWideChar.KERNEL32(00000000,00000101,00000020,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 1000D034
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 1000D08C
                          • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 1000D0A2
                          • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 1000D0D5
                          • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 1000D13D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID:
                          • API String ID: 352835431-0
                          • Opcode ID: c8d20f4e56d3d156e632033c757d61f90dcf30927a82f938c165a7452664eb3f
                          • Instruction ID: 4ddebbf8e4329545ab3144b50fe820065b42d78ffb362d58e5454d5a28e999cb
                          • Opcode Fuzzy Hash: c8d20f4e56d3d156e632033c757d61f90dcf30927a82f938c165a7452664eb3f
                          • Instruction Fuzzy Hash: 9B516A72900249AFEF22DF94CC85ADE3FB5FB487D0F10851AF918A2168C3329D51DB61
                          APIs
                          • LCMapStringW.KERNEL32(00000000,00000100,0041F774,00000001,00000000,00000000,00000100,00000001,00000000,00000000,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 00415611
                          • LCMapStringA.KERNEL32(00000000,00000100,0041F770,00000001,00000000,00000000,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 0041562D
                          • LCMapStringA.KERNEL32(00000000,00401C95,?,00000001,?,00000000,00000100,00000001,00000000,00000000,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 00415676
                          • MultiByteToWideChar.KERNEL32(00000000,00000002,?,00000001,00000000,00000000,00000100,00000001,00000000,00000000,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 004156AE
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,00000001,?,00000000,?,00000001,?,00401C95,00000000), ref: 00415706
                          • LCMapStringW.KERNEL32(00000000,00401C95,00000000,00000000,00000000,00000000,?,00000001,?,00401C95,00000000), ref: 0041571C
                          • LCMapStringW.KERNEL32(00000000,00401C95,00000000,00000000,?,?,?,00000001,?,00401C95,00000000), ref: 0041574F
                          • LCMapStringW.KERNEL32(00000000,00401C95,00000000,00000000,?,00000000,?,00000001,?,00401C95,00000000), ref: 004157B7
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID:
                          • API String ID: 352835431-0
                          • Opcode ID: 54639eaa1e88e8aba79d0bfb87c835f61b69fc4376d0359fc4e24f3ef4defc34
                          • Instruction ID: c98063cf3f2f28be6c6fde9ee765e17db69f0972600e8ea42cf796d09a82ff02
                          • Opcode Fuzzy Hash: 54639eaa1e88e8aba79d0bfb87c835f61b69fc4376d0359fc4e24f3ef4defc34
                          • Instruction Fuzzy Hash: 3A515E31900609EFCF218F95CC46ADF7FB9FB89754F10412AF924A12A0D3398992DB69
                          APIs
                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,0040D805), ref: 00411C20
                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,0040D805), ref: 00411C34
                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,0040D805), ref: 00411C55
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00411C8C
                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,0040D805), ref: 00411CAC
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,?,0040D805), ref: 00411CCA
                          • FreeEnvironmentStringsA.KERNEL32(00000000,?,00000000,?,?,?,0040D805), ref: 00411CFF
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,0040D805,?,00000000,?,?,?,0040D805), ref: 00411D2F
                          • FreeEnvironmentStringsA.KERNEL32(00000000,?,00000000,?,?,?,0040D805), ref: 00411D65
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                          • String ID:
                          • API String ID: 158306478-0
                          • Opcode ID: 430383f94c9601cc9abb21fb9faf9b17a59a43af17ef76a8277b7701f354be51
                          • Instruction ID: 3090c6bc3a1742862e2e0e64a859aa86bf3849621cf42877fae6005f5b539d00
                          • Opcode Fuzzy Hash: 430383f94c9601cc9abb21fb9faf9b17a59a43af17ef76a8277b7701f354be51
                          • Instruction Fuzzy Hash: 11412832A482116BD7316F65EC44BE77698EB45714F26423FEA01D73A0EB78DC8182DD
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,10002B52), ref: 10009599
                          • GetStdHandle.KERNEL32(000000F4,1000E7D4,00000000,10002B52,00000000,10002B52), ref: 1000966F
                          • WriteFile.KERNEL32(00000000), ref: 10009676
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: File$HandleModuleNameWrite
                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                          • API String ID: 3784150691-4022980321
                          • Opcode ID: ea0aefca77f81431ba08ae345cfe8b03a1e754fc5cee4c380e72236d7967db81
                          • Instruction ID: 178abc943d900cdddc95ff121c26e31f1f9fca6714615d81558fc3e48779c060
                          • Opcode Fuzzy Hash: ea0aefca77f81431ba08ae345cfe8b03a1e754fc5cee4c380e72236d7967db81
                          • Instruction Fuzzy Hash: 4431B772A002189FFF21DB60CC85FDA73ADEB453C5F500466F589E6049EA70EA94CB51
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 00412152
                          • GetStdHandle.KERNEL32(000000F4,0041F570,00000000,?,00000000,?), ref: 00412228
                          • WriteFile.KERNEL32(00000000), ref: 0041222F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: File$HandleModuleNameWrite
                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                          • API String ID: 3784150691-4022980321
                          • Opcode ID: 94ef7481e6b027e58786b40d54ef855c7b3dd6018c705d79d6d9ec024a23f2e9
                          • Instruction ID: 77ffc6442223af21855e83ebf50e4e10e44f81062925e762b119b775f980ce86
                          • Opcode Fuzzy Hash: 94ef7481e6b027e58786b40d54ef855c7b3dd6018c705d79d6d9ec024a23f2e9
                          • Instruction Fuzzy Hash: CC31D272600218BFDF20DB60CE46FDE736DEB49304F64046BF545E2190EAB8AAD58A1D
                          APIs
                          • GetModuleHandleA.KERNEL32(?), ref: 10001274
                          • GetProcAddress.KERNEL32(?,?), ref: 100012CA
                          • GetProcAddress.KERNEL32(?,?), ref: 10001324
                          • GetProcAddress.KERNEL32(?,?), ref: 1000137C
                          • GetProcAddress.KERNEL32(?,?), ref: 100013E8
                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 10001405
                          • CloseHandle.KERNEL32(00000000), ref: 10001412
                          • CloseHandle.KERNEL32(?), ref: 10001417
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressProc$Handle$Close$ModuleObjectSingleWait
                          • String ID:
                          • API String ID: 2743844413-0
                          • Opcode ID: 802593ae90f17b18c79662a3e1d270b58ba0ee5f8a4df7299d5aea8cafb05fb4
                          • Instruction ID: 9a7eeab185e46d06bf56ebbfeee1b870957da3878e33c4a72f9ae6495fbb8191
                          • Opcode Fuzzy Hash: 802593ae90f17b18c79662a3e1d270b58ba0ee5f8a4df7299d5aea8cafb05fb4
                          • Instruction Fuzzy Hash: 6A6104B5F8431CBAFB309A609C47FDB7A6DDB04B81F404061B708BD0D5D6F66E918AA0
                          APIs
                          • LCMapStringW.KERNEL32(00000000,00000100,1000E864,00000001,00000000,00000000,?,?,10012768,10001574,00000000,?,?,?,?,00000104), ref: 1000AD70
                          • LCMapStringA.KERNEL32(00000000,00000100,1000E860,00000001,00000000,00000000), ref: 1000AD8C
                          • LCMapStringW.KERNEL32(?,?,?,?,00000000,10001574,?,?,10012768,10001574,00000000,?,?,?,?,00000104), ref: 1000ADD5
                          • WideCharToMultiByte.KERNEL32(10012768,00000220,?,?,00000000,00000000,00000000,00000000,?,?,10012768,10001574,00000000,?,?,?), ref: 1000AE08
                          • WideCharToMultiByte.KERNEL32(?,00000220,?,?,?,?,00000000,00000000), ref: 1000AE5F
                          • LCMapStringA.KERNEL32(?,?,?,?,00000000,00000000), ref: 1000AE7B
                          • LCMapStringA.KERNEL32(?,?,?,?,?,00000000), ref: 1000AED1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID:
                          • API String ID: 352835431-0
                          • Opcode ID: 8f05e58b05e9a447cfb959372668e7abf9ba84083b2cc2ff43c1636e0db6dea5
                          • Instruction ID: fe289346f532971cbccc950126f10ae72bd3b0df8f0bc12cb035537b02f92d92
                          • Opcode Fuzzy Hash: 8f05e58b05e9a447cfb959372668e7abf9ba84083b2cc2ff43c1636e0db6dea5
                          • Instruction Fuzzy Hash: D0515DB290026AAFEF22CF91CC45AEF3FB5FB0A7D0F104225F915A5164C7358991DBA1
                          APIs
                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10005B8F), ref: 1000932B
                          • GetEnvironmentStrings.KERNEL32(?,?,?,?,10005B8F), ref: 1000933F
                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10005B8F), ref: 1000936B
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,10005B8F), ref: 100093A3
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,10005B8F), ref: 100093C5
                          • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,10005B8F), ref: 100093DE
                          • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,10005B8F), ref: 100093F1
                          • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 1000942F
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                          • String ID:
                          • API String ID: 1823725401-0
                          • Opcode ID: b5af69dadc5efcc076ab60009370ba4e8c1262b8b097945ac6c57da46478fe6f
                          • Instruction ID: 2b81245d939cd83357b068e11a87cd151e038e3c4334040fef868fdd10b89fca
                          • Opcode Fuzzy Hash: b5af69dadc5efcc076ab60009370ba4e8c1262b8b097945ac6c57da46478fe6f
                          • Instruction Fuzzy Hash: 393149B24083A2AFF320FFB85CC4C6F77DCE7482D4B120939F552C3148E6619D824A61
                          APIs
                          • GetModuleHandleW.KERNEL32(?), ref: 00401AA1
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401AEE
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401B2C
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401B6A
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401BAC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: BIN
                          • API String ID: 667068680-1015027815
                          • Opcode ID: 426b30f3620974495326e62c2c60232af0cb6738e2bec8c0dcf57d0a5699cdcb
                          • Instruction ID: d33b504a52d157aab54a39868a1b44e55f0db24058a997c431131fa17ba52408
                          • Opcode Fuzzy Hash: 426b30f3620974495326e62c2c60232af0cb6738e2bec8c0dcf57d0a5699cdcb
                          • Instruction Fuzzy Hash: 6151D771BC43447AF2309671DC47FAB769DAB49F44F00082EB744BE0C2D6FAA6144665
                          APIs
                          • GetStartupInfoA.KERNEL32(?), ref: 10008E58
                          • GetFileType.KERNEL32(00000480), ref: 10008F03
                          • GetStdHandle.KERNEL32(-000000F6), ref: 10008F66
                          • GetFileType.KERNEL32(00000000), ref: 10008F74
                          • SetHandleCount.KERNEL32 ref: 10008FAB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: FileHandleType$CountInfoStartup
                          • String ID: HO[
                          • API String ID: 1710529072-177266396
                          • Opcode ID: 02b9d74386a5989b0b137aa57980a70e0f4be3b1f5c6b816f135ec974fccc55d
                          • Instruction ID: ddfa1a036474b7ecfbd58c851be394f7d76dc5ca7c0e2929af7eacdf6a4d07e1
                          • Opcode Fuzzy Hash: 02b9d74386a5989b0b137aa57980a70e0f4be3b1f5c6b816f135ec974fccc55d
                          • Instruction Fuzzy Hash: 5951DF315046A28FF711CB78C8846A97BE1FB013E8F298678D5E29B2E5DB30DA46C751
                          APIs
                          • GetStartupInfoA.KERNEL32(?), ref: 00411E6E
                          • GetFileType.KERNEL32(?,?,00000000), ref: 00411F19
                          • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00411F7C
                          • GetFileType.KERNEL32(00000000,?,00000000), ref: 00411F8A
                          • SetHandleCount.KERNEL32 ref: 00411FC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: FileHandleType$CountInfoStartup
                          • String ID: $uB
                          • API String ID: 1710529072-178231841
                          • Opcode ID: 593c92c7eb8dc217b894d47eb924cc9a35d400393df819289d625f248b346279
                          • Instruction ID: 38d4255647d52bf4454d4f47cfcd0d26b98a62e44eb290e802ac21e1cfab70cc
                          • Opcode Fuzzy Hash: 593c92c7eb8dc217b894d47eb924cc9a35d400393df819289d625f248b346279
                          • Instruction Fuzzy Hash: 5B510831A046018FC720CF68D8846A677E0AB15338F24466ED7A6D72F0DB38D887C75D
                          APIs
                            • Part of subcall function 0040F7B8: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F7F5
                            • Part of subcall function 0040F7B8: EnterCriticalSection.KERNEL32(?,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F810
                          • InitializeCriticalSection.KERNEL32(00000068,00000100,00000080,@,S@,00000000,?,?,00414D1C,00000001,00000000,00000000), ref: 0041487E
                          • EnterCriticalSection.KERNEL32(00000068,00000100,00000080,@,S@,00000000,?,?,00414D1C,00000001,00000000,00000000), ref: 00414893
                          • LeaveCriticalSection.KERNEL32(00000068), ref: 004148A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterInitialize$Leave
                          • String ID: $ uB$ vB$@,S@
                          • API String ID: 713024617-4028107869
                          • Opcode ID: 2fcf63ef652f2c0e74e52bff06b73b5af4071bfdd219f627d315837f60cbb5e4
                          • Instruction ID: be70e2c14c3603ac5746ce5d34877287c054dce09029812c88c6f1b27f3c77f8
                          • Opcode Fuzzy Hash: 2fcf63ef652f2c0e74e52bff06b73b5af4071bfdd219f627d315837f60cbb5e4
                          • Instruction Fuzzy Hash: E23135B21043419FD320AF34EC8479A77D4EF81738F24863EE666472D1DB789889871A
                          APIs
                          • GetStringTypeW.KERNEL32(00000001,1000E864,00000001,10001574,?,?,10012768,10001574,00000000,?,?,?), ref: 1000C7C7
                          • GetStringTypeA.KERNEL32(00000000,00000001,1000E860,00000001,?), ref: 1000C7E1
                          • GetStringTypeW.KERNEL32(00000100,?,?,?,?,?,10012768,10001574,00000000,?,?,?), ref: 1000C808
                          • WideCharToMultiByte.KERNEL32(00000000,00000220,?,?,00000000,00000000,00000000,00000000,?,?,10012768,10001574,00000000,?,?,?), ref: 1000C83B
                          • WideCharToMultiByte.KERNEL32(?,00000220,?,?,00000000,00000000,00000000,00000000), ref: 1000C8A4
                          • GetStringTypeA.KERNEL32(?,00000100,?,?), ref: 1000C90F
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide
                          • String ID:
                          • API String ID: 3852931651-0
                          • Opcode ID: 65637de255ac76e6e7f76532fbcc80446d0a0cbfeb49186c18b28d8f0bea70a4
                          • Instruction ID: 3834e5c373360181745353e4b3832744015ecb015a07ac9f4135a2620758db1e
                          • Opcode Fuzzy Hash: 65637de255ac76e6e7f76532fbcc80446d0a0cbfeb49186c18b28d8f0bea70a4
                          • Instruction Fuzzy Hash: 6B519A71900399EBEB21CF95CC89EDF7FB8EB497D0F108519F511A2194D7709A51CBA0
                          APIs
                          • GetStringTypeW.KERNEL32(00000001,1000E864,00000001,00000000,?,00000100,00000000,1000C1FE,00000001,00000020,00000100,?,00000000), ref: 1000C98C
                          • GetStringTypeA.KERNEL32(00000000,00000001,1000E860,00000001,?), ref: 1000C9A6
                          • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,1000C1FE,00000001,00000020,00000100,?,00000000), ref: 1000C9DA
                          • MultiByteToWideChar.KERNEL32(1000C1FE,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,1000C1FE,00000001,00000020,00000100,?,00000000), ref: 1000CA12
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 1000CA68
                          • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 1000CA7A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide
                          • String ID:
                          • API String ID: 3852931651-0
                          • Opcode ID: 8c18163fd7cb7fb328bf5ae09abcb2a32844a993f7bb06213be619abc0828dfc
                          • Instruction ID: 037dbdefde4d013786314c10ea3b09220e1c4c7773944604d13847e7930403d9
                          • Opcode Fuzzy Hash: 8c18163fd7cb7fb328bf5ae09abcb2a32844a993f7bb06213be619abc0828dfc
                          • Instruction Fuzzy Hash: 9B416A7260025EAFEB11CF94CC89EEE3BA8FB093D4F104525FA15E2154D7319D54CBA1
                          APIs
                          • GetStringTypeW.KERNEL32(00000001,0041F774,00000001,00000000,00000100,00000001,00000000,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 004154C5
                          • GetStringTypeA.KERNEL32(00000000,00000001,0041F770,00000001,?,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 004154DF
                          • GetStringTypeA.KERNEL32(00000000,00000000,00401C95,?,00000001,00000100,00000001,00000000,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 00415513
                          • MultiByteToWideChar.KERNEL32(?,00000002,00401C95,?,00000000,00000000,00000100,00000001,00000000,?,00000001,?,00401C95,00000000,DllGetClassObject), ref: 0041554B
                          • MultiByteToWideChar.KERNEL32(?,00000001,00401C95,?,?,?,?,?,?,?,00000001,?,00401C95,00000000), ref: 004155A1
                          • GetStringTypeW.KERNEL32(00000000,?,00000000,00000001,?,?,?,?,?,?,00000001,?,00401C95,00000000), ref: 004155B3
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide
                          • String ID:
                          • API String ID: 3852931651-0
                          • Opcode ID: 46c1e1efbf68a1b9c3dca6136892804e34c50b007045e83396152ebd5b2c70ef
                          • Instruction ID: a579a62adc80f026206eeacd120a953fb5ac64c8790a5af1e40b5935c4da18f0
                          • Opcode Fuzzy Hash: 46c1e1efbf68a1b9c3dca6136892804e34c50b007045e83396152ebd5b2c70ef
                          • Instruction Fuzzy Hash: 03416E72A00509FFCF218F94CC89EEB3F6AFB48754F10452AF915D6250D3788995CBA9
                          APIs
                          • GetCommandLineW.KERNEL32(?,00000000,?,?,0040D7FB), ref: 00411D88
                          • GetCommandLineA.KERNEL32(?,00000000,?,?,0040D7FB), ref: 00411D9A
                          • GetCommandLineW.KERNEL32(?,00000000,?,?,0040D7FB), ref: 00411DB1
                          • GetCommandLineA.KERNEL32(?,00000000,?,?,0040D7FB), ref: 00411DBA
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,0040D7FB), ref: 00411DD3
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,0040D7FB), ref: 00411DF8
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CommandLine$ByteCharMultiWide
                          • String ID:
                          • API String ID: 3068183746-0
                          • Opcode ID: a5543fad8a4234462ea19dc9d77a33d97f9d14257ac7e0c8ff6f7cbd7543386f
                          • Instruction ID: 7f57305f5f48fc3308e12dfa4f530b447d2b4a88bf3a8819f48e49d9868202e0
                          • Opcode Fuzzy Hash: a5543fad8a4234462ea19dc9d77a33d97f9d14257ac7e0c8ff6f7cbd7543386f
                          • Instruction Fuzzy Hash: 7811CC32704219A6D6205BE5AC41FF7375CDF42365F220137EA10D72F1DAA5DC824AED
                          APIs
                            • Part of subcall function 0040F7B8: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F7F5
                            • Part of subcall function 0040F7B8: EnterCriticalSection.KERNEL32(?,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F810
                          • GetCPInfo.KERNEL32(00000000,?), ref: 00416B8E
                            • Part of subcall function 0040F819: LeaveCriticalSection.KERNEL32(?,0040D29B,00000009,?,00000009,00000000,?,0040D25B,000000E0,0040D248,?,0040F7D8,00000018,00000000,?), ref: 0040F826
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterInfoInitializeLeave
                          • String ID: H,B$X+B$rB$rB
                          • API String ID: 1866836854-3838826781
                          • Opcode ID: 8de95d3dfc8d72ad378295f86c02e45b56d8b3132e7ce49b123cafe39809b56a
                          • Instruction ID: 65a658ebd2d53d0b8e3581262dd4c83a8b89734c92ddd14565b351d09dcc6dd2
                          • Opcode Fuzzy Hash: 8de95d3dfc8d72ad378295f86c02e45b56d8b3132e7ce49b123cafe39809b56a
                          • Instruction Fuzzy Hash: 9D41387160C260AEE721DB64D8803EA7B91DB05304F6680BBE585CB292D67DD8C6C79C
                          APIs
                          • InterlockedIncrement.KERNEL32(00428674), ref: 0040D5EF
                          • InterlockedDecrement.KERNEL32(00428674), ref: 0040D5FE
                          • InterlockedDecrement.KERNEL32(00428674), ref: 0040D65C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Interlocked$Decrement$Increment
                          • String ID: $+@$C:\Users\user\AppData\Local\Temp\@AE2AF6.tmp.exe
                          • API String ID: 2574743344-2763535350
                          • Opcode ID: e44f5cca523c1bbce0fe183b9a9583f5cce5e950200b30a6372c9fe17fb2ecd8
                          • Instruction ID: 434f967d428384523260c60ec9955d5cee3339aa3ac38c669103ab5418d8fd4d
                          • Opcode Fuzzy Hash: e44f5cca523c1bbce0fe183b9a9583f5cce5e950200b30a6372c9fe17fb2ecd8
                          • Instruction Fuzzy Hash: 9421A376900205EBDB206F95D8456EA77A8EB04714F50C43BFC49AA2C0DB788EC6CF9D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 39ae0dcb8c9e85e88f16ec3ad252fe16bcc93ced395766251b0c7ab93858c113
                          • Instruction ID: 8b76d0335c75e456601fad6d949bcc15044b76aeca226337109a248b62bf8a62
                          • Opcode Fuzzy Hash: 39ae0dcb8c9e85e88f16ec3ad252fe16bcc93ced395766251b0c7ab93858c113
                          • Instruction Fuzzy Hash: B051CA71A00149FFDF31AF50DD808EE7BBAEB40316B62817BE55696250D7398EC68B18
                          APIs
                            • Part of subcall function 10007128: InitializeCriticalSection.KERNEL32(00000000,?,10002B52,?,10006680,00000009,?,?,1000664F,000000E0,100059AD,10002B52,00000001,10002B52), ref: 10007165
                            • Part of subcall function 10007128: EnterCriticalSection.KERNEL32(10002B52,10002B52,?,10006680,00000009,?,?,1000664F,000000E0,100059AD,10002B52,00000001,10002B52), ref: 10007180
                          • InitializeCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,?,?,1000B8CB,00000001,00000000,00000000), ref: 1000B42D
                          • EnterCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,?,?,1000B8CB,00000001,00000000,00000000), ref: 1000B442
                          • LeaveCriticalSection.KERNEL32(00000068,?,00000000,?,?,1000B8CB,00000001,00000000,00000000), ref: 1000B44F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterInitialize$Leave
                          • String ID: $HO[
                          • API String ID: 713024617-3714246590
                          • Opcode ID: 763a3f4733fb243791e99211741b653b94060ddeb637a506f5486018309758c8
                          • Instruction ID: ed49ec3101de35bba78ea3940e76779101a720b959259f2900186d2d71f27fd6
                          • Opcode Fuzzy Hash: 763a3f4733fb243791e99211741b653b94060ddeb637a506f5486018309758c8
                          • Instruction Fuzzy Hash: 453112725047419FF314CF24CCC479A77D4FB403A4F258A2CE5654A1D7C7B4EA848711
                          APIs
                          • VirtualFree.KERNEL32(005B05C4,00100000,00004000,?,?,?,?,10005BE0,10005C34,?,?,?), ref: 100094AC
                          • VirtualFree.KERNEL32(005B05C4,00000000,00008000,?,?,10005BE0,10005C34,?,?,?), ref: 100094B7
                          • HeapFree.KERNEL32(00000000,005B0700,?,?,10005BE0,10005C34,?,?,?), ref: 100094C4
                          • HeapFree.KERNEL32(00000000,?,?,10005BE0,10005C34,?,?,?), ref: 100094E2
                          • HeapDestroy.KERNEL32(?,?,10005BE0,10005C34,?,?,?), ref: 100094EA
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Free$Heap$Virtual$Destroy
                          • String ID:
                          • API String ID: 782257640-0
                          • Opcode ID: b35f386f5967b22487236f92b0a632c729da4a67992a83c097bf518819c70c28
                          • Instruction ID: 79a529c26f2269d1bb7fa9166d85c2a5e8f024c85fec41328c91a863a656031d
                          • Opcode Fuzzy Hash: b35f386f5967b22487236f92b0a632c729da4a67992a83c097bf518819c70c28
                          • Instruction Fuzzy Hash: 81F0173A240225BFFB259F51CCC5F857B66FB847A0F2A8024F244260B5C6B3B865DB58
                          APIs
                          • GetLastError.KERNEL32(00000002,00000000,100098E7,100096D1,?,1000C75F,?,00000000,00000002,00000020,?,00000000,00000007,?,1000AD29,00000000), ref: 100089A3
                          • TlsGetValue.KERNEL32(?,1000AD29,00000000,?,00000000,?,10007016,00000000,00000000,10006A6B,00000000,?,100051FB,?,00000000,00000000), ref: 100089B1
                          • SetLastError.KERNEL32(00000000,?,1000AD29,00000000,?,00000000,?,10007016,00000000,00000000,10006A6B,00000000,?,100051FB,?,00000000), ref: 100089FD
                            • Part of subcall function 1000B20A: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000000,100089C6,00000001,00000074,?,1000AD29,00000000,?,00000000,?,10007016,00000000), ref: 1000B25F
                          • TlsSetValue.KERNEL32(00000000,?,1000AD29,00000000,?,00000000,?,10007016,00000000,00000000,10006A6B,00000000,?,100051FB,?,00000000), ref: 100089D5
                          • GetCurrentThreadId.KERNEL32 ref: 100089E6
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ErrorLastValue$AllocCurrentHeapThread
                          • String ID:
                          • API String ID: 2020098873-0
                          • Opcode ID: 5e1e9148d7b878ed103a2ec25932d88dd9a5e7fe7a9e4b39f72545ffad241bed
                          • Instruction ID: e2d9743bec49df8f1e21d7b67743586fe623e2b20218ca44f90ded4584f35bb7
                          • Opcode Fuzzy Hash: 5e1e9148d7b878ed103a2ec25932d88dd9a5e7fe7a9e4b39f72545ffad241bed
                          • Instruction Fuzzy Hash: 22F0F6366002329BF6247B309C4962A3A50FB457F1B154628F6D0E61E9CFB08C418766
                          APIs
                          • GetLastError.KERNEL32(00000100,00000000,004122B0,004149B6,00000100,00000000,00414DA1,00000000,00000000), ref: 0040E8E5
                          • TlsGetValue.KERNEL32 ref: 0040E8F3
                          • SetLastError.KERNEL32(00000000), ref: 0040E93F
                            • Part of subcall function 004136B5: HeapAlloc.KERNEL32(00000008,?,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0041370A
                          • TlsSetValue.KERNEL32(00000000), ref: 0040E917
                          • GetCurrentThreadId.KERNEL32 ref: 0040E928
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ErrorLastValue$AllocCurrentHeapThread
                          • String ID:
                          • API String ID: 2020098873-0
                          • Opcode ID: b985bd8542c82dd67ccfa6d5669cd8db65a88773f2c83ef21a65d2b108fb800b
                          • Instruction ID: 9f61251463e7e37e6423e796c13b01a931e201981835502aa1cd9af062a6a855
                          • Opcode Fuzzy Hash: b985bd8542c82dd67ccfa6d5669cd8db65a88773f2c83ef21a65d2b108fb800b
                          • Instruction Fuzzy Hash: E9F09632600321BBC6312B76AC0959A3A50AB147F1B11853EF561E62F1DF388841869C
                          APIs
                          • DeleteCriticalSection.KERNEL32(00000000,?,?,10008975,10005BDB,10005C34,?,?,?), ref: 100070F0
                          • DeleteCriticalSection.KERNEL32(?,?,10008975,10005BDB,10005C34,?,?,?), ref: 1000710B
                          • DeleteCriticalSection.KERNEL32 ref: 10007113
                          • DeleteCriticalSection.KERNEL32 ref: 1000711B
                          • DeleteCriticalSection.KERNEL32 ref: 10007123
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalDeleteSection
                          • String ID:
                          • API String ID: 166494926-0
                          • Opcode ID: 9e69759ed002e24659984a7f435f97bc025c4070d5df05447b94f6d5e3a5fbce
                          • Instruction ID: cf58868213997e36051f3376a6e725bb11fa79f154b32d579c881074b99f913b
                          • Opcode Fuzzy Hash: 9e69759ed002e24659984a7f435f97bc025c4070d5df05447b94f6d5e3a5fbce
                          • Instruction Fuzzy Hash: 3EF05425F40365F7EA71F715CC8C8897661EBC13D03424172F8CA66138DEBEDD818A80
                          APIs
                          • WideCharToMultiByte.KERNEL32(?,00000220,?,?,00000000,?,00000000,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe), ref: 00414492
                          • LCMapStringA.KERNEL32(?,$+@,00000000,?,00000000,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe), ref: 004144AE
                          • LCMapStringA.KERNEL32(?,?,?,?,?,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe), ref: 00414504
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,?,?,?,00000000,?,?,00402B24,C:\Users\user\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe), ref: 00414546
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharMultiStringWide
                          • String ID: $+@
                          • API String ID: 2829165498-3232336855
                          • Opcode ID: 1c8450ee31f7a9110dbba800e545e0dd2b1cd7292b63a24c96e78346ab624120
                          • Instruction ID: 4f5137f97fd2356129a150dbaa5cde0c9aa4d21ec916f5203b4995e5c37383f1
                          • Opcode Fuzzy Hash: 1c8450ee31f7a9110dbba800e545e0dd2b1cd7292b63a24c96e78346ab624120
                          • Instruction Fuzzy Hash: 01215172900219BBCF228F94DC459EE7F76FF48750F14801AFA2465160D3398991DBA9
                          APIs
                          • InterlockedIncrement.KERNEL32(00428674), ref: 00414E7B
                          • InterlockedDecrement.KERNEL32(00428674), ref: 00414E92
                            • Part of subcall function 0040F7B8: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F7F5
                            • Part of subcall function 0040F7B8: EnterCriticalSection.KERNEL32(?,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F810
                          • InterlockedDecrement.KERNEL32(00428674), ref: 00414EBE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Interlocked$CriticalDecrementSection$EnterIncrementInitialize
                          • String ID: !B
                          • API String ID: 2038102319-4034699715
                          • Opcode ID: 3199c93f3b0bab531b6d63b90894785d3336c39e95a846418a2edcd88d4db09b
                          • Instruction ID: 665e77978c722901bea5e4fa00d2eba61c4c5290c7a08fda2fd3ff2ab79372e9
                          • Opcode Fuzzy Hash: 3199c93f3b0bab531b6d63b90894785d3336c39e95a846418a2edcd88d4db09b
                          • Instruction Fuzzy Hash: D0F0B43210121C6ED7102BA5BC41ECB7B5CEF85339B11813FF508591808F75598646AD
                          APIs
                          • InterlockedIncrement.KERNEL32(00428674), ref: 004137D2
                          • InterlockedDecrement.KERNEL32(00428674), ref: 004137E9
                            • Part of subcall function 0040F7B8: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F7F5
                            • Part of subcall function 0040F7B8: EnterCriticalSection.KERNEL32(?,?,?,004136EB,00000009,?,?,?,0040E89B,00000001,00000074,?,0040D7E0), ref: 0040F810
                          • InterlockedDecrement.KERNEL32(00428674), ref: 00413819
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Interlocked$CriticalDecrementSection$EnterIncrementInitialize
                          • String ID: 8b@
                          • API String ID: 2038102319-4096664975
                          • Opcode ID: aa7f0651c13fcd1ebd1ac851582d1fd861859e0837f66e530d82a2f8df76540d
                          • Instruction ID: bdd68373600cb70d33b190d259ec905e176670b953d2b87ec9c1c7cbffc26e36
                          • Opcode Fuzzy Hash: aa7f0651c13fcd1ebd1ac851582d1fd861859e0837f66e530d82a2f8df76540d
                          • Instruction Fuzzy Hash: 22F0B43250125DBFDB117FA1AC919DF3B9CEF45725F00803FFA0415151CFB54A5686A9
                          APIs
                          • GetModuleHandleA.KERNEL32(KERNEL32,0040CD7A), ref: 0040F345
                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040F355
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsProcessorFeaturePresent$KERNEL32
                          • API String ID: 1646373207-3105848591
                          • Opcode ID: fb413194f2de41c59819ed9e99b839e4801d8f7edbcad4f3ae5a422335417f45
                          • Instruction ID: bdbbaf358dd800c7f714fd99258dbf88c1ad81857618fab68b5394e8f8f88707
                          • Opcode Fuzzy Hash: fb413194f2de41c59819ed9e99b839e4801d8f7edbcad4f3ae5a422335417f45
                          • Instruction Fuzzy Hash: 6BC01234B84B08A2DA705BB19C0AB9728282B08B22F25807BAC0AE15C0CE7DC04D912D
                          APIs
                          • __allrem.LIBCMT ref: 0040BB59
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040BB68
                          • __allrem.LIBCMT ref: 0040BB7B
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040BB89
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 1992179935-0
                          • Opcode ID: fff05f784ce0bcbbe042ba8cc1b2d73a54de2a2c09b7feb9c908bfa9eb0798ec
                          • Instruction ID: 8f8fcd52b4759e703182c14bd552bb073fc00ad4ea3f9e3920774124ba682e4c
                          • Opcode Fuzzy Hash: fff05f784ce0bcbbe042ba8cc1b2d73a54de2a2c09b7feb9c908bfa9eb0798ec
                          • Instruction Fuzzy Hash: C86150B1F006149BD714CF9EC88065AB7E6EB98314B39C07AE809EB351D7B6DD128BC4
                          APIs
                          • MultiByteToWideChar.KERNEL32(0040DFD0,00000001,00000000,0040DFD0,0040DFD0,0040DFD0,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416AAA
                          • MultiByteToWideChar.KERNEL32(0040DFD0,00000009,00000000,0040DFD0,00000000,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416ABD
                          • MultiByteToWideChar.KERNEL32(0040DFD0,00000001,00000000,0040DFD0,?,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416B09
                          • CompareStringW.KERNEL32(?,00000000,0040DFD0,0040DFD0,?,00000000,?,00000000,?,00412B8F,0040DFD0,0040DFD0,0040DFD0,0040DFD0,00000000,0040DFD0), ref: 00416B21
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$CompareString
                          • String ID:
                          • API String ID: 376665442-0
                          • Opcode ID: 6a48dbc9fe27ccdb7e2b5afbaaae9767b6802422ad6f196e6bf848d67f3be152
                          • Instruction ID: d432f733f2ed69cf75d8d7b950ffdf43c4a318ad5a64495c68b8fdfee3381f80
                          • Opcode Fuzzy Hash: 6a48dbc9fe27ccdb7e2b5afbaaae9767b6802422ad6f196e6bf848d67f3be152
                          • Instruction Fuzzy Hash: 37211832900219EBCF219F95CC419DEBFB5FF4D350F12416AFA14B21A0C736A961DBA4
                          APIs
                          • FreeLibrary.KERNEL32(?,00000000,?,00000001,00404846,00000000,?,?,?,00401C84,00000000,00000001), ref: 00404BFB
                          • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00404846,00000000,?,?,?,00401C84,00000000,00000001), ref: 00404C1F
                          • GetProcessHeap.KERNEL32(00000000,00000001,?,00000001,00404846,00000000,?,?,?,00401C84,00000000,00000001), ref: 00404C27
                          • HeapFree.KERNEL32(00000000,?,?,?,00401C84,00000000,00000001), ref: 00404C2E
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Free$Heap$LibraryProcessVirtual
                          • String ID:
                          • API String ID: 548792435-0
                          • Opcode ID: 167be693a8985a9f9c73ef0efebdf1d14adc20e20237db8df440473cd541fe7e
                          • Instruction ID: b38d9afa45eead5bdd55cf5a23908fead77d6ad92500e43aeedd019bbe57284c
                          • Opcode Fuzzy Hash: 167be693a8985a9f9c73ef0efebdf1d14adc20e20237db8df440473cd541fe7e
                          • Instruction Fuzzy Hash: 090121B55056019FD7248FA9CCC4967B7E9FB88325315893EF296A3590CB34FC45CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Info
                          • String ID: $
                          • API String ID: 1807457897-3032137957
                          • Opcode ID: 542543d206a95f6c63ce2e3c9ecb8d5dda4050018df6d26d5e097ca0ae24a915
                          • Instruction ID: a7d753c6c2874a8986b08f861c04606aad37ebce78db97bb7f1172f2256a78b7
                          • Opcode Fuzzy Hash: 542543d206a95f6c63ce2e3c9ecb8d5dda4050018df6d26d5e097ca0ae24a915
                          • Instruction Fuzzy Hash: 4C4119315043AC5EFB19CB94CC85FEA7FA9DB067C4F1040F5E686D7096C2718948DBA2
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: Info
                          • String ID: $
                          • API String ID: 1807457897-3032137957
                          • Opcode ID: ce8b78341ca5b2e9188c19ec593f55b1c2e0fc9ab97de19a8a70aff7c43f35f6
                          • Instruction ID: 8738f5bd17488016f5b5c4cce4a7dc7a1990465905e3fb195ccc7aec701b56c1
                          • Opcode Fuzzy Hash: ce8b78341ca5b2e9188c19ec593f55b1c2e0fc9ab97de19a8a70aff7c43f35f6
                          • Instruction Fuzzy Hash: 19418E312083586EEB22D714DD59BFB7F99DB02700F1500E6E545C7193C23989C5DBAE
                          APIs
                          • GetEnvironmentVariableW.KERNEL32(00000002,?,00000104,?,?,?,?,00401101,00000000,00000000), ref: 00404E78
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: EnvironmentVariable
                          • String ID: %s%s%s$qY@
                          • API String ID: 1431749950-1628662383
                          • Opcode ID: 72a6b6654fea98f93945160f4ecc85e4d4973da5075d3a2efb098018a34d4313
                          • Instruction ID: b51b18539a02b601262caadefb1db32c1c28ccf0f7a66d34a922fd809fd0284b
                          • Opcode Fuzzy Hash: 72a6b6654fea98f93945160f4ecc85e4d4973da5075d3a2efb098018a34d4313
                          • Instruction Fuzzy Hash: 7C312773600218BBCB209BA5CC89ADB776DBF84304F1045BAF704F7190EA759A9187D8
                          APIs
                            • Part of subcall function 00412322: SetFilePointer.KERNEL32(00000000,00000100,00000000,00000000,00000100,00000000,00414DE4,00000000,000000FF,00000002), ref: 0041234C
                            • Part of subcall function 00412322: GetLastError.KERNEL32 ref: 00412359
                          • SetEndOfFile.KERNEL32(00000000,?,?,?,00000100,?,?,?,00414E2F,00000000,0000001A), ref: 004164CE
                          • GetLastError.KERNEL32(?,?,?,00000100,?,?,?,00414E2F,00000000,0000001A), ref: 004164EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ErrorFileLast$Pointer
                          • String ID: @,S@
                          • API String ID: 1697706070-1817016226
                          • Opcode ID: fba8649b9e6eb2ee347c64e015b8f4832a02dc9d7992d13052f2934211b47bb8
                          • Instruction ID: 078275469bbd33506af0275a5805691d9f2aac2e4cfb1e07a62de63b4dd83938
                          • Opcode Fuzzy Hash: fba8649b9e6eb2ee347c64e015b8f4832a02dc9d7992d13052f2934211b47bb8
                          • Instruction Fuzzy Hash: 3231D5329001147ACF112F79CC41BCD3A65EF00368F12417BF918DB291EA79DED18A9D
                          APIs
                          • WideCharToMultiByte.KERNEL32(?,00000220,?,?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,00402B24), ref: 0041623F
                          • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00402B24), ref: 004162AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharMultiStringTypeWide
                          • String ID: $+@
                          • API String ID: 3139900361-3232336855
                          • Opcode ID: 1ab5709f8d6834a3a4b88a97ff4803a233ecba1001be81026512e25c7716fa16
                          • Instruction ID: c98a976f16736608043865ae8b184436da9360259561a9bacea657c745c163ec
                          • Opcode Fuzzy Hash: 1ab5709f8d6834a3a4b88a97ff4803a233ecba1001be81026512e25c7716fa16
                          • Instruction Fuzzy Hash: EF217C3190061AEFCF20DF98CC459DEBBB1FF48314F22855AE510732A0D3359991CB94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: string too long$|IB
                          • API String ID: 3519838083-205027280
                          • Opcode ID: adf922865bcbf773d628d941c16721c6900b57e06b511b800cc419ddac508d7b
                          • Instruction ID: c2d73e001ad19d5b6ca3acc6226604809243cb83edcc773596166e9365ef075c
                          • Opcode Fuzzy Hash: adf922865bcbf773d628d941c16721c6900b57e06b511b800cc419ddac508d7b
                          • Instruction Fuzzy Hash: 83F062B2A00254AEDB009F95DC81BAEB7B8EF84314F00456FB511A7291C7B85904C7A8
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000009,?,000000FF,00000000,0040DFE3,74DEE860,00428674,00000000,?,00412A59,00000000,?,0040DFE3,?,0040DFE3,?), ref: 00412ADF
                          • GetLastError.KERNEL32(?,00412A59,00000000,?,0040DFE3,?,0040DFE3,?,00000000,00000000,?,?,?,?,00000000,?), ref: 00412AE9
                          • MultiByteToWideChar.KERNEL32(00000001,?,?,00000000,0040DFE3,?,00412A59,00000000,?,0040DFE3,?,0040DFE3,?,00000000,00000000), ref: 00412B3E
                          • MultiByteToWideChar.KERNEL32(00000009,?,000000FF,00000000,00000000,74DEE860,00428674,00000000,?,00412A59,00000000,?,0040DFE3,?,0040DFE3,?), ref: 00412B68
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast
                          • String ID:
                          • API String ID: 1717984340-0
                          • Opcode ID: 64e1477176139964343b1c6459b3b3e5cd564f77b681a68d3d2878c794b48bfa
                          • Instruction ID: 2a56a42d278125ad634d74eb586f69142b7d7cb3a1436235cbcec2a717df93c1
                          • Opcode Fuzzy Hash: 64e1477176139964343b1c6459b3b3e5cd564f77b681a68d3d2878c794b48bfa
                          • Instruction Fuzzy Hash: 6531A734209115AFDB314F24DE40AEB3B65FF45764B25822AF855C62E0D6B8ACA1C79C
                          APIs
                          • InitializeCriticalSection.KERNEL32(?,10008922,?,10005B72), ref: 100070A0
                          • InitializeCriticalSection.KERNEL32 ref: 100070A8
                          • InitializeCriticalSection.KERNEL32 ref: 100070B0
                          • InitializeCriticalSection.KERNEL32 ref: 100070B8
                          Memory Dump Source
                          • Source File: 00000002.00000002.1736326119.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.1735905725.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736612802.000000001000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000002.00000002.1736868230.0000000010010000.00000004.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalInitializeSection
                          • String ID:
                          • API String ID: 32694325-0
                          • Opcode ID: df881dd359dc54fa86db7768642a35b41112ed37ae1d6e776f33cabba6f89b4f
                          • Instruction ID: 577411244c626e9fc6ee63a52d48d50eca6bb40afa868a4b0455fa2252862c5d
                          • Opcode Fuzzy Hash: df881dd359dc54fa86db7768642a35b41112ed37ae1d6e776f33cabba6f89b4f
                          • Instruction Fuzzy Hash: 47C00231A90135FBEA12AB65DD898897F25EB043A03018063F54451035CEB55C50DFD0
                          APIs
                          • InitializeCriticalSection.KERNEL32(?,0040E882,?,0040D7E0), ref: 0040F79C
                          • InitializeCriticalSection.KERNEL32(?,0040E882,?,0040D7E0), ref: 0040F7A4
                          • InitializeCriticalSection.KERNEL32(?,0040E882,?,0040D7E0), ref: 0040F7AC
                          • InitializeCriticalSection.KERNEL32(?,0040E882,?,0040D7E0), ref: 0040F7B4
                          Memory Dump Source
                          • Source File: 00000002.00000002.1732408164.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1732393095.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732438731.0000000000418000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732460768.0000000000424000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.1732549022.0000000000429000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_@AE2AF6.jbxd
                          Similarity
                          • API ID: CriticalInitializeSection
                          • String ID:
                          • API String ID: 32694325-0
                          • Opcode ID: 7c1ebc378b22d0e8b3ae53161043e8d2a38dbd2c77177f54a8f64ca9e07651ac
                          • Instruction ID: 50c9ae2927645dc934af3625bb155b39ac17ac1ccfa62184e15f329c955f65e4
                          • Opcode Fuzzy Hash: 7c1ebc378b22d0e8b3ae53161043e8d2a38dbd2c77177f54a8f64ca9e07651ac
                          • Instruction Fuzzy Hash: 1AC00232A01034BACA362B55FF058867F75EB152A13414073A30452070CAA11C12EFD8
                          APIs
                          • _ZNK13QOpenGLBuffer9isCreatedEv.QT5GUI ref: 0043B9D0
                          • _ZN13QOpenGLBuffer4bindEv.QT5GUI ref: 0043B9F7
                          • _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 0043BA41
                          • _ZN13QOpenGLBuffer7releaseEv.QT5GUI ref: 0043BA92
                          • _ZN13QOpenGLBuffer8allocateEPKvi.QT5GUI ref: 0043BB01
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043BB26
                          • _ZN13QOpenGLBuffer7releaseEv.QT5GUI ref: 0043BB3D
                          • _ZN24QOpenGLVertexArrayObject4bindEv.QT5GUI ref: 0043BB62
                          • _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 0043BBC3
                          • _Z9qBadAllocv.QT5CORE ref: 0043BCF0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Open$Array$AllocationBuffer7releaseData8allocateEjjj6FlagsOptionS_16$AllocvBuffer4bindBuffer8allocateBuffer9isCreatedData10deallocateObject4bindS_jjVertex
                          • String ID: $$$$a_color$a_start
                          • API String ID: 976633068-3993229557
                          • Opcode ID: 000386fb188aae6a37d44c9d39d7420fe5393183c9f959d11fcb9abfb6bc1378
                          • Instruction ID: a9a0630f5ac7c6e9c26d01203a34b4ec3e04c7bb494e5e1cca410d6c2aae7dd8
                          • Opcode Fuzzy Hash: 000386fb188aae6a37d44c9d39d7420fe5393183c9f959d11fcb9abfb6bc1378
                          • Instruction Fuzzy Hash: 66A15AB0A04205DFCB00EF68D4986AEBBF1FF88314F10852EE9569B355DB389945CF96
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                          • String ID:
                          • API String ID: 649803965-0
                          • Opcode ID: 25609d0bdb2af2d84345e5d985a947456fcd420ae17ec5186397dd20220b9703
                          • Instruction ID: 53f1602e79e5c5f9722e637126e08f256338e11542e0716e6e256710acc29070
                          • Opcode Fuzzy Hash: 25609d0bdb2af2d84345e5d985a947456fcd420ae17ec5186397dd20220b9703
                          • Instruction Fuzzy Hash: D48180B1A08201CFD710DFA9D58475A7BE0FB46304F11853ED985EB3B2D778A849CB99
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 004518CF
                          • UnhandledExceptionFilter.KERNEL32 ref: 004518DF
                          • GetCurrentProcess.KERNEL32 ref: 004518E8
                          • TerminateProcess.KERNEL32 ref: 004518F9
                          • abort.MSVCRT ref: 00451902
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                          • String ID:
                          • API String ID: 520269711-0
                          • Opcode ID: 08d15e43aedef7dda845dd0e44642f85409120dbe397647334ccdf62fedb763a
                          • Instruction ID: a690c7fc7135b6e26f041563c11b21ff09c7640cffe323d7e1500ddce41917a5
                          • Opcode Fuzzy Hash: 08d15e43aedef7dda845dd0e44642f85409120dbe397647334ccdf62fedb763a
                          • Instruction Fuzzy Hash: E101B6B5804204DFC740EFB9E9496497FF0FB4A305F408A3AE88997221E7B59558CF4A
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00440390
                          • _Z6qIsNaNf.QT5CORE ref: 004403AE
                          • _ZN7QString6numberEdci.QT5CORE ref: 004403D4
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 004403F0
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00440405
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00440412
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440458
                          • _Z6qIsNaNf.QT5CORE ref: 00440464
                          • _ZN7QString6numberEdci.QT5CORE ref: 0044048A
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 004404A6
                          • _ZN7QString6appendERKS_.QT5CORE ref: 004404BB
                          • _ZN7QString6appendERKS_.QT5CORE ref: 004404C8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044050E
                          • _Z6qIsNaNf.QT5CORE ref: 0044051A
                          • _Z6qIsNaNf.QT5CORE ref: 0044053C
                          • _ZN7QString6numberEdci.QT5CORE ref: 00440565
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00440581
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00440596
                          • _ZN7QString6appendERKS_.QT5CORE ref: 004405A3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004405E9
                          • _Z6qIsNaNf.QT5CORE ref: 004405F5
                          • _ZN7QString6numberEdci.QT5CORE ref: 0044061E
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0044063A
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0044064F
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0044065C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004406A2
                          • _Z6qIsNaNf.QT5CORE ref: 004406AE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440853
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440874
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: String6append$ArrayData10deallocateS_jj$EdciString15fromString6numberUtf8_helper$Ascii_helperString16from
                          • String ID: f
                          • API String ID: 4043239795-1993550816
                          • Opcode ID: c1ab7615d746decde31920c067da5705adf2bd03a9b7fefba9dec64769f3c694
                          • Instruction ID: b6b87e29f144be754a8321ed767d9d95072274eb90fed99891508e6da37d288a
                          • Opcode Fuzzy Hash: c1ab7615d746decde31920c067da5705adf2bd03a9b7fefba9dec64769f3c694
                          • Instruction Fuzzy Hash: 49029EB4904305DFEB00EF64D48869EBBF0FF84314F15892AE984A7364D73A9869CF46
                          APIs
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00433392
                          • _ZN15QGuiApplication22applicationDisplayNameEv.QT5GUI ref: 0043339E
                          • _ZN11QMessageBox7warningEP7QWidgetRK7QStringS4_6QFlagsINS_14StandardButtonEES6_.QT5WIDGETS ref: 004333BF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004333E3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00433405
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Application22applicationBox7warningButtonDisplayFlagsMessageMetaNameObject2trS1_iS4_6S_14StandardStringWidget
                          • String ID: &$G21G90; G53G0Z0$G21G91G38.2Z-30F100; G0Z1; G38.2Z-2F10$Reset settings to default values?
                          • API String ID: 1526889372-1657726610
                          • Opcode ID: 3f7eced39b6d704d1029c95adf305379524e94394c58f9f8152a4e2d3871ce59
                          • Instruction ID: 7983c535889ed4ac6008d76a7dc82c0c69a7bfe6a1d5c5f94e8c120bd34348db
                          • Opcode Fuzzy Hash: 3f7eced39b6d704d1029c95adf305379524e94394c58f9f8152a4e2d3871ce59
                          • Instruction Fuzzy Hash: 0B22E7B45042048FDB04FF68D59976EBBF1AF94300F01856DD8859B3A5DB79A898CF82
                          APIs
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0042F9F8
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 0042FA2A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042FA53
                          • _ZN11QTextStreamlsEPKc.QT5CORE ref: 0042FA80
                          • _ZN11QTextStreamlsEPKc.QT5CORE ref: 0042FAA6
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0042FABB
                          • _ZN15QAbstractButton10setCheckedEb.QT5WIDGETS ref: 0042FBC6
                          • _ZN8QVariantC1Eb.QT5CORE ref: 0042FBD8
                          • _ZN7QObject11setPropertyEPKcRK8QVariant.QT5CORE ref: 0042FBF5
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0042FC00
                          • _ZNK7QWidget5styleEv.QT5WIDGETS ref: 0042FC08
                          • _ZNK7QWidget14ensurePolishedEv.QT5WIDGETS ref: 0042FC2D
                          • _ZNK10QTableView16horizontalHeaderEv.QT5WIDGETS ref: 0042FC3F
                          • _ZNK11QHeaderView9saveStateEv.QT5WIDGETS ref: 0042FC47
                          • _ZNK10QTableView16horizontalHeaderEv.QT5WIDGETS ref: 0042FC85
                          • _ZN11QHeaderView12restoreStateERK10QByteArray.QT5WIDGETS ref: 0042FC8F
                          • _ZNK17QAbstractItemView14selectionModelEv.QT5WIDGETS ref: 0042FC9E
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 0042FCC7
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 0042FCCF
                          • _ZN10QTableView9selectRowEi.QT5WIDGETS ref: 0042FCE2
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042FD41
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0042FDB3
                          • _ZN9QLineEdit7setTextERK7QString.QT5WIDGETS ref: 0042FDC8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042FE25
                            • Part of subcall function 00445990: _ZN18QAbstractItemModel15beginResetModelEv.QT5CORE(?,?,?,?,0000031A,00404281), ref: 00445996
                            • Part of subcall function 00445990: _ZN18QAbstractItemModel13endResetModelEv.QT5CORE(?,?,?,?,0000031A,00404281), ref: 004459B7
                            • Part of subcall function 00443460: _ZdlPv.LIBSTDC++-6 ref: 004434BC
                            • Part of subcall function 00443460: _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 00443536
                            • Part of subcall function 00443460: _Z5qQNaNv.QT5CORE ref: 004435C8
                            • Part of subcall function 00443460: _Z5qQNaNv.QT5CORE ref: 004435CD
                            • Part of subcall function 00443460: _Z5qQNaNv.QT5CORE ref: 004435D2
                            • Part of subcall function 00443460: _Z5qQNaNv.QT5CORE ref: 004435E3
                            • Part of subcall function 00443460: _Z5qQNaNv.QT5CORE ref: 004435E8
                            • Part of subcall function 00443460: _Z5qQNaNv.QT5CORE ref: 004435ED
                            • Part of subcall function 00443460: _Z5qQNaNv.QT5CORE ref: 004435FE
                            • Part of subcall function 00403F70: _ZNK9QVector3D6lengthEv.QT5GUI ref: 00403FE8
                            • Part of subcall function 00403F70: _Z6qIsNaNd.QT5CORE ref: 00403FF5
                            • Part of subcall function 00403F70: _ZN9QListData6detachEi.QT5CORE ref: 00404029
                            • Part of subcall function 00471AA0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471AAE
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042FE4C
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042FE67
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042FE87
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042FEB3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042FED4
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayText$Streamls$Data10deallocateS_jj$AbstractHeader$ItemModelTableVariant$ConnectionListMetaResetStateStringView16horizontal$AllocationButton10setByteCheckedD6lengthDataData6detachData7disposeData8allocateDebugEdit7setEjjj6FlagsLineLogger5debugMessageModel13endModel15beginObject10Object11setObject2trObject7connectOptionPolishedPropertyQt14S1_iS_16TypeVector3View12restoreView14selectionView9saveView9selectWidget14ensureWidget5style
                          • String ID: 1onTableCurrentChanged(QModelIndex,QModelIndex)$2currentChanged(QModelIndex,QModelIndex)$Untitled$changes:$default$false$overrided$true
                          • API String ID: 2367289132-2706518009
                          • Opcode ID: e7c4a973108be5ad41ee9b51201ba3f619d1e54eedc5c951da7469d07b6e19bf
                          • Instruction ID: 472a54a46040f8fb270f7aac692bb7486b26cfaebdcb15eed94c9d6afe6b7562
                          • Opcode Fuzzy Hash: e7c4a973108be5ad41ee9b51201ba3f619d1e54eedc5c951da7469d07b6e19bf
                          • Instruction Fuzzy Hash: 32E180B4A042049FDB04EF68E49876E7BF1BF44304F91857DE8469B366DB389849CF4A
                          APIs
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00401C09
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401C42
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00401CB3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401CF2
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401D1B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401D44
                          • _Znwj.LIBSTDC++-6 ref: 00401D6A
                          • _ZN11QTranslatorC1EP7QObject.QT5CORE ref: 00401D7E
                          • _ZN11QTranslator4loadERK7QStringS2_S2_S2_.QT5CORE ref: 00401DC5
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401DF3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401E1C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401E45
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00401E6F
                          • _ZN16QCoreApplication21setApplicationVersionERK7QString.QT5CORE ref: 00401E84
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401EAD
                          • _ZNK12QApplication10styleSheetEv.QT5WIDGETS ref: 00401EC2
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00401F01
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401F3A
                          • _ZN12QApplication13setStyleSheetERK7QString.QT5WIDGETS ref: 00401F49
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401F75
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401F9E
                          • _ZN7QWidget4showEv.QT5WIDGETS ref: 00401FBF
                          • _ZN12QApplication4execEv.QT5WIDGETS ref: 00401FC5
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00401FFB
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402024
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040204D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402072
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040207E
                          • _ZN12QApplicationD1Ev.QT5WIDGETS ref: 0040208A
                          • _ZN16QCoreApplication17installTranslatorEP11QTranslator.QT5CORE ref: 00402529
                          • _ZN16QCoreApplication17installTranslatorEP11QTranslator.QT5CORE ref: 0040253D
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Translator$CoreStringString15fromUtf8_helper$ApplicationApplication17installSheet$Application10styleApplication13setApplication21setApplication4execAscii_helperFormatObjectString16fromStyleTranslator4loadVersionWidget4showZnwj
                          • String ID: .qm$1.1.7$QWidget {font-size: 8pt}$qt_
                          • API String ID: 3769272640-4060635474
                          • Opcode ID: df1740036eea80f12b4b34d7becba356dd7a783032694ad7bf5dcf5a17d8877f
                          • Instruction ID: fab97603c71d1373fac279fab67cdba15be5163c4ffed7c064040b609f137f5d
                          • Opcode Fuzzy Hash: df1740036eea80f12b4b34d7becba356dd7a783032694ad7bf5dcf5a17d8877f
                          • Instruction Fuzzy Hash: 72D1E2B49053158FDB10AF24C98879EBBF1FF84344F1089ADD689AB364D7789988CF49
                          APIs
                          • _ZN9QSettingsC1ERK7QStringNS_6FormatEP7QObject.QT5CORE ref: 0040F4D8
                          • _ZN9QSettings11setIniCodecEPKc.QT5CORE ref: 0040F4EB
                          • _ZN8QVariantC1EPKc.QT5CORE ref: 0040F4FE
                          • _ZNK8QVariant8toStringEv.QT5CORE ref: 0040F552
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0040F571
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0040F57F
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040F597
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040F5B7
                          • _ZNK12QApplication10styleSheetEv.QT5WIDGETS ref: 0040F5CD
                          • _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 0040F5E0
                          • _ZN12QApplication13setStyleSheetERK7QString.QT5WIDGETS ref: 0040F5F3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F61C
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 0040F624
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F64A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F670
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F696
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F6A5
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F6C7
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F6D3
                          • _ZN9QGLFormat13defaultFormatEv.QT5OPENGL ref: 0040F6D8
                          • _ZN8QVariantC1Eb.QT5CORE ref: 0040F6E7
                          • _ZNK8QVariant6toBoolEv.QT5CORE ref: 0040F724
                          • _ZN9QGLFormat15setSwapIntervalEi.QT5OPENGL ref: 0040F732
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F73E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F75C
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F764
                          • _ZN9QGLFormat16setDefaultFormatERKS_.QT5OPENGL ref: 0040F769
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F771
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F77A
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jjVariant$FormatString$SettingsSheet$Application10styleApplication13setAscii_helperBoolCaseCodecDefaultFormat13defaultFormat15setFormat16setIntervalObjectPatternQt15S_13SensitivitySettings11setString15fromString16fromString6appendString7replaceStyleSwapSyntaxUtf8_helperVariant6toVariant8to
                          • String ID: UTF-8$font-size: $font-size:\s*\d+$fontSize$vsync
                          • API String ID: 1710846834-3850597127
                          • Opcode ID: 5a15afacf7cb6abf960a87028e162fa2ef7e66b055218a196d94e8826af5569b
                          • Instruction ID: db21c44bc4e4a656a8dcf58416a975cc16f9afcd3e55df4a9d65e620bac9117f
                          • Opcode Fuzzy Hash: 5a15afacf7cb6abf960a87028e162fa2ef7e66b055218a196d94e8826af5569b
                          • Instruction Fuzzy Hash: 9BA118B49043059FDB14EFA8D49869EBBF0FF44314F548A3DD485A72A0EB399889CF46
                          APIs
                          • __cxa_guard_acquire.LIBSTDC++-6 ref: 00403498
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00403533
                          • _ZN15QAbstractButton7setTextERK7QString.QT5WIDGETS ref: 00403548
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00403571
                          • _ZN7QWidget15setMinimumWidthEi.QT5WIDGETS ref: 00403591
                          • _ZN7QWidget7repaintEv.QT5WIDGETS ref: 0040367F
                          • __cxa_guard_acquire.LIBSTDC++-6 ref: 004036B7
                          • __cxa_guard_release.LIBSTDC++-6 ref: 004036DE
                          • _ZNK15QAbstractButton4textEv.QT5WIDGETS ref: 00403867
                          • _ZeqRK7QStringS1_.QT5CORE ref: 0040387A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004038C3
                          • _ZN15QAbstractButton7setTextERK7QString.QT5WIDGETS ref: 00403906
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040392F
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractArrayData10deallocateS_jjString$Button7setText__cxa_guard_acquire$Button4textMetaMinimumObject2trS1_iWidget15setWidget7repaintWidth__cxa_guard_release
                          • String ID: Autoscroll$Check$Check mode$Scroll
                          • API String ID: 2270580755-4151716742
                          • Opcode ID: 764d7d2ae982bd7607a25c4a17a70e1b4b384415a3f580180644f708cf3a7144
                          • Instruction ID: 49773ea21b4a6999add3c0064889408d159629f4d7882c6ed7b5aaeee87fb8da
                          • Opcode Fuzzy Hash: 764d7d2ae982bd7607a25c4a17a70e1b4b384415a3f580180644f708cf3a7144
                          • Instruction Fuzzy Hash: FD226FB4A04201CFCB04DF68C48869EBBF1FF88315F158669E895AB3A1D739E845CF45
                          APIs
                          • _ZN7QDialogC2EP7QWidget6QFlagsIN2Qt10WindowTypeEE.QT5WIDGETS ref: 00434C09
                          • _Znwj.LIBSTDC++-6 ref: 00434C26
                          • _ZN13QIntValidatorC1EP7QObject.QT5GUI ref: 00434C4F
                          • _ZN7QLocaleC1ENS_8LanguageENS_7CountryE.QT5CORE ref: 00434C7A
                          • _ZN7QWidget9setLocaleERK7QLocale.QT5WIDGETS ref: 00434C88
                          • _ZN7QLocaleD1Ev.QT5CORE ref: 00434C93
                          • _ZN13QIntValidator9setBottomEi.QT5GUI ref: 00434CA5
                          • _ZN13QIntValidator6setTopEi.QT5GUI ref: 00434CB7
                          • _ZN9QComboBox12setValidatorEPK10QValidator.QT5WIDGETS ref: 00434CD5
                          • _ZN9QComboBox12setValidatorEPK10QValidator.QT5WIDGETS ref: 00434CE9
                          • _Z23qt_qFindChildren_helperPK7QObjectRK7QStringRK11QMetaObjectP5QListIPvE6QFlagsIN2Qt15FindChildOptionEE.QT5CORE ref: 00434D1B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00434DB8
                          • _ZNK11QListWidget5countEv.QT5WIDGETS ref: 00434DC4
                          • _ZNK11QListWidget4itemEi.QT5WIDGETS ref: 00434DD2
                          • _ZNK7QObject10objectNameEv.QT5CORE ref: 00434DF0
                          • _ZN8QVariantC1ERK7QString.QT5CORE ref: 00434DFF
                          • _ZN8QVariantD1Ev.QT5CORE ref: 00434E21
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00434E47
                          • _ZNK9QGroupBox5titleEv.QT5WIDGETS ref: 00434E7B
                          • _ZNK11QListWidget5countEv.QT5WIDGETS ref: 00434E92
                          • _ZN11QListWidget10insertItemEiRK7QString.QT5WIDGETS ref: 00434EA0
                          • _ZNK11QListWidget4itemEi.QT5WIDGETS ref: 00434F15
                          • _ZN11QListWidget15setItemSelectedEPK15QListWidgetItemb.QT5WIDGETS ref: 00434F30
                          • _ZNK19QAbstractScrollArea17verticalScrollBarEv.QT5WIDGETS ref: 00434F3F
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 00434F6B
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 00434F74
                          • _ZN9QListData6detachEi.QT5CORE ref: 00434FBA
                          • memcpy.MSVCRT ref: 00434FFE
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$Validator$Locale$ObjectString$ArrayBox12setComboConnectionData10deallocateFindFlagsItemMetaS_jjScrollTypeVariantWidget4itemWidget5count$AbstractArea17verticalBottomBox5titleChildChildren_helperCountryData6detachDialogGroupItembLanguageNameObject10Object10objectObject7connectOptionQt10Qt14Qt15SelectedValidator6setValidator9setWidgetWidget10insertWidget15setWidget6Widget9setWindowZ23qt_qZnwjmemcpy
                          • String ID: QC$1onScrollBarValueChanged(int)$2valueChanged(int)
                          • API String ID: 3435305693-1886318998
                          • Opcode ID: 789cd66c216b0073a68b2700d95e80c1b8e0097d8c5f84725f208e98eae51ca5
                          • Instruction ID: 765925c98e1df5cc145d400bfa724ac36408931a4275cad640ecf07b8926fa6b
                          • Opcode Fuzzy Hash: 789cd66c216b0073a68b2700d95e80c1b8e0097d8c5f84725f208e98eae51ca5
                          • Instruction Fuzzy Hash: F5D12CB4904204CFCB04EF68D59859EBBF1FF88310F15856EE8459B365DB74A845CF86
                          APIs
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405D8B
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DA0
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DB4
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DC2
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 0040E646
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 0040E660
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E69C
                          • _Z6qIsNaNf.QT5CORE ref: 0040E6A1
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E709
                          • _Z6qIsNaNd.QT5CORE ref: 0040E727
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0040E779
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0040E798
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 0040E7A4
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E82C
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E830
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E838
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E83D
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E870
                          • _ZNK9QVector3D10normalizedEv.QT5GUI ref: 0040E899
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E8C0
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0040E91D
                          • _Znwj.LIBSTDC++-6 ref: 0040E9D5
                          • _ZN9QListData6detachEi.QT5CORE ref: 0040EA12
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040EA86
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0040EAA2
                          • memcpy.MSVCRT ref: 0040EABE
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Box5valueDoubleSpin$Vector3$D6lengthDebug$ListStreamlsText$ArrayD10normalizedDataData10deallocateData6detachData7disposeLogger5debugMessageS_jjStringString15fromUtf8_helperZnwjmemcpy
                          • String ID: ERROR length:$default
                          • API String ID: 4015208753-1537122966
                          • Opcode ID: 7c936f45afa2ee461846f8f5f0393fd6053fc6b702259f3f3e8397e27f996e60
                          • Instruction ID: 71c70bc65d029fb791b3f7e5bb551834d4eb2eff15102b737d9e2fa7db171372
                          • Opcode Fuzzy Hash: 7c936f45afa2ee461846f8f5f0393fd6053fc6b702259f3f3e8397e27f996e60
                          • Instruction Fuzzy Hash: 28226170A04218CFCB14EF65D58869DBBF0FF44300F2589AAD889AB366DB349DA5CF45
                          APIs
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040BB16
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0040BB45
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040BB5A
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0040BBB7
                          • _ZNK7QString5toIntEPbi.QT5CORE ref: 0040BBCE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BBFA
                          • _ZNK9QVector3D10normalizedEv.QT5GUI ref: 0040BC4E
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040BC81
                          • _ZNK7QString3argEdici5QChar.QT5CORE ref: 0040BCC2
                          • _ZNK7QString3argEdici5QChar.QT5CORE ref: 0040BCFB
                          • _ZNK7QString3argEdici5QChar.QT5CORE ref: 0040BD34
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 0040BD6A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BDB3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BDD9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BDFF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BE25
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BE4B
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$CharString3arg$Edici5$Box11currentComboTextVector3$Ascii_helperD10normalizedD6lengthDoubleExii5String16fromString5toString8to
                          • String ID: $J=G21G91X%1Y%2Z%3F%4$g
                          • API String ID: 933172395-1902803442
                          • Opcode ID: bd1a0e932d985e71c8c38d5bb791de106098ae52199360422c682335c1c0e6fe
                          • Instruction ID: fb105eb140ad7745f5485a4dc0b5e2c64b55abc85c0abecde211c06132d9cda5
                          • Opcode Fuzzy Hash: bd1a0e932d985e71c8c38d5bb791de106098ae52199360422c682335c1c0e6fe
                          • Instruction Fuzzy Hash: CD1229B0904309DFDB00EF64D58869EBBF0FF84314F158969D484AB3A4E73A9959CF86
                          APIs
                            • Part of subcall function 004099C0: _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AD75
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040ADA1
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040ADB6
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040ADE8
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040ADF7
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040AE29
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040AE38
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AF60
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AF86
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AFAC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AFD2
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AFF8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B01E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B044
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040B06A
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040B079
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040B0B7
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040B0C6
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040B104
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040B113
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B240
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B266
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B28C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B2B2
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B2D8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B2FE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B324
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$DoubleEdit4textLineString8to$Device6isOpen
                          • String ID: G21$G53G90G0X%1Y%2Z%3$G92X%1Y%2Z%3$g
                          • API String ID: 3795681016-3115675479
                          • Opcode ID: 34ae1692844f564a6d79399c7db777f8deda82ea610941afa6ae8297eee1aff8
                          • Instruction ID: e2834fa09fb1c92ad391a0ca5a9ca049da0105ecf9b2bc2a86057e62da63c79c
                          • Opcode Fuzzy Hash: 34ae1692844f564a6d79399c7db777f8deda82ea610941afa6ae8297eee1aff8
                          • Instruction Fuzzy Hash: 47022AB4904305CBDB00EFA4D58879EBBF1FF88314F11896DE894AB395DB789848CB56
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040A068
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A0A1
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A0B6
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A0E8
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A0F7
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A129
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A138
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A265
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A28B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A2B1
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A2D7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A2FD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A323
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A349
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A36F
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A37E
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A3B0
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A3BF
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A3F1
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A400
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A521
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A547
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A56D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A593
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A5B9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A5DB
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A5FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$DoubleEdit4textLineString8to$ResumeUnwind_
                          • String ID: G21G53G90X%1Y%2Z%3$G21G92X%1Y%2Z%3$g
                          • API String ID: 4213677738-3882755902
                          • Opcode ID: 84b682f238bbcde640fc966d2e2826517e07e6e5fdedb695324bda6c4d6981fa
                          • Instruction ID: c88723479f5b871758223dc5baf98e72c5a3d24c8c206eb42ffcbcbb6029b354
                          • Opcode Fuzzy Hash: 84b682f238bbcde640fc966d2e2826517e07e6e5fdedb695324bda6c4d6981fa
                          • Instruction Fuzzy Hash: BFF139B4904305CBDB00EFA4D48869EBBF1FF88314F10896DE884AB395DB799859CB56
                          APIs
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A0A1
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A0B6
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A0E8
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A0F7
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A129
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A138
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A265
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A28B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A2B1
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A2D7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A2FD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A323
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A349
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A36F
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A37E
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A3B0
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A3BF
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 0040A3F1
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0040A400
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A521
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A547
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A56D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A593
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A5B9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A5DB
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A5FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$DoubleEdit4textLineString8to
                          • String ID: G21G53G90X%1Y%2Z%3$G21G92X%1Y%2Z%3$g
                          • API String ID: 3926616291-3882755902
                          • Opcode ID: 460839cd2362f571c957ced56cdd1f47cfc0ec6f12a0d3a3ca009a70cac06f38
                          • Instruction ID: 770e57adcb076919d2f126627f0abf58dab345ceeac997cac2a7f0f2528f4a34
                          • Opcode Fuzzy Hash: 460839cd2362f571c957ced56cdd1f47cfc0ec6f12a0d3a3ca009a70cac06f38
                          • Instruction Fuzzy Hash: 0B125BB4904305DBDB00EF68D48869EBBF1FF84314F148A6DE8946B394DB3A9859CB46
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041ACE1
                          • _ZN9QListData5eraseEPPv.QT5CORE ref: 0041ACEC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041AD2A
                          • _ZN7QString14trimmed_helperERKS_.QT5CORE ref: 0041AD43
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041AD7E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041ADFF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041AE28
                            • Part of subcall function 00440DB0: _ZN7QString15toLatin1_helperERKS_.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041AE46), ref: 00440DD8
                            • Part of subcall function 00440DB0: _ZN7QString6appendE5QChar.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041AE46), ref: 00440EB7
                            • Part of subcall function 00440DB0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440F0E
                            • Part of subcall function 00440DB0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440F34
                          • _ZN7QStringaSERKS_.QT5CORE ref: 0041AEA2
                          • _ZNK15QProgressDialog7maximumEv.QT5WIDGETS ref: 0041AF6F
                          • _ZN15QProgressDialog8setValueEi.QT5WIDGETS ref: 0041AF86
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 0041AF96
                          • _ZNK15QProgressDialog11wasCanceledEv.QT5WIDGETS ref: 0041AFA2
                          • _ZN7QWidget5closeEv.QT5WIDGETS ref: 0041AFC6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041B0F6
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041B6C2
                            • Part of subcall function 004326F0: _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS(?,0041B169), ref: 004326FF
                            • Part of subcall function 00403F70: _ZNK9QVector3D6lengthEv.QT5GUI ref: 00403FE8
                            • Part of subcall function 00403F70: _Z6qIsNaNd.QT5CORE ref: 00403FF5
                            • Part of subcall function 00403F70: _ZN9QListData6detachEi.QT5CORE ref: 00404029
                            • Part of subcall function 00471AA0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471AAE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041B253
                          • _ZN11QHeaderView12restoreStateERK10QByteArray.QT5WIDGETS ref: 0041B2D3
                          • _ZNK17QAbstractItemView14selectionModelEv.QT5WIDGETS ref: 0041B2E8
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 0041B317
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 0041B31F
                          • _ZN10QTableView9selectRowEi.QT5WIDGETS ref: 0041B332
                            • Part of subcall function 00403E60: _ZdlPv.LIBSTDC++-6(?,?,?,0041B371), ref: 00403E8F
                            • Part of subcall function 00403E60: _ZN9QLineEdit5clearEv.QT5WIDGETS(?,?,?,?,?,?,?,0041B371), ref: 00403EE3
                          • _ZN15QProgressDialogD1Ev.QT5WIDGETS ref: 0041B37E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041B3B2
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041B3DB
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                            • Part of subcall function 0043CE90: _ZdlPv.LIBSTDC++-6 ref: 0043CEF8
                            • Part of subcall function 0043CE90: _ZN7QObjectD2Ev.QT5CORE ref: 0043CF28
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041B438
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041B692
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041B6A7
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041B707
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$Data10deallocateS_jj$ProgressStreamlsText$List$AbstractConnectionEvents$Application13processButton9isByteCanceledCharCheckedCoreD6lengthDataData5eraseData6detachData7disposeDialogDialog11wasDialog7maximumDialog8setEdit5clearEventFlagFlagsHeaderItemLatin1_helperLineLoop17MetaModelObjectObject10Object7connectProcessQt14StateString14trimmed_helperString15toString6appendStringaTableTypeValueVector3View12restoreView14selectionView9selectWidget5close
                          • String ID: 1onTableCurrentChanged(QModelIndex,QModelIndex)$2currentChanged(QModelIndex,QModelIndex)$default$model filled:$view parser filled:
                          • API String ID: 1623609310-1195016428
                          • Opcode ID: 1030f92aa699a33240020ce898542518413fee53f3754f2cc978c7a7d74ee40a
                          • Instruction ID: 389af5cd83772c36792c5d744256fe1a72f98c7591cfb28371349a0aedc0e3e5
                          • Opcode Fuzzy Hash: 1030f92aa699a33240020ce898542518413fee53f3754f2cc978c7a7d74ee40a
                          • Instruction Fuzzy Hash: AF22D5B4904319CFDB24EF24C99879EBBB1BF44304F0085ADD489A7351DB74AA89CF96
                          APIs
                          • _ZN5QFileC1ERK7QString.QT5CORE ref: 0042E59B
                          • _ZN4QDirC1ERK7QString.QT5CORE ref: 0042E5B8
                          • _ZNK5QFile6existsEv.QT5CORE ref: 0042E5E5
                          • _ZNK5QFile8fileNameEv.QT5CORE ref: 0042E5FD
                          • _ZN4QDir6removeERK7QString.QT5CORE ref: 0042E60F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042E64D
                          • _ZN5QFile4openE6QFlagsIN9QIODevice12OpenModeFlagEE.QT5CORE ref: 0042E65D
                          • _ZN11QTextStreamC1EP9QIODevice.QT5CORE ref: 0042E67D
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E6A1
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E6B5
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E6D4
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E6F3
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E7C1
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E7D5
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E7F1
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E80D
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E932
                          • _ZNK16QAbstractSpinBox4textEv.QT5WIDGETS ref: 0042E946
                          • _ZNK9QComboBox12currentIndexEv.QT5WIDGETS ref: 0042E954
                          • _ZN11QTextStreamlsEi.QT5CORE ref: 0042E960
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EBCE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EBEF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EC15
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EC3B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EC61
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractBox4textSpin$ArrayData10deallocateS_jj$String$Text$Box12currentComboDeviceDevice12Dir6removeFileFile4openFile6existsFile8fileFlagFlagsIndexModeNameOpenStreamStreamls
                          • String ID:
                          • API String ID: 1655651007-0
                          • Opcode ID: c644d1d0806cdbb016a7f495be67af23f40e740b8c6ea1d2c35e4a38e225d5ba
                          • Instruction ID: 7123866bbc87ccf535e6dfcc9eef2acb548c22b6c3917f90961ea0784f32a695
                          • Opcode Fuzzy Hash: c644d1d0806cdbb016a7f495be67af23f40e740b8c6ea1d2c35e4a38e225d5ba
                          • Instruction Fuzzy Hash: 68223CB0A043188FDB14EFB8D4986ADBBF1BF44310F54466DD88A97354EB34A989CF46
                          APIs
                          • _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          • _ZN7QString14toUpper_helperERKS_.QT5CORE ref: 00409A00
                          • _ZN7QStringaSERKS_.QT5CORE ref: 00409A73
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00409AB9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409B04
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE ref: 00409B23
                          • _ZN7QRegExp3capEi.QT5CORE ref: 00409B50
                          • _ZNK7QString5toIntEPbi.QT5CORE ref: 00409B6B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409B97
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00409BD5
                          • _ZNK7QString7indexOfERK7QRegExpi.QT5CORE ref: 00409C09
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 00409C1D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409C3F
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00409C81
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00409C92
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409CBB
                          • _ZN7QString15toLatin1_helperERKS_.QT5CORE ref: 00409CCB
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 00409CEA
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409D13
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409D39
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 00409D42
                            • Part of subcall function 0044D630: _ZN8QSpinBox8setValueEi.QT5WIDGETS(?,?,?,00409BC3), ref: 0044D646
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409D83
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409DB3
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperString16from$Box8setCaretDevice5writeDevice6isExp3capExp7indexExpiLatin1_helperModeOpenSpinString14toString15fromString15toString5toString6appendString7indexStringaStringiUpper_helperUtf8_helperValue
                          • String ID: M0*2|M30$[Ss]0*(\d+)
                          • API String ID: 3472984461-2506890424
                          • Opcode ID: 8fc015a2c830d76297d1463c74fb1b2b3aedcb7f8f3020521dc86ff1cf0f5df3
                          • Instruction ID: 3767587674780bea0f1802d3873bc840f95af1854b63fbb6b7ab974efcc1104f
                          • Opcode Fuzzy Hash: 8fc015a2c830d76297d1463c74fb1b2b3aedcb7f8f3020521dc86ff1cf0f5df3
                          • Instruction Fuzzy Hash: 3EF159B4904205DFCB04DF68D48869EBBF1FF88314F14862AE855AB3A1D739AC49CF56
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042D98F
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042DD87
                            • Part of subcall function 00432480: _ZNK9QComboBox11currentTextEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,0040FA03), ref: 00432493
                            • Part of subcall function 00432480: _ZNK7QString5toIntEPbi.QT5CORE ref: 004324AE
                            • Part of subcall function 00432480: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004324D6
                            • Part of subcall function 00432430: _ZNK9QComboBox11currentTextEv.QT5WIDGETS(?,?,?,?,00000002,0042C404), ref: 00432443
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042DA46
                          • _ZN6QDebug9putStringEPK5QCharj.QT5CORE ref: 0042DA6C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042DAC6
                          • _ZN11QTextStreamlsEi.QT5CORE ref: 0042DADF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042DB1D
                          • _ZN7QString14compare_helperEPK5QChariPKciN2Qt15CaseSensitivityE.QT5CORE ref: 0042DB5E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042DB90
                          • _ZNK9QIODevice6isOpenEv.QT5CORE(00000001), ref: 0042DBA8
                          • _ZN11QSerialPort11setPortNameERK7QString.QT5SERIALPORT ref: 0042DBD2
                          • _ZN11QSerialPort11setBaudRateEi6QFlagsINS_9DirectionEE.QT5SERIALPORT ref: 0042DC14
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042DD27
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042DD3C
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042DD57
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0042DD6C
                          • _ZNK11QSerialPort8portNameEv.QT5SERIALPORT ref: 0042DDA4
                          • _ZeqRK7QStringS1_.QT5CORE ref: 0042DDCA
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042DDFB
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042DE1D
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jjText$Streamls$SerialString$Box11currentComboNamePort11set$BaudCaseChariCharjDebug9putDevice6isDirectionFlagsOpenPortPort8portQt15RateSensitivityString14compare_helperString5to
                          • String ID: Applying settings$Baud:$Port:$default
                          • API String ID: 2779695237-3975943926
                          • Opcode ID: bc13486aa8ae02e3c3636f62b8541cd46b0e4308149168c0e8c70219cff11007
                          • Instruction ID: 528736bba5b87ce8832c3a77ce4224ba8f68d571ff065aeac6e2da2f8d866863
                          • Opcode Fuzzy Hash: bc13486aa8ae02e3c3636f62b8541cd46b0e4308149168c0e8c70219cff11007
                          • Instruction Fuzzy Hash: 1FF16CB0E08244DFDB04EFA8E48879EBBF1BF44304F54852EE4959B364DB799849CB46
                          APIs
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00404BC8
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00404BDD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404C06
                          • _ZN7QWidget6updateEv.QT5WIDGETS ref: 00404C4A
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 00404C57
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Events$Application13processArrayBox8setCoreData10deallocateEventFlagFlagsGroupLoop17MetaObject2trProcessS1_iS_jjStringTitleWidget6update
                          • String ID: (%1/%2/%3)$Overriding
                          • API String ID: 1194972151-3697313130
                          • Opcode ID: 6e714f907fc28e01d515a70357170ce980cc1fb187446643d35919c646322406
                          • Instruction ID: 4b6b06bdbd3564aa32854c2e4091aaafe3fba6078c224ad87eb51a8b65034518
                          • Opcode Fuzzy Hash: 6e714f907fc28e01d515a70357170ce980cc1fb187446643d35919c646322406
                          • Instruction Fuzzy Hash: C2F18CB4904301DFDB04DF68D4886AEBBF1FF84314F14862AE954AB3A4D7799845CF86
                          APIs
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442D7F
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442D90
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442DAB
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442DBC
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442DD7
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442DE8
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442E03
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442E14
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442E2F
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442E40
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442E5B
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442E68
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00442E88
                          • _Z6qIsNaNd.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00443017
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00443027
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e98ff7bf975d8f098e2a9eae005e161342d74f89f42a2417cd145b0dee59e0c9
                          • Instruction ID: 9317f5e9bb02fea394928649fb5e2225a7c3b097e5489c98bb304e39613b4d3a
                          • Opcode Fuzzy Hash: e98ff7bf975d8f098e2a9eae005e161342d74f89f42a2417cd145b0dee59e0c9
                          • Instruction Fuzzy Hash: 8671F8B0408E07C7AA11BF01E58816AFFB0FF98784F910989F4C12116ADB768879978F
                          APIs
                          • _ZN7QDialogC2EP7QWidget6QFlagsIN2Qt10WindowTypeEE.QT5WIDGETS ref: 004357E9
                          • _Znwj.LIBSTDC++-6 ref: 00435806
                            • Part of subcall function 00461410: _ZNK7QObject10objectNameEv.QT5CORE ref: 00461424
                            • Part of subcall function 00461410: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00461450
                            • Part of subcall function 00461410: _ZN7QObject13setObjectNameERK7QString.QT5CORE ref: 0046146A
                            • Part of subcall function 00461410: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00461493
                            • Part of subcall function 00461410: _ZN7QWidget6resizeERK5QSize.QT5WIDGETS ref: 004614B0
                            • Part of subcall function 00461410: _ZN7QString17fromLatin1_helperEPKci.QT5CORE ref: 004614C8
                            • Part of subcall function 00461410: _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS ref: 004614E0
                            • Part of subcall function 00461410: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00461505
                            • Part of subcall function 00461410: _Znwj.LIBSTDC++-6 ref: 00461512
                            • Part of subcall function 00461410: _ZN11QVBoxLayoutC1EP7QWidget.QT5WIDGETS ref: 00461521
                            • Part of subcall function 00461410: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00461568
                            • Part of subcall function 00461410: _ZN7QLayout18setContentsMarginsEiiii.QT5WIDGETS ref: 0046158F
                            • Part of subcall function 00461410: _Znwj.LIBSTDC++-6 ref: 0046159F
                          • _ZN16QCoreApplication18applicationVersionEv.QT5CORE ref: 00435821
                          • _ZNK6QLabel4textEv.QT5WIDGETS ref: 00435835
                          • _ZNK7QString3argERKS_i5QChar.QT5CORE ref: 0043585A
                          • _ZN6QLabel7setTextERK7QString.QT5WIDGETS ref: 0043586F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435898
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004358BE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004358E4
                          • _ZN16QCoreApplication18applicationDirPathEv.QT5CORE ref: 004358F0
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00435923
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00435934
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043595D
                          • _ZN5QFileC1ERK7QString.QT5CORE ref: 0043596B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435994
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004359BA
                          • _ZN5QFile4openE6QFlagsIN9QIODevice12OpenModeFlagEE.QT5CORE ref: 004359C9
                          • _ZN9QIODevice7readAllEv.QT5CORE ref: 004359E0
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00435A07
                          • _ZN14QPlainTextEdit12setPlainTextERK7QString.QT5WIDGETS ref: 00435A19
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435A42
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435A68
                          • _ZN5QFileD1Ev.QT5CORE ref: 00435A70
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$String$TextZnwj$Application18applicationCoreFileFlagsNamePlain$Ascii_helperCharContentsDevice12Device7readDialogEdit12setEiiiiFile4openFlagLabel4textLabel7setLatin1_helperLayoutLayout18setMarginsModeObjectObject10objectObject13setOpenPathQt10S_i5SheetSizeString15fromString16fromString17fromString3argString6appendStyleTypeUtf8_helperVersionWidgetWidget13setWidget6Widget6resizeWindow
                          • String ID: /LICENSE$0WC
                          • API String ID: 35986418-918975467
                          • Opcode ID: 0cba59fe5debd1101f5c226e013d7fe5e8bdbaa67ed606467fe64c876dd49f08
                          • Instruction ID: a82b7b1640b3eef0db677057ac734b9334223cc3146c7e937acdc12992eab2d0
                          • Opcode Fuzzy Hash: 0cba59fe5debd1101f5c226e013d7fe5e8bdbaa67ed606467fe64c876dd49f08
                          • Instruction Fuzzy Hash: 1AA17BB4904700DFDB04EF68D49876EBBF1FF88315F14861AE8859B360D7399885DB86
                          APIs
                          • _ZN11QFileDialog15getOpenFileNameEP7QWidgetRK7QStringS4_S4_PS2_6QFlagsINS_6OptionEE.QT5WIDGETS ref: 004315E8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043160E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431634
                          • _ZN7QString14compare_helperEPK5QChariPKciN2Qt15CaseSensitivityE.QT5CORE ref: 00431662
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004316B4
                          • _ZN11QFileDialog15getOpenFileNameEP7QWidgetRK7QStringS4_S4_PS2_6QFlagsINS_6OptionEE.QT5WIDGETS ref: 004317DE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431804
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043182A
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0043184D
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 00431871
                          • _ZNK7QString11lastIndexOfERK7QRegExpi.QT5CORE ref: 00431888
                          • _ZNK7QString4leftEi.QT5CORE ref: 0043189D
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 004318D8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004318FE
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$File$String$CaseDialog15getFlagsNameOpenOptionQt15S2_6SensitivityWidget$Ascii_helperChariExpiIndexPatternS_13String11lastString14compare_helperString16fromString4leftSyntax
                          • String ID: G-Code files (*.nc *.ncc *.ngc *.tap *.txt);;All files (*.*)$Heightmap files (*.map)$Open$[/\\]+
                          • API String ID: 706382530-3463056738
                          • Opcode ID: f0d6545a6dc70b81ae7ae3c6bc28e6b216c698863512e27eccc2390b612b18e0
                          • Instruction ID: 06d7c6fe61200ab13aa8bd59ad8867926c88d1e9a9c7b589e6e5043c34bba3f9
                          • Opcode Fuzzy Hash: f0d6545a6dc70b81ae7ae3c6bc28e6b216c698863512e27eccc2390b612b18e0
                          • Instruction Fuzzy Hash: A0023AB49043059FDB00DF68C48869EBBF1FF88315F148A1EE4959B3A0D77A9846CF86
                          APIs
                          • _ZNK9QGroupBox9isCheckedEv.QT5WIDGETS ref: 00405634
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00405666
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 0040567B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004056A0
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 004056D4
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 004056E7
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00405702
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00405716
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 00405725
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00405750
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0040577D
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004057FD
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00405821
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00405836
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Box11currentCheckedComboGroupMetaObject2trS1_iText$AbstractBox8setButton9isStringTitle$ArrayBox9isData10deallocateDoubleS_jjString6appendString8to
                          • String ID: (%1/%2)$Jog
                          • API String ID: 70142446-2497401342
                          • Opcode ID: 3de2d89d9d6a413e41ddcd8570ae0da0a729695206e2fe36b87e5ef67f112527
                          • Instruction ID: be07a9afbb00439369326ed93660fce6ebb399d25904583e129cf508c8c40e5b
                          • Opcode Fuzzy Hash: 3de2d89d9d6a413e41ddcd8570ae0da0a729695206e2fe36b87e5ef67f112527
                          • Instruction Fuzzy Hash: D7C17BB4904601DFDB04EF68D48869FBBF1FF84310F148669E894AB3A0D7399845CF86
                          APIs
                          • _ZN11QFileDialog15getSaveFileNameEP7QWidgetRK7QStringS4_S4_PS2_6QFlagsINS_6OptionEE.QT5WIDGETS ref: 0042EE38
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EE5E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EE84
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EF10
                          • _ZN11QFileDialog15getSaveFileNameEP7QWidgetRK7QStringS4_S4_PS2_6QFlagsINS_6OptionEE.QT5WIDGETS ref: 0042EF9D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EFC3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042EFE9
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0042F056
                          • _ZNK7QString11lastIndexOfERKS_iN2Qt15CaseSensitivityE.QT5CORE ref: 0042F075
                          • _ZNK7QString3midEii.QT5CORE ref: 0042F095
                          • _ZN9QLineEdit7setTextERK7QString.QT5WIDGETS ref: 0042F0AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$File$String$Dialog15getFlagsNameOptionS2_6SaveWidget$Ascii_helperCaseEdit7setIndexLineQt15SensitivityString11lastString16fromString3midText
                          • String ID: G-Code files (*.nc *.ncc *.ngc *.tap *.txt)$Heightmap files (*.map)$Save file as
                          • API String ID: 2745152268-529487481
                          • Opcode ID: e61b0e814e7b172b3269b1160f87f7b2ed62b18d94093dde0e69f9fb2da5d883
                          • Instruction ID: a59168c985f537cd795fe4914da7c737bafdf0a92dc16f8b9316866d3c0c3c1e
                          • Opcode Fuzzy Hash: e61b0e814e7b172b3269b1160f87f7b2ed62b18d94093dde0e69f9fb2da5d883
                          • Instruction Fuzzy Hash: B3F19EB4A04311CFCB04DF68D4886AEBBF1FF85304F548A2EE4945B391D77A9849CB96
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E846
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E8C3
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0041E9A9
                          • _ZN9QListData6detachEi.QT5CORE ref: 0041EA0A
                          • memcpy.MSVCRT ref: 0041EA4F
                            • Part of subcall function 00472C50: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,00443248), ref: 00472C5E
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EA7C
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EA91
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EAA6
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EABB
                          • _ZdlPv.LIBSTDC++-6 ref: 0041EAF0
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041EBD6
                          • _ZN17QAbstractItemView14clearSelectionEv.QT5WIDGETS ref: 0041EC79
                          • _ZN10QTableView9selectRowEi.QT5WIDGETS ref: 0041EC8C
                          • _ZN5QTimeC1Eiiii.QT5CORE ref: 0041ECB9
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041ED4B
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041ED60
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: EnabledWidget10set$ArrayData10deallocateListS_jj$DataData7disposeStreamlsText$AbstractData6detachEiiiiItemSelectionTableTimeView14clearView9selectmemcpy
                          • String ID: default$drawn false:$table updated:
                          • API String ID: 3219745582-4252874899
                          • Opcode ID: 5f44373abc87222c5b3ab938dbd46b06077e5f97be5f58cee30ae14f21eee31a
                          • Instruction ID: e4d764857296acb69ad9317867eca899fe6411475ad961416909ed482a85b6a3
                          • Opcode Fuzzy Hash: 5f44373abc87222c5b3ab938dbd46b06077e5f97be5f58cee30ae14f21eee31a
                          • Instruction Fuzzy Hash: FE1269B4904204CFDB00EFA9D4987AEBBF1BF44304F14866DD8969B351DB78A889CF46
                          APIs
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE ref: 0043FB04
                          • _ZN7QRegExp3capEi.QT5CORE ref: 0043FB2A
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 0043FB3D
                          • _ZN7QString6numberEdci.QT5CORE ref: 0043FB5F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FB85
                          • _ZNK7QRegExp13matchedLengthEv.QT5CORE ref: 0043FB90
                          • _ZNK7QString3midEii.QT5CORE ref: 0043FBAA
                          • _ZNK7QString4leftEi.QT5CORE ref: 0043FBBD
                          • _ZN7QStringaSERKS_.QT5CORE ref: 0043FC1E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FC47
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FC6D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FC93
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FCB9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FCE2
                          • __cxa_guard_acquire.LIBSTDC++-6 ref: 0043FDCF
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0043FDEB
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0043FE0F
                          • __cxa_guard_release.LIBSTDC++-6 ref: 0043FE1F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FE67
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCaretCaseDoubleEdciExp13matchedExp3capExp7indexLengthModePatternQt15S_13SensitivityStringString16fromString3midString4leftString6numberString8toStringaStringiSyntax__cxa_guard_acquire__cxa_guard_release
                          • String ID: (\d*\.\d*)$f
                          • API String ID: 88297903-4282393098
                          • Opcode ID: 22dcce85430f20f6a9c4832527992ea24a56a1e15a020ea388548d9f322ae291
                          • Instruction ID: 5eaed56f7aab779c7da27238f4b2cc184792850c189baab2125a30b9ffb3514f
                          • Opcode Fuzzy Hash: 22dcce85430f20f6a9c4832527992ea24a56a1e15a020ea388548d9f322ae291
                          • Instruction Fuzzy Hash: 2FA181B4908305CFDB00DFA8D48869EBBF1FF48314F14962AE895973A0D73A9849CF56
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404C06
                          • _ZN7QWidget6updateEv.QT5WIDGETS ref: 00404C4A
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 00404C57
                          • _ZN7QString6numberEii.QT5CORE ref: 00404CD9
                          • _ZN7QString6numberEii.QT5CORE ref: 00404D18
                          • _ZN7QString6numberEii.QT5CORE ref: 00404D57
                          • _ZNK7QString3argERKS_i5QChar.QT5CORE ref: 00404DB4
                          • _ZNK7QString3argERKS_i5QChar.QT5CORE ref: 00404DDB
                          • _ZNK7QString3argERKS_i5QChar.QT5CORE ref: 00404E02
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00404E51
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00404E66
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404E8F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404EB5
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404EDB
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404F01
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404F27
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404F4D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404F73
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404F99
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00404FDF
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00405002
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040502F
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCharS_i5String16fromString3argString6number$Events$Application13processBox8setCoreEventFlagFlagsGroupLoop17ProcessStringString6appendTitleWidget6update
                          • String ID: (%1/%2/%3)$Overriding
                          • API String ID: 2783631364-3697313130
                          • Opcode ID: a3bb20deb82732c28d9a4c92662460304372a24352c1c5e7e0c55de05b25f837
                          • Instruction ID: b8d2580dfd8e8a592ed40e010e64756f34f75a2f3cc288aa57efa8441130ecf1
                          • Opcode Fuzzy Hash: a3bb20deb82732c28d9a4c92662460304372a24352c1c5e7e0c55de05b25f837
                          • Instruction Fuzzy Hash: FEA1C0B49053009FDB04EF64D4886AEBBF1FF84304F11896DE885AB3A5D7799845CF46
                          APIs
                          • _ZN7QWidgetC2EPS_6QFlagsIN2Qt10WindowTypeEE.QT5WIDGETS ref: 00447699
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 004476B2
                          • _Znwj.LIBSTDC++-6 ref: 004476BF
                          • _ZN11QHBoxLayoutC1EP7QWidget.QT5WIDGETS ref: 004476CB
                          • _Znwj.LIBSTDC++-6 ref: 004476DE
                          • _ZN6QFrameC1EP7QWidget6QFlagsIN2Qt10WindowTypeEE.QT5WIDGETS ref: 004476F2
                          • _Znwj.LIBSTDC++-6 ref: 00447705
                          • _ZN11QToolButtonC1EP7QWidget.QT5WIDGETS ref: 00447711
                          • _ZN6QFrame13setFrameShapeENS_5ShapeE.QT5WIDGETS ref: 00447727
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0044773F
                          • _ZN15QAbstractButton7setTextERK7QString.QT5WIDGETS ref: 00447751
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044777A
                          • _ZN7QLayout9setMarginEi.QT5WIDGETS ref: 0044778A
                          • _ZN10QBoxLayout9addWidgetEP7QWidgeti6QFlagsIN2Qt13AlignmentFlagEE.QT5WIDGETS ref: 004477B2
                          • _ZN10QBoxLayout9addWidgetEP7QWidgeti6QFlagsIN2Qt13AlignmentFlagEE.QT5WIDGETS ref: 004477D0
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 004477FB
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 00447803
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Widget$Flags$TypeZnwj$AlignmentConnectionFlagFrameLayout9addQt10Qt13ShapeWidgeti6Window$AbstractArrayAscii_helperButtonButton7setColor10invalidateData10deallocateFrame13setLayoutLayout9setMarginMetaObject10Object7connectQt14S_jjStringString16fromTextToolWidget6
                          • String ID: ...$1onButtonClicked()$2clicked()$`IG
                          • API String ID: 2254674564-1643727246
                          • Opcode ID: c60889dd86ef5197e20294b9af9100fc343c8b144a7f4697eb6bb653fde805ed
                          • Instruction ID: 15fcf9703b245334877e11445fe4ad193980d23aaae14c8f172faa38886ab367
                          • Opcode Fuzzy Hash: c60889dd86ef5197e20294b9af9100fc343c8b144a7f4697eb6bb653fde805ed
                          • Instruction Fuzzy Hash: 6C4106B09083009FDB00AF68D59835EBBF0FF44315F518A6DE8858B355DBB99889CF96
                          APIs
                          • __cxa_guard_acquire.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041ADCA), ref: 0043F69C
                          • _ZNK7QString7indexOfE5QChariN2Qt15CaseSensitivityE.QT5CORE ref: 0043F6CA
                          • _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043F6EF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043F718
                          • _ZNK7QString7indexOfE5QChariN2Qt15CaseSensitivityE.QT5CORE ref: 0043F739
                          • _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 0043F75E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043F783
                          • _ZN7QString14trimmed_helperERKS_.QT5CORE ref: 0043F790
                          • __cxa_guard_acquire.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041ADCA), ref: 0043F7DC
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0043F7F8
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0043F81F
                          • __cxa_guard_release.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043F82F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043F877
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayCaseData10deallocateQt15S_jjSensitivity$ChariString7indexString7replace__cxa_guard_acquire$Ascii_helperPatternS_13StringString14trimmed_helperString16fromSyntax__cxa_guard_release
                          • String ID: ;.*$\(+[^\(]*\)+
                          • API String ID: 3936861947-3250114144
                          • Opcode ID: 481349fad3b33991668e6e976975a0816d1f2d45a14690e3ccd8edf265de410e
                          • Instruction ID: 6890fd3866856f5fc036d1ccea26377fc7867601ac1879a6612e40bfafaa9ef7
                          • Opcode Fuzzy Hash: 481349fad3b33991668e6e976975a0816d1f2d45a14690e3ccd8edf265de410e
                          • Instruction Fuzzy Hash: EF613DB4D04205DFDB00AF69D49936EBBF0FF89314F10862EE894973A0D77D98498B4A
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00420569
                          • _ZNK7QString3argEdici5QChar.QT5CORE ref: 004205B0
                          • _ZNK7QString3argEdici5QChar.QT5CORE ref: 004205F0
                          • _ZNK7QString3argEdici5QChar.QT5CORE ref: 00420632
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0042065F
                          • _ZN7QStringaSERKS_.QT5CORE ref: 00420671
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042069D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004206C6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004206EF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00420718
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042073E
                            • Part of subcall function 00471200: _Znwj.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,?,?,?,0041AF1D), ref: 0047123A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004207A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$CharEdici5String3arg$Ascii_helperString16fromString6appendStringaZnwj
                          • String ID: X%1Y%2Z%3$f
                          • API String ID: 1873680363-834748316
                          • Opcode ID: 4592f1b235bd3f295711f34a066d71dec0dbecbdd1a2deec59f243b79b002c56
                          • Instruction ID: 16733c49eb7493ad703ed9781be07e24d4c0a5cd19f5a80f6bf57a34cc440982
                          • Opcode Fuzzy Hash: 4592f1b235bd3f295711f34a066d71dec0dbecbdd1a2deec59f243b79b002c56
                          • Instruction Fuzzy Hash: 0C024870A00229CFDB20DF28D888B9EBBB1BF84304F5486DAD449A7366D735AD95CF45
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040681F
                            • Part of subcall function 00470650: _ZN9QListData11detach_growEPii.QT5CORE ref: 00470686
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040685A
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040686F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004068A5
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004068BA
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004068F0
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00406905
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040693B
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00406950
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00406986
                          • _ZNK7QString7indexOfERKS_iN2Qt15CaseSensitivityE.QT5CORE ref: 004069FA
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayAscii_helperData10deallocateS_jjString16from$CaseData11detach_growListQt15SensitivityString7index
                          • String ID: '$H'|'$X' to unlock$ALARM: Hard limit$ALARM: Soft limit$Check Door$Reset to continue
                          • API String ID: 1614496162-3455368573
                          • Opcode ID: 4484ab7c70675a9632da8cfb7be99ee9eea1ba79f7a7a2beaa4dd50953e68c8a
                          • Instruction ID: 6af33ea5dbaef13b55b08cd8b619cce32fd3011105dc473d6374902fe71c958b
                          • Opcode Fuzzy Hash: 4484ab7c70675a9632da8cfb7be99ee9eea1ba79f7a7a2beaa4dd50953e68c8a
                          • Instruction Fuzzy Hash: 97A139B0904205DFDB04EF68C48469EBBF1FF84324F15852AE456B7390D73AA895CF5A
                          APIs
                          • _ZNK9QIODevice11errorStringEv.QT5CORE ref: 0041A1F4
                          • _ZN7QString6numberEii.QT5CORE ref: 0041A20F
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0041A237
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0041A266
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0041A298
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0041A2AC
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0041A2F2
                          • _ZN14QPlainTextEdit15appendPlainTextERK7QString.QT5WIDGETS ref: 0041A306
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A32F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A355
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A37B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A3A1
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A3C7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A3E9
                          • _ZNK9QIODevice6isOpenEv.QT5CORE ref: 0041A3F1
                          • _ZN11QSerialPort5closeEv.QT5SERIALPORT ref: 0041A3FD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A433
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$String6append$PlainStringText$Device11errorDevice6isEdit15appendMetaObject2trOpenPort5closeS1_iSerialString15fromString6numberUtf8_helper
                          • String ID: Serial port error
                          • API String ID: 2067993489-4145358202
                          • Opcode ID: 70eef79a7cb68fa3be96b8dda868682f2d477db736bbe43a914c982efbc6430d
                          • Instruction ID: 4a514e900431131fd9d049cf33e5bb75c724cda6e6e47f37f563c4be11176b56
                          • Opcode Fuzzy Hash: 70eef79a7cb68fa3be96b8dda868682f2d477db736bbe43a914c982efbc6430d
                          • Instruction Fuzzy Hash: 95916BB4905305CFCB04DF64D4886AEBBF1FF84314F14861AE855AB364E73AAC99CB46
                          APIs
                          • _ZN8QVariantC1Eb.QT5CORE ref: 0040467B
                          • _ZN7QObject11setPropertyEPKcRK8QVariant.QT5CORE ref: 00404698
                          • _ZN8QVariantD1Ev.QT5CORE ref: 004046A3
                          • _ZNK7QWidget5styleEv.QT5WIDGETS ref: 004046AB
                          • _ZNK7QWidget14ensurePolishedEv.QT5WIDGETS ref: 004046D0
                          • _ZNK9QGroupBox9isCheckedEv.QT5WIDGETS ref: 004046E5
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00404721
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00404736
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040475B
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 00404800
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00404850
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00404865
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040488E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004048B4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004048D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$GroupVariant$Box8setStringTitle$Box9isCharCheckedExii5MetaObject11setObject2trPolishedPropertyS1_iString3argString6appendWidget14ensureWidget5style
                          • String ID: (%1)$Spindle$overrided
                          • API String ID: 3883570626-4126582086
                          • Opcode ID: 09a476ac42e8e3d3c02c84da314944fb102e972865638a406df85f615da225ed
                          • Instruction ID: 55668fbf19d1886c1ff478afc141aa1e7984710375d28a5d0333be45bfb21f17
                          • Opcode Fuzzy Hash: 09a476ac42e8e3d3c02c84da314944fb102e972865638a406df85f615da225ed
                          • Instruction Fuzzy Hash: 65817EB4904300DFCB04EF68D49869EBBF1FF85310F14CA6AE995AB3A1D7399845CB46
                          APIs
                          • _ZN19QAbstractTableModelC2EP7QObject.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,?), ref: 00445601
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00445643
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0044566A
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00445691
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004456B8
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004456E1
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00445708
                            • Part of subcall function 00470650: _ZN9QListData11detach_growEPii.QT5CORE ref: 00470686
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044578D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004457B3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004457D9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004457FF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00445825
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00445847
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateMetaObject2trS1_iS_jj$AbstractData11detach_growListModelObjectTable
                          • String ID: Args$Command$Line$Response$State
                          • API String ID: 2249371053-722716890
                          • Opcode ID: 6e144abfdef686eb4d05ca5fe43223375e231e3b87635d96c7c8c7912bb8ae55
                          • Instruction ID: b788f72de5179dcbd0fd5f0ea40b9207b4150728f95434fd29bc3c39c50821b8
                          • Opcode Fuzzy Hash: 6e144abfdef686eb4d05ca5fe43223375e231e3b87635d96c7c8c7912bb8ae55
                          • Instruction Fuzzy Hash: E4816CB0905700DFEB00EF69C48869EBBF1FF85314F10CA2DE4945B291EB799859CB56
                          APIs
                          • _ZN5QFileC1ERK7QString.QT5CORE ref: 00421385
                          • _ZN5QFile4openE6QFlagsIN9QIODevice12OpenModeFlagEE.QT5CORE ref: 00421398
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004213CB
                          • _ZN7QString6appendERKS_.QT5CORE ref: 004213F3
                          • _ZNK7QWidget11windowTitleEv.QT5WIDGETS ref: 00421407
                          • _ZN11QMessageBox8criticalEP7QWidgetRK7QStringS4_6QFlagsINS_14StandardButtonEES6_.QT5WIDGETS ref: 0042142E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00421454
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042147A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004214A0
                          • _ZN7QStringaSERKS_.QT5CORE ref: 004214BF
                          • _ZN11QTextStreamC1EP9QIODevice.QT5CORE ref: 004214D0
                          • _ZNK11QTextStream5atEndEv.QT5CORE ref: 004214F2
                          • _ZN11QTextStream8readLineEx.QT5CORE ref: 00421511
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00421543
                          • _ZNK11QTextStream5atEndEv.QT5CORE ref: 0042154B
                          • _ZN11QTextStreamD1Ev.QT5CORE ref: 00421583
                          • _ZN5QFileD1Ev.QT5CORE ref: 0042158C
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Text$ArrayData10deallocateS_jj$FileFlagsStreamStream5atString$Box8criticalButtonDeviceDevice12File4openFlagLineMessageMetaModeObject2trOpenS1_iS4_6S_14StandardStream8readString6appendStringaTitleWidgetWidget11window
                          • String ID: Can't open file:
                          • API String ID: 1305402717-2899359307
                          • Opcode ID: 69a8e97f5a1be8b6dfdfd9a9bf4a1c6fbd18939354b87c5ca55cab1f6de424af
                          • Instruction ID: f37b1edaa6630c8cad1e76e20688dbf7c329ea2be883284b4a243dd0904eb061
                          • Opcode Fuzzy Hash: 69a8e97f5a1be8b6dfdfd9a9bf4a1c6fbd18939354b87c5ca55cab1f6de424af
                          • Instruction Fuzzy Hash: 277180B0A04314DFDB04AF68E49869EBBB1FF90354F50862DE45697360DB39A849CF86
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Data6detachListmemcpy
                          • String ID: 1onActRecentFileTriggered()$2triggered()
                          • API String ID: 3440376306-1671216855
                          • Opcode ID: 2740e1a41ea30c0fe0a662b7164bbbf817df7c44d8c82d7c22d212156467bd24
                          • Instruction ID: 6f130e26e9eb2837bd30b00aa8ed56c477dfd887d21c4fa2ae6f1dd3ff885943
                          • Opcode Fuzzy Hash: 2740e1a41ea30c0fe0a662b7164bbbf817df7c44d8c82d7c22d212156467bd24
                          • Instruction Fuzzy Hash: C4D14974900209CFCB04EF68C5849AEBBF1FF88314F15856ED895AB3A1DB34A845CF95
                          APIs
                          • __cxa_guard_acquire.LIBSTDC++-6 ref: 0043F332
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043F357
                          • _ZN7QRegExp3capEi.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043F381
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0043F3B8
                          • _ZNK7QString3argEdici5QChar.QT5CORE ref: 0043F3F5
                          • _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 0043F40B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043F434
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043F45A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043F480
                          • _ZN7QRegExp3capEi.QT5CORE ref: 0043F49E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043F4D7
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0043EBEB), ref: 0043F580
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0043EBEB), ref: 0043F5A4
                          • __cxa_guard_release.LIBSTDC++-6 ref: 0043F5B4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043F5E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperExp3capString16from$CaretCaseCharEdici5Exp7indexModePatternQt15S_13SensitivityStringString3argString7replaceStringiSyntax__cxa_guard_acquire__cxa_guard_release
                          • String ID: F%1$g
                          • API String ID: 2340270184-2179636994
                          • Opcode ID: 5d20fb626c45e326893529b7c5bf19ad43f78fab8da24ff2b19abc21dd4875df
                          • Instruction ID: e7baa646c871ab51cbd5bb7d0fcf1919fa21517a18fe4d7372e6c05a55ffc8a3
                          • Opcode Fuzzy Hash: 5d20fb626c45e326893529b7c5bf19ad43f78fab8da24ff2b19abc21dd4875df
                          • Instruction Fuzzy Hash: 73816CB0904305DFDB00AF68D58875EBBF0FF99314F10852EE8945B3A0D7799849CB5A
                          APIs
                          • _ZN16QOpenGLFunctions25initializeOpenGLFunctionsEv.QT5GUI ref: 0044A1CE
                          • _Znwj.LIBSTDC++-6 ref: 0044A1DB
                          • _ZN20QOpenGLShaderProgramC1EP7QObject.QT5GUI ref: 0044A1EB
                          • _ZN20QOpenGLShaderProgram23addShaderFromSourceFileE6QFlagsIN13QOpenGLShader13ShaderTypeBitEERK7QString.QT5GUI ref: 0044A230
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044A255
                          • _ZN20QOpenGLShaderProgram23addShaderFromSourceFileE6QFlagsIN13QOpenGLShader13ShaderTypeBitEERK7QString.QT5GUI ref: 0044A283
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0044A2E0
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0044A2FC
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 0044A308
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044A32D
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0044A33F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044A363
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: OpenShader$ArrayData10deallocateS_jjString$FileFlagsFromProgram23addShader13SourceType$DebugFunctionsFunctions25initializeLogger5debugMessageObjectProgramStreamlsString15fromTextUtf8_helperZnwj
                          • String ID: :/shaders/fshader.glsl$:/shaders/vshader.glsl$default$shader program created
                          • API String ID: 1833095885-3826425475
                          • Opcode ID: 3be2b8b5c2e878f358afe0fb8489b1285d8c53a6853ab1739a3a2c973cf9875f
                          • Instruction ID: a8e0042573e6a2fc9d5b0d62ab930dbc04f6a859bb6dd8cde640f2cf6e1d35bd
                          • Opcode Fuzzy Hash: 3be2b8b5c2e878f358afe0fb8489b1285d8c53a6853ab1739a3a2c973cf9875f
                          • Instruction Fuzzy Hash: E5513AB0904204DFDB00EFA8D99879EBBF1FF44304F14852DE8999B360DB7A9859CB56
                          APIs
                            • Part of subcall function 00471AA0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471AAE
                          • _ZN15QProgressDialogD1Ev.QT5WIDGETS ref: 0041FA9C
                          • __cxa_begin_catch.LIBSTDC++-6 ref: 0041FAB9
                            • Part of subcall function 00445990: _ZN18QAbstractItemModel15beginResetModelEv.QT5CORE(?,?,?,?,0000031A,00404281), ref: 00445996
                            • Part of subcall function 00445990: _ZN18QAbstractItemModel13endResetModelEv.QT5CORE(?,?,?,?,0000031A,00404281), ref: 004459B7
                          • _ZN11QHeaderView12restoreStateERK10QByteArray.QT5WIDGETS ref: 0041FB09
                          • _ZNK17QAbstractItemView14selectionModelEv.QT5WIDGETS ref: 0041FB18
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 0041FB44
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 0041FB4C
                          • _ZN10QTableView9selectRowEi.QT5WIDGETS ref: 0041FB5F
                          • _ZN15QAbstractButton10setCheckedEb.QT5WIDGETS ref: 0041FB78
                          • _ZNSt9exceptionD2Ev.LIBSTDC++-6 ref: 0041FB8B
                          • __cxa_end_catch.LIBSTDC++-6 ref: 0041FB90
                          • _ZNSt9exceptionD2Ev.LIBSTDC++-6 ref: 0041FBA5
                            • Part of subcall function 00452AC0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE(?,?,?,?,?,?,?,?,?,00406496), ref: 00452ADE
                          • _ZNSt9exceptionD2Ev.LIBSTDC++-6 ref: 0041FBF2
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041FC05
                          • _ZNSt9exceptionD2Ev.LIBSTDC++-6 ref: 0041FC16
                          • __cxa_end_catch.LIBSTDC++-6 ref: 0041FC1B
                          Strings
                          • 1onTableCurrentChanged(QModelIndex,QModelIndex), xrefs: 0041FB29
                          • 2currentChanged(QModelIndex,QModelIndex), xrefs: 0041FB35
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractSt9exception$ItemModel$ArrayConnectionReset__cxa_end_catch$Button10setByteCheckedDataData10deallocateData7disposeDialogHeaderListMetaModel13endModel15beginObject10Object7connectProgressQt14ResumeS_jjStateTableTypeUnwind_View12restoreView14selectionView9select__cxa_begin_catch
                          • String ID: 1onTableCurrentChanged(QModelIndex,QModelIndex)$2currentChanged(QModelIndex,QModelIndex)
                          • API String ID: 744467675-838859644
                          • Opcode ID: 31e1de6df354dcb71b967f016dc78e3860f5cb9140a2e5cc6bc9ff979b971152
                          • Instruction ID: 49d2f00957d34b366e646fea64c44ef82d46eb3b5cfb5ab7263ee1b87bcd44d4
                          • Opcode Fuzzy Hash: 31e1de6df354dcb71b967f016dc78e3860f5cb9140a2e5cc6bc9ff979b971152
                          • Instruction Fuzzy Hash: 5C415E70A052098FDB00EF68D9946DDBBB0FF84305F0146AEE84A97352CB746D89CF99
                          APIs
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0040520A
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 0040521F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00405248
                          • _ZN7QWidget6updateEv.QT5WIDGETS ref: 00405253
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 00405260
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0040528D
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004052D0
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 00405306
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00405331
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00405358
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 0040536D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00405396
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004053BC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004053DE
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$MetaObject2trS1_i$Box8setEventsGroupStringTitle$AbstractApplication13processButton9isCharCheckedCoreEventExii5FlagFlagsLoop17ProcessString3argString6appendWidget6update
                          • String ID: (%1)$Spindle
                          • API String ID: 2489393047-1814662097
                          • Opcode ID: 76330223f99b7a6dbbb502c8fa964ecddcb378233b8a07c6aaf8987742dda0e6
                          • Instruction ID: 26e57378ae4a97a0a44f073ab9203b8c6f56ee2aec6f2aba25a71afc85a6ece9
                          • Opcode Fuzzy Hash: 76330223f99b7a6dbbb502c8fa964ecddcb378233b8a07c6aaf8987742dda0e6
                          • Instruction Fuzzy Hash: 41714AB49047058FDB10EF68C4986AEBBF1FF84314F14866DE8946B3A0D779A849CF46
                          APIs
                          • _ZNK11QScrollArea6widgetEv.QT5WIDGETS ref: 004484DB
                          • _Z23qt_qFindChildren_helperPK7QObjectRK7QStringRK11QMetaObjectP5QListIPvE6QFlagsIN2Qt15FindChildOptionEE.QT5CORE ref: 0044850E
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 004485BA
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 004485CB
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 004485F3
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 004485FB
                          • _ZNK7QLayout15contentsMarginsEv.QT5WIDGETS ref: 00448622
                          • _ZNK7QLayout15contentsMarginsEv.QT5WIDGETS ref: 0044863B
                          • _ZN9QListData6detachEi.QT5CORE ref: 004486A9
                          • memcpy.MSVCRT ref: 004486ED
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044871E
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Connection$Meta$FindLayout15contentsListMarginsObjectObject10Object7connectQt14Type$Area6widgetArrayChildChildren_helperData10deallocateData6detachFlagsOptionQt15S_jjScrollStringZ23qt_qmemcpy
                          • String ID: (G$1onPressed()$1onScroll(int,int)$2mouseMoved(int,int)$2mousePressed()
                          • API String ID: 838599591-3739612319
                          • Opcode ID: fce1e63258df10d205f8a49edbe780c15f84b69fceb345028dd23834b47c1bd9
                          • Instruction ID: 9384c1bdb8bc35b18f06ff6c99755b0b82bedd3eab231a3fc45ec2cf0cac1852
                          • Opcode Fuzzy Hash: fce1e63258df10d205f8a49edbe780c15f84b69fceb345028dd23834b47c1bd9
                          • Instruction Fuzzy Hash: D37105749043098FCB00DFA9D98499DFBF1BF88314F148A6AE459AB361D774A886CF85
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040681F
                            • Part of subcall function 00470650: _ZN9QListData11detach_growEPii.QT5CORE ref: 00470686
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040685A
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040686F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004068A5
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004068BA
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004068F0
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00406905
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040693B
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00406950
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00406986
                          • _ZNK7QString7indexOfERKS_iN2Qt15CaseSensitivityE.QT5CORE ref: 004069FA
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayAscii_helperData10deallocateS_jjString16from$CaseData11detach_growListQt15SensitivityString7index
                          • String ID: '$H'|'$X' to unlock$ALARM: Hard limit$ALARM: Soft limit$Check Door$Reset to continue
                          • API String ID: 1614496162-3455368573
                          • Opcode ID: 691294b919503bb01d3077c70c2b46b5aaaef5577fd01143ae34e5c819162238
                          • Instruction ID: bbfc396e4e01fd2a8547bddf7911772bf5f14e179a7b616778aeecd2074da2e0
                          • Opcode Fuzzy Hash: 691294b919503bb01d3077c70c2b46b5aaaef5577fd01143ae34e5c819162238
                          • Instruction Fuzzy Hash: DE71E5B09043099FDB00EFA9C49469EBBF1FF88314F15852EE485A7350E779A894CF95
                          APIs
                          • _Z5qQNaNv.QT5CORE ref: 004410EE
                          • _Z5qQNaNv.QT5CORE ref: 004410F3
                          • _Z5qQNaNv.QT5CORE ref: 004410F8
                          • _Z5qQNaNv.QT5CORE ref: 004410FD
                          • _ZN5QChar7toUpperEj.QT5CORE ref: 0044122A
                          • _ZNK7QString3midEii.QT5CORE ref: 00441253
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 00441266
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004412B3
                          • _Z6qIsNaNd.QT5CORE ref: 004413A4
                          • _Z6qIsNaNd.QT5CORE ref: 0044140A
                          • _Z6qIsNaNd.QT5CORE ref: 00441416
                            • Part of subcall function 00440060: _Z6qIsNaNd.QT5CORE ref: 004400B1
                            • Part of subcall function 00440060: _Z6qIsNaNd.QT5CORE ref: 004400C9
                            • Part of subcall function 00440060: _Z6qIsNaNd.QT5CORE ref: 004400DD
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayChar7toData10deallocateDoubleS_jjString3midString8toUpper
                          • String ID:
                          • API String ID: 1268732198-0
                          • Opcode ID: 6da5d422fff5ce23ba5764a48247dc7393c40319585c786e6713bd09acaa504e
                          • Instruction ID: dd2039754a1711c312c459a515480d5f467d989a3e249fc2144fd80d37dbc764
                          • Opcode Fuzzy Hash: 6da5d422fff5ce23ba5764a48247dc7393c40319585c786e6713bd09acaa504e
                          • Instruction Fuzzy Hash: 00B16174904309DFDF10DFA8D4846AEBBF0FF48350F14865AE894A73A0D7399999CB4A
                          APIs
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0040E188
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0040E1A7
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 0040E1B6
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E1F0
                          • _Znwj.LIBSTDC++-6 ref: 0040E22A
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 0040E249
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 0040E26D
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Box5valueDoubleSpin$DebugLogger5debugMessageStreamlsStringString15fromTextUtf8_helperZnwj
                          • String ID: Updating interpolation$default
                          • API String ID: 497035242-1846736205
                          • Opcode ID: 14722bf055e764ecad9c4bee9e640e1a54606b292e7604a2e0a3b8b4cf4f0b5f
                          • Instruction ID: 7ab530155aafea75068842b7a859b0f6aaf43ca9fe32e6a501a41d3b3ef6a835
                          • Opcode Fuzzy Hash: 14722bf055e764ecad9c4bee9e640e1a54606b292e7604a2e0a3b8b4cf4f0b5f
                          • Instruction Fuzzy Hash: 36D19D70D04208DFCB14DFA5D4846ADBBB1FF44304F10896AE895AB391DB399969CF49
                          APIs
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0040953A
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 00409566
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040958F
                          • _ZN6QDebugD1Ev.QT5CORE ref: 004095A5
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 004095BC
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 004095E7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409610
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004096DF
                          • _ZN14QPlainTextEdit15appendPlainTextERK7QString.QT5WIDGETS ref: 00409706
                          • _ZNK14QPlainTextEdit10blockCountEv.QT5WIDGETS ref: 00409731
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409787
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 00409827
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayText$Data10deallocateS_jj$Plain$StreamlsString$ByteCountDebugDevice5writeEdit10blockEdit15appendLogger5debugMessage
                          • String ID: [CTRL+X]$default$grbl reset
                          • API String ID: 659757468-2983608331
                          • Opcode ID: 7046a6515f153c1d9dc7ea606a984334a5dcc90eb600e6227e6b44405050d07e
                          • Instruction ID: c441f5a44ad87fadb267ab83d18647b36ee9cdd40b6efd80c1ddbd6f3be75875
                          • Opcode Fuzzy Hash: 7046a6515f153c1d9dc7ea606a984334a5dcc90eb600e6227e6b44405050d07e
                          • Instruction Fuzzy Hash: 29916BB4904204DFCB04DF68D48879EBBF1BF88304F148669E844AB3A6D7799849CB59
                          APIs
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00402E8E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402EC4
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00402F57
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00402F8B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402FBF
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: CaseQt15SensitivityString8endsWith$ArrayData10deallocateS_jj
                          • String ID: .nc$.ncc$.ngc$.tap$.txt
                          • API String ID: 2043502143-3566413618
                          • Opcode ID: 7021d3deeb99780b3b3fec2b7488a1bed7610e96011c95ac34fc2eea5867a328
                          • Instruction ID: 25db4b9e7e86e70c6645edfba4c0f38f9c8534f2b0845453da4a904407c2bc93
                          • Opcode Fuzzy Hash: 7021d3deeb99780b3b3fec2b7488a1bed7610e96011c95ac34fc2eea5867a328
                          • Instruction Fuzzy Hash: BC617AB09043049BDB04DF78C58839EBBF0BF84315F14852EE494AB3D4D7BA9949DB96
                          APIs
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405D8B
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DA0
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DB4
                            • Part of subcall function 00405D70: _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DC2
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 0040E646
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 0040E660
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E69C
                          • _Z6qIsNaNf.QT5CORE ref: 0040E6A1
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E709
                          • _Z6qIsNaNd.QT5CORE ref: 0040E727
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0040E779
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0040E798
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 0040E7A4
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E82C
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E830
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E838
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040E83D
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E870
                          • _ZNK9QVector3D10normalizedEv.QT5GUI ref: 0040E899
                          • _ZNK9QVector3D6lengthEv.QT5GUI ref: 0040E8C0
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0040E91D
                          • _Znwj.LIBSTDC++-6 ref: 0040E9D5
                          • _ZN9QListData6detachEi.QT5CORE ref: 0040EA12
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040EA86
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0040EAA2
                          • memcpy.MSVCRT ref: 0040EABE
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Box5valueDoubleSpin$Vector3$D6lengthDebug$ListStreamlsText$ArrayD10normalizedDataData10deallocateData6detachData7disposeLogger5debugMessageS_jjStringString15fromUtf8_helperZnwjmemcpy
                          • String ID: ERROR length:$default
                          • API String ID: 4015208753-1537122966
                          • Opcode ID: 61694034963bdc7e1518a7b8569344ca5f7b163b3f4fdbc536a80fd24e59f2a6
                          • Instruction ID: a2a45536ef1b9542d7b112510ead07cc148450eaeac608fcc0e9886a769e01b0
                          • Opcode Fuzzy Hash: 61694034963bdc7e1518a7b8569344ca5f7b163b3f4fdbc536a80fd24e59f2a6
                          • Instruction Fuzzy Hash: A2713971E00218CFCB14EF65D98879DBBB0FF84304F2184AAD489A7265DB355EA9CF85
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 004094FA
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0040953A
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 00409566
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040958F
                          • _ZN6QDebugD1Ev.QT5CORE ref: 004095A5
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 004095BC
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 004095E7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409610
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004096DF
                          • _ZN14QPlainTextEdit15appendPlainTextERK7QString.QT5WIDGETS ref: 00409706
                          • _ZNK14QPlainTextEdit10blockCountEv.QT5WIDGETS ref: 00409731
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00409787
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 00409827
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$Data10deallocateS_jjText$Plain$StreamlsString$ByteCountDebugDevice5writeEdit10blockEdit15appendLogger5debugMessageResumeUnwind_
                          • String ID: [CTRL+X]$default$grbl reset
                          • API String ID: 4209539939-2983608331
                          • Opcode ID: f5557f384d53b95efb0faf00d63dd23f71611704bf3c139573a431b4959b823b
                          • Instruction ID: 9f8926cfcc87c16217f9f0a3c86d951f894735b1246aefeebe733dfa80534f73
                          • Opcode Fuzzy Hash: f5557f384d53b95efb0faf00d63dd23f71611704bf3c139573a431b4959b823b
                          • Instruction Fuzzy Hash: 908115B49043048FDB04EF68D49879EBBF1FF88304F04856DE844AB366D7B9A949CB59
                          APIs
                          • _ZNK9QSplitter6handleEi.QT5WIDGETS ref: 0040D192
                          • _ZN7QObject11eventFilterEPS_P6QEvent.QT5CORE ref: 0040D1AC
                          • _ZN15QAbstractButton10setCheckedEb.QT5WIDGETS ref: 0040D2C0
                          • _ZNK7QWidget11minimumSizeEv.QT5WIDGETS ref: 0040D385
                          • _ZN9QSplitter8setSizesERK5QListIiE.QT5WIDGETS ref: 0040D40D
                          • _ZNK9QSplitter11handleWidthEv.QT5WIDGETS ref: 0040D452
                          • _ZN7QWidget16setMinimumHeightEi.QT5WIDGETS ref: 0040D474
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractButton10setCheckedEventFilterHeightListMinimumObject11eventSizeSizesSplitter11handleSplitter6handleSplitter8setWidget11minimumWidget16setWidth
                          • String ID:
                          • API String ID: 1674032690-0
                          • Opcode ID: eed159f8e05ef5622984560eda25a02628d5fefc38ce7b069e1e8eecb845e3f8
                          • Instruction ID: 0ff0c228381c5d08ebc452e9ed92133516ab1cdb787f628e75d27cf7e4bbf07a
                          • Opcode Fuzzy Hash: eed159f8e05ef5622984560eda25a02628d5fefc38ce7b069e1e8eecb845e3f8
                          • Instruction Fuzzy Hash: 89022174A00605CFCB24EFA8D5989AAB7F1FF48300F14867AD8469B791DB34E849CB59
                          APIs
                          • _ZNK9QIODevice6isOpenEv.QT5CORE ref: 0040CDA3
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0040CE06
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 0040CE43
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 0040CE76
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 0040CEAE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040CEE4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040CF0A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040CF2C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040CF4E
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 0040CFF1
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 0040D013
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040D038
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$Data10deallocateS_jj$CharExii5String3arg$ByteDevice5writeDevice6isMetaObject2trOpenS1_i
                          • String ID: ?$Buffer: %1 / %2 / %3
                          • API String ID: 2354960371-1937707986
                          • Opcode ID: a89a13d47cd82c610e46d701a2c37accbd6bf68f979760b6645bc31f9c96829a
                          • Instruction ID: 675c07d23a5f498c34b170ce675c4ed25b8b41c03873ad457aa12ce6cff51214
                          • Opcode Fuzzy Hash: a89a13d47cd82c610e46d701a2c37accbd6bf68f979760b6645bc31f9c96829a
                          • Instruction Fuzzy Hash: 968127B4904301DFDB00DF68C48879EBBF1FF84314F148669E8986B3A5D779984ACB96
                          APIs
                          • _ZN7QObjectC2EPS_.QT5CORE ref: 00438D42
                            • Part of subcall function 0043B720: _ZN16QOpenGLFunctionsC2Ev.QT5GUI(?,?,000000D2,?,?,?,0043BE6C,?,?,00000002,?,00429A9F), ref: 0043B731
                            • Part of subcall function 0043B720: _ZN13QOpenGLBufferC1Ev.QT5GUI(?,?,000000D2,?,?,?,0043BE6C,?,?,00000002,?,00429A9F), ref: 0043B74D
                            • Part of subcall function 0043B720: _ZN24QOpenGLVertexArrayObjectC1EP7QObject.QT5GUI(?,?,000000D2,?,?,?,0043BE6C,?,?,00000002,?,00429A9F), ref: 0043B75D
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00438D6E
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00438D73
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00438D7B
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00438D83
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00438D8B
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00438D93
                          • _ZN6QTimerC1EP7QObject.QT5CORE ref: 00438DA4
                          • _ZN6QImageC1Ev.QT5GUI ref: 00438DBB
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 00438E23
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 00438E2B
                          • _ZN6QTimer5startEi.QT5CORE ref: 00438E3A
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Color10invalidate$Object$Open$Connection$ArrayBufferFunctionsImageMetaObject10Object7connectQt14TimerTimer5startTypeVertex
                          • String ID: 1onTimerVertexUpdate()$2timeout()
                          • API String ID: 321571006-4287782181
                          • Opcode ID: 1ec73d526c6df8fba387a48d75319a75996ddf43bd0ba827651f2a4cf8897b8c
                          • Instruction ID: d68ea61d2ff725c142be1ba0d7966148b2f68eb66273ecfcc1f6e1983678e0ca
                          • Opcode Fuzzy Hash: 1ec73d526c6df8fba387a48d75319a75996ddf43bd0ba827651f2a4cf8897b8c
                          • Instruction Fuzzy Hash: 723129B09042448FDB04AF28D8987AD7FB4FB44304F4045BEDC4A9B26ADB795949CF96
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00473E4A
                          • _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 00473E7A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$AllocationData10deallocateData8allocateEjjj6FlagsOptionS_16S_jj
                          • String ID:
                          • API String ID: 1338957267-0
                          • Opcode ID: 91ec500d02793e032463d77cd85744788c18aa5270b2776dacd7083f1b2b0cf1
                          • Instruction ID: e290987e834012f534b437b8ae1ff915bbb47617a3d9b20732e88306247c4b48
                          • Opcode Fuzzy Hash: 91ec500d02793e032463d77cd85744788c18aa5270b2776dacd7083f1b2b0cf1
                          • Instruction Fuzzy Hash: ABC13B75504241CFC710DF28C084A9AFBF1FF89325F19C65AE8989B3A1D738E945DB85
                          APIs
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00407C52
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 00407D2C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00407D6F
                          • _ZN15QAbstractButton7setTextERK7QString.QT5WIDGETS ref: 00407DB9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00407DE2
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 00407E04
                          • _ZN7QAction10setVisibleEb.QT5WIDGETS ref: 00407E51
                          • _ZNK11QToolButton4menuEv.QT5WIDGETS ref: 00407E74
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 00407E80
                          • _ZN9QListData6detachEi.QT5CORE ref: 00407EA1
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00407EE0
                          • memcpy.MSVCRT ref: 00408481
                          • memcpy.MSVCRT ref: 004084A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$ArrayDataData10deallocateData7disposeEdit4textLineS_jjmemcpy$AbstractAction10setButton4menuButton7setData6detachStringTextToolVisibleWidget7actions
                          • String ID: Probe
                          • API String ID: 4058281796-379535406
                          • Opcode ID: 655263fc705fa3044b59eec769c3bf7dbbbd62ec0e15201bfb82ce4df2011ad0
                          • Instruction ID: efb320d687f64ea4fc9cef4515f776982190978bb43a46c1b7725a5f720d3289
                          • Opcode Fuzzy Hash: 655263fc705fa3044b59eec769c3bf7dbbbd62ec0e15201bfb82ce4df2011ad0
                          • Instruction Fuzzy Hash: 9AA12BB49042058FDB04EF68C098AAEBBF1FF44300F1585A9DC959B396DB34E855CF56
                          APIs
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00433B2F
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00433B3D
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00433B55
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 00433B79
                          • _ZNK12QApplication10styleSheetEv.QT5WIDGETS ref: 00433B90
                          • _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 00433BA3
                          • _ZN12QApplication13setStyleSheetERK7QString.QT5WIDGETS ref: 00433BB1
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00433BD6
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 00433BDE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00433C00
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00433C22
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$SheetString$Application10styleApplication13setAscii_helperCasePatternQt15S_13SensitivityString15fromString16fromString6appendString7replaceStyleSyntaxUtf8_helper
                          • String ID: font-size: $font-size:\s*\d+
                          • API String ID: 1187537974-446646615
                          • Opcode ID: 087dbb8ffd76441f42d95f05c763d4c095fae1d71ccd26d3f5a1063bac2256d9
                          • Instruction ID: d7a6bff2cc6a71d150df039e180a0daf96ce2625583cbd6a0d5652ccb09b0239
                          • Opcode Fuzzy Hash: 087dbb8ffd76441f42d95f05c763d4c095fae1d71ccd26d3f5a1063bac2256d9
                          • Instruction Fuzzy Hash: 43419FB55043018FDB00EF68D48869EBBF0FF48315F10962DD485A7360D7399989CF46
                          APIs
                          • _ZN11QScrollAreaC2EP7QWidget.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004480A1
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004480E5
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044811F
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00448134
                          • _ZNK19QAbstractScrollArea17verticalScrollBarEv.QT5WIDGETS ref: 00448141
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044816A
                          • _ZNK19QAbstractScrollArea17verticalScrollBarEv.QT5WIDGETS ref: 00448172
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 00448197
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 0044819F
                          Strings
                          • 1onVerticalScrollBarValueChanged(int), xrefs: 0044817C
                          • @IG, xrefs: 004480B0
                          • 2valueChanged(int), xrefs: 00448188
                          • QScrollBar:vertical {border: none; width: 2px; padding-top: 8px;} QScrollBar::handle:vertical {background: darkgray;} QScrollBar::add-line:vertical {border: none; backgroun, xrefs: 0044812D
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Scroll$AbstractArea17verticalArrayAscii_helperConnectionData10deallocateS_jjString16from$AreaMetaObject10Object7connectQt14TypeWidget
                          • String ID: 1onVerticalScrollBarValueChanged(int)$2valueChanged(int)$@IG$QScrollBar:vertical {border: none; width: 2px; padding-top: 8px;} QScrollBar::handle:vertical {background: darkgray;} QScrollBar::add-line:vertical {border: none; backgroun
                          • API String ID: 2444537193-3884517918
                          • Opcode ID: 1641a1793b626a6250a17073c30804e1875bf6fa0f6bd278c0fd413021e2ba0e
                          • Instruction ID: 3b878da24d68f37fd0f9a94935a467ddcbb64f1bca200d9e7687b3ee0683660a
                          • Opcode Fuzzy Hash: 1641a1793b626a6250a17073c30804e1875bf6fa0f6bd278c0fd413021e2ba0e
                          • Instruction Fuzzy Hash: AD312FB09043059FDB00AF69D99835EBBF0FF84314F10852ED4959B360DB799849CF8A
                          APIs
                          • _ZN15QAbstractButtonC2EP7QWidget.QT5WIDGETS ref: 00448A54
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00448A72
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00448A7C
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 00448A86
                          • _ZNK7QWidget7paletteEv.QT5WIDGETS ref: 00448A97
                          • _ZNK8QPalette5brushENS_10ColorGroupENS_9ColorRoleE.QT5GUI ref: 00448AB0
                          • _ZN6QColoraSERKS_.QT5GUI ref: 00448AC5
                          • _ZNK8QPalette5brushENS_10ColorGroupENS_9ColorRoleE.QT5GUI ref: 00448AE2
                          • _ZN6QColoraSERKS_.QT5GUI ref: 00448AF2
                          • _ZN6QColor6setRgbEiiii.QT5GUI ref: 00448B1B
                          • _ZNK6QColor4darkEi.QT5GUI ref: 00448B37
                          • _ZN6QColoraSERKS_.QT5GUI ref: 00448B46
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Color$Color10invalidateColora$GroupPalette5brushRoleS_10$AbstractButtonColor4darkColor6setEiiiiWidgetWidget7palette
                          • String ID: x
                          • API String ID: 1997027963-2363233923
                          • Opcode ID: 9bfddbb046f4a4af6c7c5ee9d50dfd6e3e3189619030e7814f28af1ae8e99c61
                          • Instruction ID: 8d4b59df9419b269512976f587a71d54f513442ad5689dd5c21f38ea87dfd4b5
                          • Opcode Fuzzy Hash: 9bfddbb046f4a4af6c7c5ee9d50dfd6e3e3189619030e7814f28af1ae8e99c61
                          • Instruction Fuzzy Hash: 61310BB1A042049FCB04FF68D9986ADBFF5EF84300F41853DD885AB255DB78A848CF96
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Color4redColor5blueColor6greenDataData7disposeListmemcpy$Buffer4readOpenmalloc
                          • String ID:
                          • API String ID: 510264085-0
                          • Opcode ID: 102a00aaaab058f7b9ce52e64237d6891f354b72ed628df84860030f710bfdcb
                          • Instruction ID: 81e3ab3e348bc0d4a7a428ba89ba571a6bbc41cd75de8ed64dbe886f639584af
                          • Opcode Fuzzy Hash: 102a00aaaab058f7b9ce52e64237d6891f354b72ed628df84860030f710bfdcb
                          • Instruction Fuzzy Hash: 5E125EB4A04216CFCB24DFA8C484A9DBBF1FF48310F25856AD489AB355E734AC56CF85
                          APIs
                            • Part of subcall function 00472410: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,0043519C), ref: 0047241E
                            • Part of subcall function 00472040: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,0043421E), ref: 0047204E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435256
                          • _ZNK7QObject8propertyEPKc.QT5CORE ref: 00435289
                          • _ZNK8QVariant8toDoubleEPb.QT5CORE ref: 00435297
                            • Part of subcall function 00472770: _Znwj.LIBSTDC++-6(?,?,?,?,000B3C74,004352B1), ref: 004727A3
                          • _ZN8QVariantD1Ev.QT5CORE ref: 004352B6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435360
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0043538C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435443
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435474
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0043549D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00435565
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$DataData7disposeList$AbstractBox11currentButton9isCheckedComboDoubleObject8propertyTextVariantVariant8toZnwj
                          • String ID: value
                          • API String ID: 1969026285-494360628
                          • Opcode ID: 8a4050fc1e65c642476f4c789f4e6d2e720fd5337bdd234b248559f73f20c2b1
                          • Instruction ID: f830a111c38283105ad746ab3561d7e064778de3034e4961ee07ed5cab87610e
                          • Opcode Fuzzy Hash: 8a4050fc1e65c642476f4c789f4e6d2e720fd5337bdd234b248559f73f20c2b1
                          • Instruction Fuzzy Hash: DCF127B4904604CFCB04DFA9D484A9EBBF1FF88314F14892EE445A7361E779A849CF99
                          APIs
                          • _ZNK9QComboBox12currentIndexEv.QT5WIDGETS ref: 0044E1EF
                          • _ZNK9QComboBox8itemTextEi.QT5WIDGETS ref: 0044E1FE
                          • _ZeqRK7QStringS1_.QT5CORE ref: 0044E220
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044E249
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044E276
                          • _ZNK9QComboBox8itemDataEii.QT5WIDGETS ref: 0044E2CB
                          • _ZNK8QVariant3cmpERKS_.QT5CORE ref: 0044E2DA
                          • _ZN9QComboBox15insertSeparatorEi.QT5WIDGETS ref: 0044E312
                          • _ZN5QIconC1Ev.QT5GUI ref: 0044E336
                          • _ZN9QComboBox10insertItemEiRK5QIconRK7QStringRK8QVariant.QT5WIDGETS ref: 0044E353
                          • _ZN5QIconD1Ev.QT5GUI ref: 0044E35E
                          • _ZN9QComboBox15setCurrentIndexEi.QT5WIDGETS ref: 0044E37A
                          • _ZN9QComboBox11setEditableEb.QT5WIDGETS ref: 0044E3AD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044E453
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$ArrayData10deallocateIconS_jj$Box8itemIndexString$Box10insertBox11setBox12currentBox15insertBox15setCurrentDataEditableItemSeparatorTextVariantVariant3cmp
                          • String ID:
                          • API String ID: 449382430-0
                          • Opcode ID: 9de2e6c512745e6487bb21d358a0e0edacb38a63a6ca77344ef10b820dacdfe9
                          • Instruction ID: 501a4dc1afd80ea32d85504420b47800672fe02fba4febd00084775dfd902481
                          • Opcode Fuzzy Hash: 9de2e6c512745e6487bb21d358a0e0edacb38a63a6ca77344ef10b820dacdfe9
                          • Instruction Fuzzy Hash: 7A711BB0A043048FDF04EFB9D9985AEBBF5BF84300F54452DE89A9B360DB349949CB46
                          APIs
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0042F689
                          • _ZNK7QWidget11windowTitleEv.QT5WIDGETS ref: 0042F69D
                          • _ZN11QMessageBox7warningEP7QWidgetRK7QStringS4_6QFlagsINS_14StandardButtonEES6_.QT5WIDGETS ref: 0042F6C4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042F6EC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042F70E
                          Strings
                          • Heightmap file was changed. Save?, xrefs: 0042F553
                          • G-code program file was changed. Save?, xrefs: 0042F673
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Box7warningButtonFlagsMessageMetaObject2trS1_iS4_6S_14StandardStringTitleWidgetWidget11window
                          • String ID: G-code program file was changed. Save?$Heightmap file was changed. Save?
                          • API String ID: 163025283-3052660131
                          • Opcode ID: a473b8949a9a253cd987d2874ec86f4e9b6d23cda3fab561c7e64728e49f9ee6
                          • Instruction ID: 48bc976fd598ec26167535461b4921171e51b6fa1a12b6f7ce1912c3db207344
                          • Opcode Fuzzy Hash: a473b8949a9a253cd987d2874ec86f4e9b6d23cda3fab561c7e64728e49f9ee6
                          • Instruction Fuzzy Hash: C47172B0A043159BDB10DF68E48879EBBF0FF84314F94863ED89497391D7798849CB56
                          APIs
                          • _ZdlPv.LIBSTDC++-6 ref: 00402BCF
                          • _ZNK9QGroupBox9isCheckedEv.QT5WIDGETS ref: 00402BFF
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 00402C12
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 00402C8E
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00402CDC
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00402CF4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402D1D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402D43
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402D65
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402D87
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$CheckedGroup$AbstractBox8setBox9isButton9isCharExii5StringString3argString6appendTitle
                          • String ID: (%1)$Spindle
                          • API String ID: 3207239229-1814662097
                          • Opcode ID: f60272e839d14d150f8f795d971a2e897687ee00c90de832ff21d6bea24bcd5e
                          • Instruction ID: 9b95a252e212a37add460a5c6c006fa7421fad19e4e0cf8f184b8d556641dcb0
                          • Opcode Fuzzy Hash: f60272e839d14d150f8f795d971a2e897687ee00c90de832ff21d6bea24bcd5e
                          • Instruction Fuzzy Hash: 39618B749042058FCB00DF68D58C69EBBF1FF84314F14866AE854AB3E1D7B9AC45CB96
                          APIs
                          • _ZN7QSlider10paintEventEP11QPaintEvent.QT5WIDGETS ref: 0044D411
                          • _ZNK15QAbstractSlider5valueEv.QT5WIDGETS ref: 0044D41F
                          • _ZN8QPainterC1EP12QPaintDevice.QT5GUI ref: 0044D436
                          • _ZN8QPainter13setRenderHintENS_10RenderHintEb.QT5GUI ref: 0044D451
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0044D469
                          • _ZN6QImageC1ERK7QStringPKc.QT5GUI ref: 0044D485
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044D4AE
                          • _ZNK15QAbstractSlider7maximumEv.QT5WIDGETS ref: 0044D4D1
                          • _ZNK6QImage6heightEv.QT5GUI ref: 0044D53D
                          • _ZNK6QImage5widthEv.QT5GUI ref: 0044D550
                          • _ZN8QPainter9drawImageERK7QPointFRK6QImage.QT5GUI ref: 0044D580
                          • _ZN6QImageD1Ev.QT5GUI ref: 0044D58B
                          • _ZN8QPainterD1Ev.QT5GUI ref: 0044D594
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Image$AbstractEventHintPaintPainterRender$ArrayAscii_helperData10deallocateDeviceImage5widthImage6heightPainter13setPainter9drawPointS_10S_jjSlider10paintSlider5valueSlider7maximumStringString16from
                          • String ID:
                          • API String ID: 2915859233-0
                          • Opcode ID: ac94ae84ba5d1e08cd853089ca44006a57ea1d51b293536f74e51c2e2260d633
                          • Instruction ID: e398883778ac2bb3a95c26fda5ca3566f2171610997d0277dbe0ffe49034b81c
                          • Opcode Fuzzy Hash: ac94ae84ba5d1e08cd853089ca44006a57ea1d51b293536f74e51c2e2260d633
                          • Instruction Fuzzy Hash: 19512B74E00249DFCB04EFE9E99859DBFB1FF84301F408529E846AB368DB359859CB45
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041DF5C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E25F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E284
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj
                          • String ID: G0X%1Y%2$G0Z%1$G38.2Z%1$g
                          • API String ID: 3736559311-1936129248
                          • Opcode ID: f1142bdc1492ad2bfdc3a637cb0cfa250261b0e66d6d33854f3af87306a60db9
                          • Instruction ID: 749e68eb4468531d40f5b30db38b32fdefcb179b94e9abd66d5f1ce150175b69
                          • Opcode Fuzzy Hash: f1142bdc1492ad2bfdc3a637cb0cfa250261b0e66d6d33854f3af87306a60db9
                          • Instruction Fuzzy Hash: 51D1FAB09043598FDB10EF68C48879EBBF1FF84314F108A9DE4999B294DB759988CF42
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E0F2
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E11B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E25F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E284
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj
                          • String ID: G0X%1Y%2$G0Z%1$G38.2Z%1$g
                          • API String ID: 3736559311-1936129248
                          • Opcode ID: 1b59d9c3f494d70f4fe2f34a7f0c3ed2ec5208e6904a5e77e8f52aed92758ebe
                          • Instruction ID: 67c743e3905486c503b9cb58b868212185fb6009679f39728a6b4a03ae754c0e
                          • Opcode Fuzzy Hash: 1b59d9c3f494d70f4fe2f34a7f0c3ed2ec5208e6904a5e77e8f52aed92758ebe
                          • Instruction Fuzzy Hash: DED10AB09043598FDB10EF68C48879EBBF1FF84314F108A9DE4999B294DB759988CF42
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041DF85
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041DFAE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E0F2
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E11B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E25F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E284
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj
                          • String ID: G0X%1Y%2$G0Z%1$G38.2Z%1$g
                          • API String ID: 3736559311-1936129248
                          • Opcode ID: a8280523c2097267c77074d507d253faf5f7946648232ec8b0a4941e0b82151a
                          • Instruction ID: bd7ab41d9b1493a69537cdac97de19609bf9902cbd82cf10efade7d7fa85215c
                          • Opcode Fuzzy Hash: a8280523c2097267c77074d507d253faf5f7946648232ec8b0a4941e0b82151a
                          • Instruction Fuzzy Hash: 6AD1FAB09047598FDB10EF68C48879EBBF1FF84314F108A9DE4999B294DB759988CF42
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00441913
                          • _ZNK7QRegExp13matchedLengthEv.QT5CORE ref: 0044191E
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE ref: 0044193A
                          • _ZN7QRegExp3capEi.QT5CORE ref: 0044195C
                          • _ZNK7QString5toIntEPbi.QT5CORE ref: 00441977
                          • __cxa_guard_acquire.LIBSTDC++-6 ref: 004419D1
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004419ED
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 00441A11
                          • __cxa_guard_release.LIBSTDC++-6 ref: 00441A21
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00441A69
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCaretCaseExp13matchedExp3capExp7indexLengthModePatternQt15S_13SensitivityStringString16fromString5toStringiSyntax__cxa_guard_acquire__cxa_guard_release
                          • String ID: [Gg]0*(\d+)
                          • API String ID: 3620934763-3212684299
                          • Opcode ID: 18ce0050932b3f9630aac35ce4fdf772a480f6fc5a6901ed80b5be375c310fa6
                          • Instruction ID: 5cb6a8343735e1e22467ac1fde7e29409483b364391882b1d2f109faba47a66b
                          • Opcode Fuzzy Hash: 18ce0050932b3f9630aac35ce4fdf772a480f6fc5a6901ed80b5be375c310fa6
                          • Instruction Fuzzy Hash: EB415EB0908304DFEB00AFA8D49836EBBF4FF45355F04892EE88597361D7795889CB5A
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00441B03
                          • _ZNK7QRegExp13matchedLengthEv.QT5CORE ref: 00441B0E
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE ref: 00441B2A
                          • _ZN7QRegExp3capEi.QT5CORE ref: 00441B4C
                          • _ZNK7QString5toIntEPbi.QT5CORE ref: 00441B67
                          • __cxa_guard_acquire.LIBSTDC++-6 ref: 00441BC1
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00441BDD
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 00441C01
                          • __cxa_guard_release.LIBSTDC++-6 ref: 00441C11
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00441C59
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCaretCaseExp13matchedExp3capExp7indexLengthModePatternQt15S_13SensitivityStringString16fromString5toStringiSyntax__cxa_guard_acquire__cxa_guard_release
                          • String ID: [Mm]0*(\d+)
                          • API String ID: 3620934763-1030862428
                          • Opcode ID: 8a141d2837ba83b59828fa3d6922560ba7cdd00bffb4a3b13995c5ce41d3a2e9
                          • Instruction ID: 9d0e0b57b8ab20ec263c912e104a34148b3dcb19acc7ee30e5a07bccc5fdc92f
                          • Opcode Fuzzy Hash: 8a141d2837ba83b59828fa3d6922560ba7cdd00bffb4a3b13995c5ce41d3a2e9
                          • Instruction Fuzzy Hash: 284191B0908204CFEB00AFA9D48836EBBF0FF45355F00852EE88597360E77D5889CB5A
                          APIs
                          • _ZNK7QObject6senderEv.QT5CORE ref: 0041C6A4
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Object6sender
                          • String ID:
                          • API String ID: 3167791116-0
                          • Opcode ID: b22610495538c7a694e3eeac21561415b6b1a4b96ae69ec05779d947aa2c3bb9
                          • Instruction ID: b4ea190a510a0c9ab0a68d9fe3b5acab1c2f574d1739b1e37b33d9c48e8b2c7e
                          • Opcode Fuzzy Hash: b22610495538c7a694e3eeac21561415b6b1a4b96ae69ec05779d947aa2c3bb9
                          • Instruction Fuzzy Hash: D102E6B4904309CFCB14EFA9D49469DBBF1BF48324F10866DE869AB391D734A885CF85
                          APIs
                          • memmove.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00474220
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: memmove
                          • String ID:
                          • API String ID: 2162964266-0
                          • Opcode ID: 8c938a59316333d38665806825d56bf055d6c13b26a74419dfe7ccdaf235e8d7
                          • Instruction ID: b60b1ed6de8fa11930b6cc73e465d7f8623dd6a8109ec474bb169d000eed46c5
                          • Opcode Fuzzy Hash: 8c938a59316333d38665806825d56bf055d6c13b26a74419dfe7ccdaf235e8d7
                          • Instruction Fuzzy Hash: AFA13974A04205CFC700DF68C488AAAFBF0FF88310F19C65AE8689B351D738E855CB55
                          APIs
                          • _ZdlPv.LIBSTDC++-6 ref: 004434BC
                          • _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 00443536
                          • _Z5qQNaNv.QT5CORE ref: 004435C8
                          • _Z5qQNaNv.QT5CORE ref: 004435CD
                          • _Z5qQNaNv.QT5CORE ref: 004435D2
                          • _Z5qQNaNv.QT5CORE ref: 004435E3
                          • _Z5qQNaNv.QT5CORE ref: 004435E8
                          • _Z5qQNaNv.QT5CORE ref: 004435ED
                          • _Z5qQNaNv.QT5CORE ref: 004435FE
                          • _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 00443684
                          • _Z9qBadAllocv.QT5CORE ref: 00443699
                          • _Z9qBadAllocv.QT5CORE ref: 004436A4
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AllocationAllocvArrayData8allocateEjjj6FlagsOptionS_16
                          • String ID:
                          • API String ID: 1252432087-0
                          • Opcode ID: c42a68f401f38781b4b6a6163f72067da6efa63dbfca0ad895ae38b7fb9b5b18
                          • Instruction ID: 1c33771c6011b546c1b7e90f335fc3872dab5c7fe767d886f5a9b46c36749625
                          • Opcode Fuzzy Hash: c42a68f401f38781b4b6a6163f72067da6efa63dbfca0ad895ae38b7fb9b5b18
                          • Instruction Fuzzy Hash: BF71AA70A00205DFEB20DF69D88469EFBF0BF48721F14866AD455A7390D738E956CB48
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004322A3
                          • _ZN8QVariantD1Ev.QT5CORE ref: 004322AC
                          • _ZNK7QRegion7isEmptyEv.QT5GUI ref: 004322CF
                          • _ZN7QRegionD1Ev.QT5GUI ref: 004322E0
                          • _ZNK11QListWidget5countEv.QT5WIDGETS ref: 004322EF
                          • _ZNK11QListWidget4itemEi.QT5WIDGETS ref: 00432309
                          • _ZNK8QVariant8toStringEv.QT5CORE ref: 00432330
                          • _Z20qt_qFindChild_helperPK7QObjectRK7QStringRK11QMetaObject6QFlagsIN2Qt15FindChildOptionEE.QT5CORE ref: 00432351
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: FindListString$ArrayChildChild_helperData10deallocateEmptyFlagsMetaObjectObject6OptionQt15RegionRegion7isS_jjVariantVariant8toWidget4itemWidget5countZ20qt_q
                          • String ID:
                          • API String ID: 4143093196-0
                          • Opcode ID: 6c75e9a22955342f3e94eddbcc6d7734da808ae69ad60b4e3018ea05578caeaa
                          • Instruction ID: d4c72b20e1dc15b88b65be57399b172ccee92fe4951f57e0cb5ea09e7b185a51
                          • Opcode Fuzzy Hash: 6c75e9a22955342f3e94eddbcc6d7734da808ae69ad60b4e3018ea05578caeaa
                          • Instruction Fuzzy Hash: AD41FB74904205DFCB04EFB9E99899EBBF0FF48311F404529E85297360EB74A859CF95
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040EE63
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040EFCB
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040EFED
                          • _ZNK7QString7indexOfERK7QRegExpi.QT5CORE ref: 0040F033
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 0040F041
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F067
                            • Part of subcall function 0046FA90: _ZN9QListData6detachEi.QT5CORE(?,?,?,?,?,?,?,?,?,?,0040F012), ref: 0046FAA9
                            • Part of subcall function 0046FA90: _Znwj.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,?,?,0040F012), ref: 0046FAD8
                          • _ZN8QVariantC1Ei.QT5CORE ref: 0040F08D
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCaseData6detachExpiListPatternQt15S_13SensitivityStringString16fromString7indexSyntaxVariantZnwj
                          • String ID: M0*2|M30
                          • API String ID: 1176667680-2299933850
                          • Opcode ID: c37c9be0d37ed544c86d74e447228ab983dfb19aaa7efb554108b24f33195738
                          • Instruction ID: 7eb52420d75068416b5fb032f666f5821a1c76a503bc47a9d8326c1d69bdb0c9
                          • Opcode Fuzzy Hash: c37c9be0d37ed544c86d74e447228ab983dfb19aaa7efb554108b24f33195738
                          • Instruction Fuzzy Hash: F6D134B4904305CFCB04EFA8C49869DBBF1BF84324F14862DE859AB395DB35A889CF45
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040EFCB
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040EFED
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Ascii_helperCasePatternQt15S_13SensitivityStringString16fromSyntax
                          • String ID: M0*2|M30
                          • API String ID: 476007479-2299933850
                          • Opcode ID: f7fc08653b9193f1e30f6e2f72b83b73b3fb5584900f85349a7d6981c1ffc4d6
                          • Instruction ID: c7c8d10cdf5fc8da084dfeeacb9fc0215263201ae82e0b535afe0d2d207f5eb3
                          • Opcode Fuzzy Hash: f7fc08653b9193f1e30f6e2f72b83b73b3fb5584900f85349a7d6981c1ffc4d6
                          • Instruction Fuzzy Hash: 5FC115B4904305CFCB00EFA8C49869DBBF1BF88314F14866DE859AB395D735A985CF45
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00408BA3
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Ascii_helperString16from
                          • String ID: text/plain$text/uri-list
                          • API String ID: 3564552234-3611446695
                          • Opcode ID: e9f6281d3ceac727e3ad5c1b78529ff9dea2290e7c1348f320696abfc408b3bd
                          • Instruction ID: 3de6bd3418ff8ca5d6039f62abb0c42df1adc5d2aae52c868103f9376d6c73ad
                          • Opcode Fuzzy Hash: e9f6281d3ceac727e3ad5c1b78529ff9dea2290e7c1348f320696abfc408b3bd
                          • Instruction Fuzzy Hash: EF818FB4905249CFDF00DF68D184AEEBBF1BF44344F04816AE894AB395DB39A905CF69
                          APIs
                          • _ZN11QFileDialog15getOpenFileNameEP7QWidgetRK7QStringS4_S4_PS2_6QFlagsINS_6OptionEE.QT5WIDGETS ref: 00431DDD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431E24
                          • _ZN7QString14compare_helperEPK5QChariPKciN2Qt15CaseSensitivityE.QT5CORE ref: 00431E52
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431EA4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431EEE
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$File$CaseChariDialog15getFlagsNameOpenOptionQt15S2_6SensitivityStringString14compare_helperWidget
                          • String ID: Heightmap files (*.map)$Open
                          • API String ID: 2231395888-315761322
                          • Opcode ID: 621032d337ee563c34a17aed1e56e386181967143ba4d58d7e24220d6fe703a2
                          • Instruction ID: 51da051272a89f2cd77031f441e1c701b45bfbbb82215b56fc8651948a847bee
                          • Opcode Fuzzy Hash: 621032d337ee563c34a17aed1e56e386181967143ba4d58d7e24220d6fe703a2
                          • Instruction Fuzzy Hash: 86816FB49043019FDB00DF64C48869EBBF1FF88314F14CA2EE8945B3A5D77A9849CB96
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040EE63
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040EF1E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040EF44
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040EFCB
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040EFED
                          • _ZNK7QString7indexOfERK7QRegExpi.QT5CORE ref: 0040F033
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 0040F041
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040F067
                          • _ZN8QVariantC1Ei.QT5CORE ref: 0040F08D
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCaseExpiPatternQt15S_13SensitivityStringString16fromString7indexSyntaxVariant
                          • String ID: M0*2|M30
                          • API String ID: 2648252753-2299933850
                          • Opcode ID: bb207f1e334e5e538626e6c1131b4e0822ea6ef8052fd524db2be5278b348ae5
                          • Instruction ID: 8eaa9e0a807f812863902fbefb1c5e17f5e00b5df883f505dbcf97466a75588c
                          • Opcode Fuzzy Hash: bb207f1e334e5e538626e6c1131b4e0822ea6ef8052fd524db2be5278b348ae5
                          • Instruction Fuzzy Hash: DC9115B4904305CFCB00EFA8C49869DBBF1BF84314F14866DE899AB395DB359889CF45
                          APIs
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0040B727
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 0040B747
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 0040B76D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B796
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040B7D9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B81E
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$Data10deallocateS_jj$AbstractAscii_helperButton9isByteCheckedDevice5writeString16from
                          • String ID: M3 S%1
                          • API String ID: 742399625-2472580429
                          • Opcode ID: 9901d8e5bace58cbb4158f062af8bfc3eebee53be568f1b98c941b20454b0925
                          • Instruction ID: b7e737412d5fd8c77db1d5dfebe1d437e2225d39e899b6b2eb0ac10f70c1739a
                          • Opcode Fuzzy Hash: 9901d8e5bace58cbb4158f062af8bfc3eebee53be568f1b98c941b20454b0925
                          • Instruction Fuzzy Hash: BA5173B5904305CFDB00EF68D4886AEBBF5FF84314F14C529E8546B3A1D7399846CB9A
                          APIs
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00408856
                          • _ZN7QWidget12insertActionEP7QActionS1_.QT5WIDGETS ref: 00408876
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004088AE
                          • _Znwj.LIBSTDC++-6 ref: 004088F7
                          • _ZN7QActionC1ERK7QStringP7QObject.QT5WIDGETS ref: 00408907
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 00408936
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 0040893F
                          • _ZN9QListData6detachEi.QT5CORE ref: 00408979
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Action$ConnectionList$ArrayDataData10deallocateData6detachData7disposeMetaObjectObject10Object7connectQt14S_jjStringTypeWidget12insertZnwj
                          • String ID: 1onActRecentFileTriggered()$2triggered()
                          • API String ID: 525373236-1671216855
                          • Opcode ID: 7dd01c78bd33648fb50403402c96df22ffd6fc1cc322fdc3d100781f87217df1
                          • Instruction ID: 5fa61bacc2620dfa71bc6be41fead7fd26a8570ab96761756e641846da5da591
                          • Opcode Fuzzy Hash: 7dd01c78bd33648fb50403402c96df22ffd6fc1cc322fdc3d100781f87217df1
                          • Instruction Fuzzy Hash: CA512974904206CFCB04EF68D58899EBBF1FF44304F548A6EE895AB3A0DB34A945CF95
                          APIs
                          • _ZN8QVariantC1Eb.QT5CORE ref: 0040CBFB
                          • _ZN7QObject11setPropertyEPKcRK8QVariant.QT5CORE ref: 0040CC18
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040CC23
                          • _ZNK7QWidget5styleEv.QT5WIDGETS ref: 0040CC2B
                          • _ZNK7QWidget14ensurePolishedEv.QT5WIDGETS ref: 0040CC50
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040CCAF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040CCF1
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040CD3D
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$Ascii_helperString16from$ArrayData10deallocateObject11setPolishedPropertyS_jjWidget14ensureWidget5style
                          • String ID: G90$overrided
                          • API String ID: 2325213093-2262859457
                          • Opcode ID: bcb045b22c7c3714ec88e1ee1c86d8e60011721cad3cc0d9656c8c5a5f8f6abf
                          • Instruction ID: 2f46f892ad17bc11762ecb97df29f20df13d2ba800e85aa804fd1e4839898c14
                          • Opcode Fuzzy Hash: bcb045b22c7c3714ec88e1ee1c86d8e60011721cad3cc0d9656c8c5a5f8f6abf
                          • Instruction Fuzzy Hash: 884184B4604344DFDB04AF68D49869DBFF1BF88310F04467EE8856B392CB389845CB5A
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00404310
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040432E
                          • _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 00404360
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404387
                          • _ZN7QStringaSERKS_.QT5CORE ref: 00404396
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043BB
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 004043C3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043E5
                          Strings
                          • GC:|\[|\]|G[01234]\s|M[0345]+\s|\sF[\d\.]+|\sS[\d\.]+, xrefs: 00404309
                          • 5, xrefs: 00404301
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCasePatternQt15S_13SensitivityStringString16fromString7replaceStringaSyntax
                          • String ID: 5$GC:|\[|\]|G[01234]\s|M[0345]+\s|\sF[\d\.]+|\sS[\d\.]+
                          • API String ID: 71511268-2282411076
                          • Opcode ID: 001b490d57d8eee2a23122098b91cddaa3521b9e5c26d23ccb524bbb3ab7638a
                          • Instruction ID: 9cf056819eb4cb7091d215956440725f8b209d8b5eac5f001702747cde867f27
                          • Opcode Fuzzy Hash: 001b490d57d8eee2a23122098b91cddaa3521b9e5c26d23ccb524bbb3ab7638a
                          • Instruction Fuzzy Hash: 12417FB4904305CFCB04DF68D4886AEBBF0FF84315F14862DE955A7390D7399889CB96
                          APIs
                          • _ZN11QSerialPort4openE6QFlagsIN9QIODevice12OpenModeFlagEE.QT5SERIALPORT ref: 00413257
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00413294
                          • _ZN9QLineEdit7setTextERK7QString.QT5WIDGETS ref: 004132A9
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004132DA
                          • _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS ref: 004132EF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00413314
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: String$ArrayAscii_helperData10deallocateDevice12Edit7setFlagFlagsLineMetaModeObject2trOpenPort4openS1_iS_jjSerialSheetString16fromStyleTextWidget13set
                          • String ID: 8$Port opened$background-color: palette(button); color: palette(text);
                          • API String ID: 3941000538-1369377024
                          • Opcode ID: 3d9502d0b8feaf01bc75158eb357b2c2492b95e7dae158baf481a01e8e963ada
                          • Instruction ID: b0a3fbfd7e97e4ddc00f311016c78ecd7f53c984e871f43d21b14fe9aa82baa5
                          • Opcode Fuzzy Hash: 3d9502d0b8feaf01bc75158eb357b2c2492b95e7dae158baf481a01e8e963ada
                          • Instruction Fuzzy Hash: 923172745043009FDB00AF68D49869EBBB0FF44316F14C65DE89957350DB395A89CB8A
                          APIs
                          • _ZNK24QOpenGLVertexArrayObject9isCreatedEv.QT5GUI(?,?,?,?,00000002,000B2B30,0000031A,00413097), ref: 0043BD33
                          • _ZNK13QOpenGLBuffer9isCreatedEv.QT5GUI(?,?,?,?,00000002,000B2B30,0000031A,00413097), ref: 0043BD46
                          • _ZN13QOpenGLBuffer7destroyEv.QT5GUI(?,?,?,?,00000002,000B2B30,0000031A,00413097), ref: 0043BD52
                          • _ZN24QOpenGLVertexArrayObjectD1Ev.QT5GUI(?,?,?,?,00000002,000B2B30,0000031A,00413097), ref: 0043BD5A
                          • _ZN13QOpenGLBufferD1Ev.QT5GUI(?,?,?,?,00000002,000B2B30,0000031A,00413097), ref: 0043BD62
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043BD84
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043BDA6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043BDC8
                          • _ZN24QOpenGLVertexArrayObject7destroyEv.QT5GUI(?,?,?,?,00000002,000B2B30,0000031A,00413097), ref: 0043BE22
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayOpen$Data10deallocateS_jjVertex$Created$BufferBuffer7destroyBuffer9isObjectObject7destroyObject9is
                          • String ID: $
                          • API String ID: 4109716583-3993045852
                          • Opcode ID: 2246c9bc0a75725e75c01389b112c6a1d7594007e522e659f053842f77fe8464
                          • Instruction ID: e1803f1c871a75ef041a10f5d26a1d81f6250e6c0b22701bb23ede2fb74d974c
                          • Opcode Fuzzy Hash: 2246c9bc0a75725e75c01389b112c6a1d7594007e522e659f053842f77fe8464
                          • Instruction Fuzzy Hash: EF2191B4204200DFDB149F28D4D836E3BB2FF89315F249659EA454B3A5D73A8C46CB8A
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00404310
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040432E
                          • _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 00404360
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404387
                          • _ZN7QStringaSERKS_.QT5CORE ref: 00404396
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043BB
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 004043C3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043E5
                          Strings
                          • GC:|\[|\]|G[01234]\s|M[0345]+\s|\sF[\d\.]+|\sS[\d\.]+, xrefs: 00404309
                          • 5, xrefs: 00404301
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCasePatternQt15S_13SensitivityStringString16fromString7replaceStringaSyntax
                          • String ID: 5$GC:|\[|\]|G[01234]\s|M[0345]+\s|\sF[\d\.]+|\sS[\d\.]+
                          • API String ID: 71511268-2282411076
                          • Opcode ID: 014098d524fedfda44c721df5ca7c8c349533fe77224adad851f8a2081e12bd3
                          • Instruction ID: f6610380caaa330af5ace4cf575d093f85fefb1b5953f752f65e2cc23d69f4f4
                          • Opcode Fuzzy Hash: 014098d524fedfda44c721df5ca7c8c349533fe77224adad851f8a2081e12bd3
                          • Instruction Fuzzy Hash: 4F3129B4904305CFDB04EFA8D59869EBBF0FB88315F10852DE985A7360D7789849CF96
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043EAF0
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043EB71
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043EB97
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043EC14
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043EC3A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043ECA8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043ECCE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043ED76
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043ED9C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj
                          • String ID:
                          • API String ID: 3736559311-0
                          • Opcode ID: 8aa7c93e151f8acbf7b8ce599ba6c13d0763a3a53fa972d10b527ec396ad5026
                          • Instruction ID: 588bf13632576bce406b4551c413669ff2781b36dfe1e487f17f20e3971d3ad7
                          • Opcode Fuzzy Hash: 8aa7c93e151f8acbf7b8ce599ba6c13d0763a3a53fa972d10b527ec396ad5026
                          • Instruction Fuzzy Hash: D0E168B4905205CFCB04DF6AC48469EBBF2FF88314F14961AE455AB3A4D73A9C46CF46
                          APIs
                          • _ZNK9QMimeData4urlsEv.QT5CORE ref: 00431107
                          • _ZNK4QUrl11toLocalFileEv.QT5CORE ref: 00431120
                            • Part of subcall function 00470080: _ZN4QUrlD1Ev.QT5CORE(?,?,?,00000000,?,?,00408DEB), ref: 004700B5
                            • Part of subcall function 00470080: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,00000000,?,?,00408DEB), ref: 004700BE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431173
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431245
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004312CE
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00431356
                          • _ZNK9QMimeData4textEv.QT5CORE ref: 0043136A
                          • _ZNK7QString5splitERKS_NS_13SplitBehaviorEN2Qt15CaseSensitivityE.QT5CORE ref: 00431390
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004313E7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431433
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Mime$Ascii_helperBehaviorCaseDataData4textData4urlsData7disposeFileListLocalQt15S_13SensitivitySplitString16fromString5splitUrl11to
                          • String ID:
                          • API String ID: 2497575-0
                          • Opcode ID: d81ffb7fbdc6c94b08daf704f81db7b9da781d12d2ad6c9dbef7ebe7c1ffcb4f
                          • Instruction ID: 3a34350f90a8dcd87afc7c4c3f3eba6441c182ebeee452a9ff7e6fd9ea45e929
                          • Opcode Fuzzy Hash: d81ffb7fbdc6c94b08daf704f81db7b9da781d12d2ad6c9dbef7ebe7c1ffcb4f
                          • Instruction Fuzzy Hash: 5BA17E74A042058FDB00DF68C4846AFB7F1FF88354F14862AD855AB364D73AAC49CF96
                          APIs
                          • _ZN9QListData6detachEi.QT5CORE ref: 00406F3B
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00406F7A
                          • _ZN7QWidget17setUpdatesEnabledEb.QT5WIDGETS(?), ref: 00406FB8
                          • _ZN9QListData6detachEi.QT5CORE ref: 00406FF6
                          • __cxa_guard_release.LIBSTDC++-6 ref: 004071F3
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 004072BB
                          • memcpy.MSVCRT ref: 004072DB
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData6detachData7dispose$EnabledUpdatesWidget17set__cxa_guard_releasememcpy
                          • String ID:
                          • API String ID: 4149923590-0
                          • Opcode ID: 029eca73420a5b9c263d2b0ca7ac1c71faf0daa3db69aac523b39bdf9b1689d9
                          • Instruction ID: 58acd42e498843f585bae483fcca50c253b52e53e95e72c7e68800ecc1c69975
                          • Opcode Fuzzy Hash: 029eca73420a5b9c263d2b0ca7ac1c71faf0daa3db69aac523b39bdf9b1689d9
                          • Instruction Fuzzy Hash: 20817174A042058FCB14EF78D48496EB7F1FF48300B1985BAE8469B3A1D738EC56CB56
                          APIs
                          • _Z5qQNaNv.QT5CORE ref: 00440185
                          • _Z5qQNaNv.QT5CORE ref: 0044018A
                          • _Z5qQNaNv.QT5CORE ref: 0044018F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044020F
                          • _ZN5QChar7toUpperEj.QT5CORE ref: 00440247
                          • _ZNK7QString3midEii.QT5CORE ref: 00440274
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 00440287
                          • _ZNK7QString3midEii.QT5CORE ref: 004402D9
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 004402EC
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: DoubleString3midString8to$ArrayChar7toData10deallocateS_jjUpper
                          • String ID:
                          • API String ID: 150059324-0
                          • Opcode ID: d3e1e71a57f3a88de4a688042279fb41cef5c4914a2271f8ccdc0e9034825958
                          • Instruction ID: 24a90a7d0bd65688897c5e349930d4e3abefbf28020335ad5b0b8acd182a38de
                          • Opcode Fuzzy Hash: d3e1e71a57f3a88de4a688042279fb41cef5c4914a2271f8ccdc0e9034825958
                          • Instruction Fuzzy Hash: 8351617490470ACFDB10EFA8D4886AEBBF0FF48310F04C669E89497390D779A856CB59
                          APIs
                          • _ZNK9QComboBox5countEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447B9B
                          • _ZNK9QComboBox8maxCountEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447BAB
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00447BD1
                          • _ZN5QIconC1Ev.QT5GUI ref: 00447BE2
                          • _ZN9QComboBox10insertItemEiRK5QIconRK7QStringRK8QVariant.QT5WIDGETS ref: 00447C00
                          • _ZN5QIconD1Ev.QT5GUI ref: 00447C0B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00447C2D
                          • _ZN8QVariantD1Ev.QT5CORE ref: 00447C35
                          • _ZN9QComboBox15setCurrentIndexEi.QT5WIDGETS ref: 00447C44
                          • _ZNK9QComboBox8maxCountEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447C72
                          • _ZN9QComboBox10removeItemEi.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447C7C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$Icon$Box8maxCountItemVariant$ArrayBox10insertBox10removeBox11currentBox15setBox5countCurrentData10deallocateIndexS_jjStringText
                          • String ID:
                          • API String ID: 3112665431-0
                          • Opcode ID: 1aa4d3e6a93e21d1751c15f510eda9f1e4b496c15efd3b7d74cd02a7104445a5
                          • Instruction ID: 5ff047029bcfa56a5ebe7e3f35c5478d94b8745ba8d722b9b9c56a03a00cd6c5
                          • Opcode Fuzzy Hash: 1aa4d3e6a93e21d1751c15f510eda9f1e4b496c15efd3b7d74cd02a7104445a5
                          • Instruction Fuzzy Hash: 8F21A370A042059FDB00AF78D89869DBFB5FF88320F40463DE455D73A0DB34584ACB96
                          APIs
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0043D92A
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0043D946
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 0043D952
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043D97B
                          • _Zls6QDebugRK9QVector3D.QT5GUI ref: 0043D9A8
                          • _Znwj.LIBSTDC++-6 ref: 0043DA88
                            • Part of subcall function 004447E0: _ZdlPv.LIBSTDC++-6(?,?,?,?,?,0043DA24), ref: 004447F6
                            • Part of subcall function 004447E0: _ZdlPv.LIBSTDC++-6(?,?,?,?,?,0043DA24), ref: 00444804
                            • Part of subcall function 004447E0: _ZdlPv.LIBSTDC++-6(?,?,?,?,?,0043DA24), ref: 00444813
                          • _ZdlPv.LIBSTDC++-6 ref: 0043DA27
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0043DAE7
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: StreamlsText$ArrayData10deallocateDebugLogger5debugMessageS_jjStringString15fromUtf8_helperVector3Zls6Znwj
                          • String ID: reseting gp
                          • API String ID: 844818140-1593418405
                          • Opcode ID: c8a60f17b0f3595e4db52c949bf522a7d8ccd381e7023d0498c9fc1b6bbed751
                          • Instruction ID: bd6d47ad7e49220985c931e81617bf1db8818b7649920047b4976c8c647b70ad
                          • Opcode Fuzzy Hash: c8a60f17b0f3595e4db52c949bf522a7d8ccd381e7023d0498c9fc1b6bbed751
                          • Instruction Fuzzy Hash: 6F514AB0D042049FDB04EFA9E49869EBBF1FF88314F10852EE855AB351DB789945CF89
                          APIs
                          • _ZNK9QIODevice6isOpenEv.QT5CORE ref: 00413391
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 004133B9
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00413402
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00413448
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0041349A
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 004134D3
                            • Part of subcall function 004099C0: _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00413515
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00413537
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperDevice6isOpenString16from$AbstractButton9isCharCheckedExii5String3arg
                          • String ID: S%1
                          • API String ID: 3919080040-680958246
                          • Opcode ID: c4a5d1783c7cfad485dbf9eb0105547554ffaba08c06358817881cc6a26c7406
                          • Instruction ID: f0d6d6e874dc196768052f282e6d7341f775ab995fc4466a57d34528ae7bf80a
                          • Opcode Fuzzy Hash: c4a5d1783c7cfad485dbf9eb0105547554ffaba08c06358817881cc6a26c7406
                          • Instruction Fuzzy Hash: B9517CB0904304DFDB009F68C48839EBBF1FF84715F14856EE8989B391D7398989CB5A
                          APIs
                          • _ZN6QColoraSERKS_.QT5GUI(?,?,?,?,?,?,?,?,?,?,00434AC8), ref: 004478B7
                          • _ZNK6QColor4nameEv.QT5GUI(?,?,?,?,?,?,?,?,?,?,?,00434AC8), ref: 004478C5
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004478DD
                          • _ZNK7QString3argERKS_i5QChar.QT5CORE ref: 00447907
                          • _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00447916
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044793B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044795D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044797F
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCharColor4nameColoraS_i5SheetStringString16fromString3argStyleWidget13set
                          • String ID: background-color: %1
                          • API String ID: 1303405689-1427882026
                          • Opcode ID: 4c09f7f9417e4fc6fd1f7d34ea7dff804cf1a4ee785b641e4f11d97735988907
                          • Instruction ID: b723bbc1883a3668c1835882d141e65680d49ce0a5cbce1a25cf7872270eeada
                          • Opcode Fuzzy Hash: 4c09f7f9417e4fc6fd1f7d34ea7dff804cf1a4ee785b641e4f11d97735988907
                          • Instruction Fuzzy Hash: BC314CF49082059FEB00EF68D58869EBBF1FF84314F148629E49557360D73A984ACB9A
                          APIs
                          • _ZNK19QAbstractScrollArea17verticalScrollBarEv.QT5WIDGETS ref: 0044838B
                          • _ZNK11QScrollArea6widgetEv.QT5WIDGETS ref: 0044839E
                          • _ZNK15QAbstractSlider5valueEv.QT5WIDGETS(?), ref: 004483BC
                          • _ZNK15QAbstractSlider7minimumEv.QT5WIDGETS ref: 004483C6
                          • _ZNK15QAbstractSlider7maximumEv.QT5WIDGETS ref: 0044841F
                          • _ZNK7QWidget5styleEv.QT5WIDGETS ref: 0044845B
                          • _ZNK7QWidget14ensurePolishedEv.QT5WIDGETS ref: 00448470
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Abstract$Scroll$Area17verticalArea6widgetPolishedSlider5valueSlider7maximumSlider7minimumWidget14ensureWidget5style
                          • String ID: bottomBorder$topBorder
                          • API String ID: 3800568410-2561627314
                          • Opcode ID: c94ead6259037564fcadf905c4e7440ab7c2cae526387c5708677efc46c12ada
                          • Instruction ID: 7ca2b8511fbc7c1de6e2b85aebfd17a5c9e8164666e2417e04beeab513cfedce
                          • Opcode Fuzzy Hash: c94ead6259037564fcadf905c4e7440ab7c2cae526387c5708677efc46c12ada
                          • Instruction Fuzzy Hash: CD312D75E102149FCF04AFB8E9984ADBFF6BF88201B41467AE846E7361DF349805CB95
                          APIs
                          • __cxa_guard_acquire.LIBSTDC++-6 ref: 0043F99B
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE ref: 0043F9BF
                          • _ZN7QRegExp3capEi.QT5CORE ref: 0043F9DE
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0043F9FF
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0043FA1F
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0043FA43
                          • __cxa_guard_release.LIBSTDC++-6 ref: 0043FA53
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043FA80
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Ascii_helperString16from$ArrayCaretCaseData10deallocateExp3capExp7indexModePatternQt15S_13S_jjSensitivityStringStringiSyntax__cxa_guard_acquire__cxa_guard_release
                          • String ID: (\([^\(\)]*\)|;[^;].*)
                          • API String ID: 452882500-2829701144
                          • Opcode ID: 912bd5253cc809522914855609eeeed044e8b1a180db266b9ee066470c53bf77
                          • Instruction ID: 9aacb250a1338dc51fad174a6383950b29f6d4752d40e0def53f1b644beaf426
                          • Opcode Fuzzy Hash: 912bd5253cc809522914855609eeeed044e8b1a180db266b9ee066470c53bf77
                          • Instruction Fuzzy Hash: 423130B0908204DFDB00AFA8D55835EBBF0FF45354F10853EE9945B361D779588C9B8A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc$LibraryLoad
                          • String ID: _Jv_RegisterClasses$__register_frame_info$libgcc_s_dw2-1.dll$libgcj-13.dll
                          • API String ID: 652391981-159345992
                          • Opcode ID: f490e806488dc32bf68dad0bd87db4bf7c34b1d2c78bb5c316a49847c911b63c
                          • Instruction ID: 7451f4b0056bea047177fbb33e8633eb8e190bd6e673369b85e2d7479d2812e4
                          • Opcode Fuzzy Hash: f490e806488dc32bf68dad0bd87db4bf7c34b1d2c78bb5c316a49847c911b63c
                          • Instruction Fuzzy Hash: DA0152709092405BCB10BFB99A0929A7EE4EB85345F44853AD8898B355D7B8D808CB9B
                          APIs
                          • _ZN9QComboBox5clearEv.QT5WIDGETS ref: 0044E6FF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044E7D2
                          • _ZNK9QComboBox5countEv.QT5WIDGETS ref: 0044E819
                          • _ZN9QComboBox15insertSeparatorEi.QT5WIDGETS ref: 0044E824
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$ArrayBox15insertBox5clearBox5countData10deallocateS_jjSeparator
                          • String ID:
                          • API String ID: 2339799715-0
                          • Opcode ID: 5d7b2efd948519bacd7153162d6b0b1399501f0c239ac3337c7ee8806451c7f5
                          • Instruction ID: b9fed84ca4d5f40f7a4e5c210dcd62b62b1af36e7fe6906f9f159d27e48f0b73
                          • Opcode Fuzzy Hash: 5d7b2efd948519bacd7153162d6b0b1399501f0c239ac3337c7ee8806451c7f5
                          • Instruction Fuzzy Hash: 1851AF74E00209CFEF10DF69D8986AEBBB1FF44324F14852AE445A7390D7389846CF56
                          APIs
                          • _ZN5QTimeC1Eiiii.QT5CORE ref: 004218DE
                          • _ZN5QTime5startEv.QT5CORE ref: 00421901
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0042192B
                          • _ZN15QAbstractButton10setCheckedEb.QT5WIDGETS ref: 00421943
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 00421955
                            • Part of subcall function 004042F0: _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00404310
                            • Part of subcall function 004042F0: _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040432E
                            • Part of subcall function 004042F0: _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 00404360
                            • Part of subcall function 004042F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404387
                            • Part of subcall function 004042F0: _ZN7QStringaSERKS_.QT5CORE ref: 00404396
                            • Part of subcall function 004042F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043BB
                            • Part of subcall function 004042F0: _ZN7QRegExpD1Ev.QT5CORE ref: 004043C3
                            • Part of subcall function 004042F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043E5
                          • _ZN8QSysInfo14windowsVersionEv.QT5CORE ref: 0042195E
                          • _ZN19QWinTaskbarProgress10setMaximumEi.QT5WINEXTRAS ref: 004219B9
                          • _ZN19QWinTaskbarProgress8setValueEi.QT5WINEXTRAS ref: 004219D1
                          • _ZN19QWinTaskbarProgress4showEv.QT5WINEXTRAS ref: 004219E0
                          • _ZN7QWidget8setFocusEN2Qt11FocusReasonE.QT5WIDGETS ref: 00421A07
                          • _ZNK8QVariant5toIntEPb.QT5CORE ref: 00421B27
                          • _ZN8QVariantD1Ev.QT5CORE ref: 00421B34
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractArrayCheckedData10deallocateS_jjTaskbar$Button9isFocus$Ascii_helperButton10setCaseEiiiiInfo14windowsMaximumPatternProgress10setProgress4showProgress8setQt11Qt15ReasonS_13SensitivityStringString16fromString7replaceStringaSyntaxTimeTime5startValueVariantVariant5toVersionWidget8set
                          • String ID:
                          • API String ID: 1029089598-0
                          • Opcode ID: e19cc23d735511c4a1bae26fc3783d239162c15197ff64a149092c4d6b501aaa
                          • Instruction ID: 8f071cd23ff3398d8b370ff582f46e13014b775c1b0ca0e65c816f330228b09a
                          • Opcode Fuzzy Hash: e19cc23d735511c4a1bae26fc3783d239162c15197ff64a149092c4d6b501aaa
                          • Instruction Fuzzy Hash: DE411BB4A006448FD710EF78D598BAEBBF0BF48300F4045ADD89A97391CB34A948CF56
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040659F
                            • Part of subcall function 00470650: _ZN9QListData11detach_growEPii.QT5CORE ref: 00470686
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004065DA
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004065EF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00406625
                          • _ZNK7QString7indexOfERKS_iN2Qt15CaseSensitivityE.QT5CORE ref: 00406699
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayAscii_helperData10deallocateS_jjString16from$CaseData11detach_growListQt15SensitivityString7index
                          • String ID: error
                          • API String ID: 1614496162-1574812785
                          • Opcode ID: 20e4447b56991a221a4392821b934997a9babed3281794c3ccddd09652539bf8
                          • Instruction ID: f15bcf3b317e55e302584573a0f907492b637f2fdb6c5674c3a30f7b122d2cb1
                          • Opcode Fuzzy Hash: 20e4447b56991a221a4392821b934997a9babed3281794c3ccddd09652539bf8
                          • Instruction Fuzzy Hash: 90616CB4904205CFCB04DFA8D48469EBBF1FF88328F15852AD455AB390D73AA855CF95
                          APIs
                          • _hypot.MSVCRT ref: 00440AB4
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 00440B5C
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00440B7B
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 00440B8A
                          • _ZN6QDebugD1Ev.QT5CORE ref: 00440BB8
                          Strings
                          • Error computing arc radius., xrefs: 00440B70
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: DebugLogger5debugMessageStreamlsStringString15fromTextUtf8_helper_hypot
                          • String ID: Error computing arc radius.
                          • API String ID: 1318116894-1659689772
                          • Opcode ID: c41e0a96dfedc5b7067e4a62bf0a9822a040926664848def706b97823bf43900
                          • Instruction ID: 0415b71bfcc9d64af3acea9c60136e5d5552016bb47fa8cb74efe338e86cfbdb
                          • Opcode Fuzzy Hash: c41e0a96dfedc5b7067e4a62bf0a9822a040926664848def706b97823bf43900
                          • Instruction Fuzzy Hash: 1D51BDB1E00209DBDB01BF90E5886CDBFB0FF44394F21489AE48576269EB365969CFC5
                          APIs
                          • _ZN9QGLWidgetC2EP7QWidgetPKS_6QFlagsIN2Qt10WindowTypeEE.QT5OPENGL ref: 0044B2E0
                          • _ZN16QOpenGLFunctionsC2Ev.QT5GUI ref: 0044B2EC
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 0044B4D1
                          • _ZN6QColor10invalidateEv.QT5GUI ref: 0044B4D9
                            • Part of subcall function 0044A400: _ZN10QMatrix4x47frustumEffffff.QT5GUI ref: 0044A4E9
                          • _ZN5QTime6setHMSEiiii.QT5CORE ref: 0044B597
                          • _ZN5QTime6setHMSEiiii.QT5CORE ref: 0044B5C1
                          • _ZN6QTimer10singleShotEiPK7QObjectPKc.QT5CORE ref: 0044B5EA
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Color10invalidateEiiiiTime6setWidget$EffffffFlagsFunctionsMatrix4x47frustumObjectOpenQt10ShotTimer10singleTypeWindow
                          • String ID: <
                          • API String ID: 1630362984-4251816714
                          • Opcode ID: ecbf2d95b65fc75c5588b22f4fca58abec36c3e4f45eee9ff0f80e9cd37ddf6f
                          • Instruction ID: 9ba56759ec3404f0b5883c4cfd422cd6e4e3b508a7009ee5c13162aa5f96e44d
                          • Opcode Fuzzy Hash: ecbf2d95b65fc75c5588b22f4fca58abec36c3e4f45eee9ff0f80e9cd37ddf6f
                          • Instruction Fuzzy Hash: A6718BB0005601DBEB41AF15D5E83C67BA4FF49308F5885B8DC8C4E29ADBBA4458DFA6
                          APIs
                          • _ZNK9QIODevice6isOpenEv.QT5CORE ref: 0042F809
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0042F892
                          • _ZNK7QWidget11windowTitleEv.QT5WIDGETS ref: 0042F8A1
                          • _ZN11QMessageBox7warningEP7QWidgetRK7QStringS4_6QFlagsINS_14StandardButtonEES6_.QT5WIDGETS ref: 0042F8CB
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042F8F0
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042F912
                          • _ZN11QSerialPort5closeEv.QT5SERIALPORT ref: 0042F972
                          Strings
                          • File sending in progress. Terminate and exit?, xrefs: 0042F883
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Box7warningButtonDevice6isFlagsMessageMetaObject2trOpenPort5closeS1_iS4_6S_14SerialStandardStringTitleWidgetWidget11window
                          • String ID: File sending in progress. Terminate and exit?
                          • API String ID: 66700925-2885346009
                          • Opcode ID: a1e1e9e5d7dbf50c25c986f27a6eac0e8779bee05e3c25efc99424a437acd32e
                          • Instruction ID: 5592936268a11ce998f5b9a4aa3c64a185a1a66b4ec1118ef3d746659cc8b1d3
                          • Opcode Fuzzy Hash: a1e1e9e5d7dbf50c25c986f27a6eac0e8779bee05e3c25efc99424a437acd32e
                          • Instruction Fuzzy Hash: FA41A0B0A043568BCB00DF69E4947AEBBB0BF44314F84867AE8945B352D738954ACF99
                          APIs
                          • _ZN7QWidget7repaintEv.QT5WIDGETS ref: 0040367F
                          • _ZNK15QAbstractButton4textEv.QT5WIDGETS ref: 00403737
                          • _ZeqRK7QStringS1_.QT5CORE ref: 0040374A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00403793
                          • _ZN15QAbstractButton7setTextERK7QString.QT5WIDGETS ref: 004037D6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004037FF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00403B93
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$AbstractString$Button4textButton7setTextWidget7repaint
                          • String ID: Check$Check mode
                          • API String ID: 2919470273-392678444
                          • Opcode ID: d888ee96853d614f743af21df81dcfe82b28b693ff8ae58958c754f782b92e7e
                          • Instruction ID: 318ab171dd750fe0bbc30aafb3506d0c90fa6e4c955d5963c7a4131742660886
                          • Opcode Fuzzy Hash: d888ee96853d614f743af21df81dcfe82b28b693ff8ae58958c754f782b92e7e
                          • Instruction Fuzzy Hash: D03148B4A043058FDB00EF68C48869EBBF1FF84354F14CA2DE895973A1DB79A845CB46
                          APIs
                          • _ZN7QWidgetC2EPS_6QFlagsIN2Qt10WindowTypeEE.QT5WIDGETS ref: 0044DB19
                          • _Znwj.LIBSTDC++-6 ref: 0044DB36
                          • _ZN6QTimerC1EP7QObject.QT5CORE ref: 0044DB4A
                            • Part of subcall function 00461F50: _ZNK7QObject10objectNameEv.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00461F66
                            • Part of subcall function 00461F50: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00461F95
                            • Part of subcall function 00461F50: _ZN7QObject13setObjectNameERK7QString.QT5CORE ref: 00461FAE
                            • Part of subcall function 00461F50: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00461FD7
                            • Part of subcall function 00461F50: _ZN7QWidget6resizeERK5QSize.QT5WIDGETS ref: 00461FF0
                            • Part of subcall function 00461F50: _Znwj.LIBSTDC++-6 ref: 00462000
                            • Part of subcall function 00461F50: _ZN11QVBoxLayoutC1EP7QWidget.QT5WIDGETS ref: 0046200D
                            • Part of subcall function 00461F50: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00462054
                            • Part of subcall function 00461F50: _ZN7QLayout18setContentsMarginsEiiii.QT5WIDGETS ref: 0046207B
                            • Part of subcall function 00461F50: _Znwj.LIBSTDC++-6 ref: 0046208B
                            • Part of subcall function 00461F50: _ZN11QHBoxLayoutC1Ev.QT5WIDGETS ref: 00462095
                            • Part of subcall function 00461F50: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004620D3
                            • Part of subcall function 00461F50: _Znwj.LIBSTDC++-6 ref: 004620E0
                            • Part of subcall function 0044DAB0: _ZN8QSpinBox10setMinimumEi.QT5WIDGETS(00000002,000B2260,?,0042B208), ref: 0044DAC9
                            • Part of subcall function 0044D9A0: _ZN8QSpinBox10setMaximumEi.QT5WIDGETS(00000002,000B2260,?,0042B220), ref: 0044D9B9
                            • Part of subcall function 0044D630: _ZN8QSpinBox8setValueEi.QT5WIDGETS(?,?,?,00409BC3), ref: 0044D646
                            • Part of subcall function 0044D680: _ZNK8QSpinBox5valueEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6AD
                            • Part of subcall function 0044D680: _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6C1
                            • Part of subcall function 0044D680: _ZN7QString16fromAscii_helperEPKci.QT5CORE(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6E7
                            • Part of subcall function 0044D680: _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6FC
                            • Part of subcall function 0044D680: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044D721
                          • _ZN7QObject7connectEPKS_PKcS1_S3_N2Qt14ConnectionTypeE.QT5CORE ref: 0044DBF8
                          • _ZN11QMetaObject10ConnectionD1Ev.QT5CORE ref: 0044DC00
                          • _ZN6QTimer11setIntervalEi.QT5CORE ref: 0044DC0F
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$SpinZnwj$Box10setConnectionLayoutNameObjectStringTypeWidget$AbstractAscii_helperBox5valueBox8setButton9isCheckedContentsEiiiiFlagsIntervalLayout18setMarginsMaximumMetaMinimumObject10Object10objectObject13setObject7connectQt10Qt14SheetSizeString16fromStyleTimerTimer11setValueWidget13setWidget6resizeWindow
                          • String ID: 1onTimerValueChanged()$2timeout()
                          • API String ID: 147573032-1740788808
                          • Opcode ID: 70b17e52ab2467749ba3e5fd556af34eb83be56b439b0c605fb1770e6ff02d66
                          • Instruction ID: f9036ebaad5f89eee1dd01aa2f37062e98fd3060bde56a94761b7f12f08e328a
                          • Opcode Fuzzy Hash: 70b17e52ab2467749ba3e5fd556af34eb83be56b439b0c605fb1770e6ff02d66
                          • Instruction Fuzzy Hash: B831E9F16082008FDB04BF69D19926EBBF0BB44304F41493DE88A9B355DB789498CB97
                          APIs
                          • _ZN7QString14toUpper_helperERKS_.QT5CORE ref: 00404A56
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00404A6B
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 00404A8D
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE ref: 00404AAC
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 00404ABE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404AE0
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404B02
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCaretCaseExp7indexModePatternQt15S_13SensitivityStringString14toString16fromStringiSyntaxUpper_helper
                          • String ID: ^GRBL|GCARVIN\s\d\.\d.
                          • API String ID: 1535780433-1806128931
                          • Opcode ID: e75c70acc9cbd50f4021f804f1010b95535627d1d44c2f3fbdfbe6fbae1d6160
                          • Instruction ID: 082118d0f57a72f17e6ac0ae851475bb2ccda77e5dac9715c1a97fc64cc2e04a
                          • Opcode Fuzzy Hash: e75c70acc9cbd50f4021f804f1010b95535627d1d44c2f3fbdfbe6fbae1d6160
                          • Instruction Fuzzy Hash: 41317AB05083059FDB00EF68D89839EBBF0FF84354F50862DE995A7290D7399989CF5A
                          APIs
                          • _ZNK11QListWidget4itemEi.QT5WIDGETS ref: 0043219D
                          • _ZNK8QVariant8toStringEv.QT5CORE ref: 004321C0
                          • _Z20qt_qFindChild_helperPK7QObjectRK7QStringRK11QMetaObject6QFlagsIN2Qt15FindChildOptionEE.QT5CORE ref: 004321E1
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00432205
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0043220D
                          • _ZN11QScrollArea19ensureWidgetVisibleEP7QWidgetii.QT5WIDGETS ref: 00432230
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: FindString$Area19ensureArrayChildChild_helperData10deallocateFlagsListMetaObjectObject6OptionQt15S_jjScrollVariantVariant8toVisibleWidgetWidget4itemWidgetiiZ20qt_q
                          • String ID: 2$2
                          • API String ID: 1410313547-3784399050
                          • Opcode ID: ae001745c5135db7a4c0bb5548846625fb824ecec396aa62e9d2d52aa13c186c
                          • Instruction ID: a763655aa02bc6b877a647317c2b5b0098a9fdae0178b46fade03bf20eac95cc
                          • Opcode Fuzzy Hash: ae001745c5135db7a4c0bb5548846625fb824ecec396aa62e9d2d52aa13c186c
                          • Instruction Fuzzy Hash: 552139B49043009FC704AF69D98869EBBF0FF88314F50862EE89597361DB749889CB96
                          APIs
                          • _ZN7QString14toUpper_helperERKS_.QT5CORE ref: 00404A56
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00404A6B
                          • _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 00404A8D
                          • _ZNK7QRegExp7indexInERK7QStringiNS_9CaretModeE.QT5CORE ref: 00404AAC
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 00404ABE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404AE0
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404B02
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperCaretCaseExp7indexModePatternQt15S_13SensitivityStringString14toString16fromStringiSyntaxUpper_helper
                          • String ID: ^GRBL|GCARVIN\s\d\.\d.
                          • API String ID: 1535780433-1806128931
                          • Opcode ID: f8516c89f547e1133012a3df1c50d3d48df5037488685506333b494775e8f003
                          • Instruction ID: 9de5701cb0778ff0403898ed2e81524304a1c0eece32fda549ccc6968fe347b6
                          • Opcode Fuzzy Hash: f8516c89f547e1133012a3df1c50d3d48df5037488685506333b494775e8f003
                          • Instruction Fuzzy Hash: 052135B08043059FDB00EF68D99879EBBF0FF88344F50892DE985A3250D7799848CF96
                          APIs
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00413294
                          • _ZN9QLineEdit7setTextERK7QString.QT5WIDGETS ref: 004132A9
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 004132DA
                          • _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS ref: 004132EF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00413314
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00413343
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jjString$Ascii_helperEdit7setLineMetaObject2trS1_iSheetString16fromStyleTextWidget13set
                          • String ID: 8$Port opened$background-color: palette(button); color: palette(text);
                          • API String ID: 3676935821-1369377024
                          • Opcode ID: 651d9c2b5e5281dadcddde806dad505c89d9d407284d17436487676b46000734
                          • Instruction ID: 7e2522119fe41f8b504bd47d51584863069357899eade76bf8cc56aa62bb114b
                          • Opcode Fuzzy Hash: 651d9c2b5e5281dadcddde806dad505c89d9d407284d17436487676b46000734
                          • Instruction Fuzzy Hash: A2115EB49043009FCB00EF68D49829EBBB1FF84315F54C6ADE8995B390DB399945CF8A
                          APIs
                          • _ZNK7QObject6senderEv.QT5CORE ref: 0040C881
                          • _ZNK7QObject10objectNameEv.QT5CORE ref: 0040C88C
                          • _ZNK7QString5rightEi.QT5CORE ref: 0040C8A3
                          • _ZNK7QString5toIntEPbi.QT5CORE ref: 0040C8BE
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040C8E7
                            • Part of subcall function 00433010: _ZN7QString16fromAscii_helperEPKci.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,004115F8), ref: 00433030
                            • Part of subcall function 00433010: _ZNK7QString3argExii5QChar.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00433066
                            • Part of subcall function 00433010: _Z20qt_qFindChild_helperPK7QObjectRK7QStringRK11QMetaObject6QFlagsIN2Qt15FindChildOptionEE.QT5CORE ref: 0043308A
                            • Part of subcall function 00433010: _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 00433095
                            • Part of subcall function 00433010: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004330BA
                            • Part of subcall function 00433010: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004330DC
                          • _ZNK7QString5splitERKS_NS_13SplitBehaviorEN2Qt15CaseSensitivityE.QT5CORE ref: 0040C924
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040C987
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040C9B4
                          • _ZN7QString14trimmed_helperERKS_.QT5CORE ref: 0040CA0E
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperFindQt15String16from$BehaviorCaseCharChildChild_helperEdit4textExii5FlagsLineMetaNameObjectObject10objectObject6Object6senderOptionS_13SensitivitySplitStringString14trimmed_helperString3argString5rightString5splitString5toZ20qt_q
                          • String ID:
                          • API String ID: 2776095069-0
                          • Opcode ID: 233c5017907c90f5b83be505d1bef29cd48646c81ea3228db60fc08ee94776cb
                          • Instruction ID: 56842c5d4efa8fef4e9fbba6ebb297380f5f13ca4c48eb7d0cdfdd3d443212a9
                          • Opcode Fuzzy Hash: 233c5017907c90f5b83be505d1bef29cd48646c81ea3228db60fc08ee94776cb
                          • Instruction Fuzzy Hash: 2C5148B0904304DFCB04EFA9D5886AEBBF1FF44314F04862EE455A7290DB799949CF96
                          APIs
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 00406082
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 00406097
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004060C7
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 00406104
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 00406113
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00406163
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateDoubleEdit4textLineS_jjString8to
                          • String ID:
                          • API String ID: 3459737250-0
                          • Opcode ID: 423761209936f0ed3280fecb558121884f343f1e4d3e526abb211f2b5066434b
                          • Instruction ID: fcadb1be34a119727e0188e8b66e1adbf9054e1cc0b5ce69adfde0b45b401482
                          • Opcode Fuzzy Hash: 423761209936f0ed3280fecb558121884f343f1e4d3e526abb211f2b5066434b
                          • Instruction Fuzzy Hash: FD41B2B0904209DBDF00EF64D8886AEBBF0FF44340F158569D886673D4E7399C6ACB96
                          APIs
                            • Part of subcall function 0041E6F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E846
                          • _ZN5QTime5startEv.QT5CORE ref: 0041EE35
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0041EE5F
                          • _ZN15QAbstractButton10setCheckedEb.QT5WIDGETS ref: 0041EE77
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0041EE89
                            • Part of subcall function 004042F0: _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00404310
                            • Part of subcall function 004042F0: _ZN7QRegExpC1ERK7QStringN2Qt15CaseSensitivityENS_13PatternSyntaxE.QT5CORE ref: 0040432E
                            • Part of subcall function 004042F0: _ZN7QString7replaceERK7QRegExpRKS_.QT5CORE ref: 00404360
                            • Part of subcall function 004042F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404387
                            • Part of subcall function 004042F0: _ZN7QStringaSERKS_.QT5CORE ref: 00404396
                            • Part of subcall function 004042F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043BB
                            • Part of subcall function 004042F0: _ZN7QRegExpD1Ev.QT5CORE ref: 004043C3
                            • Part of subcall function 004042F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004043E5
                          • _ZN8QSysInfo14windowsVersionEv.QT5CORE ref: 0041EE92
                          • _ZN19QWinTaskbarProgress10setMaximumEi.QT5WINEXTRAS ref: 0041EEE8
                          • _ZN19QWinTaskbarProgress8setValueEi.QT5WINEXTRAS ref: 0041EEFE
                          • _ZN19QWinTaskbarProgress4showEv.QT5WINEXTRAS ref: 0041EF0D
                          • _ZN7QWidget8setFocusEN2Qt11FocusReasonE.QT5WIDGETS ref: 0041EF2A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$AbstractCheckedTaskbar$Button9isFocus$Ascii_helperButton10setCaseInfo14windowsMaximumPatternProgress10setProgress4showProgress8setQt11Qt15ReasonS_13SensitivityStringString16fromString7replaceStringaSyntaxTime5startValueVersionWidget8set
                          • String ID:
                          • API String ID: 3615984582-0
                          • Opcode ID: 80c883c81ad438820e58d911ca7635b5ff9cf62957a5ba8ef00942a6f72b6462
                          • Instruction ID: 2934e70c84d1f2cbed25a0d4b3249bd1c32da0d327acd6be5f47f5761074fa01
                          • Opcode Fuzzy Hash: 80c883c81ad438820e58d911ca7635b5ff9cf62957a5ba8ef00942a6f72b6462
                          • Instruction Fuzzy Hash: 6F3180B42042418FD704EF29D5E87AA7BB4EF84310F4406BDEC954B3E6CB74A909CB96
                          APIs
                            • Part of subcall function 004414D0: _ZN5QChar7toUpperEj.QT5CORE ref: 0044154B
                            • Part of subcall function 004414D0: _Z5qQNaNv.QT5CORE ref: 00441598
                          • _ZN9QListData6detachEi.QT5CORE ref: 0043E482
                          • memcpy.MSVCRT ref: 0043E4B5
                            • Part of subcall function 004729B0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 004729BE
                          • _ZN9QListData6detachEi.QT5CORE ref: 0043E5EA
                          • memcpy.MSVCRT ref: 0043E635
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$Data6detachmemcpy$Char7toDataData7disposeUpper
                          • String ID: G$P
                          • API String ID: 1869317941-270004741
                          • Opcode ID: 933447fc676d984f03699d02c78d63813d40a35223fd1a71234ad91d566585bb
                          • Instruction ID: 592caeccc5ee3589c4dee403da918fd7bd3546ea00e1f9587b51b4a8a0f54399
                          • Opcode Fuzzy Hash: 933447fc676d984f03699d02c78d63813d40a35223fd1a71234ad91d566585bb
                          • Instruction Fuzzy Hash: 0FB128B0D01209DFCF14EFA9D4848ADBBF1FF88314F15856AE845A7391EB34A896CB45
                          APIs
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00403533
                          • _ZN15QAbstractButton7setTextERK7QString.QT5WIDGETS ref: 00403548
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00403571
                          • _ZN7QWidget15setMinimumWidthEi.QT5WIDGETS ref: 00403591
                          • _ZN7QWidget7repaintEv.QT5WIDGETS ref: 0040367F
                          • __cxa_guard_release.LIBSTDC++-6 ref: 00403ACA
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractArrayButton7setData10deallocateMetaMinimumObject2trS1_iS_jjStringTextWidget15setWidget7repaintWidth__cxa_guard_release
                          • String ID: Check
                          • API String ID: 143180855-4249846551
                          • Opcode ID: 2d6ae9abdc8592d7589fbe4635874687d285d4ba67d69cea8929a4088c5074b1
                          • Instruction ID: c6276543e5cb3a1abc732b39cba4c9b359f5e7cc6077406659477a6fc200b30a
                          • Opcode Fuzzy Hash: 2d6ae9abdc8592d7589fbe4635874687d285d4ba67d69cea8929a4088c5074b1
                          • Instruction Fuzzy Hash: 30610DB5A00204CFCB48EF68C498999BBF1FF88314F1585B9D8469B766CB34E845CF91
                          APIs
                          • _ZN11QFileDialog15getSaveFileNameEP7QWidgetRK7QStringS4_S4_PS2_6QFlagsINS_6OptionEE.QT5WIDGETS ref: 0042E3E8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042E40E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042E434
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0042E4AC
                          Strings
                          • G-Code files (*.nc *.ncc *.ngc *.tap *.txt), xrefs: 0042E37B
                          • Save file as, xrefs: 0042E3A8
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$File$Dialog15getFlagsNameOptionS2_6SaveStringWidget
                          • String ID: G-Code files (*.nc *.ncc *.ngc *.tap *.txt)$Save file as
                          • API String ID: 4017155732-2175381733
                          • Opcode ID: 54080e5a4c75a0e81acc49966884bde5b902bdd8094b27e1f765dfb8c9313aea
                          • Instruction ID: 6d86541849c5fb36edb5bea4cc8482151a62933d66ecf35f92f1c13a8c45b12a
                          • Opcode Fuzzy Hash: 54080e5a4c75a0e81acc49966884bde5b902bdd8094b27e1f765dfb8c9313aea
                          • Instruction Fuzzy Hash: 65514BB0A043119FCB00EF69D48879EBBF1FF84314F548A1EE4985B394D77A9845CB86
                          APIs
                          • _ZN7QWidget5closeEv.QT5WIDGETS ref: 0041C1C6
                            • Part of subcall function 00443460: _ZdlPv.LIBSTDC++-6 ref: 004434BC
                            • Part of subcall function 00443460: _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 00443536
                            • Part of subcall function 004326F0: _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS(?,0041B169), ref: 004326FF
                            • Part of subcall function 00403F70: _ZNK9QVector3D6lengthEv.QT5GUI ref: 00403FE8
                            • Part of subcall function 00403F70: _Z6qIsNaNd.QT5CORE ref: 00403FF5
                            • Part of subcall function 00403F70: _ZN9QListData6detachEi.QT5CORE ref: 00404029
                            • Part of subcall function 00471AA0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471AAE
                            • Part of subcall function 00449A80: _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449AA8
                            • Part of subcall function 00449A80: _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449AD0
                            • Part of subcall function 00449A80: _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449AF8
                            • Part of subcall function 00449A80: _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449B20
                            • Part of subcall function 00449A80: _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449B48
                            • Part of subcall function 00449A80: _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449B70
                          • _ZNK5QTime7elapsedEv.QT5CORE ref: 0041C290
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041C33E
                          • _ZN11QTextStreamlsEi.QT5CORE ref: 0041C357
                          • _ZN15QProgressDialogD1Ev.QT5WIDGETS ref: 0041C384
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayList$AbstractAllocationButton9isCheckedD6lengthDataData10deallocateData6detachData7disposeData8allocateDialogEjjj6FlagsOptionProgressS_16S_jjStreamlsTextTime7elapsedVector3Widget5close
                          • String ID: Update parser time: $default
                          • API String ID: 1854842719-2908768034
                          • Opcode ID: d3a06dd792fcdbd741b1c253bd6d3fa2e987e4dfe77e04c440dc50278254e046
                          • Instruction ID: d2c0d067afae4a444eb2a613e474cd036ed9cd8b2db09611215aedb665f783e6
                          • Opcode Fuzzy Hash: d3a06dd792fcdbd741b1c253bd6d3fa2e987e4dfe77e04c440dc50278254e046
                          • Instruction Fuzzy Hash: FF511C74904319CFDB24EF24C8957EEBBB1BF84304F0085ADD88A57251DB74AA89CF56
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,004115F8), ref: 00433030
                          • _ZNK7QString3argExii5QChar.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00433066
                          • _Z20qt_qFindChild_helperPK7QObjectRK7QStringRK11QMetaObject6QFlagsIN2Qt15FindChildOptionEE.QT5CORE ref: 0043308A
                          • _ZNK9QLineEdit4textEv.QT5WIDGETS ref: 00433095
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004330BA
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004330DC
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateFindS_jj$Ascii_helperCharChildChild_helperEdit4textExii5FlagsLineMetaObjectObject6OptionQt15StringString16fromString3argZ20qt_q
                          • String ID: txtUserCommand%1
                          • API String ID: 3452890311-1882453919
                          • Opcode ID: 6a2180e9ba6624648f45e712baefc1badf3188088ac00f75bea800ab326080d6
                          • Instruction ID: be01dbf89a083609326435172f16de0d7207e25e557f81aaf8e1922b46da1e2a
                          • Opcode Fuzzy Hash: 6a2180e9ba6624648f45e712baefc1badf3188088ac00f75bea800ab326080d6
                          • Instruction Fuzzy Hash: 27315CB05083059FDB00AF68D88825EBBF0FF88315F108A2EE4889B350D7799945CB86
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 00433160
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 00433196
                          • _Z20qt_qFindChild_helperPK7QObjectRK7QStringRK11QMetaObject6QFlagsIN2Qt15FindChildOptionEE.QT5CORE ref: 004331B7
                          • _ZN9QLineEdit7setTextERK7QString.QT5WIDGETS ref: 004331C5
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004331EA
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043320C
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateFindS_jjString$Ascii_helperCharChildChild_helperEdit7setExii5FlagsLineMetaObjectObject6OptionQt15String16fromString3argTextZ20qt_q
                          • String ID: txtUserCommand%1
                          • API String ID: 1224941544-1882453919
                          • Opcode ID: cd9160d7e863a3816dbd2db34b93577cbb8bd460593f486ee0dd5c618262a818
                          • Instruction ID: 4d8daef8793b669f9863a337fb515e2287920bb495ba7f9d665f479c58341a2a
                          • Opcode Fuzzy Hash: cd9160d7e863a3816dbd2db34b93577cbb8bd460593f486ee0dd5c618262a818
                          • Instruction Fuzzy Hash: B4314DB49043059FDB009F68D48865EBBF0FF88315F50C62EE49497360D7799945CB56
                          APIs
                            • Part of subcall function 0044D3E0: _ZN7QWidget7repaintEv.QT5WIDGETS(?,0044D6A4,?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D3EF
                          • _ZNK8QSpinBox5valueEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6AD
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6C1
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6E7
                          • _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6FC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044D721
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractArrayAscii_helperBox5valueButton9isCheckedData10deallocateS_jjSheetSpinStringString16fromStyleWidget13setWidget7repaint
                          • String ID: color: palette(text);$color: red;
                          • API String ID: 3101016212-1387309593
                          • Opcode ID: 36f252f8e9a893dc62f9a35281237eff89647f8e186fa9a9c119d74974b4f2d2
                          • Instruction ID: 188badc03d401b648fd9d4add4c4f1e6f0a7e57e4ed4050b077493577ff8b4ed
                          • Opcode Fuzzy Hash: 36f252f8e9a893dc62f9a35281237eff89647f8e186fa9a9c119d74974b4f2d2
                          • Instruction Fuzzy Hash: 1221A1B4A002048FDB08EF68D8C899EBBB1FF84344F118569E8458B365DB35EC45CF89
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040CBD6
                          • _ZN8QVariantC1Eb.QT5CORE ref: 0040CBFB
                          • _ZN7QObject11setPropertyEPKcRK8QVariant.QT5CORE ref: 0040CC18
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040CC23
                          • _ZNK7QWidget5styleEv.QT5WIDGETS ref: 0040CC2B
                          • _ZNK7QWidget14ensurePolishedEv.QT5WIDGETS ref: 0040CC50
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040CCAF
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040CCF1
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040CD3D
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayAscii_helperData10deallocateS_jjString16from$Object11setPolishedPropertyResumeUnwind_Widget14ensureWidget5style
                          • String ID: overrided
                          • API String ID: 2632582772-1212112701
                          • Opcode ID: 6e468ee542df08ea522a0165b9089540c6be9978875376d47274b82c9c111bee
                          • Instruction ID: 62813573c8096cbeb3908a086cc559c1c636bf99e4dcd270d496fcc73a295a37
                          • Opcode Fuzzy Hash: 6e468ee542df08ea522a0165b9089540c6be9978875376d47274b82c9c111bee
                          • Instruction Fuzzy Hash: 3821E4757002008FCF04AF78D8985ADBBB1EF88301F44457EED469B362CB38A859CB99
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 004051BE
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0040520A
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 0040521F
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00405248
                          • _ZN7QWidget6updateEv.QT5WIDGETS ref: 00405253
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 00405260
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0040528D
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004052D0
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 00405306
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00405331
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00405358
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 0040536D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00405396
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004053BC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004053DE
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$MetaObject2trS1_i$Box8setEventsGroupStringTitle$AbstractApplication13processButton9isCharCheckedCoreEventExii5FlagFlagsLoop17ProcessResumeString3argString6appendUnwind_Widget6update
                          • String ID: Spindle
                          • API String ID: 565202139-1894147609
                          • Opcode ID: c02b19049f76e1ec9954b6e70533c3a5df903a3fd45d7b08d74a3bf5c7d415b3
                          • Instruction ID: 4439bd4ee06e11428aa0142e98da4118bbfe58443dc8381f7d889f9d607d4a01
                          • Opcode Fuzzy Hash: c02b19049f76e1ec9954b6e70533c3a5df903a3fd45d7b08d74a3bf5c7d415b3
                          • Instruction Fuzzy Hash: 8C2160B56043009FC700AF64D4987AEBBF0FF84314F058A6DE99557361D778A449CF86
                          APIs
                          • _ZN8QVariantC1Eb.QT5CORE ref: 0040467B
                          • _ZN7QObject11setPropertyEPKcRK8QVariant.QT5CORE ref: 00404698
                          • _ZN8QVariantD1Ev.QT5CORE ref: 004046A3
                          • _ZNK7QWidget5styleEv.QT5WIDGETS ref: 004046AB
                          • _ZNK7QWidget14ensurePolishedEv.QT5WIDGETS ref: 004046D0
                          • _ZNK9QGroupBox9isCheckedEv.QT5WIDGETS ref: 004046E5
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00404721
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00404736
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040475B
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 00404800
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00404850
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00404865
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040488E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004048B4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004048D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$GroupVariant$Box8setStringTitle$Box9isCharCheckedExii5MetaObject11setObject2trPolishedPropertyS1_iString3argString6appendWidget14ensureWidget5style
                          • String ID: overrided
                          • API String ID: 3883570626-1212112701
                          • Opcode ID: ef9ee6073e7ef741f3b7c82d9d15188be884296a66a8a44c820386ef1e900e1a
                          • Instruction ID: 61c08a02cf1d6933a9c51b0c5b13231fcc4d15ba6ef16f9397a861a19ecd6245
                          • Opcode Fuzzy Hash: ef9ee6073e7ef741f3b7c82d9d15188be884296a66a8a44c820386ef1e900e1a
                          • Instruction Fuzzy Hash: 97113375610200DFCB04EFA8E89C9A9BBB5FF88311F444579ED469B362CB34A815CB95
                          APIs
                          • _ZNK8QVariant5toIntEPb.QT5CORE ref: 004460F1
                          • _ZN18QAbstractItemModel11dataChangedERK11QModelIndexS2_RK7QVectorIiE.QT5CORE ref: 00446115
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044613E
                          • _ZNK8QVariant8toStringEv.QT5CORE ref: 0044615E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004461BB
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$AbstractChangedIndexItemModelModel11dataStringVariant5toVariant8toVector
                          • String ID:
                          • API String ID: 1391285557-0
                          • Opcode ID: 2e997fcf2aac3020233d8938e023cea54e4f08a76677ca8192363633d2b9aa3f
                          • Instruction ID: 535c55e06ddcc4176fcb091c8d8adefeb1ef77a65f2fb80d5d69c1c0a17ec394
                          • Opcode Fuzzy Hash: 2e997fcf2aac3020233d8938e023cea54e4f08a76677ca8192363633d2b9aa3f
                          • Instruction Fuzzy Hash: 318127B4A04206CFDB04EF69C48495ABBF1FF85304F16C66AD8599B321D735E845CF86
                          APIs
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0040F2A4
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F38E
                            • Part of subcall function 0046F2E0: _ZN9QListData6detachEi.QT5CORE(?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F2F9
                            • Part of subcall function 0046F2E0: _Znwj.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F328
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F2D2
                            • Part of subcall function 00472140: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,004086DF), ref: 0047214E
                          • _ZNK19QAbstractScrollArea8viewportEv.QT5WIDGETS ref: 0040F3BF
                          • _ZNK7QWidget11mapToGlobalERK6QPoint.QT5WIDGETS ref: 0040F3CD
                          • _ZN5QMenu5popupERK6QPointP7QAction.QT5WIDGETS ref: 0040F3ED
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F400
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F435
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Widget7actions$ListPoint$AbstractActionArea8viewportDataData6detachData7disposeGlobalItemMenu5popupModel12selectedRowsScrollSelectionWidget11mapZnwj
                          • String ID:
                          • API String ID: 2916371295-0
                          • Opcode ID: d45e21848b44b7e75ee8b86bafa996b6c671ecfb81fe1286dd8c55d8f113cd0d
                          • Instruction ID: f1798daec4dde15dd27168254fc022ab50bdb890d5639a47f73dbe925ab15477
                          • Opcode Fuzzy Hash: d45e21848b44b7e75ee8b86bafa996b6c671ecfb81fe1286dd8c55d8f113cd0d
                          • Instruction Fuzzy Hash: 4551F9B5A00204CFCB04EFB8D59899DBBF1FF88310F05466AE855AB365DB34A845CF96
                          APIs
                          • _ZN7QStringaSERKS_.QT5CORE ref: 004214BF
                          • _ZN11QTextStreamC1EP9QIODevice.QT5CORE ref: 004214D0
                          • _ZNK11QTextStream5atEndEv.QT5CORE ref: 004214F2
                          • _ZN11QTextStream8readLineEx.QT5CORE ref: 00421511
                            • Part of subcall function 00470650: _ZN9QListData11detach_growEPii.QT5CORE ref: 00470686
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00421543
                          • _ZNK11QTextStream5atEndEv.QT5CORE ref: 0042154B
                          • _ZN11QTextStreamD1Ev.QT5CORE ref: 00421583
                          • _ZN5QFileD1Ev.QT5CORE ref: 0042158C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Text$StreamStream5at$ArrayData10deallocateData11detach_growDeviceFileLineListS_jjStream8readStringa
                          • String ID:
                          • API String ID: 1213247097-0
                          • Opcode ID: f121501413bf62275c89e3b9e01313e56211848ed24cdcb5219b9bdb2a8f367e
                          • Instruction ID: 2aeae716f303c7bdb6030dddd774b9036b4ed5648fad678ddda75e612aeab56d
                          • Opcode Fuzzy Hash: f121501413bf62275c89e3b9e01313e56211848ed24cdcb5219b9bdb2a8f367e
                          • Instruction Fuzzy Hash: 1D2130B1A002158FDF04BF78E4A86ADBBB1FF94304F40453DE446A7260DB386959CB8A
                          APIs
                          • _ZN7QObjectC2EPS_.QT5CORE(?,?,?,?,?,?,00000002,?,00429A6F), ref: 0044327E
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,00000002,?,00429A6F), ref: 004432F5
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,00000002,?,00429A6F), ref: 004432FB
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,00000002,?,00429A6F), ref: 00443301
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,00000002,?,00429A6F), ref: 00443314
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,00000002,?,00429A6F), ref: 0044331A
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,00000002,?,00429A6F), ref: 00443320
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,00000002,?,00429A6F), ref: 00443333
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Object
                          • String ID:
                          • API String ID: 2936123098-0
                          • Opcode ID: 9e758e5028568e10e9a9f0d0f7366b83f2d1f792977a3f79345c56cac69d1929
                          • Instruction ID: 5ff04c1d35116a1e058c3c107f39fd5ab09c69faa6175a63fc637c9ecb58587c
                          • Opcode Fuzzy Hash: 9e758e5028568e10e9a9f0d0f7366b83f2d1f792977a3f79345c56cac69d1929
                          • Instruction Fuzzy Hash: 662190B0505254CFDB549F14E9D831A7FB0BF54304F8545A9D8845E2AAC3BAC8B8CFEA
                          APIs
                          • _ZNK10QTableView16horizontalHeaderEv.QT5WIDGETS(?,?,?,0041D719), ref: 00403404
                          • _ZNK11QHeaderView18defaultSectionSizeEv.QT5WIDGETS ref: 00403408
                          • _ZNK10QTableView16horizontalHeaderEv.QT5WIDGETS ref: 00403416
                          • _ZNK11QHeaderView5countEv.QT5WIDGETS ref: 0040341A
                          • _ZNK10QTableView16horizontalHeaderEv.QT5WIDGETS ref: 00403439
                          • _ZN11QHeaderView20setSectionResizeModeENS_10ResizeModeE.QT5WIDGETS ref: 00403444
                          • _ZNK10QTableView16horizontalHeaderEv.QT5WIDGETS ref: 00403454
                          • _ZN11QHeaderView20setSectionResizeModeENS_10ResizeModeE.QT5WIDGETS ref: 0040345F
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Header$ModeResizeTableView16horizontal$Section$S_10View20set$SizeView18defaultView5count
                          • String ID:
                          • API String ID: 1455340251-0
                          • Opcode ID: 409ca12b0cdc30bbc74f86f079ec7bc7ab8c5e85e3929c2b3ddecb783dfaa32a
                          • Instruction ID: 0ae5a48ec4e37e0d6ee38a46238d2a8197e8d9aaee0d4b8b60881ae45342a434
                          • Opcode Fuzzy Hash: 409ca12b0cdc30bbc74f86f079ec7bc7ab8c5e85e3929c2b3ddecb783dfaa32a
                          • Instruction Fuzzy Hash: F10175726002008FD718BF7CE99995EBBF5FB94200B510A6DD842C73A5DE35E8468B85
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00473843
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004738AC
                          • memcpy.MSVCRT ref: 00473A05
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$memcpy
                          • String ID:
                          • API String ID: 2929742026-0
                          • Opcode ID: 4a864458f9acf349d61817e3bb0ee4aa7cdcdcf65264b822ec7473ce473cd6f0
                          • Instruction ID: 12aa07123557c66fec345b2ef8078f9c7d77b01d2f1ee011910ce616e7b2abd2
                          • Opcode Fuzzy Hash: 4a864458f9acf349d61817e3bb0ee4aa7cdcdcf65264b822ec7473ce473cd6f0
                          • Instruction Fuzzy Hash: 49C18AB0608242CFC710DF28C580A9AFBE1BF85316F19C52EE5988B351D739EE45DB86
                          Strings
                          • Unknown pseudo relocation protocol version %d., xrefs: 00451714
                          • Mingw-w64 runtime failure:, xrefs: 004512FD
                          • VirtualQuery failed for %d bytes at address %p, xrefs: 00451700
                          • Unknown pseudo relocation bit size %d., xrefs: 00451574
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID:
                          • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$ VirtualQuery failed for %d bytes at address %p$Mingw-w64 runtime failure:
                          • API String ID: 0-1068558636
                          • Opcode ID: f3041292eaebadafbbdb344e855932b31dc112cafff104ef43a6d46bfc2c9c7f
                          • Instruction ID: 155c29f241d9e4624166fc541b84943b5143b784766c8f7a33df62642477c892
                          • Opcode Fuzzy Hash: f3041292eaebadafbbdb344e855932b31dc112cafff104ef43a6d46bfc2c9c7f
                          • Instruction Fuzzy Hash: 6F718E74A01204ABCB10CF69D98076EBBF5EF85345F68852BEC4597326E738D808CB59
                          APIs
                          • _ZN7QString15toLatin1_helperERKS_.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041AE46), ref: 00440DD8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440E52
                          • _ZN7QString6appendE5QChar.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041AE46), ref: 00440EB7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440F0E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00440F34
                          • _ZN7QString6appendE5QChar.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041AE46), ref: 00440F51
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$CharString6append$Latin1_helperString15to
                          • String ID:
                          • API String ID: 4225502300-0
                          • Opcode ID: f035a5dc6805b64a50c6df97a860994964a83e85f010b674f6d86e6a92dad533
                          • Instruction ID: 714e91ba88a595ce387a740736354ad32d94b6ebaf7445c52e30c3c97d0d432e
                          • Opcode Fuzzy Hash: f035a5dc6805b64a50c6df97a860994964a83e85f010b674f6d86e6a92dad533
                          • Instruction Fuzzy Hash: FA61C375A00209CFEF10DF68C88469EB7F1FF48314F55862AE958AB360D739E865CB49
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Char7toUpper
                          • String ID:
                          • API String ID: 830358617-0
                          • Opcode ID: f6cc953657f134986aa13e8b927a908282de7af3f94c48f6b0a058c9ac4fced8
                          • Instruction ID: 0efbc687d99d025c965f7a22fdabb2b61c57a87e60160b1e57c62be9b605b15b
                          • Opcode Fuzzy Hash: f6cc953657f134986aa13e8b927a908282de7af3f94c48f6b0a058c9ac4fced8
                          • Instruction Fuzzy Hash: 64518E74900209DFEF10DFA8D888AEEBBB0FF84314F18855AE855A7364D739D885CB59
                          APIs
                          • _ZNK7QString5rightEi.QT5CORE ref: 004044B5
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 004044CD
                          • _ZNK7QString5rightEi.QT5CORE ref: 004044F4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404535
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040455B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040457D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040459F
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$String5right$DoubleString8to
                          • String ID:
                          • API String ID: 3361197361-0
                          • Opcode ID: 0c94592b4ef672f4cecc0d7d0ed02034c990f90cfc4d2497b7ff8eafba73f802
                          • Instruction ID: e2290bc265e2d58ae9b7e734d479fef3592aa8ce2a7ca1d751e8372a6e7dbb90
                          • Opcode Fuzzy Hash: 0c94592b4ef672f4cecc0d7d0ed02034c990f90cfc4d2497b7ff8eafba73f802
                          • Instruction Fuzzy Hash: 814184F4904205EFDB00EF64D88869EBBF0FF84314F144529EA44A7390E739989ACF86
                          APIs
                          • _ZNK17QAbstractItemView14selectionModelEv.QT5WIDGETS ref: 0041CCC7
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041CCDD
                          • _ZNK17QAbstractItemView14selectionModelEv.QT5WIDGETS ref: 0041CD0C
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041CD1C
                          • _ZN8QVariantC1Ei.QT5CORE ref: 0041CD9C
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041CE0A
                          • _ZN10QTableView9selectRowEi.QT5WIDGETS ref: 0041CE27
                            • Part of subcall function 0046F2E0: _ZN9QListData6detachEi.QT5CORE(?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F2F9
                            • Part of subcall function 0046F2E0: _Znwj.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F328
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Item$AbstractModelModel12selectedRowsSelectionVariantView14selection$Data6detachListTableView9selectZnwj
                          • String ID:
                          • API String ID: 3939498389-0
                          • Opcode ID: 5eac46d6288aa2b03e75dc8d89d879bb19493894158c6f9d853af8bebaac3328
                          • Instruction ID: 8af9366d14400a372e016656ef9cc37c36a0de9cb2a5e261d4dce29b17324496
                          • Opcode Fuzzy Hash: 5eac46d6288aa2b03e75dc8d89d879bb19493894158c6f9d853af8bebaac3328
                          • Instruction Fuzzy Hash: 38511BB19042088FCB04EF68D594ADDBBF0FF88324F14466DD8556B3A1DB74A849CF96
                          APIs
                          • _ZNK17QAbstractItemView14selectionModelEv.QT5WIDGETS ref: 0041CCC7
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041CCDD
                          • _ZNK17QAbstractItemView14selectionModelEv.QT5WIDGETS ref: 0041CD0C
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041CD1C
                          • _ZN8QVariantC1Ei.QT5CORE ref: 0041CD9C
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041CE0A
                          • _ZN10QTableView9selectRowEi.QT5WIDGETS ref: 0041CE27
                            • Part of subcall function 0046F2E0: _ZN9QListData6detachEi.QT5CORE(?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F2F9
                            • Part of subcall function 0046F2E0: _Znwj.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F328
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Item$AbstractModelModel12selectedRowsSelectionVariantView14selection$Data6detachListTableView9selectZnwj
                          • String ID:
                          • API String ID: 3939498389-0
                          • Opcode ID: 0a66d2520393775fac5c53238b944e150524d0a02bd58789776da002d8dfccc1
                          • Instruction ID: 7405b679288201111cababd25edd338fc77eaf9cf8c7313ba8eae3e9df32ffc2
                          • Opcode Fuzzy Hash: 0a66d2520393775fac5c53238b944e150524d0a02bd58789776da002d8dfccc1
                          • Instruction Fuzzy Hash: 0B411AB09042088FCB04EF68D594A9EBBF1FF88324F05466DD8556B3A1DB74A849CF96
                          APIs
                          • _ZN7QString6numberEdci.QT5CORE ref: 00446511
                          • _ZN8QVariantC1ERK7QString.QT5CORE ref: 0044651C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00446541
                          • _ZN8QVariantC1Ei.QT5CORE ref: 00446579
                          • _ZN8QVariantC1Ed.QT5CORE ref: 004465A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayData10deallocateEdciS_jjStringString6number
                          • String ID: f
                          • API String ID: 2681256453-1993550816
                          • Opcode ID: e1d54e1a67cc26ed3d89c9ad770678ee77ab387fe07e3eff9b6b2f76a798d1ee
                          • Instruction ID: 7b9690de22b17cbcc5e12ed6506146f6b255ea1d6d549ea82a1bd0c6cad32b7d
                          • Opcode Fuzzy Hash: e1d54e1a67cc26ed3d89c9ad770678ee77ab387fe07e3eff9b6b2f76a798d1ee
                          • Instruction Fuzzy Hash: 0741D570900205DFEF14CF28D488A5ABBF1FF45324F16866AD8545B368DB39EC59CB8A
                          APIs
                          • _ZNK7QString5rightEi.QT5CORE ref: 004044B5
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 004044CD
                          • _ZNK7QString5rightEi.QT5CORE ref: 004044F4
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404535
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040455B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040457D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040459F
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$String5right$DoubleString8to
                          • String ID:
                          • API String ID: 3361197361-0
                          • Opcode ID: 026c94085337970a061152fdb5848cc9bfe9af3d6b578b9b329032de4b99ae84
                          • Instruction ID: ca52126e15cbf702b03abfd8dd78165cf058b44dac268d078e1222136c7b2ab5
                          • Opcode Fuzzy Hash: 026c94085337970a061152fdb5848cc9bfe9af3d6b578b9b329032de4b99ae84
                          • Instruction Fuzzy Hash: 4C3108B49042059FDB00EF68D98879EBBF0FF84704F10892CE985A7354E779A949CF86
                          APIs
                          • _ZNK14QMessageLogger5debugEv.QT5CORE ref: 00405EBA
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 00405ED6
                          • _ZN11QTextStreamlsERK7QString.QT5CORE ref: 00405EE2
                          • _ZN6QDebugD1Ev.QT5CORE ref: 00405F10
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: DebugLogger5debugMessageStreamlsStringString15fromTextUtf8_helper
                          • String ID: default$updating border drawer
                          • API String ID: 503439215-529061905
                          • Opcode ID: 8cffb0edf0db74d4b7197464c09649383ce0c8dab6c6b226e06049262877465d
                          • Instruction ID: 1935ac792e95e871f0db08a282f516b5b3b3ed68c5afc4d3efdc7c3b8183e413
                          • Opcode Fuzzy Hash: 8cffb0edf0db74d4b7197464c09649383ce0c8dab6c6b226e06049262877465d
                          • Instruction Fuzzy Hash: E1216DB18046049FDB04EFA8D8887EEBBB5FF40314F44412DE4456B290DB79194ACF8A
                          APIs
                          • _ZN8QVariantC1Eb.QT5CORE ref: 00406249
                          • _ZN7QObject11setPropertyEPKcRK8QVariant.QT5CORE ref: 00406266
                          • _ZN8QVariantD1Ev.QT5CORE ref: 00406271
                          • _ZNK7QWidget5styleEv.QT5WIDGETS ref: 00406279
                          • _ZNK7QWidget14ensurePolishedEv.QT5WIDGETS ref: 0040629E
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$Object11setPolishedPropertyWidget14ensureWidget5style
                          • String ID: overrided
                          • API String ID: 2442626109-1212112701
                          • Opcode ID: 1acbdbf4c75997c0ee7045c0af8adf423b26f251da92002b1c012f74dbd10dd5
                          • Instruction ID: 7e061de74e49f8910b4ca3c72b1ca7fa835cb345b573d041a59d12c14bf15dc2
                          • Opcode Fuzzy Hash: 1acbdbf4c75997c0ee7045c0af8adf423b26f251da92002b1c012f74dbd10dd5
                          • Instruction Fuzzy Hash: 9D114674601100CFCB48EF68D49C9697BB5EF48301F4141BDED069B362CB39A856CB99
                          APIs
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00404BC8
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00404BDD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00404C06
                          • _ZN7QWidget6updateEv.QT5WIDGETS ref: 00404C4A
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 00404C57
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Events$Application13processArrayBox8setCoreData10deallocateEventFlagFlagsGroupLoop17MetaObject2trProcessS1_iS_jjStringTitleWidget6update
                          • String ID: Overriding
                          • API String ID: 1194972151-3848043014
                          • Opcode ID: 3c53ed29d2c8b3991151d17ecc9a2fc335b55845a9e0f990b00090900e1cc6d3
                          • Instruction ID: 2fd6c1efd42831c5e21512a2586d35124f8424445afd1829d721ee0ea53b5a9d
                          • Opcode Fuzzy Hash: 3c53ed29d2c8b3991151d17ecc9a2fc335b55845a9e0f990b00090900e1cc6d3
                          • Instruction Fuzzy Hash: 0111C4B5605300CFD704EF58D4886AEBBF0FF84310F41856DE9959B3A1C778A845CB96
                          APIs
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0044D8D0
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0044D8F5
                          • _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS ref: 0044D907
                          • _ZN6QTimer5startEv.QT5CORE ref: 0044D92C
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractAscii_helperButton9isCheckedSheetStringString16fromStyleTimer5startWidget13set
                          • String ID: color: red;
                          • API String ID: 2648379722-296104473
                          • Opcode ID: 2e6e8cdc2ebc2ec641880d6676de08cfb57d2a8c93db766848951e7342b2d672
                          • Instruction ID: 97dff4f28b3d05008005b35eaaa0a042f7f270c4fb09519a2d4cdab566868531
                          • Opcode Fuzzy Hash: 2e6e8cdc2ebc2ec641880d6676de08cfb57d2a8c93db766848951e7342b2d672
                          • Instruction Fuzzy Hash: 2711CEF0904200DFEB04EF68E888AAEBBB0FF49321F508169E95497361C7369855CF89
                          APIs
                            • Part of subcall function 004527C0: _errno.MSVCRT ref: 004527F7
                            • Part of subcall function 00452880: _errno.MSVCRT ref: 004528B7
                          • _ZNK9QVector3D10normalizedEv.QT5GUI ref: 0044A749
                          • _ZN10QMatrix4x46lookAtERK9QVector3DS2_S2_.QT5GUI ref: 0044A767
                          • _ZN10QMatrix4x49translateEfff.QT5GUI ref: 0044A78C
                          • _ZN10QMatrix4x45scaleEfff.QT5GUI ref: 0044A7AC
                          • _ZN10QMatrix4x49translateEfff.QT5GUI ref: 0044A7E9
                          • _ZN10QMatrix4x46rotateEffff.QT5GUI ref: 0044A80F
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Efff$Matrix4x49translateVector3_errno$D10normalizedEffffMatrix4x45scaleMatrix4x46lookMatrix4x46rotate
                          • String ID:
                          • API String ID: 2814583391-0
                          • Opcode ID: d0835053ff2589e1728c1e400fbb44768641e500d9826dfe8a92d14b4601ee7a
                          • Instruction ID: 987448bd570659b6891b53ac4aef17bbc62b12739281b51fd625d82c56a8ce31
                          • Opcode Fuzzy Hash: d0835053ff2589e1728c1e400fbb44768641e500d9826dfe8a92d14b4601ee7a
                          • Instruction Fuzzy Hash: 06913F71A09605DBD7027F54E148199BFB0FF84784F614D9CE4C4661AEEB3284798F87
                          APIs
                          • _Znwj.LIBSTDC++-6 ref: 0043D0DD
                            • Part of subcall function 00444820: _Znwj.LIBSTDC++-6 ref: 00444880
                            • Part of subcall function 004410D0: _Z5qQNaNv.QT5CORE ref: 004410EE
                            • Part of subcall function 004410D0: _Z5qQNaNv.QT5CORE ref: 004410F3
                            • Part of subcall function 004410D0: _Z5qQNaNv.QT5CORE ref: 004410F8
                            • Part of subcall function 004410D0: _Z5qQNaNv.QT5CORE ref: 004410FD
                            • Part of subcall function 004410D0: _Z6qIsNaNd.QT5CORE ref: 004413A4
                            • Part of subcall function 004414D0: _ZN5QChar7toUpperEj.QT5CORE ref: 0044154B
                            • Part of subcall function 004414D0: _Z5qQNaNv.QT5CORE ref: 00441598
                          • _Z6qIsNaNd.QT5CORE ref: 0043D1A2
                          • _ZN10QMatrix4x46rotateEffff.QT5GUI ref: 0043D25D
                          • _ZN10QMatrix4x46rotateEffff.QT5GUI ref: 0043D5B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: EffffMatrix4x46rotateZnwj$Char7toUpper
                          • String ID: R
                          • API String ID: 2136949353-1466425173
                          • Opcode ID: 48edd372f1763a950a61d71975ecca4a3c1354f0ac18277468aedc135162eb56
                          • Instruction ID: 92734ff8c66f9e5b8dbf5a20d406568452d4df5b04286727587d60c952cf7b08
                          • Opcode Fuzzy Hash: 48edd372f1763a950a61d71975ecca4a3c1354f0ac18277468aedc135162eb56
                          • Instruction Fuzzy Hash: 0A026AB2E002089BCB06BF94D5592CDBFB0FB04794F215C49D889B626AFB3659648FC5
                          APIs
                          • _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449AA8
                          • _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449AD0
                          • _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449AF8
                          • _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449B20
                          • _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449B48
                          • _Z6qIsNaNf.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,000B2260,000B3094,0044A8B1), ref: 00449B70
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: eb5dfdc44c179876a7a840fea57df98314d1bd06c8598c5aa5789db8300853d4
                          • Instruction ID: d97057f013840333af2bbc0dce35c50f6c3525b0e55a930d3eb15645cd4f20a8
                          • Opcode Fuzzy Hash: eb5dfdc44c179876a7a840fea57df98314d1bd06c8598c5aa5789db8300853d4
                          • Instruction Fuzzy Hash: BA51C5B0108A02CFDB14EF24E5C8A6ABBF0FF81704F06499DE4D656255DB31A869CB17
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041FFEA
                          • _ZNK7QString7indexOfE5QChariN2Qt15CaseSensitivityE.QT5CORE ref: 00420069
                          • _ZNK7QString3midEii.QT5CORE ref: 00420090
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 004200A6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004200D8
                          • _ZNK7QString7indexOfE5QChariN2Qt15CaseSensitivityE.QT5CORE ref: 004200F8
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0042020E
                          • _ZN7QString6appendERKS_.QT5CORE ref: 0042021D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00420249
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$CaseChariQt15SensitivityString7index$DoubleString15fromString3midString6appendString8toUtf8_helper
                          • String ID:
                          • API String ID: 2635586883-0
                          • Opcode ID: dd71c067c252a21c407b814dd780d187efd7c23f03510cafbbb692a433560404
                          • Instruction ID: 187c558114d79af8fa6fd06cbff03cf04e5a99e05cc8b7fdee44f25ba399a4bd
                          • Opcode Fuzzy Hash: dd71c067c252a21c407b814dd780d187efd7c23f03510cafbbb692a433560404
                          • Instruction Fuzzy Hash: F551EDB0A04316CBDF10AF14D8983997BF0BF41354F54889AC489A7395EB798C89CF8A
                          APIs
                          • _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 0047451A
                          • memcpy.MSVCRT ref: 0047455D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004745D5
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$AllocationData10deallocateData8allocateEjjj6FlagsOptionS_16S_jjmemcpy
                          • String ID:
                          • API String ID: 3654953330-0
                          • Opcode ID: 8628432a7319ff4df1233ea5f28b361c13091e336f8fdb7f45c1fdb20351b43f
                          • Instruction ID: 4544868eba9573dac0d5926632cb4d646bafa017fb4cdb6e4fc3d1fc777be72d
                          • Opcode Fuzzy Hash: 8628432a7319ff4df1233ea5f28b361c13091e336f8fdb7f45c1fdb20351b43f
                          • Instruction Fuzzy Hash: BD414A70208241DFC750DF18C4C0A6ABBE1FB85310F68C96EE5888B355D739D845CB56
                          APIs
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0040F2A4
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F2D2
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F38E
                          • _ZNK19QAbstractScrollArea8viewportEv.QT5WIDGETS ref: 0040F3BF
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Widget7actions$AbstractArea8viewportItemModel12selectedRowsScrollSelection
                          • String ID:
                          • API String ID: 1719238399-0
                          • Opcode ID: 1fc8f9502846006610ea86bcededabe56b10fc86e1d8efdff635e606de639ffa
                          • Instruction ID: 1d80b278ad086fb3b5fe675fd175d4e69262a242576348e003e8e87f105479d5
                          • Opcode Fuzzy Hash: 1fc8f9502846006610ea86bcededabe56b10fc86e1d8efdff635e606de639ffa
                          • Instruction Fuzzy Hash: AE511BB5900204CFCB04EFA8D59499DBBF1FF48310F45826AE855AB361DB34A849CF95
                          APIs
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0040F2A4
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F2D2
                            • Part of subcall function 00472140: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,004086DF), ref: 0047214E
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F38E
                            • Part of subcall function 0046F2E0: _ZN9QListData6detachEi.QT5CORE(?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F2F9
                            • Part of subcall function 0046F2E0: _Znwj.LIBSTDC++-6(?,?,?,?,?,?,?,?,?,000BA158,?,0040F332), ref: 0046F328
                          • _ZNK19QAbstractScrollArea8viewportEv.QT5WIDGETS ref: 0040F3BF
                          • _ZNK7QWidget11mapToGlobalERK6QPoint.QT5WIDGETS ref: 0040F3CD
                          • _ZN5QMenu5popupERK6QPointP7QAction.QT5WIDGETS ref: 0040F3ED
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F400
                          • _ZNK7QWidget7actionsEv.QT5WIDGETS ref: 0040F435
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Widget7actions$ListPoint$AbstractActionArea8viewportDataData6detachData7disposeGlobalItemMenu5popupModel12selectedRowsScrollSelectionWidget11mapZnwj
                          • String ID:
                          • API String ID: 2916371295-0
                          • Opcode ID: 9c3c7fcf2a2a09a9c2401283965c5b83575844324075397ae28af49db8d8e920
                          • Instruction ID: 9c98247144ffc28fbc71ecbca75fc3e9f8a79019f36303f426b6489b9b12b18b
                          • Opcode Fuzzy Hash: 9c3c7fcf2a2a09a9c2401283965c5b83575844324075397ae28af49db8d8e920
                          • Instruction Fuzzy Hash: C7511AB5A00204CFCB04EFACD59499DBBF1FF48310F05866AE855AB361DB34A845CF95
                          APIs
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0040A849
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A936
                            • Part of subcall function 00447B90: _ZNK9QComboBox5countEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447B9B
                            • Part of subcall function 00447B90: _ZNK9QComboBox8maxCountEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447BAB
                            • Part of subcall function 00447B90: _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00447BD1
                            • Part of subcall function 00447B90: _ZN5QIconC1Ev.QT5GUI ref: 00447BE2
                            • Part of subcall function 00447B90: _ZN9QComboBox10insertItemEiRK5QIconRK7QStringRK8QVariant.QT5WIDGETS ref: 00447C00
                            • Part of subcall function 00447B90: _ZN5QIconD1Ev.QT5GUI ref: 00447C0B
                            • Part of subcall function 00447B90: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00447C2D
                            • Part of subcall function 00447B90: _ZN8QVariantD1Ev.QT5CORE ref: 00447C35
                            • Part of subcall function 00447B90: _ZN9QComboBox15setCurrentIndexEi.QT5WIDGETS ref: 00447C44
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040A87D
                          • _ZN9QComboBox14setCurrentTextERK7QString.QT5WIDGETS ref: 0040A895
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A8BE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A914
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$ArrayData10deallocateS_jj$IconText$Box11currentCurrentStringVariant$Ascii_helperBox10insertBox14setBox15setBox5countBox8maxCountIndexItemString16from
                          • String ID:
                          • API String ID: 436334179-0
                          • Opcode ID: ac9ea4bfd308a7f64739833cca120108e6bbab5332ddce599db0cfa0bbdc84f5
                          • Instruction ID: 0696b0f37001b215b65a261b980df13cce6043faf368dda74316f6044fe5aeb9
                          • Opcode Fuzzy Hash: ac9ea4bfd308a7f64739833cca120108e6bbab5332ddce599db0cfa0bbdc84f5
                          • Instruction Fuzzy Hash: 1C416DB4A043019FDB14EF68C48865EBBB1FF80314F15CA69E8546B3A4D73A9C56CB46
                          APIs
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0040B999
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040B9BF
                          • _ZN9QComboBox14setCurrentTextERK7QString.QT5WIDGETS ref: 0040B9D7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BA00
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BA56
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040BA78
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$ComboText$Ascii_helperBox11currentBox14setCurrentStringString16from
                          • String ID:
                          • API String ID: 2409670204-0
                          • Opcode ID: b5963723eaef2308cc70044d6df1ac1f2f290848428dacfc3efb09fbf1c83202
                          • Instruction ID: e343861c51bbba07e51f47281e6796af6d168b466613994d08656fb74d121144
                          • Opcode Fuzzy Hash: b5963723eaef2308cc70044d6df1ac1f2f290848428dacfc3efb09fbf1c83202
                          • Instruction Fuzzy Hash: AA415EB4A04305DFDB14DF68C48866EBBB1FF80314F14C669E8546B3A4D73A9945CF8A
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6cad4bfe446e423c93e424b2512113f38dc05b738e3e65832d5d7511a2573d0b
                          • Instruction ID: 1dc741c5953e62c9da19c780657aa9c731f4862c06f36105a12fabb1e0ef5a1e
                          • Opcode Fuzzy Hash: 6cad4bfe446e423c93e424b2512113f38dc05b738e3e65832d5d7511a2573d0b
                          • Instruction Fuzzy Hash: 28313A70609645CBDB01AF00F58825AFFB0FF88784F554CC9E5C5261AACB35C879CB9A
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: signal
                          • String ID:
                          • API String ID: 1946981877-0
                          • Opcode ID: ed02623f9f9ea33c10627bb6363fcf7cf73d12fd6aa1a098db85f0315eda1cef
                          • Instruction ID: 81f22786daf9d95947ca89c7cc1c2dc43633ef1b9f74b7cc4f4508d15cd6cc39
                          • Opcode Fuzzy Hash: ed02623f9f9ea33c10627bb6363fcf7cf73d12fd6aa1a098db85f0315eda1cef
                          • Instruction Fuzzy Hash: ED2171704046009EEB206F65C54036F7690AB097A6F15498BDED487363C7BD9C8CD75F
                          APIs
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0040A849
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A936
                            • Part of subcall function 00447B90: _ZNK9QComboBox5countEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447B9B
                            • Part of subcall function 00447B90: _ZNK9QComboBox8maxCountEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040A86E), ref: 00447BAB
                            • Part of subcall function 00447B90: _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00447BD1
                            • Part of subcall function 00447B90: _ZN5QIconC1Ev.QT5GUI ref: 00447BE2
                            • Part of subcall function 00447B90: _ZN9QComboBox10insertItemEiRK5QIconRK7QStringRK8QVariant.QT5WIDGETS ref: 00447C00
                            • Part of subcall function 00447B90: _ZN5QIconD1Ev.QT5GUI ref: 00447C0B
                            • Part of subcall function 00447B90: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00447C2D
                            • Part of subcall function 00447B90: _ZN8QVariantD1Ev.QT5CORE ref: 00447C35
                            • Part of subcall function 00447B90: _ZN9QComboBox15setCurrentIndexEi.QT5WIDGETS ref: 00447C44
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040A87D
                          • _ZN9QComboBox14setCurrentTextERK7QString.QT5WIDGETS ref: 0040A895
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A8BE
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040A914
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$ArrayData10deallocateS_jj$IconText$Box11currentCurrentStringVariant$Ascii_helperBox10insertBox14setBox15setBox5countBox8maxCountIndexItemString16from
                          • String ID:
                          • API String ID: 436334179-0
                          • Opcode ID: e83c8c2e4c4ba2a5609b1b333ee09b48abdd4e686986db13c1345248cb626af2
                          • Instruction ID: b7d0d5d420744d52403ae7e0d49f0f7ab01185763ee2c92745f27ead5fef7d09
                          • Opcode Fuzzy Hash: e83c8c2e4c4ba2a5609b1b333ee09b48abdd4e686986db13c1345248cb626af2
                          • Instruction Fuzzy Hash: 433114B4A043059FDB00EF68C48869EBBF1FF84304F11C96DE8946B365D739A845CB86
                          APIs
                            • Part of subcall function 00403280: _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 004032C0
                            • Part of subcall function 00403280: _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 004032F1
                            • Part of subcall function 00403280: _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 00403337
                            • Part of subcall function 00403280: _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 0040337A
                          • _ZN8QSysInfo14windowsVersionEv.QT5CORE ref: 00403CEF
                          • _Znwj.LIBSTDC++-6 ref: 00403D37
                          • _ZN17QWinTaskbarButtonC1EP7QObject.QT5WINEXTRAS ref: 00403D43
                          • _ZNK7QWidget12windowHandleEv.QT5WIDGETS ref: 00403D54
                          • _ZN17QWinTaskbarButton9setWindowEP7QWindow.QT5WINEXTRAS ref: 00403D63
                          • _ZNK17QWinTaskbarButton8progressEv.QT5WINEXTRAS ref: 00403D72
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: PointWidget4move$Taskbar$Window$ButtonButton8progressButton9setHandleInfo14windowsObjectVersionWidget12windowZnwj
                          • String ID:
                          • API String ID: 1518945770-0
                          • Opcode ID: 3b8d393ae1d71d759b1ee2e84859385415be9bdad3b9c429fd2e34ca8ececdf7
                          • Instruction ID: b9214213e01cceb10ee1e146f33c6b55dac43d678d3e6ade39834c106db72767
                          • Opcode Fuzzy Hash: 3b8d393ae1d71d759b1ee2e84859385415be9bdad3b9c429fd2e34ca8ececdf7
                          • Instruction Fuzzy Hash: A30140B06001408FDB04BFA9E5E966E7FA8FF44341F40067EEC468B296DB789954CB66
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 0040F89E
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8CC
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayData10deallocateFormatResumeS_jjSettingsUnwind_
                          • String ID:
                          • API String ID: 1695743215-0
                          • Opcode ID: 384303928fd4c32c6cd1e1bd877cf7f8a219365cfe276243c76423843ee3173c
                          • Instruction ID: 1326457d191d020e2d3517292ddfd3834b584c23de17cd01f7aa60df4df61fdb
                          • Opcode Fuzzy Hash: 384303928fd4c32c6cd1e1bd877cf7f8a219365cfe276243c76423843ee3173c
                          • Instruction Fuzzy Hash: 6501AD34E00608CBCB28EFB6C5944ECF7B1AF4C304B54816EE826A7362DBB85945DF49
                          APIs
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 0040F89E
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8CC
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayData10deallocateFormatResumeS_jjSettingsUnwind_
                          • String ID:
                          • API String ID: 1695743215-0
                          • Opcode ID: 86d1bc57d1ff1a88023f80cdacf060567a1d669dab6391b3cdbf303584bf3b59
                          • Instruction ID: 303caeb5d398a690ff75a1c9c72a6f2923cb8e506ecd71dbf0fb0c8a34b43822
                          • Opcode Fuzzy Hash: 86d1bc57d1ff1a88023f80cdacf060567a1d669dab6391b3cdbf303584bf3b59
                          • Instruction Fuzzy Hash: 4501DE35E006048BCB28EFB5C4A44ECB7B1AF4C304B54417ED816A7362DB7859459F49
                          APIs
                          • __cxa_begin_catch.LIBSTDC++-6 ref: 0041FBD6
                          • __cxa_rethrow.LIBSTDC++-6 ref: 0041FBDB
                          • _ZNSt9exceptionD2Ev.LIBSTDC++-6 ref: 0041FBF2
                            • Part of subcall function 00452AC0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE(?,?,?,?,?,?,?,?,?,00406496), ref: 00452ADE
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041FC05
                          • _ZNSt9exceptionD2Ev.LIBSTDC++-6 ref: 0041FC16
                          • __cxa_end_catch.LIBSTDC++-6 ref: 0041FC1B
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: St9exception$ArrayData10deallocateResumeS_jjUnwind___cxa_begin_catch__cxa_end_catch__cxa_rethrow
                          • String ID:
                          • API String ID: 697205320-0
                          • Opcode ID: f32fe3cc68e374d25f946e5aefa42742a2e08e8625414e8bde0d488c50341bb6
                          • Instruction ID: 5def9db77dda775c848a538ff12257b2e77f883db6b18963e58b42344e1cbb7e
                          • Opcode Fuzzy Hash: f32fe3cc68e374d25f946e5aefa42742a2e08e8625414e8bde0d488c50341bb6
                          • Instruction Fuzzy Hash: D2E0BF709072048ADB10FFB6CA916DD7AB06F55309F0105AFA94553243DFBC198DCE6A
                          APIs
                          • _ZNK9QGroupBox9isCheckedEv.QT5WIDGETS ref: 00405634
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00405666
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 0040567B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004056A0
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 004056D4
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 004056E7
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00405702
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00405716
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 00405725
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 00405750
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0040577D
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004057FD
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00405821
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 00405836
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Box11currentCheckedComboGroupMetaObject2trS1_iText$AbstractBox8setButton9isStringTitle$ArrayBox9isData10deallocateDoubleS_jjString6appendString8to
                          • String ID: Jog
                          • API String ID: 70142446-3019854487
                          • Opcode ID: ad6d0f3afdb2c3f9f9872e0a9cd268423b031c3f302a343cb6d4b9da25128ad1
                          • Instruction ID: d4b3fd41a5610159c4ee2e60359134230131eab13dca24daa426cb08bb0095f7
                          • Opcode Fuzzy Hash: ad6d0f3afdb2c3f9f9872e0a9cd268423b031c3f302a343cb6d4b9da25128ad1
                          • Instruction Fuzzy Hash: 9F0180B15042009FCB00AF54D8486ABBBB4FB80314F40C96DE9585B391C739A809CB89
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: __deregister_frame_info$libgcc_s_dw2-1.dll
                          • API String ID: 4061214504-2468945734
                          • Opcode ID: 95a46238dd6fd8d8216cf124d60d073914001e4491105daa260e90d1e1ee2592
                          • Instruction ID: a50b370b727f79d6a9d10c83d962b8a5a8dc3081e3d586a2ae2333f83507794a
                          • Opcode Fuzzy Hash: 95a46238dd6fd8d8216cf124d60d073914001e4491105daa260e90d1e1ee2592
                          • Instruction Fuzzy Hash: 43F012719046004BC7007FBC991911B7AE4BB85305F45853DD886D7265EB79E808C79A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: __deregister_frame_info$libgcc_s_dw2-1.dll
                          • API String ID: 4061214504-2468945734
                          • Opcode ID: 3630f7f101a6a2b9aa535b997e9dde9bf075640f45351bbb75c9735f596820fa
                          • Instruction ID: 7075c7dc402dea5a4b96fbc97c9f8986dc731d9fcb70b8d16867739564d93037
                          • Opcode Fuzzy Hash: 3630f7f101a6a2b9aa535b997e9dde9bf075640f45351bbb75c9735f596820fa
                          • Instruction Fuzzy Hash: A3F030B09046004BC7007FBC9A1D11B7EE4BB81309F44853DC886D7365EBB9E808C79A
                          APIs
                          • _ZN9QListData6detachEi.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470842
                          • _ZeqRK7QStringS1_.QT5CORE ref: 004708E6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00470930
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00470957
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Data6detachListString
                          • String ID:
                          • API String ID: 2903882118-0
                          • Opcode ID: fb247ee316b20dd238cb0d63f3cd5026cfa6235dea2ef799b83995a8bfbdb0b8
                          • Instruction ID: 2a5d3cee46fdb401d65d05cf09ed6b4301faf412c9caaf9bc3ae0680814e0ad5
                          • Opcode Fuzzy Hash: fb247ee316b20dd238cb0d63f3cd5026cfa6235dea2ef799b83995a8bfbdb0b8
                          • Instruction Fuzzy Hash: BB51AAB4906205CFDB10DF68D4C4A9EB7B1FF80320F19C26AD5595B361D73AAC46CB86
                          APIs
                          • _ZN9QListData6detachEi.QT5CORE ref: 0040EB08
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0040EB44
                          • _Znwj.LIBSTDC++-6 ref: 0040EB92
                          • _ZN9QListData6detachEi.QT5CORE ref: 0040EBC3
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0040EBFB
                          • memcpy.MSVCRT ref: 0040ECB1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData6detachData7dispose$Znwjmemcpy
                          • String ID:
                          • API String ID: 3920168834-0
                          • Opcode ID: 365a657ba61a030ccfbb050301d07c5022a5f2cb47727126ceea21a9abb568ae
                          • Instruction ID: 9746b5e401904ed91787c9dbb65e908ebcb6a564668d461bae80fa333119fd71
                          • Opcode Fuzzy Hash: 365a657ba61a030ccfbb050301d07c5022a5f2cb47727126ceea21a9abb568ae
                          • Instruction Fuzzy Hash: 67517BB4A04205CFCB04EF69D088959BBF1FF84350F2589AAD846AB366E734EC55CF85
                          APIs
                            • Part of subcall function 0044D680: _ZNK8QSpinBox5valueEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6AD
                            • Part of subcall function 0044D680: _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6C1
                            • Part of subcall function 0044D680: _ZN7QString16fromAscii_helperEPKci.QT5CORE(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6E7
                            • Part of subcall function 0044D680: _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6FC
                            • Part of subcall function 0044D680: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044D721
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 0040636C
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 00406392
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004063D4
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 00406432
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 00406458
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$ByteData10deallocateDevice5writeS_jj$AbstractAscii_helperBox5valueButton9isCheckedSheetSpinStringString16fromStyleWidget13set
                          • String ID:
                          • API String ID: 3407907801-0
                          • Opcode ID: 40d36e68da1786be1aff332e908d6ab7c7fc67585dd6b72d7eb253f505b30262
                          • Instruction ID: 6b2696becdb9c9f79d3dc369803c488008cfefa0dbcf97f0c20df4e9c551aad3
                          • Opcode Fuzzy Hash: 40d36e68da1786be1aff332e908d6ab7c7fc67585dd6b72d7eb253f505b30262
                          • Instruction Fuzzy Hash: C041C574A042048BCB04EF79C4C46AEBBF1AFC4341F05C53EE85697396DA3C98198B99
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040C410
                            • Part of subcall function 00432C50: _ZNK9QLineEdit4textEv.QT5WIDGETS(?,?,?,?,?,00410EEB), ref: 00432C66
                          • _ZNK7QString5splitERKS_NS_13SplitBehaviorEN2Qt15CaseSensitivityE.QT5CORE ref: 0040C44E
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040C4B3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040C4E0
                          • _ZN7QString14trimmed_helperERKS_.QT5CORE ref: 0040C53A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperBehaviorCaseEdit4textLineQt15S_13SensitivitySplitString14trimmed_helperString16fromString5split
                          • String ID:
                          • API String ID: 4253653670-0
                          • Opcode ID: 8fd0accbea6f943620c0a394d00927d50e8fb52ab80d07e2e34dd687d6ad735b
                          • Instruction ID: a1689f97f7a9341dd5d81918fb74108d307d454cdaee712806e4eee36a3a3da7
                          • Opcode Fuzzy Hash: 8fd0accbea6f943620c0a394d00927d50e8fb52ab80d07e2e34dd687d6ad735b
                          • Instruction Fuzzy Hash: 995168B4904204DFCB00EFA9D4C46AEBBF1FF88314F14862EE455AB390D739A844CB95
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040C650
                            • Part of subcall function 004327D0: _ZNK9QLineEdit4textEv.QT5WIDGETS(?,?,?,?,?,00410F64), ref: 004327E6
                          • _ZNK7QString5splitERKS_NS_13SplitBehaviorEN2Qt15CaseSensitivityE.QT5CORE ref: 0040C68E
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040C6F3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040C720
                          • _ZN7QString14trimmed_helperERKS_.QT5CORE ref: 0040C77A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Ascii_helperBehaviorCaseEdit4textLineQt15S_13SensitivitySplitString14trimmed_helperString16fromString5split
                          • String ID:
                          • API String ID: 4253653670-0
                          • Opcode ID: 26d60aa439141f0fd5098640bc96fd644d9eb5e2e82ebd6a96eb3e13877df542
                          • Instruction ID: 1bfd637c7b1852a467a6272579b9fab08ea9975654a0c2e4bd65cef1d5d9bc93
                          • Opcode Fuzzy Hash: 26d60aa439141f0fd5098640bc96fd644d9eb5e2e82ebd6a96eb3e13877df542
                          • Instruction Fuzzy Hash: D8514670900205DFCB00EFA9D4C46AEBBF1FF88314F14862AE455AB391DB799845CF9A
                          APIs
                          • _ZN7QObject11eventFilterEPS_P6QEvent.QT5CORE ref: 0040D1AC
                          • _ZN15QAbstractButton10setCheckedEb.QT5WIDGETS ref: 0040D2C0
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0040D309
                          • _ZN15QAbstractButton8releasedEv.QT5WIDGETS ref: 0040D4E1
                          • _ZN15QAbstractButton7pressedEv.QT5WIDGETS ref: 0040D500
                          • _ZNK19QAbstractScrollArea17verticalScrollBarEv.QT5WIDGETS ref: 0040D5A8
                          • _ZNK9QSplitter11handleWidthEv.QT5WIDGETS ref: 0040D5D3
                          • _ZN9QSplitter8setSizesERK5QListIiE.QT5WIDGETS ref: 0040D64E
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Abstract$CheckedScroll$Area17verticalButton10setButton7pressedButton8releasedButton9isEventFilterListObject11eventSizesSplitter11handleSplitter8setWidth
                          • String ID:
                          • API String ID: 1159920165-0
                          • Opcode ID: eb131fbd57f07251e70c9353703ceb8cd118699653fdd9eedac67682b8331eeb
                          • Instruction ID: 9c6bac95285f7575b4f408498a5e8b3143d091266f3d093f36e66ee9192c7c9a
                          • Opcode Fuzzy Hash: eb131fbd57f07251e70c9353703ceb8cd118699653fdd9eedac67682b8331eeb
                          • Instruction Fuzzy Hash: 0F414F70A046009FCB34DF98D598AAAB7B1FB44300F14467BD846AB791D738F88DCB5A
                          APIs
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0040EB44
                          • _Znwj.LIBSTDC++-6 ref: 0040EB92
                          • _ZN9QListData6detachEi.QT5CORE ref: 0040EBC3
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0040EBFB
                          • memcpy.MSVCRT ref: 0040ECB1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData7dispose$Data6detachZnwjmemcpy
                          • String ID:
                          • API String ID: 2200726570-0
                          • Opcode ID: 5415483ed33d634466a3655bddcbfbf424db51433d9e75755e7c01212be4889e
                          • Instruction ID: a0dfd64a04d84894379ce4c1ae5fc1c4f48391dcf1e9fed8c20f07ed6eb70fae
                          • Opcode Fuzzy Hash: 5415483ed33d634466a3655bddcbfbf424db51433d9e75755e7c01212be4889e
                          • Instruction Fuzzy Hash: A54159B4A04201CFCB04EF69D18485DBBF0FF84350F21896AE88A9B366E734E855CF85
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00441736
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00441763
                          • _ZN5QChar7toUpperEj.QT5CORE ref: 004417B6
                          • _ZNK7QString3midEii.QT5CORE ref: 004417DB
                          • _ZNK7QString8toDoubleEPb.QT5CORE ref: 004417EE
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Char7toDoubleString3midString8toUpper
                          • String ID:
                          • API String ID: 833767260-0
                          • Opcode ID: 7196c421cb084dee22e66d1c7dce2cef5fbfa0b23afbe5ae6803211f632fca3c
                          • Instruction ID: eabdb18023968e4d4ee02b20241ddda4bff8b69f654dd15d49fdc8ea68342791
                          • Opcode Fuzzy Hash: 7196c421cb084dee22e66d1c7dce2cef5fbfa0b23afbe5ae6803211f632fca3c
                          • Instruction Fuzzy Hash: 4B419D74900209DFDB10EF68D484AEEBBF1FF44314F14851AE845AB361E739A985CF96
                          APIs
                          • _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 004032C0
                          • _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 004032F1
                          • _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 00403337
                          • _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 0040337A
                          • _ZN7QWidget4moveERK6QPoint.QT5WIDGETS ref: 004033B4
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: PointWidget4move
                          • String ID:
                          • API String ID: 3082182115-0
                          • Opcode ID: fad24af7232e162d362097a60ba5fe63b7aad96865837b3fc9f65dc38b04cc7e
                          • Instruction ID: 19dad2beeb300dc92935be57b2c0f0a6f6b06171ec5be51c2b93ab0e4b94bed9
                          • Opcode Fuzzy Hash: fad24af7232e162d362097a60ba5fe63b7aad96865837b3fc9f65dc38b04cc7e
                          • Instruction Fuzzy Hash: 6841D4B960020A8FCB08DF28D68481ABFF1FF88304F114659E8549B716D730F996CFA6
                          APIs
                            • Part of subcall function 00405500: _ZNK7QWidget12contentsRectEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,0040D357), ref: 00405520
                            • Part of subcall function 00405500: _ZNK7QWidget6layoutEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040D357), ref: 00405566
                            • Part of subcall function 00405500: _ZNK7QLayout6marginEv.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040D357), ref: 0040556E
                          • _ZN7QObject11eventFilterEPS_P6QEvent.QT5CORE ref: 0040D1AC
                          • _ZNK7QWidget11minimumSizeEv.QT5WIDGETS ref: 0040D385
                            • Part of subcall function 00472AD0: _ZN9QListData6appendEv.QT5CORE(?,?,?,?,?,?,?,?,?,0040D0FE), ref: 00472B07
                          • _ZN9QSplitter8setSizesERK5QListIiE.QT5WIDGETS ref: 0040D40D
                            • Part of subcall function 00472C50: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,00443248), ref: 00472C5E
                          • _ZNK9QSplitter11handleWidthEv.QT5WIDGETS ref: 0040D452
                          • _ZN7QWidget16setMinimumHeightEi.QT5WIDGETS ref: 0040D474
                          • _ZNK19QAbstractScrollArea17verticalScrollBarEv.QT5WIDGETS ref: 0040D5A8
                          • _ZNK9QSplitter11handleWidthEv.QT5WIDGETS ref: 0040D5D3
                          • _ZN9QSplitter8setSizesERK5QListIiE.QT5WIDGETS ref: 0040D64E
                          • _ZN7QWidget16setMinimumHeightEi.QT5WIDGETS ref: 0040D688
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$HeightMinimumScrollSizesSplitter11handleSplitter8setWidget16setWidth$AbstractArea17verticalDataData6appendData7disposeEventFilterLayout6marginObject11eventRectSizeWidget11minimumWidget12contentsWidget6layout
                          • String ID:
                          • API String ID: 1387568830-0
                          • Opcode ID: 1bba0ae9ee12ca9148fe58d6fff17d12aa99435f74eac7ba4b0b6e9cb64a2e28
                          • Instruction ID: 8d6af24f0b2b5cf3c0ef5b8bb9ad9fce0c275b28283e330afc5d3e12e35dcced
                          • Opcode Fuzzy Hash: 1bba0ae9ee12ca9148fe58d6fff17d12aa99435f74eac7ba4b0b6e9cb64a2e28
                          • Instruction Fuzzy Hash: D341E675A006058FCB14DFA8D58899EFBF1FF48300B50867AD84AAB355DB34E846CF99
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32 ref: 00451808
                          • GetCurrentProcessId.KERNEL32 ref: 00451819
                          • GetCurrentThreadId.KERNEL32 ref: 00451821
                          • GetTickCount.KERNEL32 ref: 0045182A
                          • QueryPerformanceCounter.KERNEL32 ref: 00451839
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                          • String ID:
                          • API String ID: 1445889803-0
                          • Opcode ID: ff65558b2ed8dee453585ad13dbd9d60dc665dd3a428bf7baf23b0185b45d368
                          • Instruction ID: a50efaecf7b6c0c7230a3759fd25a85f6e024e7d0290bf38aa2b29cda43f4317
                          • Opcode Fuzzy Hash: ff65558b2ed8dee453585ad13dbd9d60dc665dd3a428bf7baf23b0185b45d368
                          • Instruction Fuzzy Hash: 23110776D002188BCF10AFB9E8485CEFBB4FB0C265F854676EC05B7220DB35A9548BA5
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00405248
                          • _ZN7QWidget6updateEv.QT5WIDGETS ref: 00405253
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 00405260
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0040528D
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 004052D0
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 00405306
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00405331
                          • _ZN7QString6appendERKS_.QT5CORE ref: 00405358
                          • _ZN9QGroupBox8setTitleERK7QString.QT5WIDGETS ref: 0040536D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00405396
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004053BC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004053DE
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$EventsMetaObject2trS1_i$AbstractApplication13processBox8setButton9isCharCheckedCoreEventExii5FlagFlagsGroupLoop17ProcessStringString3argString6appendTitleWidget6update
                          • String ID:
                          • API String ID: 2124586462-0
                          • Opcode ID: fa517bb1335b777c05ba313da53fc4114f0028461e4ddd6fa9e33f6e90b581df
                          • Instruction ID: 442310094518be233c8d2103f67163159f797ae4078230c5fab1ad9420691c59
                          • Opcode Fuzzy Hash: fa517bb1335b777c05ba313da53fc4114f0028461e4ddd6fa9e33f6e90b581df
                          • Instruction Fuzzy Hash: F02136B46047008FDB00DF64D48879EBBF0FF84355F148669E895A72A4C77A9889CF06
                          APIs
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EA7C
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EA91
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EAA6
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EABB
                          • _ZdlPv.LIBSTDC++-6 ref: 0041EAF0
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041ED1E
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: EnabledWidget10set$StreamlsText
                          • String ID:
                          • API String ID: 4031625570-0
                          • Opcode ID: da26cfa19525cbdbe8b4d9206ecec8c67b8ecb57b70a4c0138bd8399b81d9caf
                          • Instruction ID: d141479979c51f6ac98ef1fa6a7426f2593618832348063da823ced5e3fab29c
                          • Opcode Fuzzy Hash: da26cfa19525cbdbe8b4d9206ecec8c67b8ecb57b70a4c0138bd8399b81d9caf
                          • Instruction Fuzzy Hash: 0E115E742002008FD714EF69D4847AEB7F1BF84304F05456DD88A4B391DB79A899CB97
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044E503
                          • _ZNK9QComboBox5countEv.QT5WIDGETS ref: 0044E50F
                          • _ZNK9QComboBox12currentIndexEv.QT5WIDGETS ref: 0044E518
                          • _ZN9QComboBox15setCurrentIndexEi.QT5WIDGETS ref: 0044E527
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0044E537
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$Index$ArrayBox11currentBox12currentBox15setBox5countCurrentData10deallocateS_jjText
                          • String ID:
                          • API String ID: 2275530497-0
                          • Opcode ID: 6847eca45b22e2ec39fa70e9a6747ebe1919ae23a8647cc9c0ff5cd08909da5d
                          • Instruction ID: a0f54347647c10017ea0337f48da03108cc1b43135ac611dde9894b6747a47e5
                          • Opcode Fuzzy Hash: 6847eca45b22e2ec39fa70e9a6747ebe1919ae23a8647cc9c0ff5cd08909da5d
                          • Instruction Fuzzy Hash: 8E01A1B12043008FDB14AF7AE8D851A7BA5FFC4708F114A39E54587260E635A849CB86
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040B701
                          • _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS ref: 0040B727
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 0040B747
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 0040B76D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B796
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040B7D9
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B81E
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$Data10deallocateS_jj$AbstractAscii_helperButton9isByteCheckedDevice5writeResumeString16fromUnwind_
                          • String ID:
                          • API String ID: 891393539-0
                          • Opcode ID: 452825d0d8269914daa1f99a6b99935598414af462128e85bc6652db97de3f7e
                          • Instruction ID: 946327c79f650188a806fecd6fe6e4286e9c3ce9d40666d35653fd08ac918ca8
                          • Opcode Fuzzy Hash: 452825d0d8269914daa1f99a6b99935598414af462128e85bc6652db97de3f7e
                          • Instruction Fuzzy Hash: C8118F75A003059FCB04EF64C88869EBBF0FF84354F05C52DE9459B355C774A806CB99
                          APIs
                          • strlen.MSVCRT ref: 00472D7A
                          • _ZN7QString15fromUtf8_helperEPKci.QT5CORE(?,?,?,?,?,?,?,?,?,?,0041D7BC), ref: 00472D8D
                          • _ZN11QTextStreamlsERK7QString.QT5CORE(?,?,?,?,?,?,?,?,?,?,0041D7BC), ref: 00472D98
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472DBD
                          • _ZN11QTextStreamlsEc.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,0041D7BC), ref: 00472DD2
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: StreamlsText$ArrayData10deallocateS_jjStringString15fromUtf8_helperstrlen
                          • String ID:
                          • API String ID: 76058871-0
                          • Opcode ID: 87cbf47382d09412745ad5c05ffaaa43e5676379e660403fbbec408082d51bb5
                          • Instruction ID: 462a490ab7523b69d89550735ee48b950555c9352381f40dec73fea9a2d71565
                          • Opcode Fuzzy Hash: 87cbf47382d09412745ad5c05ffaaa43e5676379e660403fbbec408082d51bb5
                          • Instruction Fuzzy Hash: 5B1186B19046009FD710AF68D5C87AEBFB1FF81310F10862EE85487364D7B99889CB96
                          APIs
                          • _ZN9QComboBox13keyPressEventEP9QKeyEvent.QT5WIDGETS ref: 00447D0C
                          • _ZNK9QComboBox5countEv.QT5WIDGETS ref: 00447D50
                          • _ZNK9QComboBox8maxCountEv.QT5WIDGETS ref: 00447D61
                          • _ZNK9QComboBox8maxCountEv.QT5WIDGETS ref: 00447D6A
                          • _ZN9QComboBox10removeItemEi.QT5WIDGETS ref: 00447D74
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$Box8maxCountEvent$Box10removeBox13keyBox5countItemPress
                          • String ID:
                          • API String ID: 3757367114-0
                          • Opcode ID: 6bbe36bbfd5e3193f6285b53d50162b7caab20e083dd2c3e5111e7199119237d
                          • Instruction ID: 6918e7c6c201f815e8049b4e3973556482b312dafec4f3c7bab0b291b4dc4680
                          • Opcode Fuzzy Hash: 6bbe36bbfd5e3193f6285b53d50162b7caab20e083dd2c3e5111e7199119237d
                          • Instruction Fuzzy Hash: B001F571E141048BCF04AF7DE85806EBB69FB84364F40423BE911C7290DB34A956CBC9
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8CC
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayData10deallocateFormatResumeS_jjSettingsUnwind_
                          • String ID:
                          • API String ID: 1695743215-0
                          • Opcode ID: df5bccb8842e1aa39e058efb6cb5da709a8f116f399d4425b7ba6d910d917cfb
                          • Instruction ID: 22139fb0266d5e2f82ebb85e50f489497f2d10474909a1745bb9620058062367
                          • Opcode Fuzzy Hash: df5bccb8842e1aa39e058efb6cb5da709a8f116f399d4425b7ba6d910d917cfb
                          • Instruction Fuzzy Hash: AAF0CD35E006048BCB28FBB5C5D04ECB771AF4C304B54457ED816A7262DBB859469F59
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8CC
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayData10deallocateFormatResumeS_jjSettingsUnwind_
                          • String ID:
                          • API String ID: 1695743215-0
                          • Opcode ID: 3f5832e7138d23ac160cfceba81ab4027b9d5ed1701f3bc94287bc0124e11a39
                          • Instruction ID: 97a0633d503d22aa8cdf331064dd1576bb99cbe50e7e88f332ba8add7f6a880f
                          • Opcode Fuzzy Hash: 3f5832e7138d23ac160cfceba81ab4027b9d5ed1701f3bc94287bc0124e11a39
                          • Instruction Fuzzy Hash: 65F0EC35E006048BCB28EFB5C8D04ECF7B0AF0C304B54457ED816A7262DBB859469F59
                          APIs
                          • _Znwj.LIBSTDC++-6 ref: 00403D37
                          • _ZN17QWinTaskbarButtonC1EP7QObject.QT5WINEXTRAS ref: 00403D43
                          • _ZNK7QWidget12windowHandleEv.QT5WIDGETS ref: 00403D54
                          • _ZN17QWinTaskbarButton9setWindowEP7QWindow.QT5WINEXTRAS ref: 00403D63
                          • _ZNK17QWinTaskbarButton8progressEv.QT5WINEXTRAS ref: 00403D72
                            • Part of subcall function 00403470: __cxa_guard_acquire.LIBSTDC++-6 ref: 00403498
                            • Part of subcall function 00403470: _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 00403533
                            • Part of subcall function 00403470: _ZN15QAbstractButton7setTextERK7QString.QT5WIDGETS ref: 00403548
                            • Part of subcall function 00403470: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00403571
                            • Part of subcall function 00403470: _ZN7QWidget15setMinimumWidthEi.QT5WIDGETS ref: 00403591
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Taskbar$Window$AbstractArrayButtonButton7setButton8progressButton9setData10deallocateHandleMetaMinimumObjectObject2trS1_iS_jjStringTextWidget12windowWidget15setWidthZnwj__cxa_guard_acquire
                          • String ID:
                          • API String ID: 350790332-0
                          • Opcode ID: 47999cf8e7d62eea7b92bc10fdfb4638d7cd5dcab0447f57df81fa2cbfbe78c6
                          • Instruction ID: f2da5d230460204b84bc1c40a4573bee89853f8e0e254070c30a8de47fb7d6e2
                          • Opcode Fuzzy Hash: 47999cf8e7d62eea7b92bc10fdfb4638d7cd5dcab0447f57df81fa2cbfbe78c6
                          • Instruction Fuzzy Hash: EDF031B55001008FDB04BF64D4A95ADBBB4BF44341F41067EDC468B295DB786558CB56
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8CC
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayData10deallocateFormatResumeS_jjSettingsUnwind_
                          • String ID:
                          • API String ID: 1695743215-0
                          • Opcode ID: b2674ebd15015f76c049df446332574736a21b6a66984d449a80022e69fb7b92
                          • Instruction ID: 4ad38d79a29f3900fe6f6dd9bb6392c2afa52914384e9c26cf1f62e246f3db1f
                          • Opcode Fuzzy Hash: b2674ebd15015f76c049df446332574736a21b6a66984d449a80022e69fb7b92
                          • Instruction Fuzzy Hash: 3BF0F935E002088BCB28EFB5C8D04ECB7B0AF0C300B50453ED816A7262EB785946DF59
                          APIs
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8CC
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Variant$ArrayData10deallocateFormatResumeS_jjSettingsUnwind_
                          • String ID:
                          • API String ID: 1695743215-0
                          • Opcode ID: ed16a72fd94359f7d550167b04be889123fb6c827449b401f4c7be87bc76826e
                          • Instruction ID: 9c79761076acdf2177a865d9cedac8644a7615e81d2764fe9b97a5b7f31bc3d1
                          • Opcode Fuzzy Hash: ed16a72fd94359f7d550167b04be889123fb6c827449b401f4c7be87bc76826e
                          • Instruction Fuzzy Hash: 09F0B735E002088BCB28EBA5C8949ECB7B0AF0C304B54453ED416A7262EB7459469F59
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5CD
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041E5D7
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5E0
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0041E5F2
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5FB
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$ArrayData10deallocateDebugS_jjVariant
                          • String ID:
                          • API String ID: 367796544-0
                          • Opcode ID: 552f9f30e011e0f8a6c836f1d44f8009dac41ea9a5d3018e1a1419f9d8d83e55
                          • Instruction ID: 10d10dfdb579f67cef048295c27901b78fbb1281eb6f8ff4fe6d1195b65fe67d
                          • Opcode Fuzzy Hash: 552f9f30e011e0f8a6c836f1d44f8009dac41ea9a5d3018e1a1419f9d8d83e55
                          • Instruction Fuzzy Hash: 72E0C9346047148BC708BFB2D9950ADB771BF08349B40092EE9475B267EEF849489A99
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5CD
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041E5D7
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5E0
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0041E5F2
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5FB
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$ArrayData10deallocateDebugS_jjVariant
                          • String ID:
                          • API String ID: 367796544-0
                          • Opcode ID: 9f24ac588fe12dd8dd6929a7a8f9ef6b9c4ff10004318469b260d58197e43256
                          • Instruction ID: ae671c733138efdc1d87e8cf266012a9428fbf9670fc0efcf3f231d75b053433
                          • Opcode Fuzzy Hash: 9f24ac588fe12dd8dd6929a7a8f9ef6b9c4ff10004318469b260d58197e43256
                          • Instruction Fuzzy Hash: 66E012342047148BC704BFB2D9D50AC7771BF08345B40092FE9434B223EEBC4945D75A
                          APIs
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5CD
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041E5D7
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5E0
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0041E5F2
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5FB
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$ArrayData10deallocateDebugS_jjVariant
                          • String ID:
                          • API String ID: 367796544-0
                          • Opcode ID: 2e18e197b5bee19a507151425534179b35c79d35dc239f284c53ba7bd096396e
                          • Instruction ID: 7260e3c322be1b6fb5a29e92b92cd991d826bbf8e757a1eaaf29374b5e1fb598
                          • Opcode Fuzzy Hash: 2e18e197b5bee19a507151425534179b35c79d35dc239f284c53ba7bd096396e
                          • Instruction Fuzzy Hash: 10E0C2346003188BC704AFB1D8D85ADB7B1BF09305B00092EA9469B222EEB85D88CB55
                          APIs
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040ED39
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040ED41
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040ED49
                            • Part of subcall function 00471AA0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471AAE
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040ED18
                          • _ZdlPv.LIBSTDC++-6 ref: 0040ED22
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Debug$DataData7disposeListResumeUnwind_
                          • String ID:
                          • API String ID: 2102612617-0
                          • Opcode ID: 7a3556d95154b5c956965c546cbf931ffea6faec70680f7d56dbfc8c81749b21
                          • Instruction ID: 14c3609d191ed7963fe10a57c94cfee84fb8a8706a90e2ac46a0c73ba231209c
                          • Opcode Fuzzy Hash: 7a3556d95154b5c956965c546cbf931ffea6faec70680f7d56dbfc8c81749b21
                          • Instruction Fuzzy Hash: DAE0E63160461987CB14BF76999016CB3A5AF85344F16093FC94663263DE785D468F49
                          APIs
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5CD
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041E5D7
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5E0
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0041E5F2
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041E5FB
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$ArrayData10deallocateDebugS_jjVariant
                          • String ID:
                          • API String ID: 367796544-0
                          • Opcode ID: 46dc1a9173641ba133883b4f62e8c5305eddb1172c65d339e3f796219a6dfd49
                          • Instruction ID: 40af3bc8427ca9c3b872f45dbe403a1d990c5d2ed394322881e088f666578845
                          • Opcode Fuzzy Hash: 46dc1a9173641ba133883b4f62e8c5305eddb1172c65d339e3f796219a6dfd49
                          • Instruction Fuzzy Hash: 0CE0B6346147049BC704BFB2D9D90ADB7B5BF09345B40092EA9439B223EAB84888CB69
                          APIs
                          • __cxa_guard_abort.LIBSTDC++-6 ref: 00403CA7
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00403CAF
                          • __cxa_guard_abort.LIBSTDC++-6 ref: 00403CBD
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00403CC5
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00403C44
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$__cxa_guard_abort$ArrayData10deallocateS_jj
                          • String ID:
                          • API String ID: 686600420-0
                          • Opcode ID: 9d7563915399124858c7657f2b47da127ce16a0ff84a2a6d3b135c6efd279ec9
                          • Instruction ID: 7d1f9a6832e59f2c90329d1b85d6245e0e053dec88c80f50c0c528e1ae1add02
                          • Opcode Fuzzy Hash: 9d7563915399124858c7657f2b47da127ce16a0ff84a2a6d3b135c6efd279ec9
                          • Instruction Fuzzy Hash: 9DD0677121C7008AC3517FB696C222EB9E0AF1A30AF05583FA5C796243DBFC4589579F
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E846
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041E8C3
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0041E9A9
                          • _ZN9QListData6detachEi.QT5CORE ref: 0041EA0A
                          • memcpy.MSVCRT ref: 0041EA4F
                            • Part of subcall function 00472C50: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,00443248), ref: 00472C5E
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EA7C
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EA91
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EAA6
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 0041EABB
                          • _ZdlPv.LIBSTDC++-6 ref: 0041EAF0
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041EBD6
                          • _ZN17QAbstractItemView14clearSelectionEv.QT5WIDGETS ref: 0041EC79
                          • _ZN10QTableView9selectRowEi.QT5WIDGETS ref: 0041EC8C
                          • _ZN5QTimeC1Eiiii.QT5CORE ref: 0041ECB9
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041ED4B
                          • _ZN11QTextStreamlsEc.QT5CORE ref: 0041ED60
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: EnabledWidget10set$ArrayData10deallocateListS_jj$DataData7disposeStreamlsText$AbstractData6detachEiiiiItemSelectionTableTimeView14clearView9selectmemcpy
                          • String ID: default$drawn false:
                          • API String ID: 3219745582-2854321336
                          • Opcode ID: 8b3926e73c84fcb31f91de82918b917d65a3a1ca46be9a3f879e065c955ebc88
                          • Instruction ID: 597e6840d17911550d2e406f6e58514aabe136527df302f2407407a0e3629173
                          • Opcode Fuzzy Hash: 8b3926e73c84fcb31f91de82918b917d65a3a1ca46be9a3f879e065c955ebc88
                          • Instruction Fuzzy Hash: 818117B49002058FDB04EFB9C498B9EBBF1BF48304F14866DD8599B355DB39A889CF49
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040AA71
                            • Part of subcall function 004099C0: _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AAFC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Device6isOpenResumeUnwind_
                          • String ID: G92X0Y0
                          • API String ID: 1081410857-2200321382
                          • Opcode ID: 08c8079f88866395896a3af863c5efb1eff8d2824d775bf68f1036f9cfbe66b2
                          • Instruction ID: 05d43be39d05276576ffb215f090a78ae2c1ed88ab2cea73ea2597f1f539c091
                          • Opcode Fuzzy Hash: 08c8079f88866395896a3af863c5efb1eff8d2824d775bf68f1036f9cfbe66b2
                          • Instruction Fuzzy Hash: B7214BB1A043059FC700EF69C48439EBBF5FF84718F10892EE4989B392D7B95845CB8A
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040B81E
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040B862
                          • _ZNK7QString3argExii5QChar.QT5CORE ref: 0040B898
                            • Part of subcall function 004099C0: _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayAscii_helperCharData10deallocateDevice6isExii5OpenS_jjString16fromString3arg
                          • String ID: M3 S%1
                          • API String ID: 303445844-2472580429
                          • Opcode ID: b1ec2519a2cbc752f49c9ce34137a608565fe1ba067ffe28576c6463333fd7b5
                          • Instruction ID: 19986c6c2bae075201501cdd8ee1174d74ddf4081f16f14e5552301ce75251c4
                          • Opcode Fuzzy Hash: b1ec2519a2cbc752f49c9ce34137a608565fe1ba067ffe28576c6463333fd7b5
                          • Instruction Fuzzy Hash: 1A112BB19043058FDB00EF68D44839EBBF1FF84314F11892EE494A7391D7799805CB96
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040317A
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00403191
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004031B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayAscii_helperCaseData10deallocateQt15S_jjSensitivityString16fromString8endsWith
                          • String ID: .map
                          • API String ID: 3934386200-222655672
                          • Opcode ID: 370b2312bd48e57a6fa0f14c56afdf83f3fc1d678b4a1720dec6a841406a6136
                          • Instruction ID: 5e214b16000d546432187dbfd3d7cfdba7c4f50830ba22b1225be98401ef7fb6
                          • Opcode Fuzzy Hash: 370b2312bd48e57a6fa0f14c56afdf83f3fc1d678b4a1720dec6a841406a6136
                          • Instruction Fuzzy Hash: 1001D4B4804345DFDB009F64C4986AFBFB4FF45356F00C52DE4955B290D3394A44CB86
                          APIs
                          • _ZN7QString16fromAscii_helperEPKci.QT5CORE ref: 0040317A
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00403191
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004031B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayAscii_helperCaseData10deallocateQt15S_jjSensitivityString16fromString8endsWith
                          • String ID: .map
                          • API String ID: 3934386200-222655672
                          • Opcode ID: 22cf56a2d902c590ab61b5a37c4114bac9867f8a663a644c42a96773d4db78b1
                          • Instruction ID: b8fb13408b364b0cc04cbe213405fc12c61d6127d62a5bb0ec10ca19f320ba36
                          • Opcode Fuzzy Hash: 22cf56a2d902c590ab61b5a37c4114bac9867f8a663a644c42a96773d4db78b1
                          • Instruction Fuzzy Hash: D9F087B1804348EFDB00AFA8C8882AEFFF4FF44345F00882DE98957210D3345548CB9A
                          APIs
                            • Part of subcall function 004707E0: _ZN9QListData6detachEi.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470842
                            • Part of subcall function 004707E0: _ZeqRK7QStringS1_.QT5CORE ref: 004708E6
                            • Part of subcall function 00470650: _ZN9QListData11detach_growEPii.QT5CORE ref: 00470686
                          • _ZN9QListData6detachEi.QT5CORE ref: 00409228
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$Data6detach$Data11detach_growString
                          • String ID:
                          • API String ID: 2123326895-0
                          • Opcode ID: 87f95834a03ccaffed9d7009a96ff79512ae4b2cde02a90f6c41ceff65cd2875
                          • Instruction ID: 829386e83e2f673e1daf33c3e21d5e375746c1698cec1c5b548dbaa9b5abee35
                          • Opcode Fuzzy Hash: 87f95834a03ccaffed9d7009a96ff79512ae4b2cde02a90f6c41ceff65cd2875
                          • Instruction Fuzzy Hash: E8A1A074604202CFCB14DF28D4C4A5AB7B2FF84314F1986AED51AAB3A6D735AC46CF45
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0047352A
                          • _ZN10QArrayData8allocateEjjj6QFlagsINS_16AllocationOptionEE.QT5CORE ref: 00473572
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$AllocationData10deallocateData8allocateEjjj6FlagsOptionS_16S_jj
                          • String ID:
                          • API String ID: 1338957267-0
                          • Opcode ID: 9fe5ba8159348035915b1bf27ffd1311fabc865d0bb5398dcbc8e649e06e36e9
                          • Instruction ID: 30a35ee3bb1cc3ff57a4789f3462069869a84a6b8724c69a9f92507579cc2531
                          • Opcode Fuzzy Hash: 9fe5ba8159348035915b1bf27ffd1311fabc865d0bb5398dcbc8e649e06e36e9
                          • Instruction Fuzzy Hash: 71816F71A04216EFCF24CF58C480AEEB7B1BF44355F18C16AD419AB311D739EA46DB85
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 77b132f1ea278f71fc6ebe854dc65c5aa090041d178dfd50f8b9cec6c74ce95d
                          • Instruction ID: 246e3a2d7c3e0edcb7cb89d4ce5290f16d2204b0eff596c248bd2171a5afa2cc
                          • Opcode Fuzzy Hash: 77b132f1ea278f71fc6ebe854dc65c5aa090041d178dfd50f8b9cec6c74ce95d
                          • Instruction Fuzzy Hash: 44612D74504202DFE714DF28C48461AFBE1BF85364F2AC61EE8A88B3A1D739ED45CB56
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041BDE3
                          • _ZN15QProgressDialog8setValueEi.QT5WIDGETS ref: 0041BE55
                          • _ZN16QCoreApplication13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE.QT5CORE ref: 0041BE65
                          • _ZNK15QProgressDialog11wasCanceledEv.QT5WIDGETS ref: 0041BE71
                            • Part of subcall function 00470CF0: _ZN9QListData6detachEi.QT5CORE ref: 00470D0D
                            • Part of subcall function 00470CF0: _Znwj.LIBSTDC++-6 ref: 00470D3C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041C08E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041C0B7
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$EventsProgress$Application13processCanceledCoreData6detachDialog11wasDialog8setEventFlagFlagsListLoop17ProcessValueZnwj
                          • String ID:
                          • API String ID: 3922179343-0
                          • Opcode ID: a04e1fe3f257e05ccb5658a89610420e8c744eb421887ff8edec01fb55987c19
                          • Instruction ID: 87aadd030f0025d5a14440acf9761ba47d5649edb0bac55c14de9a171333f9c9
                          • Opcode Fuzzy Hash: a04e1fe3f257e05ccb5658a89610420e8c744eb421887ff8edec01fb55987c19
                          • Instruction Fuzzy Hash: 96612D70A00215CFCB14EF29C894B9ABBF2FF84304F5586A9D4499B366DB34AD85CF85
                          APIs
                          • _ZNK7QObject6senderEv.QT5CORE ref: 00431BDA
                          • _ZNK7QAction4textEv.QT5WIDGETS ref: 00431BE8
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431C76
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00431CD8
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Action4textObject6sender
                          • String ID:
                          • API String ID: 1163864997-0
                          • Opcode ID: 0e34d69e709a072eac28eb435f959dda2e86412382aa8b659a3f4fe8e1749190
                          • Instruction ID: 2c3d57e12cd5455a1c4b36c22157971f742e5ffe54de190c28bed97ae8566188
                          • Opcode Fuzzy Hash: 0e34d69e709a072eac28eb435f959dda2e86412382aa8b659a3f4fe8e1749190
                          • Instruction Fuzzy Hash: B23103B4E042118FDB10AF69C4C426FBBF1FF89310F18A16AD8584B364D7399D45CB8A
                          APIs
                          • _ZN8QVariantD1Ev.QT5CORE ref: 004062E0
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 004062E9
                            • Part of subcall function 0044D680: _ZNK8QSpinBox5valueEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6AD
                            • Part of subcall function 0044D680: _ZNK15QAbstractButton9isCheckedEv.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6C1
                            • Part of subcall function 0044D680: _ZN7QString16fromAscii_helperEPKci.QT5CORE(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6E7
                            • Part of subcall function 0044D680: _ZN7QWidget13setStyleSheetERK7QString.QT5WIDGETS(?,?,?,?,?,00000002,000B2260,?,0042B238), ref: 0044D6FC
                            • Part of subcall function 0044D680: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044D721
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 0040636C
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 00406392
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004063D4
                          • _ZN10QByteArrayC1Eic.QT5CORE ref: 00406432
                          • _ZN9QIODevice5writeEPKcx.QT5CORE ref: 00406458
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Array$ByteData10deallocateDevice5writeS_jj$AbstractAscii_helperBox5valueButton9isCheckedResumeSheetSpinStringString16fromStyleUnwind_VariantWidget13set
                          • String ID:
                          • API String ID: 3301784748-0
                          • Opcode ID: 89008ac7dd08f7ac15e871c915f276fde8e989560dcd2db442734d8eaf5aecc6
                          • Instruction ID: 33c2d679b289490abc07f1420a22f22fbf1eb16d25688ded08983406ab1151e6
                          • Opcode Fuzzy Hash: 89008ac7dd08f7ac15e871c915f276fde8e989560dcd2db442734d8eaf5aecc6
                          • Instruction Fuzzy Hash: 2421B674B042044FCB08EF79D8845AEBBF1EF88310F05C53EEC4697391DA3898188B99
                          APIs
                          • _ZN9QListData11detach_growEPii.QT5CORE ref: 004722E1
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0047232E
                          • memcpy.MSVCRT ref: 00472380
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData11detach_growData7disposememcpy
                          • String ID:
                          • API String ID: 2917024604-0
                          • Opcode ID: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction ID: 3cf3e9bacb589583d33c8547e6c5711796b6d9393fc9b8c615e2cba9598d852a
                          • Opcode Fuzzy Hash: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction Fuzzy Hash: 21318F35108306DFC714DF28D9C099AB7E1FF84304F548A5EE88987311E779E94ACB96
                          APIs
                          • _ZN9QListData11detach_growEPii.QT5CORE ref: 00472881
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 004728CE
                          • memcpy.MSVCRT ref: 00472920
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData11detach_growData7disposememcpy
                          • String ID:
                          • API String ID: 2917024604-0
                          • Opcode ID: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction ID: 69ce107900fdb7eb2fecfe607bedfae5f5069ef9dbbc477fda5e5dbbfc4db5f8
                          • Opcode Fuzzy Hash: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction Fuzzy Hash: AB31C170108306DFC710EF28D5C099AB7E0FF84304F598A9EE48987311E771E989CB96
                          APIs
                          • _ZN9QListData11detach_growEPii.QT5CORE ref: 004718F1
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 0047193E
                          • memcpy.MSVCRT ref: 00471990
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData11detach_growData7disposememcpy
                          • String ID:
                          • API String ID: 2917024604-0
                          • Opcode ID: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction ID: 1deb742aa92665e27bad0b97549372db2293d52546f28bbc0af3bba6be9eec44
                          • Opcode Fuzzy Hash: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction Fuzzy Hash: CB317CB5108206DFC710DF2CD49099AB7E1FF85308F548A5EE58987321E735E94ACB95
                          APIs
                          • _ZN9QListData11detach_growEPii.QT5CORE ref: 00472A11
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00472A5E
                          • memcpy.MSVCRT ref: 00472AB0
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData11detach_growData7disposememcpy
                          • String ID:
                          • API String ID: 2917024604-0
                          • Opcode ID: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction ID: 147fce939c00ff50df84f27ca8fd881d3fd1bc266ae8d99bbda569195ddbe311
                          • Opcode Fuzzy Hash: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction Fuzzy Hash: DA318935108306DFC720DF28D5C099AB7E0FF84304F588AAEE48987312E775E94ACB86
                          APIs
                          • _ZN9QListData11detach_growEPii.QT5CORE ref: 00471B01
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471B4E
                          • memcpy.MSVCRT ref: 00471BA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData11detach_growData7disposememcpy
                          • String ID:
                          • API String ID: 2917024604-0
                          • Opcode ID: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction ID: 53ab785938a24535ec37ebb065ddb8da5918095584d42fbd01a2658b7bf8fc5f
                          • Opcode Fuzzy Hash: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction Fuzzy Hash: C1314A75108206DFC710DF2CD8C499AB7E5FF85304F548A6EE8898B321E735E95ACB86
                          APIs
                          • _ZN9QListData11detach_growEPii.QT5CORE ref: 00471D11
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471D5E
                          • memcpy.MSVCRT ref: 00471DB0
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: List$DataData11detach_growData7disposememcpy
                          • String ID:
                          • API String ID: 2917024604-0
                          • Opcode ID: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction ID: eabcf679a57216a553adeb27ddf5c8c6f003ccd1ef5aa5a0f73965994f988bfa
                          • Opcode Fuzzy Hash: d2ee38979a1057fd3028f68c405df3994cadcb06fc33c5335dccb8a6e55b8bef
                          • Instruction Fuzzy Hash: 79313675108306DBC720DF2CD48499AB7E1FB84304F588A6EE48987321E735E95ACF86
                          APIs
                          • _ZN7QString6numberEii.QT5CORE ref: 00445453
                          • _ZN8QVariantC1ERK7QString.QT5CORE ref: 0044545E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00445483
                          • _ZN8QVariantC1ERK7QString.QT5CORE ref: 004454E3
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: StringVariant$ArrayData10deallocateS_jjString6number
                          • String ID:
                          • API String ID: 2024941470-0
                          • Opcode ID: 8cf1636da0926f2f749b93042275378dbe3a766c95c65035bcb71b00ac133633
                          • Instruction ID: e0f16fbeb2e1a216a418eb8b791f32565dd026d4246060e34c7d167bbf33038e
                          • Opcode Fuzzy Hash: 8cf1636da0926f2f749b93042275378dbe3a766c95c65035bcb71b00ac133633
                          • Instruction Fuzzy Hash: 932174716046059FDF00DF68E88878EBBB0FF44329F14866AE8548B351D336D995CB81
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 004064E3
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00406500
                          • _ZdlPv.LIBSTDC++-6 ref: 00406509
                          • _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,?,?,?,?,?,?,?,00470FE8), ref: 0040655C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$DataData7disposeList
                          • String ID:
                          • API String ID: 955637761-0
                          • Opcode ID: 1fbc4da203d1d4719697c7ebace2f0512131ed2c3bff6ad9ae977f38bf651939
                          • Instruction ID: ac1b37e6b69ba1b7d93056536e153e441bbf14dfdb3471a678ed0697e996b6d0
                          • Opcode Fuzzy Hash: 1fbc4da203d1d4719697c7ebace2f0512131ed2c3bff6ad9ae977f38bf651939
                          • Instruction Fuzzy Hash: 9F21D170104302EBD718DF29E8D462AF7B0FF80318F26462EE45657394D739E8A6CB89
                          APIs
                          • _ZNK19QAbstractTableModel5indexEiiRK11QModelIndex.QT5CORE ref: 0041D4E6
                          • _ZNK8QVariant8toDoubleEPb.QT5CORE ref: 0041D513
                          • _Z6qIsNaNd.QT5CORE ref: 0041D51F
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041D52E
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: AbstractDoubleIndexModelModel5indexTableVariantVariant8to
                          • String ID:
                          • API String ID: 1617609351-0
                          • Opcode ID: 9063cff368adfc0121ff7d2a22af78da973b2d04c99fbeb8e8047160a922cfc3
                          • Instruction ID: 524098fb18da0589a07cf4ce73186cf7abd1c032f96231df2f5bef4ba342c16b
                          • Opcode Fuzzy Hash: 9063cff368adfc0121ff7d2a22af78da973b2d04c99fbeb8e8047160a922cfc3
                          • Instruction Fuzzy Hash: B92157B0804318DFDB20AFA9D8883ADBBB1BF01328F10475EE4A5A72D0D7744989CF46
                          APIs
                          • _ZN7QObjectC2EPS_.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,0041A713), ref: 0043DB50
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,0041A713), ref: 0043DBC1
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,0041A713), ref: 0043DBC6
                          • _Z5qQNaNv.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,0041A713), ref: 0043DBCB
                            • Part of subcall function 0043D8F0: _ZNK14QMessageLogger5debugEv.QT5CORE ref: 0043D92A
                            • Part of subcall function 0043D8F0: _ZN7QString15fromUtf8_helperEPKci.QT5CORE ref: 0043D946
                            • Part of subcall function 0043D8F0: _ZN11QTextStreamlsERK7QString.QT5CORE ref: 0043D952
                            • Part of subcall function 0043D8F0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0043D97B
                            • Part of subcall function 0043D8F0: _Zls6QDebugRK9QVector3D.QT5GUI ref: 0043D9A8
                            • Part of subcall function 0043D8F0: _ZdlPv.LIBSTDC++-6 ref: 0043DA27
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateDebugLogger5debugMessageObjectS_jjStreamlsStringString15fromTextUtf8_helperVector3Zls6
                          • String ID:
                          • API String ID: 1772529278-0
                          • Opcode ID: 66b936fdb33979da88bc46252d9dbe17818dab67238a979c37bf50fb22ad4732
                          • Instruction ID: 2f58376f93edd7ae0e8142b09a4b39bba4a761e58bad712a0c4ce8e314ace5ef
                          • Opcode Fuzzy Hash: 66b936fdb33979da88bc46252d9dbe17818dab67238a979c37bf50fb22ad4732
                          • Instruction Fuzzy Hash: 02212C70905258CFDF04AF69E8C92997FB4FF04300F8140E9DD806A25ED77698B4CBAA
                          APIs
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 00433CE3
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 00433CFC
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 00433D15
                          • _ZN7QWidget10setEnabledEb.QT5WIDGETS ref: 00433D53
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: EnabledWidget10set
                          • String ID:
                          • API String ID: 1934139091-0
                          • Opcode ID: 70f40e71fbed3af597efd3f181543a2c1b24b0886cf85fe95d543d39014c6ec3
                          • Instruction ID: 05e91eff9cafba1a944e41f7eb513eec24cd23431c13d9b91f91bc19cb56d0e9
                          • Opcode Fuzzy Hash: 70f40e71fbed3af597efd3f181543a2c1b24b0886cf85fe95d543d39014c6ec3
                          • Instruction Fuzzy Hash: BE112E75A042048FC714EF7AD4949AAB7F0FF58310F41467ADC8587361DA34E948CB91
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00408713
                          • _ZN7QWidget12removeActionEP7QAction.QT5WIDGETS ref: 0040872C
                          • _ZNK7QAction4textEv.QT5WIDGETS ref: 00408765
                          • _ZN7QString14compare_helperEPK5QChariPKciN2Qt15CaseSensitivityE.QT5CORE ref: 00408796
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Action$Action4textArrayCaseChariData10deallocateQt15S_jjSensitivityString14compare_helperWidget12remove
                          • String ID:
                          • API String ID: 1464183043-0
                          • Opcode ID: 88213b1acb656ba4a0a9f9c7a105d11fb9c37d0183a6036c8a5056ae2e3da3bb
                          • Instruction ID: 98d4816d7f6b6d2d1e8db8cb6e8c3b0621b276b1ed8e5ea9350694c37763a5e9
                          • Opcode Fuzzy Hash: 88213b1acb656ba4a0a9f9c7a105d11fb9c37d0183a6036c8a5056ae2e3da3bb
                          • Instruction Fuzzy Hash: 2F213BB8904605CFCB04DF68C58869EBBF0BF88314F25C66EE89567395CB39A845CF49
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0044E596
                          • _ZNK9QComboBox12currentIndexEv.QT5WIDGETS ref: 0044E5A2
                          • _ZN9QComboBox15setCurrentIndexEi.QT5WIDGETS ref: 0044E5AF
                          • _ZNK9QComboBox11currentTextEv.QT5WIDGETS ref: 0044E5BF
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Combo$Index$ArrayBox11currentBox12currentBox15setCurrentData10deallocateS_jjText
                          • String ID:
                          • API String ID: 1953980557-0
                          • Opcode ID: d517374c47c59dc2e684c98188498496fb1fedf4d580bc2df9da90ecda4d9c95
                          • Instruction ID: 4006ef99c003fbb68c90ad87f0c71755f90af39ef439fa85739b4ab190098496
                          • Opcode Fuzzy Hash: d517374c47c59dc2e684c98188498496fb1fedf4d580bc2df9da90ecda4d9c95
                          • Instruction Fuzzy Hash: B301F7B12043009FDB14AFB9D89856B7BB5FBC4318F118A3ED44587260F735E85ACB86
                          APIs
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041CE5D
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041CE66
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041CE6F
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041CEAF
                          • _ZNK11QMetaObject2trEPKcS1_i.QT5CORE ref: 0041CF04
                          • _ZNK7QWidget11windowTitleEv.QT5WIDGETS ref: 0041CF13
                          • _ZN11QMessageBox7warningEP7QWidgetRK7QStringS4_6QFlagsINS_14StandardButtonEES6_.QT5WIDGETS ref: 0041CF3A
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041CF84
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041CFB7
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041D002
                          • _ZNK19QItemSelectionModel12selectedRowsEi.QT5CORE ref: 0041D033
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ItemModel12selectedRowsSelection$ResumeUnwind_$ArrayBox7warningButtonData10deallocateFlagsMessageMetaObject2trS1_iS4_6S_14S_jjStandardStringTitleVariantWidgetWidget11window
                          • String ID:
                          • API String ID: 928396375-0
                          • Opcode ID: 79807c14cbbece80765b4fb72adb29fb58a342ba1fb9b21cf4f507256ec9fcd2
                          • Instruction ID: b50a47556a5abcafc90e8ad02380fe530fbfd71f6af4f6c1613853f04f2e64f9
                          • Opcode Fuzzy Hash: 79807c14cbbece80765b4fb72adb29fb58a342ba1fb9b21cf4f507256ec9fcd2
                          • Instruction Fuzzy Hash: 8E01DE71A003049FCB04EFA9E884B9EBBB4FF44310F04056EE805A7322DB34A948CF99
                          APIs
                          • _ZNK11QTextStream5atEndEv.QT5CORE ref: 004214F2
                          • _ZN11QTextStream8readLineEx.QT5CORE ref: 00421511
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00421543
                          • _ZNK11QTextStream5atEndEv.QT5CORE ref: 0042154B
                          • _ZN11QTextStreamD1Ev.QT5CORE ref: 00421583
                          • _ZN5QFileD1Ev.QT5CORE ref: 0042158C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Text$Stream5at$ArrayData10deallocateFileLineS_jjStreamStream8read
                          • String ID:
                          • API String ID: 1829919948-0
                          • Opcode ID: 1b19b5d1f22fa310a4e4ff60f4463312b7330657d32afc889aaadc58f63aba98
                          • Instruction ID: 7fac2b679204f3719014b9b52f0106a2409eb0a2e9d55025c9e8234aaf653832
                          • Opcode Fuzzy Hash: 1b19b5d1f22fa310a4e4ff60f4463312b7330657d32afc889aaadc58f63aba98
                          • Instruction Fuzzy Hash: 1601D871604210CBCF04BF74F4546ADB771EF90304F40412DE44A572A1CB39294ACB8A
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A3C7
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A3E9
                          • _ZNK9QIODevice6isOpenEv.QT5CORE ref: 0041A3F1
                          • _ZN11QSerialPort5closeEv.QT5SERIALPORT ref: 0041A3FD
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0041A433
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Device6isOpenPort5closeSerial
                          • String ID:
                          • API String ID: 2407417817-0
                          • Opcode ID: 33a057bc612dbaf7cb80e68b875eff5711eef054dd9f1914619f551f6474afab
                          • Instruction ID: 6c05c087c812cd229c31244b02bacbab43627ce46d0ab2f0601d1b34a04a4352
                          • Opcode Fuzzy Hash: 33a057bc612dbaf7cb80e68b875eff5711eef054dd9f1914619f551f6474afab
                          • Instruction Fuzzy Hash: BD0162B4605300CBDB009F24D88C3AEB7F1FF80359F14852DE9A5573A5D7395859CB4A
                          APIs
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405D8B
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DA0
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DB4
                          • _ZNK14QDoubleSpinBox5valueEv.QT5WIDGETS ref: 00405DC2
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Box5valueDoubleSpin
                          • String ID:
                          • API String ID: 2520306058-0
                          • Opcode ID: ba7f673c35ed10eb4cb62c2d46acdda329394d046d58d3a0105583b98ade452f
                          • Instruction ID: 11d3f6d723edaa48f72da7e552f2d24eb200f52b38e36094b7b0792261f30302
                          • Opcode Fuzzy Hash: ba7f673c35ed10eb4cb62c2d46acdda329394d046d58d3a0105583b98ade452f
                          • Instruction Fuzzy Hash: 2EF01931A045199BC704EF18E8D4966BBB0FF88210B4589A9D88887366CE31AC70CBD5
                          APIs
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040204D
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402072
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040207E
                          • _ZN12QApplicationD1Ev.QT5WIDGETS ref: 0040208A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$ApplicationFormat
                          • String ID:
                          • API String ID: 4074272059-0
                          • Opcode ID: c8aaac8fe9dc0e665a1f4830af7227e4a01cf4127eea7379b65c289f16f1987d
                          • Instruction ID: 89f02b3451e4682b104b201f39d150fcb675ee269f1b8b2a66f704a4d00bbbe0
                          • Opcode Fuzzy Hash: c8aaac8fe9dc0e665a1f4830af7227e4a01cf4127eea7379b65c289f16f1987d
                          • Instruction Fuzzy Hash: BD016DB1904206CFDB109F24D98C39EB7B0FF80359F1085ADE259572A0DB76598ACF49
                          APIs
                            • Part of subcall function 00470080: _ZN4QUrlD1Ev.QT5CORE(?,?,?,00000000,?,?,00408DEB), ref: 004700B5
                            • Part of subcall function 00470080: _ZN9QListData7disposeEPNS_4DataE.QT5CORE(?,?,?,00000000,?,?,00408DEB), ref: 004700BE
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00408E1D
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00408E3D
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00408E4F
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00408E61
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$DataData7disposeList
                          • String ID:
                          • API String ID: 1860730466-0
                          • Opcode ID: 4e6977c6235e4c68ad5b6a76fd9fc508b2d4bb4d9c1acf703838a7c305218afd
                          • Instruction ID: d1042c1afddc62f6d8da207a4510525dadf09224b29252604df4a239254443d6
                          • Opcode Fuzzy Hash: 4e6977c6235e4c68ad5b6a76fd9fc508b2d4bb4d9c1acf703838a7c305218afd
                          • Instruction Fuzzy Hash: EBF0D070A007048ACB04FFB1D6D15EDB3B0AF18308B04486FE98667257DEFC5905D6A9
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040257C
                          • _ZN12QApplicationD1Ev.QT5WIDGETS ref: 00402588
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00402591
                            • Part of subcall function 00412E30: _ZdlPv.LIBSTDC++-6(00000000,?,?,00401FD8), ref: 00412E5F
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412E9D
                            • Part of subcall function 00412E30: _ZN11QBasicTimer4stopEv.QT5CORE(00000000,?,?,00401FD8), ref: 00412EF5
                            • Part of subcall function 00412E30: _ZN6QTimerD1Ev.QT5CORE(00000000,?,?,00401FD8), ref: 00412F07
                            • Part of subcall function 00412E30: _ZN6QTimerD1Ev.QT5CORE ref: 00412F0F
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412F34
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412F5D
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412F86
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412FAF
                            • Part of subcall function 00412E30: _ZN11QSerialPortD1Ev.QT5SERIALPORT ref: 00412FC6
                            • Part of subcall function 00412E30: _ZN19QAbstractTableModelD2Ev.QT5CORE ref: 00413008
                          • _ZN6QDebugD1Ev.QT5CORE ref: 004025DC
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Timer$AbstractApplicationBasicDebugFormatModelPortResumeSerialTableTimer4stopUnwind_
                          • String ID:
                          • API String ID: 1546850959-0
                          • Opcode ID: 1b806a1c2776faac7dda02282128708cfd82513f10a014d94b77467242934008
                          • Instruction ID: 8fc7533131639fc95aa1582fd3b8ba13d49f5f3daee5d53deb1de121b36ef1d7
                          • Opcode Fuzzy Hash: 1b806a1c2776faac7dda02282128708cfd82513f10a014d94b77467242934008
                          • Instruction Fuzzy Hash: A9F0F4309005258BCB18EB21DEA9AEDB334AF04309F5040FEE10E621B2DFB81E85DE5C
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateFormatResumeS_jjSettingsUnwind_Variant
                          • String ID:
                          • API String ID: 4229398312-0
                          • Opcode ID: 7e3ab155e25a597a127aeefffaa79ac3c316631324d68a037e4a63b23fedf2d3
                          • Instruction ID: 051d983ac3215e84bd488ac29eff5d67ad24932e2eefaf95e086aaf65a53398d
                          • Opcode Fuzzy Hash: 7e3ab155e25a597a127aeefffaa79ac3c316631324d68a037e4a63b23fedf2d3
                          • Instruction Fuzzy Hash: A0F09835E10608CBCB28EFB5D8945ECB7B0BF0C304B54417ED416E7262EB7859469F59
                          APIs
                          • _ZN9QSettingsD1Ev.QT5CORE ref: 0040F875
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040F87E
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040F86C
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0040F8D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateFormatResumeS_jjSettingsUnwind_Variant
                          • String ID:
                          • API String ID: 4229398312-0
                          • Opcode ID: 4d1386f5bc8880ca4ba48da5c6b5321af0088b2a746a2d7c38e4b6580c61aa9c
                          • Instruction ID: 7061f602af03db0f9f946fa6b40b0a7bbbe4eb7f61211d1e7d53dd1d732bce9c
                          • Opcode Fuzzy Hash: 4d1386f5bc8880ca4ba48da5c6b5321af0088b2a746a2d7c38e4b6580c61aa9c
                          • Instruction Fuzzy Hash: 39F0A535E00208CBCB28EFB5D8945ACB7B0BF0C300B60423ED416E7262EB7858469F49
                          APIs
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041CC39
                            • Part of subcall function 00471AA0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471AAE
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041CC4B
                          • _ZN8QVariantD1Ev.QT5CORE ref: 0041CC6F
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041CC78
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$DataData7disposeListVariant
                          • String ID:
                          • API String ID: 3500325730-0
                          • Opcode ID: 8eb5cdf55ff726b77d79e74eaec4e1947b85ad6ec8242e121bc0b130f814421f
                          • Instruction ID: 2cef93a76ab7acc5da3a175ef431aee1d86beef0f56595eac64b04c1b8f85ec1
                          • Opcode Fuzzy Hash: 8eb5cdf55ff726b77d79e74eaec4e1947b85ad6ec8242e121bc0b130f814421f
                          • Instruction Fuzzy Hash: 85F09270A143088BCB14EFB5D9D05ADBBB0BF48344B14152ED446A7222DA785C45CF85
                          APIs
                          • _ZN6QDebugD1Ev.QT5CORE ref: 004025DC
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _ZN9QGLFormatD1Ev.QT5OPENGL ref: 0040257C
                          • _ZN12QApplicationD1Ev.QT5WIDGETS ref: 00402588
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00402591
                            • Part of subcall function 00412E30: _ZdlPv.LIBSTDC++-6(00000000,?,?,00401FD8), ref: 00412E5F
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412E9D
                            • Part of subcall function 00412E30: _ZN11QBasicTimer4stopEv.QT5CORE(00000000,?,?,00401FD8), ref: 00412EF5
                            • Part of subcall function 00412E30: _ZN6QTimerD1Ev.QT5CORE(00000000,?,?,00401FD8), ref: 00412F07
                            • Part of subcall function 00412E30: _ZN6QTimerD1Ev.QT5CORE ref: 00412F0F
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412F34
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412F5D
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412F86
                            • Part of subcall function 00412E30: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00412FAF
                            • Part of subcall function 00412E30: _ZN11QSerialPortD1Ev.QT5SERIALPORT ref: 00412FC6
                            • Part of subcall function 00412E30: _ZN19QAbstractTableModelD2Ev.QT5CORE ref: 00413008
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Timer$AbstractApplicationBasicDebugFormatModelPortResumeSerialTableTimer4stopUnwind_
                          • String ID:
                          • API String ID: 1546850959-0
                          • Opcode ID: d5a52fddc1aeed9ebdd524b1ab20affbfd30a261151b1235fa116b6739664e22
                          • Instruction ID: e68ebd617720265adb6840afc78db60fbd312b70a659ef70a224bd92c658d960
                          • Opcode Fuzzy Hash: d5a52fddc1aeed9ebdd524b1ab20affbfd30a261151b1235fa116b6739664e22
                          • Instruction Fuzzy Hash: 5BF0B7705005158BC758EB21DEA5AEEB730AF14309F5041FEE10A561B2DFB41E85DE58
                          APIs
                          • _ZN8QVariantD1Ev.QT5CORE ref: 00408533
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040853C
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 004084EB
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00408505
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$ArrayData10deallocateS_jjVariant
                          • String ID:
                          • API String ID: 826207278-0
                          • Opcode ID: 7abd1a11294ed49f170c16781467d88604482955d3a153f8b6013777e2cb8699
                          • Instruction ID: b23ddd3176733fc88172c785cf5f72faa58cc066e8e84eceff012e44b5e5703c
                          • Opcode Fuzzy Hash: 7abd1a11294ed49f170c16781467d88604482955d3a153f8b6013777e2cb8699
                          • Instruction Fuzzy Hash: 32E0E5306047008BC708BFB1D6D14AD76B0AF08318B04592FE4866B263EEB858449BA9
                          APIs
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00409841
                            • Part of subcall function 00452AC0: _ZN10QArrayData10deallocateEPS_jj.QT5CORE(?,?,?,?,?,?,?,?,?,00406496), ref: 00452ADE
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 00409852
                          • _ZN6QDebugD1Ev.QT5CORE ref: 00409863
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040986C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$ArrayData10deallocateS_jj$Debug
                          • String ID:
                          • API String ID: 2250920564-0
                          • Opcode ID: 37d31f62dad40e4165a7f726f02b4a89790c16270c92747567f879342ed8e9fb
                          • Instruction ID: 8654787699ab3be3d6a075c39f38f7d871e2ac9ac94a7bcffb2ee800fee8fdf3
                          • Opcode Fuzzy Hash: 37d31f62dad40e4165a7f726f02b4a89790c16270c92747567f879342ed8e9fb
                          • Instruction Fuzzy Hash: 09E0EC303047004BC704BF7696D216DA5A59F49349B04082FA5478B363DEFC4C049799
                          APIs
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0041D30D
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041D316
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041D32C
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041D33D
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ResumeUnwind_$Debug
                          • String ID:
                          • API String ID: 441678417-0
                          • Opcode ID: 0ca6da3df44b95408d9b26ac493b4fa7ee520d34bb4425266193240c073e5a2a
                          • Instruction ID: 956e8c7e7bb0db1b6f467ce2ab912736db527ecfb6efeb6b88c4c52b525654d0
                          • Opcode Fuzzy Hash: 0ca6da3df44b95408d9b26ac493b4fa7ee520d34bb4425266193240c073e5a2a
                          • Instruction Fuzzy Hash: DFE0ECB06057049BC700BFB5E5D116E76A0AF0D345B10183EAD8387313EABC4C85879A
                          APIs
                          • _ZN8QVariantD1Ev.QT5CORE ref: 00419648
                          • _ZN7QRegExpD1Ev.QT5CORE ref: 00419650
                          • _ZN11QTextCursorD1Ev.QT5GUI ref: 0041965C
                            • Part of subcall function 00472F40: _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00472F5E
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0041967B
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayCursorData10deallocateResumeS_jjTextUnwind_Variant
                          • String ID:
                          • API String ID: 1130623818-0
                          • Opcode ID: 531b1df58a7b40a48fd82dfc17b7e4f8c526bb8483a3cb324edf8fb4472e3668
                          • Instruction ID: ef3894fbc069f777392c1430a066e6e158fb28cf1d13c33ace3919e16b608903
                          • Opcode Fuzzy Hash: 531b1df58a7b40a48fd82dfc17b7e4f8c526bb8483a3cb324edf8fb4472e3668
                          • Instruction Fuzzy Hash: 1CE0E6347015108FC758BF25D9A816C77B2AB48355F5442FDE40A97371CFB40D81DB89
                          APIs
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040ED41
                          • _ZN6QDebugD1Ev.QT5CORE ref: 0040ED49
                            • Part of subcall function 00471AA0: _ZN9QListData7disposeEPNS_4DataE.QT5CORE ref: 00471AAE
                          • _Unwind_Resume.LIBGCC_S_DW2-1 ref: 0040ED18
                          • _ZdlPv.LIBSTDC++-6 ref: 0040ED22
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: Debug$DataData7disposeListResumeUnwind_
                          • String ID:
                          • API String ID: 2102612617-0
                          • Opcode ID: 9b690e5010a3666afbe98599e4a87182097593efbfbcad2751292020a9cbb798
                          • Instruction ID: 864e0655da1a8fb964207abc4c2b669a9991a3879734aff64a901b2a60ee2cfe
                          • Opcode Fuzzy Hash: 9b690e5010a3666afbe98599e4a87182097593efbfbcad2751292020a9cbb798
                          • Instruction Fuzzy Hash: 50E01230604509CBCB24BF76E9902ACB3B1AF84344F250C3FD546672A3DA7C5D569F4A
                          APIs
                            • Part of subcall function 004099C0: _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AAFC
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Device6isOpen
                          • String ID: G92X0Y0
                          • API String ID: 1265076484-2200321382
                          • Opcode ID: d0ecb57223a8e03039a8d2479405267a9ada98f7ad412c402d6d2fd762e054dd
                          • Instruction ID: ccdca4f154a62c280f104a38282ee2fd60f98ec63956186843c7c3a4075ff460
                          • Opcode Fuzzy Hash: d0ecb57223a8e03039a8d2479405267a9ada98f7ad412c402d6d2fd762e054dd
                          • Instruction Fuzzy Hash: 213150B19043059FC700EF69C48869EBBF1FF84714F14862EE5A89B391D7795C49CB8A
                          APIs
                            • Part of subcall function 004099C0: _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AC3C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040ACA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Device6isOpen
                          • String ID: G92Z0
                          • API String ID: 1265076484-3769659619
                          • Opcode ID: c07df4af916b558eeafe4969968a454d8a73f3ee8ba2acf0915692fc5a86084a
                          • Instruction ID: 38b4a18adb173463edb7433c37fbff02bb960a2a291345131e090d3530b0bdb4
                          • Opcode Fuzzy Hash: c07df4af916b558eeafe4969968a454d8a73f3ee8ba2acf0915692fc5a86084a
                          • Instruction Fuzzy Hash: 433181B09083059FD7009F69C48469EBBF1FF84314F15C62DE4A89B391D7794C45CB8A
                          APIs
                            • Part of subcall function 004099C0: _ZNK9QIODevice6isOpenEv.QT5CORE ref: 004099D6
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040AC3C
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 0040ACA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: ArrayData10deallocateS_jj$Device6isOpen
                          • String ID: G92Z0
                          • API String ID: 1265076484-3769659619
                          • Opcode ID: 02b4a77bf2184e0d9b27ed9c5008f51823082e6235a4535d6294883d4826cb7f
                          • Instruction ID: d7a0ee9ab56022bcd7970e8a7b5c5f21cfb67b0e16cbe657b736594e734568b1
                          • Opcode Fuzzy Hash: 02b4a77bf2184e0d9b27ed9c5008f51823082e6235a4535d6294883d4826cb7f
                          • Instruction Fuzzy Hash: FC2119B1A043159FC700AF69C44829EBBF5FF84714F11892DE498AB391D7795845CB8A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID: cos
                          • API String ID: 2918714741-2662988677
                          • Opcode ID: 4148a63806ed11938131784bf744e636b09443dcaccd543c934d5d1c129a5721
                          • Instruction ID: b478ac35fe82ba750bc63965cfb0353f0d1bca69d4b5ea1dce8d80e73fd8c022
                          • Opcode Fuzzy Hash: 4148a63806ed11938131784bf744e636b09443dcaccd543c934d5d1c129a5721
                          • Instruction Fuzzy Hash: 3C0139B000CB0296D7006F44D44821EBEE0FF89389F850D8EF4D8112A6CBB985A8D74B
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID: sin
                          • API String ID: 2918714741-3083047850
                          • Opcode ID: 52ff61fd0afb25780d488ecb3a4076fee5aac178c245f7c980ae94dc0a32ff63
                          • Instruction ID: 8cb0d210b76f9f34a7e7cce58a99414437a7ac39e64946faee174159917a9874
                          • Opcode Fuzzy Hash: 52ff61fd0afb25780d488ecb3a4076fee5aac178c245f7c980ae94dc0a32ff63
                          • Instruction Fuzzy Hash: 92011BB400CB02D6D7016F44D54822EBEE0FF85399F855D9EF4D4112A6CBBA85B8D70B
                          APIs
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00402E8E
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402EC4
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00402F57
                          • _ZNK7QString8endsWithERKS_N2Qt15CaseSensitivityE.QT5CORE ref: 00402F8B
                          • _ZN10QArrayData10deallocateEPS_jj.QT5CORE ref: 00402FBF
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: CaseQt15SensitivityString8endsWith$ArrayData10deallocateS_jj
                          • String ID: .txt
                          • API String ID: 2043502143-2195685702
                          • Opcode ID: 2f2be091450d89a3572e74e8d81cfbc970a3bc7d15998867d1f1af34e136fe34
                          • Instruction ID: 7009e8a656b1b3d4c99d215f1ec36cc1ec66bf3269b75c09327244ced650d610
                          • Opcode Fuzzy Hash: 2f2be091450d89a3572e74e8d81cfbc970a3bc7d15998867d1f1af34e136fe34
                          • Instruction Fuzzy Hash: 78015EB1A043059BDB00DF68D84879AFBF4FB88354F04853AE984A7350D7B5A809CF95
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeavefree
                          • String ID:
                          • API String ID: 4020351045-0
                          • Opcode ID: bc70994fe394371387e119612b96c93e50a184592f1493c4f2722e82367b61a8
                          • Instruction ID: 63ccdfce74584dce1a3070e2b35c36b6188cae2d3c1a687bd65facda3fba4758
                          • Opcode Fuzzy Hash: bc70994fe394371387e119612b96c93e50a184592f1493c4f2722e82367b61a8
                          • Instruction Fuzzy Hash: 2E011E707012018F8701EF68E58561ABBE0BB6A305B54467ADC4AC7322E778DC89DB5A
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2965539817.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.2965495481.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965607377.000000000047E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965646070.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965698040.00000000004B0000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965733110.00000000004B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.2965766953.00000000004BE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_test.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterErrorLastLeaveValue
                          • String ID:
                          • API String ID: 682475483-0
                          • Opcode ID: 007d0d7a4af39be9c944f9360ab6402fadb39fcc0f32c3f1dfc5419ad1f0ccf1
                          • Instruction ID: 06f1cc86c72ee35421070a0badc03c878f23b4df5f4cf662c1556ec397f36f5e
                          • Opcode Fuzzy Hash: 007d0d7a4af39be9c944f9360ab6402fadb39fcc0f32c3f1dfc5419ad1f0ccf1
                          • Instruction Fuzzy Hash: 74F081B65006008BC700BFB9A95865BBBB4FB95351F05063ADC9993321E774E81DCBAA