Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1546257
MD5:87514bcfa421057dc1575ec1630d78ff
SHA1:012029171ff901f1cb5495059da47143d193923c
SHA256:50c263fc02412062ca239e7419880678f797408a243d0a2140bc7bbb96a716c1
Tags:exeuser-Bitsight
Infos:

Detection

NetSupport RAT
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • file.exe (PID: 7444 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 87514BCFA421057DC1575EC1630D78FF)
    • bild.exe (PID: 7544 cmdline: "C:\Users\Public\Netstat\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Netstat\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\Public\Netstat\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\Public\Netstat\bild.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\Public\Netstat\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\Public\Netstat\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                  00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                    00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                      Click to see the 8 entries
                      SourceRuleDescriptionAuthorStrings
                      1.0.bild.exe.c40000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        1.2.bild.exe.c40000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          1.2.bild.exe.73af0000.6.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            1.2.bild.exe.6e540000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              0.3.file.exe.28755e7b820.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                                Click to see the 6 entries

                                System Summary

                                barindex
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Netstat\bild.exe" , CommandLine: "C:\Users\Public\Netstat\bild.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Netstat\bild.exe, NewProcessName: C:\Users\Public\Netstat\bild.exe, OriginalFileName: C:\Users\Public\Netstat\bild.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7444, ParentProcessName: file.exe, ProcessCommandLine: "C:\Users\Public\Netstat\bild.exe" , ProcessId: 7544, ProcessName: bild.exe
                                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 172.86.117.97, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Netstat\bild.exe, Initiated: true, ProcessId: 7544, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-10-31T16:56:19.003116+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449738TCP
                                2024-10-31T16:56:56.856030+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449739TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-10-31T16:56:00.730625+010020283713Unknown Traffic192.168.2.44973513.89.179.12443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-10-31T16:55:58.033749+010028277451Malware Command and Control Activity Detected192.168.2.449736172.86.117.97443TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeReversingLabs: Detection: 28%
                                Source: C:\Users\Public\Netstat\remcmdstub.exeReversingLabs: Detection: 13%
                                Source: file.exeReversingLabs: Detection: 52%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,1_2_110AD570
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: Binary string: msvcr100.i386.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132472852.000000006D081000.00000020.00000001.01000000.0000000C.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.4132684538.0000000073AF2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.4132607275.000000006E545000.00000002.00000001.01000000.0000000D.sdmp, pcicapi.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: TCCTL32.DLL.0.dr
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482040BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7482040BC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74821B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF74821B190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74822FCA0 FindFirstFileExA,0_2_00007FF74822FCA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.4:49736 -> 172.86.117.97:443
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 104.26.1.231 104.26.1.231
                                Source: Joe Sandbox ViewASN Name: QUICKPACKETUS QUICKPACKETUS
                                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 13.89.179.12:443
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49739
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49738
                                Source: unknownTCP traffic detected without corresponding DNS query: 172.86.117.97
                                Source: unknownTCP traffic detected without corresponding DNS query: 172.86.117.97
                                Source: unknownTCP traffic detected without corresponding DNS query: 172.86.117.97
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://172.86.117.97/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 172.86.117.97Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: bild.exe, bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: bild.exe, bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: bild.exe, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                                Source: bild.exe, 00000001.00000002.4130928430.0000000000920000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: bild.exe, 00000001.00000002.4130928430.0000000000920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspXL-
                                Source: bild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asphM
                                Source: bild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspx
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: remcmdstub.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree,1_2_110321E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,1_2_110076F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,1_2_11113880
                                Source: Yara matchFile source: 0.3.file.exe.28755e7b820.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 7444, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7544, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,1_2_111158B0
                                Source: C:\Users\Public\Netstat\bild.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481FC2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7481FC2F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,1_2_1115DB40
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481FF9300_2_00007FF7481FF930
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482049280_2_00007FF748204928
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481F5E240_2_00007FF7481F5E24
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74821CE880_2_00007FF74821CE88
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748211F200_2_00007FF748211F20
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74821B1900_2_00007FF74821B190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482134840_2_00007FF748213484
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820A4AC0_2_00007FF74820A4AC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482207540_2_00007FF748220754
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820C96C0_2_00007FF74820C96C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482139640_2_00007FF748213964
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482289A00_2_00007FF7482289A0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748201A480_2_00007FF748201A48
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74822FA940_2_00007FF74822FA94
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481F1AA40_2_00007FF7481F1AA4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748212AB00_2_00007FF748212AB0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748235AF80_2_00007FF748235AF8
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820BB900_2_00007FF74820BB90
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748205B600_2_00007FF748205B60
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748214B980_2_00007FF748214B98
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748228C1C0_2_00007FF748228C1C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748212D580_2_00007FF748212D58
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748218DF40_2_00007FF748218DF4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482207540_2_00007FF748220754
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820AF180_2_00007FF74820AF18
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482320800_2_00007FF748232080
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820F1800_2_00007FF74820F180
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482121D00_2_00007FF7482121D0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481F72880_2_00007FF7481F7288
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820126C0_2_00007FF74820126C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481FA3100_2_00007FF7481FA310
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481FC2F00_2_00007FF7481FC2F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482153F00_2_00007FF7482153F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482325500_2_00007FF748232550
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820B5340_2_00007FF74820B534
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481F76C00_2_00007FF7481F76C0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481F48400_2_00007FF7481F4840
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74822C8380_2_00007FF74822C838
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110733B01_2_110733B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110295901_2_11029590
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11061C901_2_11061C90
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110330101_2_11033010
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111632201_2_11163220
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111674851_2_11167485
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110454F01_2_110454F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1101B7601_2_1101B760
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111258B01_2_111258B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1101BBA01_2_1101BBA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11087C601_2_11087C60
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110700901_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110804801_2_11080480
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1115E9801_2_1115E980
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1101C9C01_2_1101C9C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110088AB1_2_110088AB
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11050D801_2_11050D80
                                Source: C:\Users\Public\Netstat\bild.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11146450 appears 577 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 110278E0 appears 47 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1116F010 appears 36 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11029450 appears 916 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 111603E3 appears 40 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1105DD10 appears 286 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11081BB0 appears 42 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11164010 appears 32 times
                                Source: file.exe, 00000000.00000003.1674930174.0000028755FE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll2 vs file.exe
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcr100_clr0400.dll^ vs file.exe
                                Source: classification engineClassification label: mal84.rans.evad.winEXE@3/12@1/2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7481FB6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF7481FB6D8
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,1_2_1109D440
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,1_2_1109D4D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,1_2_11115B70
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748218624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF748218624
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\NetstatJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeMutant created: NULL
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: file.exeReversingLabs: Detection: 52%
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dxgidebug.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeFile written: C:\Users\Public\Netstat\client32.iniJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
                                Source: file.exeStatic file information: File size 2283549 > 1048576
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: msvcr100.i386.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132472852.000000006D081000.00000020.00000001.01000000.0000000C.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.4132684538.0000000073AF2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.4132607275.000000006E545000.00000002.00000001.01000000.0000000D.sdmp, pcicapi.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: TCCTL32.DLL.0.dr
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\__tmp_rar_sfx_access_check_4657734Jump to behavior
                                Source: file.exeStatic PE information: section name: .didat
                                Source: file.exeStatic PE information: section name: _RDATA
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748235156 push rsi; retf 0_2_00007FF748235157
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748235166 push rsi; retf 0_2_00007FF748235167
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1116F055 push ecx; ret 1_2_1116F068
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11169F49 push ecx; ret 1_2_11169F5C
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\bild.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\PCICL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,1_2_11139090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,1_2_1115B1D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,1_2_11113290
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,1_2_110254A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_110258F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,1_2_11023BA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_11024280
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11112670 IsIconic,GetTickCount,1_2_11112670
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,1_2_110C0BB0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,1_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,1_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_11143570
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110B8200 Sleep,ExitProcess,1_2_110B8200
                                Source: C:\Users\Public\Netstat\bild.exeWindow / User API: threadDelayed 430Jump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeWindow / User API: threadDelayed 7976Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_1-63975
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_1-67930
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_1-68227
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_1-68269
                                Source: C:\Users\Public\Netstat\bild.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_1-68359
                                Source: C:\Users\Public\Netstat\bild.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-68159
                                Source: C:\Users\Public\Netstat\bild.exeAPI coverage: 5.9 %
                                Source: C:\Users\Public\Netstat\bild.exe TID: 7572Thread sleep time: -73500s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exe TID: 7576Thread sleep time: -43000s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exe TID: 7572Thread sleep time: -1994000s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Users\Public\Netstat\bild.exeLast function: Thread delayed
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482040BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7482040BC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74821B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF74821B190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74822FCA0 FindFirstFileExA,0_2_00007FF74822FCA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482216A4 VirtualQuery,GetSystemInfo,0_2_00007FF7482216A4
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: bild.exe, 00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW7
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: bild.exe, 00000001.00000002.4130928430.0000000000920000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4130928430.000000000089E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_1-64043
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_1-64652
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748223170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF748223170
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState,1_2_11147750
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748230D20 GetProcessHeap,0_2_00007FF748230D20
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748223170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF748223170
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748223354 SetUnhandledExceptionFilter,0_2_00007FF748223354
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748222510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF748222510
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7482276D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7482276D8
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,1_2_11093080
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,1_2_110310C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_11161D01
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_1116DD89
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError,1_2_110F4560
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74821B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF74821B190
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event,1_2_1111FCA0
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe" Jump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,1_2_1109E190
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,1_2_1109E910
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWnd
                                Source: file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF74820DC70 cpuid 0_2_00007FF74820DC70
                                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF74821A2CC
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,1_2_11173A35
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,1_2_11173D69
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173CC6
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoA,1_2_1116B38E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,1_2_11173933
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,1_2_111739DA
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_1117383E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173D2D
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,1_2_11173C06
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,1_2_110F33F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748220754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF748220754
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA,1_2_1103B160
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11174AE9 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,1_2_11174AE9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF748204EB0 GetVersionExW,0_2_00007FF748204EB0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,1_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 1_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,1_2_110D8200
                                Source: Yara matchFile source: 1.0.bild.exe.c40000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.c40000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.73af0000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6e540000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.28755e7b820.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6ce90000.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 7444, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7544, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\bild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire Infrastructure2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                Exploitation for Privilege Escalation
                                1
                                Deobfuscate/Decode Files or Information
                                1
                                Input Capture
                                2
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                2
                                Valid Accounts
                                1
                                DLL Side-Loading
                                3
                                Obfuscated Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                22
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts2
                                Service Execution
                                1
                                Windows Service
                                2
                                Valid Accounts
                                2
                                Software Packing
                                Security Account Manager3
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                3
                                Non-Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                                Access Token Manipulation
                                1
                                DLL Side-Loading
                                NTDS44
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                4
                                Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                                Windows Service
                                1
                                Masquerading
                                LSA Secrets141
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts13
                                Process Injection
                                2
                                Valid Accounts
                                Cached Domain Credentials2
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                                Virtualization/Sandbox Evasion
                                DCSync1
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                                Access Token Manipulation
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt13
                                Process Injection
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                file.exe53%ReversingLabsWin64.Trojan.NetSupport
                                SourceDetectionScannerLabelLink
                                C:\Users\Public\Netstat\HTCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICHEK.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICL32.DLL12%ReversingLabs
                                C:\Users\Public\Netstat\TCCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\bild.exe29%ReversingLabsWin32.Trojan.NetSupport
                                C:\Users\Public\Netstat\msvcr100.dll0%ReversingLabs
                                C:\Users\Public\Netstat\pcicapi.dll3%ReversingLabs
                                C:\Users\Public\Netstat\remcmdstub.exe13%ReversingLabs
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://www.symauth.com/rpa000%URL Reputationsafe
                                http://www.symauth.com/cps0(0%URL Reputationsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                104.26.1.231
                                truefalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://geo.netsupportsoftware.com/location/loca.aspfalse
                                    unknown
                                    http://172.86.117.97/fakeurl.htmtrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://geo.netsupportsoftware.com/location/loca.asphMbild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.pci.co.uk/supportfile.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                          unknown
                                          http://%s/testpage.htmwininet.dllbild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                            unknown
                                            http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                              unknown
                                              http://www.pci.co.uk/supportsupportfile.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                unknown
                                                http://www.symauth.com/rpa00file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://geo.netsupportsoftware.com/location/loca.aspXL-bild.exe, 00000001.00000002.4130928430.0000000000920000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://geo.netsupportsoftware.com/location/loca.aspxbild.exe, 00000001.00000002.4130928430.00000000008F7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://127.0.0.1RESUMEPRINTINGfile.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                      unknown
                                                      http://%s/testpage.htmbild.exe, bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                        unknown
                                                        http://www.netsupportschool.com/tutor-assistant.asp11(file.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                          unknown
                                                          http://127.0.0.1bild.exe, bild.exe, 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                            unknown
                                                            http://www.symauth.com/cps0(file.exe, 00000000.00000003.1674930174.0000028756052000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.netsupportschool.com/tutor-assistant.aspfile.exe, 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                              unknown
                                                              http://%s/fakeurl.htmbild.exe, bild.exe, 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                104.26.1.231
                                                                geo.netsupportsoftware.comUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                172.86.117.97
                                                                unknownUnited States
                                                                46261QUICKPACKETUStrue
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1546257
                                                                Start date and time:2024-10-31 16:55:09 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 8m 53s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:6
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:file.exe
                                                                Detection:MAL
                                                                Classification:mal84.rans.evad.winEXE@3/12@1/2
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 84%
                                                                • Number of executed functions: 169
                                                                • Number of non-executed functions: 103
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • VT rate limit hit for: file.exe
                                                                TimeTypeDescription
                                                                11:56:31API Interceptor20363145x Sleep call for process: bild.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                104.26.1.231NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                update.jsGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                SecuriteInfo.com.Win32.PWSX-gen.10211.1601.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                FakturaPDF.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                Update 124.0.6367.158.jsGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                Update 124.0.6367.158.jsGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                geo.netsupportsoftware.comhttps://webdemo.biz/Get hashmaliciousNetSupport RAT, CAPTCHA ScamBrowse
                                                                • 104.26.0.231
                                                                https://inspyrehomedesign.comGet hashmaliciousNetSupport RATBrowse
                                                                • 172.67.68.212
                                                                https://inspyrehomedesign.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                                • 172.67.68.212
                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                • 172.67.68.212
                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                • 104.26.0.231
                                                                http://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                • 104.26.1.231
                                                                NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                • 104.26.1.231
                                                                NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                • 104.26.1.231
                                                                Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                • 104.26.1.231
                                                                update.jsGet hashmaliciousNetSupport RATBrowse
                                                                • 104.26.1.231
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                QUICKPACKETUSarm5.elfGet hashmaliciousUnknownBrowse
                                                                • 194.50.224.242
                                                                sh4.elfGet hashmaliciousMiraiBrowse
                                                                • 107.161.124.133
                                                                arm6.elfGet hashmaliciousUnknownBrowse
                                                                • 107.161.124.106
                                                                AF1cyL4cv6.vbsGet hashmaliciousAsyncRATBrowse
                                                                • 193.26.115.68
                                                                4d5ZJqq0M7.vbsGet hashmaliciousAsyncRATBrowse
                                                                • 193.26.115.68
                                                                LmJ7BFJILh.htmGet hashmaliciousUnknownBrowse
                                                                • 193.26.115.68
                                                                Compliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                • 185.215.165.89
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                • 144.172.118.154
                                                                vEOTtk6FeG.elfGet hashmaliciousMiraiBrowse
                                                                • 69.50.231.212
                                                                Scan08.10.24(Massimiliano.benso)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                • 185.215.165.89
                                                                CLOUDFLARENETUSFw Message from Kevin - Update on Coles Supply Chain Modernisation 31-10-24.emlGet hashmaliciousUnknownBrowse
                                                                • 104.18.36.155
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XWormBrowse
                                                                • 188.114.96.3
                                                                https://t.ly/4Nq2xGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                • 104.20.6.133
                                                                INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                • 188.114.96.3
                                                                SilverSEAL Corporation -RFQ_RFP_FSR Proposal.pdfGet hashmaliciousPhisherBrowse
                                                                • 188.114.96.3
                                                                Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 188.114.97.3
                                                                https://my.toruftuiov.com/a43a39c3-796e-468c-aae4-b83c862e0918Get hashmaliciousUnknownBrowse
                                                                • 104.16.79.73
                                                                RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 188.114.97.3
                                                                RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 188.114.97.3
                                                                MB267382625AE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                • 188.114.97.3
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\Public\Netstat\HTCTL32.DLLhttps://webdemo.biz/Get hashmaliciousNetSupport RAT, CAPTCHA ScamBrowse
                                                                  https://inspyrehomedesign.comGet hashmaliciousNetSupport RATBrowse
                                                                    https://inspyrehomedesign.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                        file.exeGet hashmaliciousNetSupport RATBrowse
                                                                          http://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                            upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                              information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                                Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                                                                                  Update_9025289.msixGet hashmaliciousNetSupport RATBrowse
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):328056
                                                                                    Entropy (8bit):6.754723001562745
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                    MD5:2D3B207C8A48148296156E5725426C7F
                                                                                    SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                    SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                    SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                    Malicious:false
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\HTCTL32.DLL, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: , Detection: malicious, Browse
                                                                                    • Filename: , Detection: malicious, Browse
                                                                                    • Filename: , Detection: malicious, Browse
                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                    • Filename: , Detection: malicious, Browse
                                                                                    • Filename: upd_8707558.msix, Detection: malicious, Browse
                                                                                    • Filename: information_package.exe, Detection: malicious, Browse
                                                                                    • Filename: Update_2762895.msix, Detection: malicious, Browse
                                                                                    • Filename: Update_9025289.msix, Detection: malicious, Browse
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):257
                                                                                    Entropy (8bit):5.119720931145611
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:O/oPn4xRPjwx1lDKHMoEEjLgpW2MezvLdNWYpPM/ioVLa8l6i7s:XeR7wx6JjjqW2MePBPM/ioU8l6J
                                                                                    MD5:7067AF414215EE4C50BFCD3EA43C84F0
                                                                                    SHA1:C331D410672477844A4CA87F43A14E643C863AF9
                                                                                    SHA-256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
                                                                                    SHA-512:17B888087192BCEA9F56128D0950423B1807E294D1C4F953D1BF0F5BD08E5F8E35AFEEE584EBF9233BFC44E0723DB3661911415798159AC118C8A42AAF0B902F
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:1200..0x3bcb348e....; NetSupport License File...; Generated on 11:54 - 21/03/2018........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=EVALUSION..maxslaves=5000..os2=1..product=10..serial_no=NSM165348..shrink_wrap=0..transport=0..
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):18808
                                                                                    Entropy (8bit):6.22028391196942
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                    MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                    SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                    SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                    SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                    Malicious:false
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICHEK.DLL, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):3735416
                                                                                    Entropy (8bit):6.525042992590476
                                                                                    Encrypted:false
                                                                                    SSDEEP:49152:cTXNZ+0ci2aYNT8wstdAukudJ1xTvIZamclSp+73mPu:cTXNo0cpKwstTJIkS43mm
                                                                                    MD5:00587238D16012152C2E951A087F2CC9
                                                                                    SHA1:C4E27A43075CE993FF6BB033360AF386B2FC58FF
                                                                                    SHA-256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
                                                                                    SHA-512:637950A1F78D3F3D02C30A49A16E91CF3DFCCC59104041876789BD7FDF9224D187209547766B91404C67319E13D1606DA7CEC397315495962CBF3E2CCD5F1226
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.t.I.'.I.'.I.'A..'.I.'...'.I.'.?#'.I.'...'.I.'.1.'.I.'.I.'.J.'.1.'.I.'.1.'.I.'..#',I.'.."'.I.'...'.I.'...'.I.'...'.I.'Rich.I.'................PE..L......V...........!......... ..............0................................9.....f-9.....................................4........`................8.x)...P7.p....@.......................P.......P..@............0..........`....................text............................... ..`.rdata.......0......................@..@.data....%..........................@....tls.........@......................@....hhshare.....P......................@....rsrc........`......................@..@.reloc..(2...P7..4....6.............@..B........................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):396664
                                                                                    Entropy (8bit):6.809064783360712
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:OpwbUb48Ju0LIFZB4Qaza4yFaMHAZtJ4Yew2j/bJa+neNQ:epq7BaGIn4BbLneNQ
                                                                                    MD5:EAB603D12705752E3D268D86DFF74ED4
                                                                                    SHA1:01873977C871D3346D795CF7E3888685DE9F0B16
                                                                                    SHA-256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
                                                                                    SHA-512:77DE0D9C93CCBA967DB70B280A85A770B3D8BEA3B707B1ABB037B2826B48898FEC87924E1A6CCE218C43478E5209E9EB9781051B4C3B450BEA3CD27DBD32C7F3
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\TCCTL32.DLL, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L...Y?XV...........!................................................................'.....@.............................o...T...x....0..@...............x)...@..\E..................................`d..@...............h............................text............................... ..`.rdata../...........................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc.. F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):105848
                                                                                    Entropy (8bit):4.68250265552195
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:qTjV5+6j6Qa86Fkv2Wr120hZIqeTSGRp2TkFimMP:qHVZl6FhWr80/heT8TkFiH
                                                                                    MD5:8D9709FF7D9C83BD376E01912C734F0A
                                                                                    SHA1:E3C92713CE1D7EAA5E2B1FABEB06CDC0BB499294
                                                                                    SHA-256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
                                                                                    SHA-512:042AD89ED2E15671F5DF67766D11E1FA7ADA8241D4513E7C8F0D77B983505D63EBFB39FEFA590A2712B77D7024C04445390A8BF4999648F83DBAB6B0F04EB2EE
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\bild.exe, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 29%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...T..U.....................n...... ........ ....@..................................K....@.................................< ..<....0...i...........t..x).......... ............................................... ...............................text............................... ..`.rdata..V.... ......................@..@.rsrc....i...0...j..................@..@.reloc..l............r..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):701
                                                                                    Entropy (8bit):5.536175622432943
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Yrqzd+mPZGS/py6z8BlsVTXuZ7+DP981E7GXXfDWQClnmSuy7bIAlkz6:4qzEmPZly6YBlLoG1fXXfDi7bIAaz6
                                                                                    MD5:A0A7B634AB8C28C9DE3A0122F7E43F98
                                                                                    SHA1:676F7554B78EAC6FEFC97B40CD965B3DEDFEF4BC
                                                                                    SHA-256:D28BC214691BF2B576411750BD8AE9D5B27AE66DC8E0B60C841D43C1ABBBC9E5
                                                                                    SHA-512:A8378E27F139F3524A45276416DBA938CD788F6C299A29B6E241740972CB5DC1181E3F0FD908769F53751E1E3392BBC73279E01D3DEF6D322ECE6FA9842879DE
                                                                                    Malicious:false
                                                                                    Preview:0xf2ddf885....[Client].._present=1..DisableChatMenu=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RADIUSSecret=dgAAAOeJWid73S6SvOyjjiTDVewA..RoomSpec=Eval..ShowUIOnConnect=0..silent=1..SKMode=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=1..Usernames=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32u.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[General]..BeepUsingSpeaker=0......[HTTP]..GatewayAddress=172.86.117.97:443..gsk=EFHH;K>OBDEJ9A<I@BCB..gskmode=0..gsku=EFHH;K>OBDEJ9A<I@BCB..GSKX=EFHH;K>OBDEJ9A<I@BCB....
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):773968
                                                                                    Entropy (8bit):6.901559811406837
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                    MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                    SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                    SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                    SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:Windows setup INFormation
                                                                                    Category:dropped
                                                                                    Size (bytes):328
                                                                                    Entropy (8bit):4.93007757242403
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                    MD5:26E28C01461F7E65C402BDF09923D435
                                                                                    SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                    SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                    SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                    Malicious:false
                                                                                    Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):33144
                                                                                    Entropy (8bit):6.737780491933496
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                    MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                    SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                    SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                    SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\pcicapi.dll, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):77224
                                                                                    Entropy (8bit):6.793971095882093
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:zfafvTuNOwphKuyUHTqYXHhrXH4+LIyrxomee/+5IrAee/DIr3:jafLSpAFUzt0+LIyr7eR5IUeCIz
                                                                                    MD5:325B65F171513086438952A152A747C4
                                                                                    SHA1:A1D1C397902FF15C4929A03D582B09B35AA70FC0
                                                                                    SHA-256:26DBB528C270C812423C3359FC54D13C52D459CC0E8BC9B0D192725EDA34E534
                                                                                    SHA-512:6829555AB3851064C3AAD2D0C121077DB0260790B95BF087B77990A040FEBD35B8B286F1593DCCAA81B24395BD437F5ADD02037418FD5C9C8C78DC0989A9A10D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 13%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L...c..c.....................J.......!............@.......................... ............@....................................<.......T................]..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\Public\Netstat\bild.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):15
                                                                                    Entropy (8bit):2.7329145639793984
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:QJgTG:QkG
                                                                                    MD5:8AB0D91EF06123198FFAC30AD08A14C7
                                                                                    SHA1:46D83BB84F74D8F28427314C6084CC9AFE9D1533
                                                                                    SHA-256:DB50064FEE42FB57DCFD9C4269A682331246224D6108A18DB83ABD400CCECA12
                                                                                    SHA-512:1AA8560708AD663C4D5D0C2199E2CE472D11748EDA18848AAA3430C6F333BB04DA65DFFF4144BFEEA3860CA30F7F832EC64FF6D5B0731AC8878050601AC7A3A3
                                                                                    Malicious:false
                                                                                    Preview:32.7767,-96.797
                                                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                    Entropy (8bit):7.881018486516457
                                                                                    TrID:
                                                                                    • Win64 Executable GUI (202006/5) 92.65%
                                                                                    • Win64 Executable (generic) (12005/4) 5.51%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                    • DOS Executable Generic (2002/1) 0.92%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:file.exe
                                                                                    File size:2'283'549 bytes
                                                                                    MD5:87514bcfa421057dc1575ec1630d78ff
                                                                                    SHA1:012029171ff901f1cb5495059da47143d193923c
                                                                                    SHA256:50c263fc02412062ca239e7419880678f797408a243d0a2140bc7bbb96a716c1
                                                                                    SHA512:0d37d146960abf699a35d8c66d4af38c68af12db62d8548457dc26f6a2e30dd07c3d2599f38befee0720e649b08884daa37961b74ff4e2622840ea3d8237501b
                                                                                    SSDEEP:49152:kDjlabwz9Tvaw2EheBgtpsDf5Log8nUQkFG4tP5Deqk+H1Zf8NNbTs:0qwFvcEhQGa178UnxBkk1ZfWC
                                                                                    TLSH:72B51209E3E909F5D0B7E53CCA668D02F77A7C5903309A8F23B4525A1F673A09E39761
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                                                    Icon Hash:1515d4d4442f2d2d
                                                                                    Entrypoint:0x140032ee0
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x140000000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:5
                                                                                    OS Version Minor:2
                                                                                    File Version Major:5
                                                                                    File Version Minor:2
                                                                                    Subsystem Version Major:5
                                                                                    Subsystem Version Minor:2
                                                                                    Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                                                    Instruction
                                                                                    dec eax
                                                                                    sub esp, 28h
                                                                                    call 00007F7088852B48h
                                                                                    dec eax
                                                                                    add esp, 28h
                                                                                    jmp 00007F70888524DFh
                                                                                    int3
                                                                                    int3
                                                                                    dec eax
                                                                                    mov eax, esp
                                                                                    dec eax
                                                                                    mov dword ptr [eax+08h], ebx
                                                                                    dec eax
                                                                                    mov dword ptr [eax+10h], ebp
                                                                                    dec eax
                                                                                    mov dword ptr [eax+18h], esi
                                                                                    dec eax
                                                                                    mov dword ptr [eax+20h], edi
                                                                                    inc ecx
                                                                                    push esi
                                                                                    dec eax
                                                                                    sub esp, 20h
                                                                                    dec ebp
                                                                                    mov edx, dword ptr [ecx+38h]
                                                                                    dec eax
                                                                                    mov esi, edx
                                                                                    dec ebp
                                                                                    mov esi, eax
                                                                                    dec eax
                                                                                    mov ebp, ecx
                                                                                    dec ecx
                                                                                    mov edx, ecx
                                                                                    dec eax
                                                                                    mov ecx, esi
                                                                                    dec ecx
                                                                                    mov edi, ecx
                                                                                    inc ecx
                                                                                    mov ebx, dword ptr [edx]
                                                                                    dec eax
                                                                                    shl ebx, 04h
                                                                                    dec ecx
                                                                                    add ebx, edx
                                                                                    dec esp
                                                                                    lea eax, dword ptr [ebx+04h]
                                                                                    call 00007F7088851963h
                                                                                    mov eax, dword ptr [ebp+04h]
                                                                                    and al, 66h
                                                                                    neg al
                                                                                    mov eax, 00000001h
                                                                                    sbb edx, edx
                                                                                    neg edx
                                                                                    add edx, eax
                                                                                    test dword ptr [ebx+04h], edx
                                                                                    je 00007F7088852673h
                                                                                    dec esp
                                                                                    mov ecx, edi
                                                                                    dec ebp
                                                                                    mov eax, esi
                                                                                    dec eax
                                                                                    mov edx, esi
                                                                                    dec eax
                                                                                    mov ecx, ebp
                                                                                    call 00007F7088854687h
                                                                                    dec eax
                                                                                    mov ebx, dword ptr [esp+30h]
                                                                                    dec eax
                                                                                    mov ebp, dword ptr [esp+38h]
                                                                                    dec eax
                                                                                    mov esi, dword ptr [esp+40h]
                                                                                    dec eax
                                                                                    mov edi, dword ptr [esp+48h]
                                                                                    dec eax
                                                                                    add esp, 20h
                                                                                    inc ecx
                                                                                    pop esi
                                                                                    ret
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    dec eax
                                                                                    sub esp, 48h
                                                                                    dec eax
                                                                                    lea ecx, dword ptr [esp+20h]
                                                                                    call 00007F7088840EF3h
                                                                                    dec eax
                                                                                    lea edx, dword ptr [00025747h]
                                                                                    dec eax
                                                                                    lea ecx, dword ptr [esp+20h]
                                                                                    call 00007F7088853742h
                                                                                    int3
                                                                                    jmp 00007F7088859924h
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    Programming Language:
                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000xe360.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7f0000x970.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x700000xe3600xe400ada5628b9441c3d4f775b5c1be0267efFalse0.630139802631579data6.596650704309685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x7f0000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    PNG0x706800xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                    PNG0x711c80x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                    RT_ICON0x727780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                                                    RT_ICON0x72ce00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                                                    RT_ICON0x735880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                                                    RT_ICON0x744300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                                                    RT_ICON0x748980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                                                    RT_ICON0x759400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                                                    RT_ICON0x77ee80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                                                    RT_DIALOG0x7c5b80x286dataEnglishUnited States0.5092879256965944
                                                                                    RT_DIALOG0x7c3880x13adataEnglishUnited States0.60828025477707
                                                                                    RT_DIALOG0x7c4c80xecdataEnglishUnited States0.6991525423728814
                                                                                    RT_DIALOG0x7c2580x12edataEnglishUnited States0.5927152317880795
                                                                                    RT_DIALOG0x7bf200x338dataEnglishUnited States0.45145631067961167
                                                                                    RT_DIALOG0x7bcc80x252dataEnglishUnited States0.5757575757575758
                                                                                    RT_STRING0x7cf980x1e2dataEnglishUnited States0.3900414937759336
                                                                                    RT_STRING0x7d1800x1ccdataEnglishUnited States0.4282608695652174
                                                                                    RT_STRING0x7d3500x1b8dataEnglishUnited States0.45681818181818185
                                                                                    RT_STRING0x7d5080x146dataEnglishUnited States0.5153374233128835
                                                                                    RT_STRING0x7d6500x46cdataEnglishUnited States0.3454063604240283
                                                                                    RT_STRING0x7dac00x166dataEnglishUnited States0.49162011173184356
                                                                                    RT_STRING0x7dc280x152dataEnglishUnited States0.5059171597633136
                                                                                    RT_STRING0x7dd800x10adataEnglishUnited States0.49624060150375937
                                                                                    RT_STRING0x7de900xbcdataEnglishUnited States0.6329787234042553
                                                                                    RT_STRING0x7df500x1c0dataEnglishUnited States0.5178571428571429
                                                                                    RT_STRING0x7e1100x250dataEnglishUnited States0.44256756756756754
                                                                                    RT_GROUP_ICON0x7bc600x68dataEnglishUnited States0.7019230769230769
                                                                                    RT_MANIFEST0x7c8400x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                                    DLLImport
                                                                                    KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                                                    OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                    gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                    EnglishUnited States
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2024-10-31T16:55:58.033749+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.449736172.86.117.97443TCP
                                                                                    2024-10-31T16:56:00.730625+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.44973513.89.179.12443TCP
                                                                                    2024-10-31T16:56:19.003116+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449738TCP
                                                                                    2024-10-31T16:56:56.856030+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449739TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 31, 2024 16:56:01.438772917 CET49736443192.168.2.4172.86.117.97
                                                                                    Oct 31, 2024 16:56:01.438817978 CET44349736172.86.117.97192.168.2.4
                                                                                    Oct 31, 2024 16:56:01.438878059 CET49736443192.168.2.4172.86.117.97
                                                                                    Oct 31, 2024 16:56:01.555509090 CET4973780192.168.2.4104.26.1.231
                                                                                    Oct 31, 2024 16:56:01.560545921 CET8049737104.26.1.231192.168.2.4
                                                                                    Oct 31, 2024 16:56:01.561636925 CET49736443192.168.2.4172.86.117.97
                                                                                    Oct 31, 2024 16:56:01.561657906 CET44349736172.86.117.97192.168.2.4
                                                                                    Oct 31, 2024 16:56:01.561706066 CET44349736172.86.117.97192.168.2.4
                                                                                    Oct 31, 2024 16:56:01.561712027 CET4973780192.168.2.4104.26.1.231
                                                                                    Oct 31, 2024 16:56:01.561825991 CET4973780192.168.2.4104.26.1.231
                                                                                    Oct 31, 2024 16:56:01.566826105 CET8049737104.26.1.231192.168.2.4
                                                                                    Oct 31, 2024 16:56:02.581109047 CET8049737104.26.1.231192.168.2.4
                                                                                    Oct 31, 2024 16:56:02.581231117 CET4973780192.168.2.4104.26.1.231
                                                                                    Oct 31, 2024 16:57:51.441176891 CET4973780192.168.2.4104.26.1.231
                                                                                    Oct 31, 2024 16:57:51.446261883 CET8049737104.26.1.231192.168.2.4
                                                                                    Oct 31, 2024 16:57:51.449245930 CET4973780192.168.2.4104.26.1.231
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 31, 2024 16:56:01.527065992 CET5031153192.168.2.41.1.1.1
                                                                                    Oct 31, 2024 16:56:01.544207096 CET53503111.1.1.1192.168.2.4
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Oct 31, 2024 16:56:01.527065992 CET192.168.2.41.1.1.10x26f8Standard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Oct 31, 2024 16:56:01.544207096 CET1.1.1.1192.168.2.40x26f8No error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                    Oct 31, 2024 16:56:01.544207096 CET1.1.1.1192.168.2.40x26f8No error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                    Oct 31, 2024 16:56:01.544207096 CET1.1.1.1192.168.2.40x26f8No error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                    • 172.86.117.97connection: keep-alivecmd=pollinfo=1ack=1
                                                                                    • geo.netsupportsoftware.com
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.449736172.86.117.974437544C:\Users\Public\Netstat\bild.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Oct 31, 2024 16:56:01.561636925 CET218OUTPOST http://172.86.117.97/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 172.86.117.97Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                    Data Raw:
                                                                                    Data Ascii:


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.449737104.26.1.231807544C:\Users\Public\Netstat\bild.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Oct 31, 2024 16:56:01.561825991 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                    Host: geo.netsupportsoftware.com
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    Oct 31, 2024 16:56:02.581109047 CET792INHTTP/1.1 200 OK
                                                                                    Date: Thu, 31 Oct 2024 15:56:02 GMT
                                                                                    Content-Type: text/html; Charset=utf-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    CF-Ray: 8db4d5311bb1e91e-DFW
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Cache-Control: private
                                                                                    Set-Cookie: ASPSESSIONIDCCBQAACB=LBAPFJHBLEIONGCOHEDKIMBC; path=/
                                                                                    cf-apo-via: origin,host
                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                    X-Powered-By: ASP.NET
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vrO3uRa8pw2Em7frJLCG0w%2FTvYth%2FKSLdz3QLBMESF6Ie0BAWoMUcNSNqpIniu4BH6z%2BNTvKHZIngYXyVotHiZKtazkB4KmIsdjERRcGlzsHYImPZYLop8IKpkzru%2FAS4UVnzD7bV1%2BxN%2Fn%2F"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    Data Raw: 66 0d 0a 33 32 2e 37 37 36 37 2c 2d 39 36 2e 37 39 37 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: f32.7767,-96.7970


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:11:55:59
                                                                                    Start date:31/10/2024
                                                                                    Path:C:\Users\user\Desktop\file.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                    Imagebase:0x7ff7481f0000
                                                                                    File size:2'283'549 bytes
                                                                                    MD5 hash:87514BCFA421057DC1575EC1630D78FF
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.1674930174.0000028755CCC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:1
                                                                                    Start time:11:56:00
                                                                                    Start date:31/10/2024
                                                                                    Path:C:\Users\Public\Netstat\bild.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\Public\Netstat\bild.exe"
                                                                                    Imagebase:0xc40000
                                                                                    File size:105'848 bytes
                                                                                    MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000000.1677245948.0000000000C42000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4131882214.0000000005766000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4132391424.000000006CED0000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\bild.exe, Author: Joe Security
                                                                                    Antivirus matches:
                                                                                    • Detection: 29%, ReversingLabs
                                                                                    Reputation:moderate
                                                                                    Has exited:false

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:12%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:26.1%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:27
                                                                                      execution_graph 25368 7ff74822154b 25369 7ff7482214a2 25368->25369 25372 7ff748221900 25369->25372 25398 7ff748221558 25372->25398 25375 7ff74822198b 25377 7ff748221868 DloadReleaseSectionWriteAccess 6 API calls 25375->25377 25376 7ff7482219b4 25379 7ff748221a3d LoadLibraryExA 25376->25379 25380 7ff748221b85 25376->25380 25381 7ff748221aa9 25376->25381 25386 7ff748221abd 25376->25386 25378 7ff748221998 RaiseException 25377->25378 25391 7ff7482214e1 25378->25391 25379->25381 25382 7ff748221a54 GetLastError 25379->25382 25406 7ff748221868 25380->25406 25381->25386 25387 7ff748221ab4 FreeLibrary 25381->25387 25384 7ff748221a69 25382->25384 25385 7ff748221a7e 25382->25385 25383 7ff748221b1b GetProcAddress 25383->25380 25390 7ff748221b30 GetLastError 25383->25390 25384->25381 25384->25385 25389 7ff748221868 DloadReleaseSectionWriteAccess 6 API calls 25385->25389 25386->25380 25386->25383 25387->25386 25392 7ff748221a8b RaiseException 25389->25392 25393 7ff748221b45 25390->25393 25392->25391 25393->25380 25394 7ff748221868 DloadReleaseSectionWriteAccess 6 API calls 25393->25394 25395 7ff748221b67 RaiseException 25394->25395 25396 7ff748221558 _com_raise_error 6 API calls 25395->25396 25397 7ff748221b81 25396->25397 25397->25380 25399 7ff74822156e 25398->25399 25405 7ff7482215d3 25398->25405 25414 7ff748221604 25399->25414 25402 7ff7482215ce 25404 7ff748221604 DloadReleaseSectionWriteAccess 3 API calls 25402->25404 25404->25405 25405->25375 25405->25376 25407 7ff748221878 25406->25407 25408 7ff7482218d1 25406->25408 25409 7ff748221604 DloadReleaseSectionWriteAccess 3 API calls 25407->25409 25408->25391 25410 7ff74822187d 25409->25410 25411 7ff7482218cc 25410->25411 25412 7ff7482217d8 DloadProtectSection 3 API calls 25410->25412 25413 7ff748221604 DloadReleaseSectionWriteAccess 3 API calls 25411->25413 25412->25411 25413->25408 25415 7ff74822161f 25414->25415 25416 7ff748221573 25414->25416 25415->25416 25417 7ff748221624 GetModuleHandleW 25415->25417 25416->25402 25421 7ff7482217d8 25416->25421 25418 7ff748221639 25417->25418 25419 7ff74822163e GetProcAddress 25417->25419 25418->25416 25419->25418 25420 7ff748221653 GetProcAddress 25419->25420 25420->25418 25422 7ff7482217fa DloadProtectSection 25421->25422 25423 7ff74822183a VirtualProtect 25422->25423 25424 7ff748221802 25422->25424 25426 7ff7482216a4 VirtualQuery GetSystemInfo 25422->25426 25423->25424 25424->25402 25426->25423 25428 7ff74822d94c 25429 7ff74822d997 25428->25429 25433 7ff74822d95b _set_errno_from_matherr 25428->25433 25438 7ff74822d69c 15 API calls _set_errno_from_matherr 25429->25438 25430 7ff74822d97e HeapAlloc 25432 7ff74822d995 25430->25432 25430->25433 25433->25429 25433->25430 25435 7ff74822bbc0 25433->25435 25439 7ff74822bc00 25435->25439 25438->25432 25444 7ff74822f398 EnterCriticalSection 25439->25444 28292 7ff74822bf2c 28299 7ff74822bc34 28292->28299 28304 7ff74822d440 35 API calls 3 library calls 28299->28304 28301 7ff74822bc3f 28305 7ff74822d068 35 API calls abort 28301->28305 28304->28301 25445 7ff74821b190 25788 7ff7481f255c 25445->25788 25447 7ff74821b1db 25448 7ff74821b1ef 25447->25448 25449 7ff74821be93 25447->25449 25603 7ff74821b20c 25447->25603 25453 7ff74821b2db 25448->25453 25454 7ff74821b1ff 25448->25454 25448->25603 26073 7ff74821f390 25449->26073 25460 7ff74821b391 25453->25460 25465 7ff74821b2f5 25453->25465 25458 7ff74821b207 25454->25458 25459 7ff74821b2a9 25454->25459 25455 7ff74821beba SendMessageW 25456 7ff74821bec9 25455->25456 25462 7ff74821bef0 GetDlgItem SendMessageW 25456->25462 25463 7ff74821bed5 SendDlgItemMessageW 25456->25463 25468 7ff74820aae0 48 API calls 25458->25468 25458->25603 25464 7ff74821b2cb EndDialog 25459->25464 25459->25603 25796 7ff7481f22bc GetDlgItem 25460->25796 26092 7ff7482062dc GetCurrentDirectoryW 25462->26092 25463->25462 25464->25603 25469 7ff74820aae0 48 API calls 25465->25469 25471 7ff74821b236 25468->25471 25472 7ff74821b313 SetDlgItemTextW 25469->25472 25470 7ff74821bf47 GetDlgItem 26102 7ff7481f2520 25470->26102 26106 7ff7481f1ec4 34 API calls _handle_error 25471->26106 25477 7ff74821b326 25472->25477 25475 7ff74821b408 GetDlgItem 25481 7ff74821b44f SetFocus 25475->25481 25482 7ff74821b422 SendMessageW SendMessageW 25475->25482 25476 7ff74821b3f5 25492 7ff74821bcc5 25476->25492 25613 7ff74821b3b1 EndDialog 25476->25613 25483 7ff74821b340 GetMessageW 25477->25483 25477->25603 25480 7ff74821b246 25488 7ff74821b25c 25480->25488 26107 7ff7481f250c 25480->26107 25484 7ff74821b4f2 25481->25484 25485 7ff74821b465 25481->25485 25482->25481 25490 7ff74821b35e IsDialogMessageW 25483->25490 25483->25603 25810 7ff7481f8d04 25484->25810 25491 7ff74820aae0 48 API calls 25485->25491 25486 7ff74821b3da 25493 7ff7481f1fa0 31 API calls 25486->25493 25502 7ff74821c363 25488->25502 25488->25603 25490->25477 25497 7ff74821b373 TranslateMessage DispatchMessageW 25490->25497 25498 7ff74821b46f 25491->25498 25499 7ff74820aae0 48 API calls 25492->25499 25493->25603 25496 7ff74821b52c 25820 7ff74821ef80 25496->25820 25497->25477 26110 7ff7481f129c 25498->26110 25503 7ff74821bcd6 SetDlgItemTextW 25499->25503 26167 7ff748227904 25502->26167 25507 7ff74820aae0 48 API calls 25503->25507 25513 7ff74821bd08 25507->25513 25528 7ff7481f129c 33 API calls 25513->25528 25514 7ff74821c368 25523 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25514->25523 25517 7ff74821b498 25521 7ff74821f0a4 24 API calls 25517->25521 25526 7ff74821b4a5 25521->25526 25529 7ff74821c36e 25523->25529 25526->25514 25548 7ff74821b4e8 25526->25548 25557 7ff74821bd31 25528->25557 25541 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25529->25541 25540 7ff74821bdda 25550 7ff74820aae0 48 API calls 25540->25550 25551 7ff74821c374 25541->25551 25544 7ff7481f1fa0 31 API calls 25555 7ff74821b586 25544->25555 25547 7ff74821b5ec 25560 7ff74821b61a 25547->25560 26121 7ff7482032a8 25547->26121 25548->25547 26120 7ff74821fa80 33 API calls 2 library calls 25548->26120 25552 7ff74821bde4 25550->25552 25562 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25551->25562 25572 7ff7481f129c 33 API calls 25552->25572 25555->25529 25555->25548 25557->25540 25567 7ff7481f129c 33 API calls 25557->25567 25858 7ff748202f58 25560->25858 25566 7ff74821c37a 25562->25566 25579 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25566->25579 25573 7ff74821bd7f 25567->25573 25578 7ff74821be0d 25572->25578 25581 7ff74820aae0 48 API calls 25573->25581 25576 7ff74821b64c 25870 7ff748207fc4 25576->25870 25577 7ff74821b634 GetLastError 25577->25576 25595 7ff7481f129c 33 API calls 25578->25595 25585 7ff74821c380 25579->25585 25586 7ff74821bd8a 25581->25586 25583 7ff74821b60e 26124 7ff748219d90 12 API calls _handle_error 25583->26124 25596 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25585->25596 25591 7ff7481f1150 33 API calls 25586->25591 25589 7ff74821b65e 25593 7ff74821b674 25589->25593 25594 7ff74821b665 GetLastError 25589->25594 25597 7ff74821bda2 25591->25597 25599 7ff74821b71c 25593->25599 25604 7ff74821b68b GetTickCount 25593->25604 25605 7ff74821b72b 25593->25605 25594->25593 25600 7ff74821be4e 25595->25600 25601 7ff74821c386 25596->25601 26154 7ff7481f2034 25597->26154 25599->25605 25621 7ff74821bb79 25599->25621 25614 7ff7481f1fa0 31 API calls 25600->25614 25606 7ff7481f255c 61 API calls 25601->25606 26158 7ff748222320 25603->26158 25873 7ff7481f4228 25604->25873 25610 7ff74821ba50 25605->25610 26125 7ff748206454 25605->26125 25609 7ff74821c3e4 25606->25609 25615 7ff74821c3e8 25609->25615 25624 7ff74821c489 GetDlgItem SetFocus 25609->25624 25671 7ff74821c3fd 25609->25671 25610->25613 26149 7ff7481fbd0c 33 API calls 25610->26149 25611 7ff74821bdbe 25619 7ff7481f1fa0 31 API calls 25611->25619 25613->25486 25622 7ff74821be78 25614->25622 25631 7ff748222320 _handle_error 8 API calls 25615->25631 25627 7ff74821bdcc 25619->25627 25637 7ff74820aae0 48 API calls 25621->25637 25629 7ff7481f1fa0 31 API calls 25622->25629 25623 7ff74821ba75 26150 7ff7481f1150 25623->26150 25635 7ff74821c4ba 25624->25635 25626 7ff74821b74e 26137 7ff74820b914 102 API calls 25626->26137 25634 7ff7481f1fa0 31 API calls 25627->25634 25628 7ff74821b6ba 25883 7ff7481f1fa0 25628->25883 25638 7ff74821be83 25629->25638 25640 7ff74821ca97 25631->25640 25634->25540 25642 7ff7481f129c 33 API calls 25635->25642 25644 7ff74821bba7 SetDlgItemTextW 25637->25644 25645 7ff7481f1fa0 31 API calls 25638->25645 25639 7ff74821ba8a 25646 7ff74820aae0 48 API calls 25639->25646 25641 7ff74821b768 25648 7ff74820da98 48 API calls 25641->25648 25649 7ff74821c4cc 25642->25649 25643 7ff74821b6c8 25888 7ff748202134 25643->25888 25650 7ff7481f2534 25644->25650 25645->25486 25651 7ff74821ba97 25646->25651 25647 7ff74821c434 SendDlgItemMessageW 25652 7ff74821c45d EndDialog 25647->25652 25653 7ff74821c454 25647->25653 25654 7ff74821b7aa GetCommandLineW 25648->25654 26172 7ff7482080d8 33 API calls 25649->26172 25658 7ff74821bbc5 SetDlgItemTextW GetDlgItem 25650->25658 25659 7ff7481f1150 33 API calls 25651->25659 25652->25615 25653->25652 25655 7ff74821b869 25654->25655 25656 7ff74821b84f 25654->25656 26142 7ff74821ab54 33 API calls _handle_error 25655->26142 26138 7ff7481f20b0 25656->26138 25663 7ff74821bbf0 GetWindowLongPtrW SetWindowLongPtrW 25658->25663 25664 7ff74821bc13 25658->25664 25665 7ff74821baaa 25659->25665 25660 7ff74821c4e0 25666 7ff7481f250c SetDlgItemTextW 25660->25666 25663->25664 25908 7ff74821ce88 25664->25908 25670 7ff7481f1fa0 31 API calls 25665->25670 25673 7ff74821c4f4 25666->25673 25667 7ff74821b87a 26143 7ff74821ab54 33 API calls _handle_error 25667->26143 25678 7ff74821bab5 25670->25678 25671->25615 25671->25647 25683 7ff74821c526 SendDlgItemMessageW FindFirstFileW 25673->25683 25675 7ff74821b704 25904 7ff74820204c 25675->25904 25676 7ff74821b6f5 GetLastError 25676->25675 25682 7ff7481f1fa0 31 API calls 25678->25682 25679 7ff74821b88b 26144 7ff74821ab54 33 API calls _handle_error 25679->26144 25681 7ff74821ce88 160 API calls 25686 7ff74821bc3c 25681->25686 25687 7ff74821bac3 25682->25687 25688 7ff74821c57b 25683->25688 25781 7ff74821ca04 25683->25781 26058 7ff74821f974 25686->26058 25697 7ff74820aae0 48 API calls 25687->25697 25698 7ff74820aae0 48 API calls 25688->25698 25689 7ff74821b89c 26145 7ff74820b9b4 102 API calls 25689->26145 25694 7ff74821b8b3 26146 7ff74821fbdc 33 API calls 25694->26146 25695 7ff74821ca81 25695->25615 25696 7ff74821ce88 160 API calls 25711 7ff74821bc6a 25696->25711 25701 7ff74821badb 25697->25701 25702 7ff74821c59e 25698->25702 25700 7ff74821caa9 25704 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25700->25704 25712 7ff7481f129c 33 API calls 25701->25712 25713 7ff7481f129c 33 API calls 25702->25713 25703 7ff74821b8d2 CreateFileMappingW 25707 7ff74821b911 MapViewOfFile 25703->25707 25708 7ff74821b953 ShellExecuteExW 25703->25708 25709 7ff74821caae 25704->25709 25705 7ff74821bc96 26072 7ff7481f2298 GetDlgItem EnableWindow 25705->26072 26147 7ff748223640 25707->26147 25728 7ff74821b974 25708->25728 25714 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25709->25714 25711->25705 25715 7ff74821ce88 160 API calls 25711->25715 25723 7ff74821bb04 25712->25723 25716 7ff74821c5cd 25713->25716 25717 7ff74821cab4 25714->25717 25715->25705 25718 7ff7481f1150 33 API calls 25716->25718 25722 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25717->25722 25720 7ff74821c5e8 25718->25720 25719 7ff74821bb5a 25724 7ff7481f1fa0 31 API calls 25719->25724 26173 7ff7481fe164 33 API calls 2 library calls 25720->26173 25721 7ff74821b9c3 25729 7ff74821b9dc UnmapViewOfFile CloseHandle 25721->25729 25730 7ff74821b9ef 25721->25730 25726 7ff74821caba 25722->25726 25723->25566 25723->25719 25724->25613 25732 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25726->25732 25727 7ff74821c5ff 25733 7ff7481f1fa0 31 API calls 25727->25733 25728->25721 25737 7ff74821b9b1 Sleep 25728->25737 25729->25730 25730->25551 25731 7ff74821ba25 25730->25731 25735 7ff7481f1fa0 31 API calls 25731->25735 25734 7ff74821cac0 25732->25734 25736 7ff74821c60c 25733->25736 25739 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25734->25739 25738 7ff74821ba42 25735->25738 25736->25709 25741 7ff7481f1fa0 31 API calls 25736->25741 25737->25721 25737->25728 25740 7ff7481f1fa0 31 API calls 25738->25740 25742 7ff74821cac6 25739->25742 25740->25610 25743 7ff74821c673 25741->25743 25746 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25742->25746 25744 7ff7481f250c SetDlgItemTextW 25743->25744 25745 7ff74821c687 FindClose 25744->25745 25747 7ff74821c797 SendDlgItemMessageW 25745->25747 25748 7ff74821c6a3 25745->25748 25749 7ff74821cacc 25746->25749 25751 7ff74821c7cb 25747->25751 26174 7ff74821a2cc 10 API calls _handle_error 25748->26174 25754 7ff74820aae0 48 API calls 25751->25754 25752 7ff74821c6c6 25753 7ff74820aae0 48 API calls 25752->25753 25755 7ff74821c6cf 25753->25755 25756 7ff74821c7d8 25754->25756 25757 7ff74820da98 48 API calls 25755->25757 25758 7ff7481f129c 33 API calls 25756->25758 25761 7ff74821c6ec BuildCatchObjectHelperInternal 25757->25761 25760 7ff74821c807 25758->25760 25759 7ff7481f1fa0 31 API calls 25762 7ff74821c783 25759->25762 25763 7ff7481f1150 33 API calls 25760->25763 25761->25717 25761->25759 25764 7ff7481f250c SetDlgItemTextW 25762->25764 25765 7ff74821c822 25763->25765 25764->25747 26175 7ff7481fe164 33 API calls 2 library calls 25765->26175 25767 7ff74821c839 25768 7ff7481f1fa0 31 API calls 25767->25768 25769 7ff74821c845 BuildCatchObjectHelperInternal 25768->25769 25770 7ff7481f1fa0 31 API calls 25769->25770 25771 7ff74821c87f 25770->25771 25772 7ff7481f1fa0 31 API calls 25771->25772 25773 7ff74821c88c 25772->25773 25773->25726 25774 7ff7481f1fa0 31 API calls 25773->25774 25775 7ff74821c8f3 25774->25775 25776 7ff7481f250c SetDlgItemTextW 25775->25776 25777 7ff74821c907 25776->25777 25777->25781 26176 7ff74821a2cc 10 API calls _handle_error 25777->26176 25779 7ff74821c932 25780 7ff74820aae0 48 API calls 25779->25780 25782 7ff74821c93c 25780->25782 25781->25615 25781->25695 25781->25700 25781->25742 25783 7ff74820da98 48 API calls 25782->25783 25785 7ff74821c959 BuildCatchObjectHelperInternal 25783->25785 25784 7ff7481f1fa0 31 API calls 25786 7ff74821c9f0 25784->25786 25785->25734 25785->25784 25787 7ff7481f250c SetDlgItemTextW 25786->25787 25787->25781 25789 7ff7481f25d0 25788->25789 25790 7ff7481f256a 25788->25790 25789->25447 25790->25789 26177 7ff74820a4ac 25790->26177 25792 7ff7481f258f 25792->25789 25793 7ff7481f25a4 GetDlgItem 25792->25793 25793->25789 25794 7ff7481f25b7 25793->25794 25794->25789 25795 7ff7481f25be SetWindowTextW 25794->25795 25795->25789 25797 7ff7481f2334 25796->25797 25798 7ff7481f22fc 25796->25798 26276 7ff7481f23f8 GetWindowTextLengthW 25797->26276 25800 7ff7481f129c 33 API calls 25798->25800 25801 7ff7481f232a BuildCatchObjectHelperInternal 25800->25801 25802 7ff7481f1fa0 31 API calls 25801->25802 25803 7ff7481f2389 25801->25803 25802->25803 25804 7ff7481f23c8 25803->25804 25807 7ff7481f23f0 25803->25807 25805 7ff748222320 _handle_error 8 API calls 25804->25805 25806 7ff7481f23dd 25805->25806 25806->25475 25806->25476 25806->25613 25808 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25807->25808 25809 7ff7481f23f5 25808->25809 25811 7ff7481f8d34 25810->25811 25817 7ff7481f8de8 25810->25817 25814 7ff7481f8de3 25811->25814 25815 7ff7481f8d91 25811->25815 25818 7ff7481f8d42 BuildCatchObjectHelperInternal 25811->25818 26311 7ff7481f1f80 33 API calls 3 library calls 25814->26311 25815->25818 25819 7ff7482221d0 33 API calls 25815->25819 26312 7ff7481f2004 33 API calls std::_Xinvalid_argument 25817->26312 25818->25496 25819->25818 25824 7ff74821efb0 25820->25824 25821 7ff74821efd7 25822 7ff748222320 _handle_error 8 API calls 25821->25822 25823 7ff74821b537 25822->25823 25834 7ff74820aae0 25823->25834 25824->25821 26313 7ff7481fbd0c 33 API calls 25824->26313 25826 7ff74821f02a 25827 7ff7481f1150 33 API calls 25826->25827 25828 7ff74821f03f 25827->25828 25830 7ff7481f1fa0 31 API calls 25828->25830 25832 7ff74821f04f BuildCatchObjectHelperInternal 25828->25832 25829 7ff7481f1fa0 31 API calls 25831 7ff74821f076 25829->25831 25830->25832 25833 7ff7481f1fa0 31 API calls 25831->25833 25832->25829 25833->25821 25835 7ff74820aaf3 25834->25835 26314 7ff748209774 25835->26314 25838 7ff74820ab58 LoadStringW 25839 7ff74820ab86 25838->25839 25840 7ff74820ab71 LoadStringW 25838->25840 25841 7ff74820da98 25839->25841 25840->25839 26333 7ff74820d874 25841->26333 25844 7ff74821f0a4 26367 7ff74821ae1c PeekMessageW 25844->26367 25847 7ff74821f143 SendMessageW SendMessageW 25849 7ff74821f189 25847->25849 25850 7ff74821f1a4 SendMessageW 25847->25850 25848 7ff74821f0f5 25853 7ff74821f101 ShowWindow SendMessageW SendMessageW 25848->25853 25849->25850 25851 7ff74821f1c3 25850->25851 25852 7ff74821f1c6 SendMessageW SendMessageW 25850->25852 25851->25852 25854 7ff74821f218 SendMessageW 25852->25854 25855 7ff74821f1f3 SendMessageW 25852->25855 25853->25847 25856 7ff748222320 _handle_error 8 API calls 25854->25856 25855->25854 25857 7ff74821b578 25856->25857 25857->25544 25861 7ff74820309d 25858->25861 25866 7ff748202f8e 25858->25866 25859 7ff748222320 _handle_error 8 API calls 25860 7ff7482030b3 25859->25860 25860->25576 25860->25577 25861->25859 25862 7ff748203077 25862->25861 25863 7ff748203684 56 API calls 25862->25863 25863->25861 25864 7ff7481f129c 33 API calls 25864->25866 25866->25862 25866->25864 25867 7ff7482030c8 25866->25867 26372 7ff748203684 25866->26372 25868 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25867->25868 25869 7ff7482030cd 25868->25869 25871 7ff748207fd2 SetCurrentDirectoryW 25870->25871 25872 7ff748207fcf 25870->25872 25871->25589 25872->25871 25874 7ff7481f4255 25873->25874 25875 7ff7481f426a 25874->25875 25876 7ff7481f129c 33 API calls 25874->25876 25877 7ff748222320 _handle_error 8 API calls 25875->25877 25876->25875 25878 7ff7481f42a1 25877->25878 25879 7ff7481f3c84 25878->25879 25880 7ff7481f3cab 25879->25880 26505 7ff7481f710c 25880->26505 25882 7ff7481f3cbb BuildCatchObjectHelperInternal 25882->25628 25884 7ff7481f1fdc 25883->25884 25885 7ff7481f1fb3 25883->25885 25884->25643 25885->25884 25886 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25885->25886 25887 7ff7481f2000 25886->25887 25891 7ff74820216a 25888->25891 25889 7ff74820219e 25892 7ff74820227f 25889->25892 25893 7ff748206a0c 49 API calls 25889->25893 25890 7ff7482021b1 CreateFileW 25890->25889 25891->25889 25891->25890 25894 7ff7482022af 25892->25894 25900 7ff7481f20b0 33 API calls 25892->25900 25895 7ff748202209 25893->25895 25896 7ff748222320 _handle_error 8 API calls 25894->25896 25898 7ff748202246 25895->25898 25899 7ff74820220d CreateFileW 25895->25899 25897 7ff7482022c4 25896->25897 25897->25675 25897->25676 25898->25892 25901 7ff7482022d8 25898->25901 25899->25898 25900->25894 25902 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25901->25902 25903 7ff7482022dd 25902->25903 25905 7ff748202066 25904->25905 25906 7ff748202072 25904->25906 25905->25906 26517 7ff7482020d0 25905->26517 26524 7ff74821aa08 25908->26524 25910 7ff74821d1ee 25911 7ff7481f1fa0 31 API calls 25910->25911 25912 7ff74821d1f7 25911->25912 25914 7ff748222320 _handle_error 8 API calls 25912->25914 25913 7ff74820d22c 33 API calls 26057 7ff74821cf03 BuildCatchObjectHelperInternal 25913->26057 25915 7ff74821bc2b 25914->25915 25915->25681 25916 7ff74821eefa 26657 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 25916->26657 25919 7ff74821ef00 26658 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 25919->26658 25921 7ff74821ef06 25925 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25921->25925 25923 7ff74821eeee 25924 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25923->25924 25926 7ff74821eef4 25924->25926 25927 7ff74821ef0c 25925->25927 26656 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 25926->26656 25930 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25927->25930 25932 7ff74821ef12 25930->25932 25931 7ff74821ee4a 25933 7ff74821eed2 25931->25933 25934 7ff7481f20b0 33 API calls 25931->25934 25937 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25932->25937 26654 7ff7481f1f80 33 API calls 3 library calls 25933->26654 25939 7ff74821ee77 25934->25939 25935 7ff74821eee8 26655 7ff7481f2004 33 API calls std::_Xinvalid_argument 25935->26655 25936 7ff7481f13a4 33 API calls 25940 7ff74821dc3a GetTempPathW 25936->25940 25941 7ff74821ef18 25937->25941 26653 7ff74821abe8 33 API calls 3 library calls 25939->26653 25940->26057 25948 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25941->25948 25942 7ff7482062dc 35 API calls 25942->26057 25946 7ff74821ee8d 25954 7ff7481f1fa0 31 API calls 25946->25954 25957 7ff74821eea4 BuildCatchObjectHelperInternal 25946->25957 25947 7ff7481f2520 SetWindowTextW 25947->26057 25952 7ff74821ef1e 25948->25952 25951 7ff74822bb8c 43 API calls 25951->26057 25958 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25952->25958 25953 7ff74821e7f3 25953->25933 25953->25935 25956 7ff7482221d0 33 API calls 25953->25956 25966 7ff74821e83b BuildCatchObjectHelperInternal 25953->25966 25954->25957 25955 7ff7481f1fa0 31 API calls 25955->25933 25956->25966 25957->25955 25959 7ff74821ef24 25958->25959 25964 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25959->25964 25961 7ff74821aa08 33 API calls 25961->26057 25962 7ff74821ef6c 26661 7ff7481f2004 33 API calls std::_Xinvalid_argument 25962->26661 25963 7ff7481f20b0 33 API calls 25963->26057 25970 7ff74821ef2a 25964->25970 25965 7ff748203f30 54 API calls 25965->26057 25974 7ff7481f20b0 33 API calls 25966->25974 26011 7ff74821eb8f 25966->26011 25968 7ff7481f1fa0 31 API calls 25968->25931 25969 7ff74821ef78 26663 7ff7481f2004 33 API calls std::_Xinvalid_argument 25969->26663 25979 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25970->25979 25971 7ff74821ef72 26662 7ff7481f1f80 33 API calls 3 library calls 25971->26662 25973 7ff74821ef66 26660 7ff7481f1f80 33 API calls 3 library calls 25973->26660 25980 7ff74821e963 25974->25980 25978 7ff74821ec2a 25978->25962 25978->25973 25987 7ff74821ec72 BuildCatchObjectHelperInternal 25978->25987 25994 7ff74821ed3b BuildCatchObjectHelperInternal 25978->25994 25996 7ff7482221d0 33 API calls 25978->25996 25984 7ff74821ef30 25979->25984 25986 7ff74821ef60 25980->25986 25995 7ff7481f129c 33 API calls 25980->25995 25983 7ff74821ed40 25983->25969 25983->25971 25983->25994 25999 7ff7482221d0 33 API calls 25983->25999 26000 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 25984->26000 25985 7ff748203d34 51 API calls 25985->26057 26659 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 25986->26659 26567 7ff74821f4e0 25987->26567 25989 7ff74821d5e9 GetDlgItem 25997 7ff7481f2520 SetWindowTextW 25989->25997 25990 7ff74820dc2c 33 API calls 25990->26057 25992 7ff7482199c8 31 API calls 25992->26057 25994->25968 26001 7ff74821e9a6 25995->26001 25996->25987 26002 7ff74821d608 SendMessageW 25997->26002 25999->25994 26003 7ff74821ef36 26000->26003 26649 7ff74820d22c 26001->26649 26002->26057 26007 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26003->26007 26006 7ff748205b60 53 API calls 26006->26057 26010 7ff74821ef3c 26007->26010 26008 7ff74821d63c SendMessageW 26008->26057 26015 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26010->26015 26011->25978 26011->25983 26017 7ff74821ef54 26011->26017 26020 7ff74821ef5a 26011->26020 26013 7ff748205aa8 33 API calls 26013->26057 26019 7ff74821ef42 26015->26019 26021 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26017->26021 26018 7ff7481f1fa0 31 API calls 26018->26057 26025 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26019->26025 26024 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26020->26024 26021->26020 26022 7ff7481f4228 33 API calls 26022->26057 26024->25986 26028 7ff74821ef48 26025->26028 26026 7ff748205820 33 API calls 26026->26057 26027 7ff7482032a8 51 API calls 26027->26057 26030 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26028->26030 26029 7ff7481fe164 33 API calls 26029->26057 26032 7ff74821ef4e 26030->26032 26031 7ff7481f250c SetDlgItemTextW 26031->26057 26036 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26032->26036 26034 7ff7481f1150 33 API calls 26034->26057 26036->26017 26038 7ff7481f1fa0 31 API calls 26047 7ff74821e9d1 26038->26047 26039 7ff7481f129c 33 API calls 26039->26047 26040 7ff7481f2674 31 API calls 26040->26057 26042 7ff7482113c4 CompareStringW 26042->26047 26043 7ff7481f129c 33 API calls 26043->26057 26044 7ff74821df99 EndDialog 26044->26057 26046 7ff7482032bc 51 API calls 26046->26057 26047->26011 26047->26028 26047->26032 26047->26038 26047->26039 26047->26042 26048 7ff74820d22c 33 API calls 26047->26048 26048->26047 26049 7ff74821db21 MoveFileW 26050 7ff74821db70 26049->26050 26051 7ff74821db55 MoveFileExW 26049->26051 26052 7ff7481f1fa0 31 API calls 26050->26052 26050->26057 26051->26050 26052->26050 26053 7ff748202f58 56 API calls 26053->26057 26054 7ff7481f2034 33 API calls 26054->26057 26055 7ff7481f8d04 33 API calls 26055->26057 26057->25910 26057->25913 26057->25916 26057->25919 26057->25921 26057->25923 26057->25926 26057->25927 26057->25931 26057->25932 26057->25936 26057->25941 26057->25942 26057->25947 26057->25951 26057->25952 26057->25953 26057->25959 26057->25961 26057->25963 26057->25965 26057->25970 26057->25984 26057->25985 26057->25990 26057->25992 26057->26003 26057->26006 26057->26008 26057->26010 26057->26013 26057->26018 26057->26019 26057->26022 26057->26026 26057->26027 26057->26029 26057->26031 26057->26034 26057->26040 26057->26043 26057->26044 26057->26046 26057->26049 26057->26053 26057->26054 26057->26055 26528 7ff7482113c4 CompareStringW 26057->26528 26529 7ff74821a440 26057->26529 26605 7ff74820cfa4 35 API calls _invalid_parameter_noinfo_noreturn 26057->26605 26606 7ff7482195b4 33 API calls Concurrency::cancel_current_task 26057->26606 26607 7ff748220684 31 API calls _invalid_parameter_noinfo_noreturn 26057->26607 26608 7ff7481fdf4c 47 API calls BuildCatchObjectHelperInternal 26057->26608 26609 7ff74821a834 33 API calls _invalid_parameter_noinfo_noreturn 26057->26609 26610 7ff748219518 33 API calls 26057->26610 26611 7ff74821abe8 33 API calls 3 library calls 26057->26611 26612 7ff748207368 33 API calls 2 library calls 26057->26612 26613 7ff748204088 33 API calls 26057->26613 26614 7ff7482065b0 33 API calls 3 library calls 26057->26614 26615 7ff7482072cc 26057->26615 26619 7ff7481f1744 33 API calls 4 library calls 26057->26619 26620 7ff7482031bc 26057->26620 26634 7ff748203ea0 FindClose 26057->26634 26635 7ff7482113f4 CompareStringW 26057->26635 26636 7ff748219cd0 47 API calls 26057->26636 26637 7ff7482187d8 51 API calls 3 library calls 26057->26637 26638 7ff74821ab54 33 API calls _handle_error 26057->26638 26639 7ff748207df4 26057->26639 26647 7ff748205b08 CompareStringW 26057->26647 26648 7ff748207eb0 47 API calls 26057->26648 26059 7ff74821f9a3 26058->26059 26060 7ff7481f20b0 33 API calls 26059->26060 26061 7ff74821f9b9 26060->26061 26062 7ff74821f9ee 26061->26062 26063 7ff7481f20b0 33 API calls 26061->26063 26677 7ff7481fe34c 26062->26677 26063->26062 26065 7ff74821fa4b 26697 7ff7481fe7a8 26065->26697 26069 7ff74821fa61 26070 7ff748222320 _handle_error 8 API calls 26069->26070 26071 7ff74821bc52 26070->26071 26071->25696 27804 7ff74821849c 26073->27804 26076 7ff74821f4b7 26079 7ff748222320 _handle_error 8 API calls 26076->26079 26077 7ff74821f3c7 GetWindow 26078 7ff74821f3e2 26077->26078 26078->26076 26081 7ff74821f3ee GetClassNameW 26078->26081 26083 7ff74821f417 GetWindowLongPtrW 26078->26083 26084 7ff74821f496 GetWindow 26078->26084 26080 7ff74821be9b 26079->26080 26080->25455 26080->25456 27809 7ff7482113c4 CompareStringW 26081->27809 26083->26084 26085 7ff74821f429 SendMessageW 26083->26085 26084->26076 26084->26078 26085->26084 26086 7ff74821f445 GetObjectW 26085->26086 27810 7ff748218504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26086->27810 26088 7ff74821f461 27811 7ff7482184cc 26088->27811 27815 7ff748218df4 16 API calls _handle_error 26088->27815 26091 7ff74821f479 SendMessageW DeleteObject 26091->26084 26093 7ff748206300 26092->26093 26098 7ff74820638d 26092->26098 26094 7ff7481f13a4 33 API calls 26093->26094 26095 7ff74820631b GetCurrentDirectoryW 26094->26095 26096 7ff748206341 26095->26096 26097 7ff7481f20b0 33 API calls 26096->26097 26099 7ff74820634f 26097->26099 26098->25470 26099->26098 26100 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26099->26100 26101 7ff7482063a9 26100->26101 26103 7ff7481f252a SetWindowTextW 26102->26103 26104 7ff7481f2527 26102->26104 26105 7ff74825e2e0 26103->26105 26104->26103 26106->25480 26108 7ff7481f2516 SetDlgItemTextW 26107->26108 26109 7ff7481f2513 26107->26109 26109->26108 26111 7ff7481f12d0 26110->26111 26118 7ff7481f139b 26110->26118 26112 7ff7481f12de BuildCatchObjectHelperInternal 26111->26112 26115 7ff7481f1396 26111->26115 26116 7ff7481f1338 26111->26116 26112->25517 27818 7ff7481f1f80 33 API calls 3 library calls 26115->27818 26116->26112 26119 7ff7482221d0 33 API calls 26116->26119 27819 7ff7481f2004 33 API calls std::_Xinvalid_argument 26118->27819 26119->26112 26120->25547 26122 7ff7482032bc 51 API calls 26121->26122 26123 7ff7482032b1 26122->26123 26123->25560 26123->25583 26124->25560 26126 7ff7481f13a4 33 API calls 26125->26126 26127 7ff748206489 26126->26127 26128 7ff74820648c GetModuleFileNameW 26127->26128 26131 7ff7482064dc 26127->26131 26129 7ff7482064de 26128->26129 26130 7ff7482064a7 26128->26130 26129->26131 26130->26127 26132 7ff7481f129c 33 API calls 26131->26132 26134 7ff748206506 26132->26134 26133 7ff74820653e 26133->25626 26134->26133 26135 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26134->26135 26136 7ff748206560 26135->26136 26137->25641 26139 7ff7481f20f6 26138->26139 26140 7ff7481f20cb BuildCatchObjectHelperInternal 26138->26140 27820 7ff7481f1474 33 API calls 3 library calls 26139->27820 26140->25655 26142->25667 26143->25679 26144->25689 26145->25694 26146->25703 26148 7ff748223620 26147->26148 26148->25708 26149->25623 26151 7ff7481f1177 26150->26151 26152 7ff7481f2034 33 API calls 26151->26152 26153 7ff7481f1185 BuildCatchObjectHelperInternal 26152->26153 26153->25639 26155 7ff7481f2085 26154->26155 26156 7ff7481f2059 BuildCatchObjectHelperInternal 26154->26156 27821 7ff7481f15b8 33 API calls 3 library calls 26155->27821 26156->25611 26161 7ff748222329 26158->26161 26159 7ff748222550 IsProcessorFeaturePresent 26162 7ff748222568 26159->26162 26160 7ff74821c350 26161->26159 26161->26160 27822 7ff748222744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 26162->27822 26164 7ff74822257b 27823 7ff748222510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26164->27823 27824 7ff74822783c 31 API calls 2 library calls 26167->27824 26169 7ff74822791d 27825 7ff748227934 16 API calls abort 26169->27825 26172->25660 26173->25727 26174->25752 26175->25767 26176->25779 26202 7ff748203e28 26177->26202 26181 7ff74820a589 26208 7ff748209408 26181->26208 26182 7ff74820a519 26182->26181 26200 7ff74820a56a SetDlgItemTextW 26182->26200 26223 7ff748209800 26182->26223 26185 7ff74820a6f2 GetSystemMetrics GetWindow 26187 7ff74820a821 26185->26187 26195 7ff74820a71d 26185->26195 26186 7ff74820a603 26188 7ff74820a60c GetWindowLongPtrW 26186->26188 26189 7ff74820a6c2 26186->26189 26191 7ff748222320 _handle_error 8 API calls 26187->26191 26192 7ff74825e2c0 26188->26192 26227 7ff7482095a8 26189->26227 26196 7ff74820a830 26191->26196 26197 7ff74820a6aa GetWindowRect 26192->26197 26195->26187 26199 7ff74820a73e GetWindowRect 26195->26199 26201 7ff74820a800 GetWindow 26195->26201 26196->25792 26197->26189 26198 7ff74820a6e5 SetWindowTextW 26198->26185 26199->26195 26200->26182 26201->26187 26201->26195 26203 7ff748203e4d _snwprintf 26202->26203 26236 7ff748229ef0 26203->26236 26206 7ff748210f68 WideCharToMultiByte 26207 7ff748210faa 26206->26207 26207->26182 26209 7ff7482095a8 47 API calls 26208->26209 26212 7ff74820944f 26209->26212 26210 7ff74820955a 26211 7ff748222320 _handle_error 8 API calls 26210->26211 26213 7ff74820958e GetWindowRect GetClientRect 26211->26213 26212->26210 26214 7ff7481f129c 33 API calls 26212->26214 26213->26185 26213->26186 26215 7ff74820949c 26214->26215 26216 7ff7482095a1 26215->26216 26218 7ff7481f129c 33 API calls 26215->26218 26217 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26216->26217 26219 7ff7482095a7 26217->26219 26220 7ff748209514 26218->26220 26220->26210 26221 7ff74820959c 26220->26221 26222 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26221->26222 26222->26216 26224 7ff748209840 26223->26224 26226 7ff748209869 26223->26226 26275 7ff74822a270 31 API calls 2 library calls 26224->26275 26226->26182 26228 7ff748203e28 swprintf 46 API calls 26227->26228 26229 7ff7482095eb 26228->26229 26230 7ff748210f68 WideCharToMultiByte 26229->26230 26231 7ff748209603 26230->26231 26232 7ff748209800 31 API calls 26231->26232 26233 7ff74820961b 26232->26233 26234 7ff748222320 _handle_error 8 API calls 26233->26234 26235 7ff74820962b 26234->26235 26235->26185 26235->26198 26237 7ff748229f4e 26236->26237 26238 7ff748229f36 26236->26238 26237->26238 26240 7ff748229f58 26237->26240 26263 7ff74822d69c 15 API calls _set_errno_from_matherr 26238->26263 26265 7ff748227ef0 35 API calls 2 library calls 26240->26265 26241 7ff748229f3b 26264 7ff7482278e4 31 API calls _invalid_parameter_noinfo_noreturn 26241->26264 26244 7ff748222320 _handle_error 8 API calls 26246 7ff748203e69 26244->26246 26245 7ff748229f69 memcpy_s 26266 7ff748227e70 15 API calls _set_errno_from_matherr 26245->26266 26246->26206 26248 7ff748229fd4 26267 7ff7482282f8 46 API calls 3 library calls 26248->26267 26250 7ff748229fdd 26251 7ff748229fe5 26250->26251 26252 7ff74822a014 26250->26252 26268 7ff74822d90c 26251->26268 26254 7ff74822a06c 26252->26254 26255 7ff74822a01a 26252->26255 26256 7ff74822a092 26252->26256 26257 7ff74822a023 26252->26257 26258 7ff74822d90c __free_lconv_mon 15 API calls 26254->26258 26255->26254 26255->26257 26256->26254 26259 7ff74822a09c 26256->26259 26260 7ff74822d90c __free_lconv_mon 15 API calls 26257->26260 26262 7ff748229f46 26258->26262 26261 7ff74822d90c __free_lconv_mon 15 API calls 26259->26261 26260->26262 26261->26262 26262->26244 26263->26241 26264->26262 26265->26245 26266->26248 26267->26250 26269 7ff74822d911 RtlFreeHeap 26268->26269 26273 7ff74822d941 __free_lconv_mon 26268->26273 26270 7ff74822d92c 26269->26270 26269->26273 26274 7ff74822d69c 15 API calls _set_errno_from_matherr 26270->26274 26272 7ff74822d931 GetLastError 26272->26273 26273->26262 26274->26272 26275->26226 26288 7ff7481f13a4 26276->26288 26279 7ff7481f2494 26280 7ff7481f129c 33 API calls 26279->26280 26281 7ff7481f24a2 26280->26281 26283 7ff7481f2505 26281->26283 26285 7ff7481f24dd 26281->26285 26282 7ff748222320 _handle_error 8 API calls 26284 7ff7481f24f3 26282->26284 26286 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26283->26286 26284->25801 26285->26282 26287 7ff7481f250a 26286->26287 26289 7ff7481f13ad 26288->26289 26297 7ff7481f142d GetWindowTextW 26288->26297 26290 7ff7481f143d 26289->26290 26291 7ff7481f13ce 26289->26291 26308 7ff7481f2018 33 API calls std::_Xinvalid_argument 26290->26308 26295 7ff7481f13db memcpy_s 26291->26295 26298 7ff7482221d0 26291->26298 26307 7ff7481f197c 31 API calls _invalid_parameter_noinfo_noreturn 26295->26307 26297->26279 26299 7ff7482221db 26298->26299 26300 7ff7482221f4 26299->26300 26301 7ff74822bbc0 _set_errno_from_matherr 2 API calls 26299->26301 26302 7ff7482221fa 26299->26302 26300->26295 26301->26299 26303 7ff748222205 26302->26303 26309 7ff748222f7c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 26302->26309 26310 7ff7481f1f80 33 API calls 3 library calls 26303->26310 26306 7ff74822220b 26307->26297 26309->26303 26310->26306 26311->25817 26313->25826 26321 7ff748209638 26314->26321 26317 7ff7482097d9 26319 7ff748222320 _handle_error 8 API calls 26317->26319 26318 7ff748209800 31 API calls 26318->26317 26320 7ff7482097f2 26319->26320 26320->25838 26320->25839 26322 7ff748209692 26321->26322 26330 7ff748209730 26321->26330 26323 7ff748210f68 WideCharToMultiByte 26322->26323 26327 7ff7482096c0 26322->26327 26323->26327 26324 7ff7482096ef 26332 7ff74822a270 31 API calls 2 library calls 26324->26332 26325 7ff748222320 _handle_error 8 API calls 26326 7ff748209764 26325->26326 26326->26317 26326->26318 26327->26324 26331 7ff74820aa88 45 API calls _snwprintf 26327->26331 26330->26325 26331->26324 26332->26330 26349 7ff74820d4d0 26333->26349 26337 7ff748229ef0 swprintf 46 API calls 26338 7ff74820d8e5 _snwprintf 26337->26338 26338->26337 26346 7ff74820d974 26338->26346 26363 7ff7481f9d78 33 API calls 26338->26363 26340 7ff748222320 _handle_error 8 API calls 26343 7ff74820da2b 26340->26343 26341 7ff74820da3f 26344 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26341->26344 26342 7ff74820da17 26342->26340 26343->25844 26345 7ff74820da44 26344->26345 26347 7ff74820d9a3 26346->26347 26364 7ff7481f9d78 33 API calls 26346->26364 26347->26341 26347->26342 26350 7ff74820d665 26349->26350 26352 7ff74820d502 26349->26352 26353 7ff74820cb80 26350->26353 26351 7ff7481f1744 33 API calls 26351->26352 26352->26350 26352->26351 26354 7ff74820cbb6 26353->26354 26361 7ff74820cc80 26353->26361 26357 7ff74820cc7b 26354->26357 26358 7ff74820cc20 26354->26358 26359 7ff74820cbc6 26354->26359 26365 7ff7481f1f80 33 API calls 3 library calls 26357->26365 26358->26359 26362 7ff7482221d0 33 API calls 26358->26362 26359->26338 26366 7ff7481f2004 33 API calls std::_Xinvalid_argument 26361->26366 26362->26359 26363->26338 26364->26347 26365->26361 26368 7ff74821ae3c GetMessageW 26367->26368 26369 7ff74821ae80 GetDlgItem 26367->26369 26370 7ff74821ae6a TranslateMessage DispatchMessageW 26368->26370 26371 7ff74821ae5b IsDialogMessageW 26368->26371 26369->25847 26369->25848 26370->26369 26371->26369 26371->26370 26374 7ff7482036b3 26372->26374 26373 7ff7482036e0 26392 7ff7482032bc 26373->26392 26374->26373 26375 7ff7482036cc CreateDirectoryW 26374->26375 26375->26373 26377 7ff74820377d 26375->26377 26381 7ff74820378d 26377->26381 26406 7ff748203d34 26377->26406 26379 7ff748203791 GetLastError 26379->26381 26383 7ff748222320 _handle_error 8 API calls 26381->26383 26385 7ff7482037b9 26383->26385 26385->25866 26386 7ff748203720 CreateDirectoryW 26387 7ff74820373b 26386->26387 26388 7ff748203774 26387->26388 26389 7ff7482037ce 26387->26389 26388->26377 26388->26379 26390 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26389->26390 26391 7ff7482037d3 26390->26391 26393 7ff7482032e4 26392->26393 26394 7ff7482032e7 GetFileAttributesW 26392->26394 26393->26394 26395 7ff7482032f8 26394->26395 26402 7ff748203375 26394->26402 26397 7ff748206a0c 49 API calls 26395->26397 26396 7ff748222320 _handle_error 8 API calls 26398 7ff748203389 26396->26398 26399 7ff74820331f 26397->26399 26398->26379 26420 7ff748206a0c 26398->26420 26400 7ff748203323 GetFileAttributesW 26399->26400 26401 7ff74820333c 26399->26401 26400->26401 26401->26402 26403 7ff748203399 26401->26403 26402->26396 26404 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26403->26404 26405 7ff74820339e 26404->26405 26407 7ff748203d5e SetFileAttributesW 26406->26407 26408 7ff748203d5b 26406->26408 26409 7ff748203d74 26407->26409 26416 7ff748203df5 26407->26416 26408->26407 26411 7ff748206a0c 49 API calls 26409->26411 26410 7ff748222320 _handle_error 8 API calls 26413 7ff748203e0a 26410->26413 26412 7ff748203d99 26411->26412 26414 7ff748203d9d SetFileAttributesW 26412->26414 26415 7ff748203dbc 26412->26415 26413->26381 26414->26415 26415->26416 26417 7ff748203e1a 26415->26417 26416->26410 26418 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26417->26418 26419 7ff748203e1f 26418->26419 26421 7ff748206a4b 26420->26421 26441 7ff748206a44 26420->26441 26424 7ff7481f129c 33 API calls 26421->26424 26422 7ff748222320 _handle_error 8 API calls 26423 7ff74820371c 26422->26423 26423->26386 26423->26387 26425 7ff748206a76 26424->26425 26426 7ff748206a96 26425->26426 26427 7ff748206cc7 26425->26427 26429 7ff748206ab0 26426->26429 26455 7ff748206b49 26426->26455 26428 7ff7482062dc 35 API calls 26427->26428 26432 7ff748206ce6 26428->26432 26430 7ff7482070ab 26429->26430 26493 7ff7481fc098 33 API calls 2 library calls 26429->26493 26501 7ff7481f2004 33 API calls std::_Xinvalid_argument 26430->26501 26433 7ff748206eef 26432->26433 26437 7ff748206d1b 26432->26437 26439 7ff748206b44 26432->26439 26436 7ff7482070cf 26433->26436 26498 7ff7481fc098 33 API calls 2 library calls 26433->26498 26434 7ff7482070b1 26446 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26434->26446 26504 7ff7481f2004 33 API calls std::_Xinvalid_argument 26436->26504 26444 7ff7482070bd 26437->26444 26496 7ff7481fc098 33 API calls 2 library calls 26437->26496 26438 7ff7482070d5 26447 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26438->26447 26439->26434 26439->26438 26439->26441 26448 7ff7482070a6 26439->26448 26441->26422 26442 7ff748206b03 26456 7ff7481f1fa0 31 API calls 26442->26456 26460 7ff748206b15 BuildCatchObjectHelperInternal 26442->26460 26502 7ff7481f2004 33 API calls std::_Xinvalid_argument 26444->26502 26453 7ff7482070b7 26446->26453 26454 7ff7482070db 26447->26454 26452 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26448->26452 26449 7ff748206f56 26499 7ff7481f11cc 33 API calls BuildCatchObjectHelperInternal 26449->26499 26451 7ff7481f1fa0 31 API calls 26451->26439 26452->26430 26463 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26453->26463 26465 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26454->26465 26455->26439 26459 7ff7481f129c 33 API calls 26455->26459 26456->26460 26458 7ff7482070c3 26462 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26458->26462 26466 7ff748206bbe 26459->26466 26460->26451 26461 7ff748206f69 26500 7ff7482057ac 33 API calls BuildCatchObjectHelperInternal 26461->26500 26468 7ff7482070c9 26462->26468 26463->26444 26464 7ff7481f1fa0 31 API calls 26478 7ff748206df5 26464->26478 26470 7ff7482070e1 26465->26470 26494 7ff748205820 33 API calls 26466->26494 26503 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 26468->26503 26469 7ff748206d76 BuildCatchObjectHelperInternal 26469->26458 26469->26464 26472 7ff748206bd3 26495 7ff7481fe164 33 API calls 2 library calls 26472->26495 26475 7ff7481f1fa0 31 API calls 26477 7ff748206fec 26475->26477 26476 7ff748206f79 BuildCatchObjectHelperInternal 26476->26454 26476->26475 26479 7ff7481f1fa0 31 API calls 26477->26479 26482 7ff748206e21 26478->26482 26497 7ff7481f1744 33 API calls 4 library calls 26478->26497 26483 7ff748206ff6 26479->26483 26481 7ff7481f1fa0 31 API calls 26486 7ff748206c6d 26481->26486 26482->26468 26484 7ff7481f129c 33 API calls 26482->26484 26487 7ff7481f1fa0 31 API calls 26483->26487 26488 7ff748206ec2 26484->26488 26485 7ff748206be9 BuildCatchObjectHelperInternal 26485->26453 26485->26481 26489 7ff7481f1fa0 31 API calls 26486->26489 26487->26439 26490 7ff7481f2034 33 API calls 26488->26490 26489->26439 26491 7ff748206edf 26490->26491 26492 7ff7481f1fa0 31 API calls 26491->26492 26492->26439 26493->26442 26494->26472 26495->26485 26496->26469 26497->26482 26498->26449 26499->26461 26500->26476 26503->26436 26506 7ff7481f7206 26505->26506 26507 7ff7481f713b 26505->26507 26515 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 26506->26515 26511 7ff7481f714b BuildCatchObjectHelperInternal 26507->26511 26514 7ff7481f3f48 33 API calls 2 library calls 26507->26514 26509 7ff7481f720b 26512 7ff7481f7273 26509->26512 26516 7ff7481f889c 8 API calls BuildCatchObjectHelperInternal 26509->26516 26511->25882 26512->25882 26514->26511 26515->26509 26516->26509 26518 7ff7482020ea 26517->26518 26519 7ff748202102 26517->26519 26518->26519 26521 7ff7482020f6 CloseHandle 26518->26521 26520 7ff748202126 26519->26520 26523 7ff7481fb544 99 API calls 26519->26523 26520->25906 26521->26519 26523->26520 26525 7ff74821aa2f 26524->26525 26526 7ff74821aa36 26524->26526 26525->26057 26526->26525 26664 7ff7481f1744 33 API calls 4 library calls 26526->26664 26528->26057 26530 7ff74821a706 26529->26530 26531 7ff74821a47f 26529->26531 26533 7ff748222320 _handle_error 8 API calls 26530->26533 26665 7ff74821cdf8 33 API calls 26531->26665 26535 7ff74821a717 26533->26535 26534 7ff74821a49e 26536 7ff7481f129c 33 API calls 26534->26536 26535->25989 26537 7ff74821a4de 26536->26537 26538 7ff7481f129c 33 API calls 26537->26538 26539 7ff74821a517 26538->26539 26540 7ff7481f129c 33 API calls 26539->26540 26541 7ff74821a54a 26540->26541 26666 7ff74821a834 33 API calls _invalid_parameter_noinfo_noreturn 26541->26666 26543 7ff74821a734 26545 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26543->26545 26544 7ff74821a573 26544->26543 26546 7ff74821a73a 26544->26546 26547 7ff74821a740 26544->26547 26550 7ff7481f20b0 33 API calls 26544->26550 26551 7ff74821a685 26544->26551 26545->26546 26548 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26546->26548 26549 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26547->26549 26548->26547 26552 7ff74821a746 26549->26552 26550->26551 26551->26530 26551->26552 26553 7ff74821a72f 26551->26553 26554 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26552->26554 26556 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26553->26556 26555 7ff74821a74c 26554->26555 26557 7ff7481f255c 61 API calls 26555->26557 26556->26543 26558 7ff74821a795 26557->26558 26559 7ff74821a7b1 26558->26559 26560 7ff74821a801 SetDlgItemTextW 26558->26560 26563 7ff74821a7a1 26558->26563 26561 7ff748222320 _handle_error 8 API calls 26559->26561 26560->26559 26562 7ff74821a827 26561->26562 26562->25989 26563->26559 26566 7ff74821a7ad 26563->26566 26667 7ff74820bb00 102 API calls 26563->26667 26564 7ff74821a7b7 EndDialog 26564->26559 26566->26559 26566->26564 26573 7ff74821f529 memcpy_s 26567->26573 26585 7ff74821f87d 26567->26585 26568 7ff7481f1fa0 31 API calls 26569 7ff74821f89c 26568->26569 26570 7ff748222320 _handle_error 8 API calls 26569->26570 26571 7ff74821f8a8 26570->26571 26571->25994 26572 7ff74821f684 26575 7ff7481f129c 33 API calls 26572->26575 26573->26572 26668 7ff7482113c4 CompareStringW 26573->26668 26576 7ff74821f6c0 26575->26576 26577 7ff7482032a8 51 API calls 26576->26577 26578 7ff74821f6ca 26577->26578 26579 7ff7481f1fa0 31 API calls 26578->26579 26582 7ff74821f6d5 26579->26582 26580 7ff74821f742 ShellExecuteExW 26581 7ff74821f846 26580->26581 26586 7ff74821f755 26580->26586 26581->26585 26588 7ff74821f8fb 26581->26588 26582->26580 26584 7ff7481f129c 33 API calls 26582->26584 26583 7ff74821f78e 26670 7ff74821fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 26583->26670 26587 7ff74821f717 26584->26587 26585->26568 26586->26583 26589 7ff74821f7e3 CloseHandle 26586->26589 26594 7ff74821f781 ShowWindow 26586->26594 26669 7ff748205b60 53 API calls 2 library calls 26587->26669 26591 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26588->26591 26592 7ff74821f7f2 26589->26592 26593 7ff74821f801 26589->26593 26597 7ff74821f900 26591->26597 26671 7ff7482113c4 CompareStringW 26592->26671 26593->26581 26601 7ff74821f837 ShowWindow 26593->26601 26594->26583 26596 7ff74821f725 26600 7ff7481f1fa0 31 API calls 26596->26600 26599 7ff74821f7a6 26599->26589 26603 7ff74821f7b4 GetExitCodeProcess 26599->26603 26602 7ff74821f72f 26600->26602 26601->26581 26602->26580 26603->26589 26604 7ff74821f7c7 26603->26604 26604->26589 26605->26057 26606->26057 26607->26057 26608->26057 26609->26057 26610->26057 26611->26057 26612->26057 26613->26057 26614->26057 26616 7ff7482072ea 26615->26616 26672 7ff7481fb3a8 26616->26672 26619->26057 26621 7ff7482031e4 26620->26621 26622 7ff7482031e7 DeleteFileW 26620->26622 26621->26622 26623 7ff7482031fd 26622->26623 26630 7ff74820327c 26622->26630 26624 7ff748206a0c 49 API calls 26623->26624 26626 7ff748203222 26624->26626 26625 7ff748222320 _handle_error 8 API calls 26627 7ff748203291 26625->26627 26628 7ff748203226 DeleteFileW 26626->26628 26629 7ff748203243 26626->26629 26627->26057 26628->26629 26629->26630 26631 7ff7482032a1 26629->26631 26630->26625 26632 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26631->26632 26633 7ff7482032a6 26632->26633 26635->26057 26636->26057 26637->26057 26638->26057 26640 7ff748207e0c 26639->26640 26641 7ff748207e55 26640->26641 26642 7ff748207e23 26640->26642 26676 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 26641->26676 26645 7ff7481f129c 33 API calls 26642->26645 26644 7ff748207e5a 26646 7ff748207e47 26645->26646 26646->26057 26647->26057 26648->26057 26652 7ff74820d25e 26649->26652 26650 7ff74820d292 26650->26047 26651 7ff7481f1744 33 API calls 26651->26652 26652->26650 26652->26651 26653->25946 26654->25935 26656->25916 26657->25919 26658->25921 26659->25973 26660->25962 26662->25969 26664->26526 26665->26534 26666->26544 26667->26566 26668->26572 26669->26596 26670->26599 26671->26593 26675 7ff7481fb3f2 memcpy_s 26672->26675 26673 7ff748222320 _handle_error 8 API calls 26674 7ff7481fb4b6 26673->26674 26674->26057 26675->26673 26676->26644 26733 7ff7482086ec 26677->26733 26679 7ff7481fe3c4 26739 7ff7481fe600 26679->26739 26681 7ff7481fe549 26684 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26681->26684 26682 7ff7481fe454 26682->26681 26685 7ff7481fe4d4 26682->26685 26683 7ff7482221d0 33 API calls 26686 7ff7481fe4f0 26683->26686 26694 7ff7481fe54e 26684->26694 26685->26683 26745 7ff748213148 102 API calls 26686->26745 26688 7ff7481fe51d 26689 7ff748222320 _handle_error 8 API calls 26688->26689 26691 7ff7481fe52d 26689->26691 26690 7ff7482018c2 26692 7ff74820190d 26690->26692 26695 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26690->26695 26691->26065 26692->26065 26693 7ff7481f1fa0 31 API calls 26693->26694 26694->26690 26694->26692 26694->26693 26696 7ff74820193b 26695->26696 26701 7ff7481fe7ea 26697->26701 26698 7ff7481fe864 26702 7ff7481fe993 26698->26702 26703 7ff7481fe8a1 26698->26703 26700 7ff7481fe900 26709 7ff7481fe955 26700->26709 26789 7ff7481f28a4 82 API calls 2 library calls 26700->26789 26701->26698 26701->26703 26746 7ff748203ec8 26701->26746 26704 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26702->26704 26703->26700 26753 7ff7481ff578 26703->26753 26706 7ff7481fe998 26704->26706 26705 7ff748222320 _handle_error 8 API calls 26708 7ff7481fe97e 26705->26708 26711 7ff7481fe578 26708->26711 26709->26705 27790 7ff7482015d8 26711->27790 26714 7ff7481fe59e 26715 7ff7481f1fa0 31 API calls 26714->26715 26717 7ff7481fe5b7 26715->26717 26716 7ff748211870 108 API calls 26716->26714 26718 7ff7481f1fa0 31 API calls 26717->26718 26719 7ff7481fe5c3 26718->26719 26720 7ff7481f1fa0 31 API calls 26719->26720 26721 7ff7481fe5cf 26720->26721 26722 7ff74820878c 108 API calls 26721->26722 26723 7ff7481fe5db 26722->26723 26724 7ff7481f1fa0 31 API calls 26723->26724 26725 7ff7481fe5e4 26724->26725 26726 7ff7481f1fa0 31 API calls 26725->26726 26727 7ff7481fe5ed 26726->26727 26728 7ff7482018c2 26727->26728 26729 7ff74820190d 26727->26729 26731 7ff7481f1fa0 31 API calls 26727->26731 26728->26729 26730 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26728->26730 26729->26069 26732 7ff74820193b 26730->26732 26731->26727 26734 7ff74820870a 26733->26734 26735 7ff7482221d0 33 API calls 26734->26735 26736 7ff74820872f 26735->26736 26737 7ff7482221d0 33 API calls 26736->26737 26738 7ff748208759 26737->26738 26738->26679 26740 7ff7481fe627 26739->26740 26742 7ff7481fe62c BuildCatchObjectHelperInternal 26739->26742 26741 7ff7481f1fa0 31 API calls 26740->26741 26741->26742 26743 7ff7481f1fa0 31 API calls 26742->26743 26744 7ff7481fe668 BuildCatchObjectHelperInternal 26742->26744 26743->26744 26744->26682 26745->26688 26747 7ff7482072cc 8 API calls 26746->26747 26748 7ff748203ee1 26747->26748 26749 7ff748203f0f 26748->26749 26790 7ff7482040bc 26748->26790 26749->26701 26752 7ff748203efa FindClose 26752->26749 26754 7ff7481ff598 _snwprintf 26753->26754 26829 7ff7481f2950 26754->26829 26757 7ff7481ff5cc 26761 7ff7481ff5fc 26757->26761 26844 7ff7481f33e4 26757->26844 26760 7ff7481ff5f8 26760->26761 26876 7ff7481f3ad8 26760->26876 27095 7ff7481f2c54 26761->27095 26769 7ff7481f8d04 33 API calls 26770 7ff7481ff662 26769->26770 27115 7ff748207918 48 API calls 2 library calls 26770->27115 26772 7ff7481ff677 26773 7ff748203ec8 55 API calls 26772->26773 26774 7ff7481ff6ad 26773->26774 26780 7ff7481ff74d 26774->26780 26782 7ff7481ff89a 26774->26782 26785 7ff748203ec8 55 API calls 26774->26785 27116 7ff748207918 48 API calls 2 library calls 26774->27116 26781 7ff7481ff7cb 26780->26781 26780->26782 26784 7ff7481ff895 26780->26784 26886 7ff7481ff8a4 26781->26886 26786 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26782->26786 26783 7ff7481ff842 26783->26761 26907 7ff7481f69f8 26783->26907 26918 7ff7481ff930 26783->26918 26788 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26784->26788 26785->26774 26787 7ff7481ff8a0 26786->26787 26788->26782 26789->26709 26791 7ff7482041d2 FindNextFileW 26790->26791 26792 7ff7482040f9 FindFirstFileW 26790->26792 26794 7ff7482041f3 26791->26794 26795 7ff7482041e1 GetLastError 26791->26795 26792->26794 26796 7ff74820411e 26792->26796 26797 7ff748204211 26794->26797 26800 7ff7481f20b0 33 API calls 26794->26800 26810 7ff7482041c0 26795->26810 26798 7ff748206a0c 49 API calls 26796->26798 26805 7ff7481f129c 33 API calls 26797->26805 26799 7ff748204144 26798->26799 26802 7ff748204148 FindFirstFileW 26799->26802 26803 7ff748204167 26799->26803 26800->26797 26801 7ff748222320 _handle_error 8 API calls 26804 7ff748203ef4 26801->26804 26802->26803 26803->26794 26807 7ff7482041af GetLastError 26803->26807 26815 7ff748204314 26803->26815 26804->26749 26804->26752 26806 7ff74820423b 26805->26806 26816 7ff748208090 26806->26816 26807->26810 26810->26801 26811 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26812 7ff74820431a 26811->26812 26813 7ff74820430f 26814 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26813->26814 26814->26815 26815->26811 26817 7ff7482080a5 26816->26817 26820 7ff748208188 26817->26820 26819 7ff748204249 26819->26810 26819->26813 26821 7ff748208326 26820->26821 26824 7ff7482081ba 26820->26824 26828 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 26821->26828 26823 7ff74820832b 26826 7ff7482081d4 BuildCatchObjectHelperInternal 26824->26826 26827 7ff7482058a4 33 API calls 2 library calls 26824->26827 26826->26819 26827->26826 26828->26823 26830 7ff7481f296c 26829->26830 26831 7ff7482086ec 33 API calls 26830->26831 26832 7ff7481f298d 26831->26832 26833 7ff7482221d0 33 API calls 26832->26833 26837 7ff7481f2ac2 26832->26837 26835 7ff7481f2ab0 26833->26835 26835->26837 27117 7ff7481f91c8 26835->27117 27124 7ff748204d04 26837->27124 26839 7ff748202ca8 27156 7ff7482024c0 26839->27156 26841 7ff748202cc5 26841->26757 27175 7ff7482028d0 26844->27175 26845 7ff7481f3674 27194 7ff7481f28a4 82 API calls 2 library calls 26845->27194 26846 7ff7481f3431 memcpy_s 26853 7ff7481f344e 26846->26853 26857 7ff7481f3601 26846->26857 27180 7ff748202bb0 26846->27180 26848 7ff7481f69f8 132 API calls 26850 7ff7481f3682 26848->26850 26850->26848 26851 7ff7481f370c 26850->26851 26850->26857 26869 7ff748202aa0 101 API calls 26850->26869 26856 7ff7481f3740 26851->26856 26851->26857 27195 7ff7481f28a4 82 API calls 2 library calls 26851->27195 26853->26845 26853->26850 26854 7ff7481f35cb 26854->26853 26855 7ff7481f35d7 26854->26855 26855->26857 26859 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26855->26859 26856->26857 26858 7ff7481f384d 26856->26858 26871 7ff748202bb0 101 API calls 26856->26871 26857->26760 26858->26857 26861 7ff7481f20b0 33 API calls 26858->26861 26862 7ff7481f3891 26859->26862 26860 7ff7481f34eb 26860->26854 27189 7ff748202aa0 26860->27189 26861->26857 26862->26760 26864 7ff7481f69f8 132 API calls 26865 7ff7481f378e 26864->26865 26865->26864 26866 7ff7481f3803 26865->26866 26872 7ff748202aa0 101 API calls 26865->26872 26867 7ff748202aa0 101 API calls 26866->26867 26867->26858 26868 7ff7482028d0 104 API calls 26868->26860 26869->26850 26870 7ff7482028d0 104 API calls 26870->26854 26871->26865 26872->26865 26877 7ff7481f3af9 26876->26877 26882 7ff7481f3b55 26876->26882 27207 7ff7481f3378 26877->27207 26879 7ff748222320 _handle_error 8 API calls 26881 7ff7481f3b67 26879->26881 26881->26769 26881->26781 26882->26879 26883 7ff7481f3b6c 26884 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 26883->26884 26885 7ff7481f3b71 26884->26885 27430 7ff74820886c 26886->27430 26888 7ff7481ff8ba 27434 7ff74820ef60 GetSystemTime SystemTimeToFileTime 26888->27434 26891 7ff748210994 26892 7ff748220340 26891->26892 26893 7ff748207df4 47 API calls 26892->26893 26894 7ff748220373 26893->26894 26895 7ff74820aae0 48 API calls 26894->26895 26896 7ff748220387 26895->26896 26897 7ff74820da98 48 API calls 26896->26897 26898 7ff748220397 26897->26898 26899 7ff7481f1fa0 31 API calls 26898->26899 26900 7ff7482203a2 26899->26900 27443 7ff74821fc68 26900->27443 26908 7ff7481f6a0e 26907->26908 26912 7ff7481f6a0a 26907->26912 26917 7ff748202bb0 101 API calls 26908->26917 26909 7ff7481f6a1b 26910 7ff7481f6a2f 26909->26910 26911 7ff7481f6a3e 26909->26911 26910->26912 27455 7ff7481f5e24 26910->27455 27517 7ff7481f5130 130 API calls 2 library calls 26911->27517 26912->26783 26915 7ff7481f6a3c 26915->26912 27518 7ff7481f466c 82 API calls 26915->27518 26917->26909 26919 7ff7481ff978 26918->26919 26925 7ff7481ff9b0 26919->26925 26978 7ff7481ffa34 26919->26978 27633 7ff74821612c 137 API calls 3 library calls 26919->27633 26920 7ff748201189 26923 7ff7482011e1 26920->26923 26924 7ff74820118e 26920->26924 26922 7ff748222320 _handle_error 8 API calls 26926 7ff7482011c4 26922->26926 26923->26978 27682 7ff74821612c 137 API calls 3 library calls 26923->27682 26924->26978 27681 7ff7481fdd08 179 API calls 26924->27681 26925->26920 26928 7ff7481ff9d0 26925->26928 26925->26978 26926->26783 26928->26978 27548 7ff7481f9bb0 26928->27548 26931 7ff7481ffad6 27561 7ff748205ef8 26931->27561 26935 7ff7481ffb7a 26978->26922 27096 7ff7481f2c88 27095->27096 27097 7ff7481f2c74 27095->27097 27098 7ff7481f1fa0 31 API calls 27096->27098 27097->27096 27769 7ff7481f2d80 108 API calls _invalid_parameter_noinfo_noreturn 27097->27769 27102 7ff7481f2ca1 27098->27102 27101 7ff7481f2d08 27771 7ff7481f3090 31 API calls _invalid_parameter_noinfo_noreturn 27101->27771 27114 7ff7481f2d64 27102->27114 27770 7ff7481f3090 31 API calls _invalid_parameter_noinfo_noreturn 27102->27770 27104 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27106 7ff7481f2d7c 27104->27106 27105 7ff7481f2d14 27107 7ff7481f1fa0 31 API calls 27105->27107 27108 7ff7481f2d20 27107->27108 27772 7ff74820878c 27108->27772 27114->27104 27115->26772 27116->26774 27134 7ff7482056a4 27117->27134 27119 7ff7481f91df 27137 7ff74820b788 27119->27137 27123 7ff7481f9383 27123->26837 27125 7ff748204d32 memcpy_s 27124->27125 27152 7ff748204bac 27125->27152 27127 7ff748204d54 27129 7ff748204dae 27127->27129 27130 7ff748204d90 27127->27130 27128 7ff748222320 _handle_error 8 API calls 27131 7ff7481f2b32 27128->27131 27132 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27129->27132 27130->27128 27131->26757 27131->26839 27133 7ff748204db3 27132->27133 27143 7ff7482056e8 27134->27143 27138 7ff7481f13a4 33 API calls 27137->27138 27139 7ff7481f9365 27138->27139 27140 7ff7481f9a28 27139->27140 27141 7ff7482056e8 2 API calls 27140->27141 27142 7ff7481f9a36 27141->27142 27142->27123 27144 7ff7482056fe memcpy_s 27143->27144 27147 7ff74820eba4 27144->27147 27150 7ff74820eb58 GetCurrentProcess GetProcessAffinityMask 27147->27150 27151 7ff7482056de 27150->27151 27151->27119 27153 7ff748204c27 27152->27153 27155 7ff748204c2f BuildCatchObjectHelperInternal 27152->27155 27154 7ff7481f1fa0 31 API calls 27153->27154 27154->27155 27155->27127 27157 7ff7482024fd CreateFileW 27156->27157 27159 7ff7482025ae GetLastError 27157->27159 27162 7ff74820266e 27157->27162 27160 7ff748206a0c 49 API calls 27159->27160 27161 7ff7482025dc 27160->27161 27163 7ff7482025e0 CreateFileW GetLastError 27161->27163 27169 7ff74820262c 27161->27169 27164 7ff7482026b1 SetFileTime 27162->27164 27168 7ff7482026cf 27162->27168 27163->27169 27164->27168 27165 7ff748202708 27166 7ff748222320 _handle_error 8 API calls 27165->27166 27167 7ff74820271b 27166->27167 27167->26841 27174 7ff7481fb7e8 99 API calls 2 library calls 27167->27174 27168->27165 27170 7ff7481f20b0 33 API calls 27168->27170 27169->27162 27171 7ff748202736 27169->27171 27170->27165 27172 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27171->27172 27173 7ff74820273b 27172->27173 27174->26841 27176 7ff7482028f6 27175->27176 27177 7ff7482028fd 27175->27177 27176->26846 27177->27176 27179 7ff748202320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27177->27179 27196 7ff7481fb8a4 99 API calls Concurrency::cancel_current_task 27177->27196 27179->27177 27181 7ff748202bcd 27180->27181 27182 7ff748202be9 27180->27182 27183 7ff7481f34cc 27181->27183 27197 7ff7481fb9c4 99 API calls Concurrency::cancel_current_task 27181->27197 27182->27183 27184 7ff748202c01 SetFilePointer 27182->27184 27183->26868 27184->27183 27186 7ff748202c1e GetLastError 27184->27186 27186->27183 27187 7ff748202c28 27186->27187 27187->27183 27198 7ff7481fb9c4 99 API calls Concurrency::cancel_current_task 27187->27198 27199 7ff748202778 27189->27199 27192 7ff7481f35a7 27192->26854 27192->26870 27194->26857 27195->26856 27205 7ff748202789 _snwprintf 27199->27205 27200 7ff748222320 _handle_error 8 API calls 27203 7ff74820281d 27200->27203 27201 7ff7482027b5 27201->27200 27202 7ff748202890 SetFilePointer 27202->27201 27204 7ff7482028b8 GetLastError 27202->27204 27203->27192 27206 7ff7481fb9c4 99 API calls Concurrency::cancel_current_task 27203->27206 27204->27201 27205->27201 27205->27202 27208 7ff7481f339a 27207->27208 27211 7ff7481f3396 27207->27211 27213 7ff7481f3294 27208->27213 27211->26882 27211->26883 27212 7ff748202aa0 101 API calls 27212->27211 27214 7ff7481f32bb 27213->27214 27216 7ff7481f32f6 27213->27216 27215 7ff7481f69f8 132 API calls 27214->27215 27219 7ff7481f32db 27215->27219 27221 7ff7481f6e74 27216->27221 27219->27212 27225 7ff7481f6e95 27221->27225 27222 7ff7481f69f8 132 API calls 27222->27225 27223 7ff7481f331d 27223->27219 27226 7ff7481f3904 27223->27226 27225->27222 27225->27223 27253 7ff74820e808 27225->27253 27261 7ff7481f6a7c 27226->27261 27229 7ff7481f396a 27231 7ff7481f3989 27229->27231 27232 7ff7481f399a 27229->27232 27294 7ff748210d54 33 API calls 27231->27294 27238 7ff7481f39a3 27232->27238 27239 7ff7481f39ec 27232->27239 27233 7ff748222320 _handle_error 8 API calls 27237 7ff7481f3a9e 27233->27237 27234 7ff7481f3ab3 27240 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27234->27240 27235 7ff7481f3a8a 27235->27233 27237->27219 27295 7ff748210c80 33 API calls 27238->27295 27296 7ff7481f26b4 33 API calls BuildCatchObjectHelperInternal 27239->27296 27242 7ff7481f3ab8 27240->27242 27247 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27242->27247 27243 7ff7481f39b0 27248 7ff7481f1fa0 31 API calls 27243->27248 27251 7ff7481f39c0 BuildCatchObjectHelperInternal 27243->27251 27245 7ff7481f1fa0 31 API calls 27252 7ff7481f394f 27245->27252 27246 7ff7481f3a13 27297 7ff748210ae8 34 API calls _invalid_parameter_noinfo_noreturn 27246->27297 27250 7ff7481f3abe 27247->27250 27248->27251 27251->27245 27252->27234 27252->27235 27252->27242 27254 7ff74820e811 27253->27254 27255 7ff74820e82b 27254->27255 27259 7ff7481fb664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27254->27259 27257 7ff74820e845 SetThreadExecutionState 27255->27257 27260 7ff7481fb664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27255->27260 27259->27255 27260->27257 27262 7ff7481f6a96 _snwprintf 27261->27262 27263 7ff7481f6ae4 27262->27263 27264 7ff7481f6ac4 27262->27264 27266 7ff7481f6d4d 27263->27266 27269 7ff7481f6b0f 27263->27269 27336 7ff7481f28a4 82 API calls 2 library calls 27264->27336 27365 7ff7481f28a4 82 API calls 2 library calls 27266->27365 27268 7ff7481f6ad0 27270 7ff748222320 _handle_error 8 API calls 27268->27270 27269->27268 27298 7ff748211f94 27269->27298 27271 7ff7481f394b 27270->27271 27271->27229 27271->27252 27293 7ff7481f2794 33 API calls __std_swap_ranges_trivially_swappable 27271->27293 27274 7ff7481f6b85 27275 7ff7481f6c2a 27274->27275 27292 7ff7481f6b7b 27274->27292 27342 7ff748208968 109 API calls 27274->27342 27307 7ff748204760 27275->27307 27276 7ff7481f6b80 27276->27274 27338 7ff7481f40b0 27276->27338 27277 7ff7481f6b6e 27337 7ff7481f28a4 82 API calls 2 library calls 27277->27337 27283 7ff7481f6c52 27284 7ff7481f6cd1 27283->27284 27285 7ff7481f6cc7 27283->27285 27343 7ff748211f20 27284->27343 27311 7ff748201794 27285->27311 27288 7ff7481f6ccf 27363 7ff748204700 8 API calls _handle_error 27288->27363 27290 7ff7481f6cfd 27290->27292 27326 7ff748211870 27292->27326 27293->27229 27294->27252 27295->27243 27296->27246 27297->27252 27299 7ff748212056 std::bad_alloc::bad_alloc 27298->27299 27302 7ff748211fc5 std::bad_alloc::bad_alloc 27298->27302 27366 7ff748224078 27299->27366 27301 7ff74821200f std::bad_alloc::bad_alloc 27304 7ff7481f6b59 27301->27304 27305 7ff748224078 Concurrency::cancel_current_task 2 API calls 27301->27305 27302->27301 27303 7ff748224078 Concurrency::cancel_current_task 2 API calls 27302->27303 27302->27304 27303->27301 27304->27274 27304->27276 27304->27277 27306 7ff7482120a9 27305->27306 27308 7ff748204780 27307->27308 27310 7ff74820478a 27307->27310 27309 7ff7482221d0 33 API calls 27308->27309 27309->27310 27310->27283 27312 7ff7482017be memcpy_s 27311->27312 27371 7ff748208a48 27312->27371 27314 7ff7482017f2 27327 7ff74821188e 27326->27327 27329 7ff7482118a1 27327->27329 27391 7ff74820e948 27327->27391 27333 7ff7482118d8 27329->27333 27387 7ff74822236c 27329->27387 27331 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27332 7ff748211ad0 27331->27332 27335 7ff748211a37 27333->27335 27398 7ff74820a984 31 API calls _invalid_parameter_noinfo_noreturn 27333->27398 27335->27331 27336->27268 27337->27292 27339 7ff7481f40dd 27338->27339 27341 7ff7481f40d7 memcpy_s 27338->27341 27339->27341 27399 7ff7481f4120 33 API calls 2 library calls 27339->27399 27341->27274 27342->27275 27344 7ff748211f29 27343->27344 27345 7ff748211f5d 27344->27345 27346 7ff748211f55 27344->27346 27347 7ff748211f49 27344->27347 27345->27288 27421 7ff748213964 151 API calls 27346->27421 27400 7ff7482120ac 27347->27400 27363->27290 27365->27268 27367 7ff748224097 27366->27367 27368 7ff7482240b4 RtlPcToFileHeader 27366->27368 27367->27368 27369 7ff7482240cc 27368->27369 27370 7ff7482240db RaiseException 27368->27370 27369->27370 27370->27302 27373 7ff748208bcd 27371->27373 27377 7ff748208a91 BuildCatchObjectHelperInternal 27371->27377 27372 7ff748208c1a 27374 7ff74820e808 SetThreadExecutionState RtlPcToFileHeader RaiseException 27372->27374 27373->27372 27375 7ff7481fa174 8 API calls 27373->27375 27378 7ff748208c1f 27374->27378 27375->27372 27376 7ff74821612c 137 API calls 27376->27377 27377->27373 27377->27376 27377->27378 27379 7ff748204888 108 API calls 27377->27379 27380 7ff7482028d0 104 API calls 27377->27380 27378->27314 27379->27377 27380->27377 27388 7ff74822239f 27387->27388 27389 7ff7482223c8 27388->27389 27390 7ff748211870 108 API calls 27388->27390 27389->27333 27390->27388 27392 7ff74820ecd8 103 API calls 27391->27392 27393 7ff74820e95f ReleaseSemaphore 27392->27393 27394 7ff74820e9a3 DeleteCriticalSection CloseHandle CloseHandle 27393->27394 27395 7ff74820e984 27393->27395 27396 7ff74820ea5c 101 API calls 27395->27396 27397 7ff74820e98e CloseHandle 27396->27397 27397->27394 27397->27395 27398->27335 27402 7ff7482120c8 memcpy_s 27400->27402 27401 7ff7482121ba 27402->27401 27403 7ff7481fb75c 82 API calls 27402->27403 27403->27402 27421->27345 27431 7ff748208882 27430->27431 27432 7ff748208892 27430->27432 27437 7ff7482023f0 27431->27437 27432->26888 27435 7ff748222320 _handle_error 8 API calls 27434->27435 27436 7ff7481ff7dc 27435->27436 27436->26783 27436->26891 27438 7ff74820240f 27437->27438 27441 7ff748202aa0 101 API calls 27438->27441 27439 7ff748202428 27442 7ff748202bb0 101 API calls 27439->27442 27440 7ff748202438 27440->27432 27441->27439 27442->27440 27444 7ff74821fc94 27443->27444 27445 7ff7481f129c 33 API calls 27444->27445 27446 7ff74821fca4 27445->27446 27447 7ff74821f0a4 24 API calls 27446->27447 27448 7ff74821fcb1 27447->27448 27456 7ff7481f5e67 27455->27456 27519 7ff7482085f0 27456->27519 27458 7ff7481f6134 27529 7ff7481f6fcc 82 API calls 27458->27529 27460 7ff7481f69af 27461 7ff748222320 _handle_error 8 API calls 27460->27461 27462 7ff7481f69e4 27467 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27462->27467 27463 7ff7481f6973 27542 7ff7481f466c 82 API calls 27463->27542 27466 7ff7481f612e 27466->27458 27466->27463 27470 7ff7482085f0 104 API calls 27466->27470 27471 7ff7481f61a4 27470->27471 27471->27458 27475 7ff7481f61ac 27471->27475 27472 7ff7481f69ef 27473 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27472->27473 27476 7ff7481f623f 27475->27476 27530 7ff7481f466c 82 API calls 27475->27530 27476->27463 27478 7ff7481f6266 27476->27478 27513 7ff7481f613c 27513->27460 27513->27462 27513->27472 27517->26915 27520 7ff74820869a 27519->27520 27521 7ff748208614 27519->27521 27522 7ff74820867c 27520->27522 27523 7ff7481f40b0 33 API calls 27520->27523 27521->27522 27524 7ff7481f40b0 33 API calls 27521->27524 27522->27466 27525 7ff7482086b3 27523->27525 27526 7ff74820864d 27524->27526 27528 7ff7482028d0 104 API calls 27525->27528 27543 7ff7481fa174 27526->27543 27528->27522 27529->27513 27544 7ff7481fa185 27543->27544 27545 7ff7481fa19a 27544->27545 27547 7ff74820af18 8 API calls 2 library calls 27544->27547 27545->27522 27547->27545 27554 7ff7481f9be7 27548->27554 27549 7ff7481f9c1b 27550 7ff748222320 _handle_error 8 API calls 27549->27550 27551 7ff7481f9c9d 27550->27551 27551->26931 27553 7ff7481f9c83 27555 7ff7481f1fa0 31 API calls 27553->27555 27554->27549 27554->27553 27557 7ff7481f9cae 27554->27557 27683 7ff748205294 27554->27683 27701 7ff74820db60 27554->27701 27555->27549 27558 7ff7481f9cbf 27557->27558 27705 7ff74820da48 CompareStringW 27557->27705 27558->27553 27560 7ff7481f20b0 33 API calls 27558->27560 27560->27553 27562 7ff748205f3a 27561->27562 27566 7ff7481f129c 33 API calls 27562->27566 27572 7ff74820619b 27562->27572 27574 7ff7482061ce 27562->27574 27563 7ff748222320 _handle_error 8 API calls 27564 7ff7481ffb29 27563->27564 27564->26935 27634 7ff748207c94 47 API calls 2 library calls 27564->27634 27568 7ff748206129 27566->27568 27567 7ff7482061d4 27569 7ff7481f1fa0 31 API calls 27568->27569 27570 7ff74820613b BuildCatchObjectHelperInternal 27568->27570 27569->27570 27571 7ff7482061c9 27570->27571 27570->27572 27572->27563 27709 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 27574->27709 27633->26925 27681->26978 27682->26978 27684 7ff7482052d4 27683->27684 27689 7ff748205312 __vcrt_FlsAlloc 27684->27689 27690 7ff748205339 __vcrt_FlsAlloc 27684->27690 27706 7ff7482113f4 CompareStringW 27684->27706 27685 7ff748222320 _handle_error 8 API calls 27687 7ff748205503 27685->27687 27687->27554 27689->27690 27691 7ff748205382 __vcrt_FlsAlloc 27689->27691 27707 7ff7482113f4 CompareStringW 27689->27707 27690->27685 27691->27690 27692 7ff748205439 27691->27692 27693 7ff7481f129c 33 API calls 27691->27693 27695 7ff74820551b 27692->27695 27696 7ff748205489 27692->27696 27694 7ff748205426 27693->27694 27697 7ff7482072cc 8 API calls 27694->27697 27698 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27695->27698 27696->27690 27708 7ff7482113f4 CompareStringW 27696->27708 27697->27692 27700 7ff748205520 27698->27700 27703 7ff74820db73 27701->27703 27702 7ff74820db91 27702->27554 27703->27702 27704 7ff7481f20b0 33 API calls 27703->27704 27704->27702 27705->27558 27706->27689 27707->27691 27708->27690 27709->27567 27769->27096 27770->27101 27771->27105 27773 7ff7482087af 27772->27773 27783 7ff7482087df 27772->27783 27774 7ff74822236c 108 API calls 27773->27774 27777 7ff7482087ca 27774->27777 27775 7ff74822236c 108 API calls 27779 7ff748208814 27775->27779 27778 7ff74822236c 108 API calls 27777->27778 27778->27783 27781 7ff74822236c 108 API calls 27779->27781 27780 7ff748208845 27782 7ff74820461c 108 API calls 27780->27782 27784 7ff74820882b 27781->27784 27785 7ff748208851 27782->27785 27783->27775 27783->27784 27786 7ff74820461c 27784->27786 27787 7ff748204632 27786->27787 27789 7ff74820463a 27786->27789 27788 7ff74820e948 108 API calls 27787->27788 27788->27789 27789->27780 27791 7ff74820163e 27790->27791 27795 7ff748201681 27790->27795 27791->27795 27796 7ff7482031bc 51 API calls 27791->27796 27792 7ff7482016a0 27794 7ff7481fe600 31 API calls 27792->27794 27793 7ff7481f1fa0 31 API calls 27793->27795 27798 7ff7482016de 27794->27798 27795->27792 27795->27793 27796->27791 27797 7ff74820175b 27799 7ff748222320 _handle_error 8 API calls 27797->27799 27798->27797 27800 7ff74820178d 27798->27800 27801 7ff7481fe58a 27799->27801 27802 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27800->27802 27801->26714 27801->26716 27803 7ff748201792 27802->27803 27805 7ff7482184cc 4 API calls 27804->27805 27806 7ff7482184aa 27805->27806 27807 7ff7482184b9 27806->27807 27816 7ff748218504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27806->27816 27807->26076 27807->26077 27809->26078 27810->26088 27812 7ff7482184de 27811->27812 27814 7ff7482184e3 27811->27814 27817 7ff748218590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27812->27817 27814->26088 27815->26091 27816->27807 27817->27814 27818->26118 27820->26140 27821->26156 27822->26164 27824->26169 27830 7ff748221491 27831 7ff7482213c9 27830->27831 27832 7ff748221900 _com_raise_error 14 API calls 27831->27832 27833 7ff748221408 27832->27833 27849 7ff748222d6c 27874 7ff7482227fc 27849->27874 27852 7ff748222eb8 27972 7ff748223170 7 API calls 2 library calls 27852->27972 27853 7ff748222d88 __scrt_acquire_startup_lock 27855 7ff748222ec2 27853->27855 27858 7ff748222da6 27853->27858 27973 7ff748223170 7 API calls 2 library calls 27855->27973 27857 7ff748222de8 __scrt_release_startup_lock 27862 7ff748222e51 27857->27862 27969 7ff74822c050 35 API calls __GSHandlerCheck_EH 27857->27969 27858->27857 27859 7ff748222dcb 27858->27859 27882 7ff74822cd90 27858->27882 27861 7ff748222ecd abort 27886 7ff7482232bc 27862->27886 27864 7ff748222e56 27889 7ff74822cd20 27864->27889 27974 7ff748222fb0 27874->27974 27877 7ff748222827 27877->27852 27877->27853 27878 7ff74822282b 27976 7ff74822cc50 27878->27976 27883 7ff74822cdeb 27882->27883 27884 7ff74822cdcc 27882->27884 27883->27857 27884->27883 27993 7ff7481f1120 27884->27993 27887 7ff748223cf0 memcpy_s 27886->27887 27888 7ff7482232d3 GetStartupInfoW 27887->27888 27888->27864 27999 7ff748230730 27889->27999 27891 7ff74822cd2f 27892 7ff748222e5e 27891->27892 28003 7ff748230ac0 35 API calls _snwprintf 27891->28003 27894 7ff748220754 27892->27894 28005 7ff74820dfd0 27894->28005 27897 7ff7482062dc 35 API calls 27898 7ff74822079a 27897->27898 28082 7ff74821946c 27898->28082 27900 7ff7482207a4 memcpy_s 28087 7ff748219a14 27900->28087 27902 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27904 7ff748220de2 27902->27904 27903 7ff74822096e GetCommandLineW 27905 7ff748220b42 27903->27905 27906 7ff748220980 27903->27906 27909 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27904->27909 27908 7ff748206454 34 API calls 27905->27908 27911 7ff7481f129c 33 API calls 27906->27911 27907 7ff748220819 27907->27903 27952 7ff748220ddc 27907->27952 27910 7ff748220b51 27908->27910 27921 7ff748220de8 27909->27921 27914 7ff7481f1fa0 31 API calls 27910->27914 27918 7ff748220b68 BuildCatchObjectHelperInternal 27910->27918 27913 7ff7482209a5 27911->27913 27912 7ff7481f1fa0 31 API calls 27915 7ff748220b93 SetEnvironmentVariableW GetLocalTime 27912->27915 28097 7ff74821cad0 27913->28097 27914->27918 27919 7ff748203e28 swprintf 46 API calls 27915->27919 27917 7ff748221900 _com_raise_error 14 API calls 27917->27921 27918->27912 27922 7ff748220c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 27919->27922 27920 7ff7482209af 27920->27904 27924 7ff7482209f9 OpenFileMappingW 27920->27924 27925 7ff748220adb 27920->27925 27921->27917 28128 7ff74821b014 LoadBitmapW 27922->28128 27926 7ff748220a19 MapViewOfFile 27924->27926 27927 7ff748220ad0 CloseHandle 27924->27927 27931 7ff7481f129c 33 API calls 27925->27931 27926->27927 27929 7ff748220a3f UnmapViewOfFile MapViewOfFile 27926->27929 27927->27905 27929->27927 27932 7ff748220a71 27929->27932 27934 7ff748220b00 27931->27934 28159 7ff74821a190 33 API calls 2 library calls 27932->28159 27933 7ff748220c75 28152 7ff7482167b4 27933->28152 28115 7ff74821fd0c 27934->28115 27938 7ff748220a81 27941 7ff74821fd0c 35 API calls 27938->27941 27943 7ff748220a90 27941->27943 27942 7ff7482167b4 33 API calls 27944 7ff748220c87 DialogBoxParamW 27942->27944 28160 7ff74820b9b4 102 API calls 27943->28160 27948 7ff748220cd3 27944->27948 27946 7ff748220dd7 27950 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 27946->27950 27947 7ff748220aa5 28161 7ff74820bb00 102 API calls 27947->28161 27953 7ff748220cec 27948->27953 27954 7ff748220ce6 Sleep 27948->27954 27950->27952 27951 7ff748220ab8 27956 7ff748220ac7 UnmapViewOfFile 27951->27956 27952->27902 27955 7ff748220cfa 27953->27955 28162 7ff748219f4c 49 API calls 2 library calls 27953->28162 27954->27953 27958 7ff748220d06 DeleteObject 27955->27958 27956->27927 27959 7ff748220d1f DeleteObject 27958->27959 27960 7ff748220d25 27958->27960 27959->27960 27961 7ff748220d5b 27960->27961 27962 7ff748220d6d 27960->27962 28163 7ff74821fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27961->28163 28155 7ff7482194e4 27962->28155 27964 7ff748220d60 CloseHandle 27964->27962 27969->27862 27972->27855 27973->27861 27975 7ff74822281e __scrt_dllmain_crt_thread_attach 27974->27975 27975->27877 27975->27878 27977 7ff748230d4c 27976->27977 27978 7ff748222830 27977->27978 27981 7ff74822ec00 27977->27981 27978->27877 27980 7ff7482251a0 7 API calls 2 library calls 27978->27980 27980->27877 27992 7ff74822f398 EnterCriticalSection 27981->27992 27994 7ff7481f91c8 35 API calls 27993->27994 27995 7ff7481f1130 27994->27995 27998 7ff7482229bc 34 API calls 27995->27998 27997 7ff748222a01 27997->27884 27998->27997 28000 7ff74823073d 27999->28000 28001 7ff748230749 27999->28001 28004 7ff748230570 48 API calls 4 library calls 28000->28004 28001->27891 28003->27891 28004->28001 28164 7ff748222450 28005->28164 28008 7ff74820e07b 28012 7ff74820e503 28008->28012 28171 7ff74822b788 39 API calls 2 library calls 28008->28171 28009 7ff74820e026 GetProcAddress 28010 7ff74820e03b 28009->28010 28011 7ff74820e053 GetProcAddress 28009->28011 28010->28011 28011->28008 28014 7ff74820e068 28011->28014 28013 7ff748206454 34 API calls 28012->28013 28017 7ff74820e50c 28013->28017 28014->28008 28016 7ff74820e3b0 28016->28012 28018 7ff74820e3ba 28016->28018 28019 7ff748207df4 47 API calls 28017->28019 28020 7ff748206454 34 API calls 28018->28020 28048 7ff74820e51a 28019->28048 28021 7ff74820e3c3 CreateFileW 28020->28021 28022 7ff74820e4f0 CloseHandle 28021->28022 28023 7ff74820e403 SetFilePointer 28021->28023 28026 7ff7481f1fa0 31 API calls 28022->28026 28023->28022 28025 7ff74820e41c ReadFile 28023->28025 28025->28022 28027 7ff74820e444 28025->28027 28026->28012 28028 7ff74820e458 28027->28028 28029 7ff74820e800 28027->28029 28034 7ff7481f129c 33 API calls 28028->28034 28180 7ff748222624 8 API calls 28029->28180 28031 7ff74820e53e CompareStringW 28031->28048 28032 7ff7481f129c 33 API calls 28032->28048 28033 7ff74820e805 28038 7ff74820e48f 28034->28038 28035 7ff748208090 47 API calls 28035->28048 28036 7ff7481f1fa0 31 API calls 28036->28048 28041 7ff74820e4db 28038->28041 28172 7ff74820d0a0 28038->28172 28039 7ff74820e648 28176 7ff748207eb0 47 API calls 28039->28176 28040 7ff74820e7c2 28043 7ff7481f1fa0 31 API calls 28040->28043 28045 7ff7481f1fa0 31 API calls 28041->28045 28047 7ff74820e7cb 28043->28047 28044 7ff7482032bc 51 API calls 28044->28048 28049 7ff74820e4e5 28045->28049 28046 7ff74820e651 28050 7ff7482051a4 9 API calls 28046->28050 28052 7ff7481f1fa0 31 API calls 28047->28052 28048->28031 28048->28032 28048->28035 28048->28036 28048->28044 28065 7ff74820e5cc 28048->28065 28166 7ff7482051a4 28048->28166 28053 7ff7481f1fa0 31 API calls 28049->28053 28054 7ff74820e656 28050->28054 28051 7ff7481f129c 33 API calls 28051->28065 28055 7ff74820e7d5 28052->28055 28053->28022 28056 7ff74820e706 28054->28056 28063 7ff74820e661 28054->28063 28058 7ff748222320 _handle_error 8 API calls 28055->28058 28059 7ff74820da98 48 API calls 28056->28059 28057 7ff748208090 47 API calls 28057->28065 28060 7ff74820e7e4 28058->28060 28061 7ff74820e74b AllocConsole 28059->28061 28060->27897 28064 7ff74820e755 GetCurrentProcessId AttachConsole 28061->28064 28081 7ff74820e6fb 28061->28081 28062 7ff7481f1fa0 31 API calls 28062->28065 28068 7ff74820aae0 48 API calls 28063->28068 28071 7ff74820e76c 28064->28071 28065->28051 28065->28057 28065->28062 28066 7ff7482032bc 51 API calls 28065->28066 28072 7ff74820e63a 28065->28072 28066->28065 28070 7ff74820e6a5 28068->28070 28069 7ff74820e7b9 ExitProcess 28074 7ff74820da98 48 API calls 28070->28074 28073 7ff74820e778 GetStdHandle WriteConsoleW Sleep FreeConsole 28071->28073 28072->28039 28072->28040 28073->28081 28075 7ff74820e6c3 28074->28075 28076 7ff74820aae0 48 API calls 28075->28076 28077 7ff74820e6ce 28076->28077 28177 7ff74820dc2c 33 API calls 28077->28177 28079 7ff74820e6da 28178 7ff7481f19e0 31 API calls _invalid_parameter_noinfo_noreturn 28079->28178 28179 7ff7481f19e0 31 API calls _invalid_parameter_noinfo_noreturn 28081->28179 28083 7ff74820dd88 28082->28083 28084 7ff748219481 OleInitialize 28083->28084 28085 7ff7482194a7 28084->28085 28086 7ff7482194cd SHGetMalloc 28085->28086 28086->27900 28088 7ff748219a49 28087->28088 28091 7ff748219a4e BuildCatchObjectHelperInternal 28087->28091 28089 7ff7481f1fa0 31 API calls 28088->28089 28089->28091 28090 7ff7481f1fa0 31 API calls 28096 7ff748219a7d BuildCatchObjectHelperInternal 28090->28096 28091->28090 28091->28096 28092 7ff7481f1fa0 31 API calls 28093 7ff748219aac BuildCatchObjectHelperInternal 28092->28093 28094 7ff7481f1fa0 31 API calls 28093->28094 28095 7ff748219adb BuildCatchObjectHelperInternal 28093->28095 28094->28095 28095->27907 28096->28092 28096->28093 28098 7ff74820d0a0 33 API calls 28097->28098 28099 7ff74821cb1f BuildCatchObjectHelperInternal 28098->28099 28100 7ff74821cd8b 28099->28100 28103 7ff74820d0a0 33 API calls 28099->28103 28104 7ff74821cde4 28099->28104 28107 7ff74821cde9 28099->28107 28110 7ff74821cdef 28099->28110 28113 7ff7481f1fa0 31 API calls 28099->28113 28114 7ff7481f129c 33 API calls 28099->28114 28181 7ff74820bb00 102 API calls 28099->28181 28101 7ff74821cdbe 28100->28101 28100->28104 28102 7ff748222320 _handle_error 8 API calls 28101->28102 28105 7ff74821cdcf 28102->28105 28103->28099 28106 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 28104->28106 28105->27920 28106->28107 28182 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 28107->28182 28183 7ff7481f704c 47 API calls BuildCatchObjectHelperInternal 28110->28183 28111 7ff74821cdf5 28113->28099 28114->28099 28116 7ff74821fd39 28115->28116 28117 7ff74821fd3c SetEnvironmentVariableW 28115->28117 28116->28117 28118 7ff74820d0a0 33 API calls 28117->28118 28121 7ff74821fd74 28118->28121 28119 7ff74821fdc3 28122 7ff74821fe1b 28119->28122 28123 7ff74821fdfa 28119->28123 28120 7ff748222320 _handle_error 8 API calls 28124 7ff74821fe0b 28120->28124 28121->28119 28127 7ff74821fdad SetEnvironmentVariableW 28121->28127 28125 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 28122->28125 28123->28120 28124->27905 28124->27946 28126 7ff74821fe20 28125->28126 28127->28119 28129 7ff74821b046 28128->28129 28130 7ff74821b03e 28128->28130 28132 7ff74821b04e GetObjectW 28129->28132 28133 7ff74821b063 28129->28133 28184 7ff748218624 FindResourceW 28130->28184 28132->28133 28134 7ff74821849c 4 API calls 28133->28134 28135 7ff74821b078 28134->28135 28136 7ff74821b0ce 28135->28136 28137 7ff74821b09e 28135->28137 28139 7ff748218624 11 API calls 28135->28139 28147 7ff7482098ac 28136->28147 28199 7ff748218504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28137->28199 28140 7ff74821b08a 28139->28140 28140->28137 28142 7ff74821b092 DeleteObject 28140->28142 28141 7ff74821b0a7 28143 7ff7482184cc 4 API calls 28141->28143 28142->28137 28144 7ff74821b0b2 28143->28144 28200 7ff748218df4 16 API calls _handle_error 28144->28200 28146 7ff74821b0bf DeleteObject 28146->28136 28201 7ff7482098dc 28147->28201 28149 7ff7482098ba 28268 7ff74820a43c GetModuleHandleW FindResourceW 28149->28268 28151 7ff7482098c2 28151->27933 28153 7ff7482221d0 33 API calls 28152->28153 28154 7ff7482167fa 28153->28154 28154->27942 28156 7ff748219501 28155->28156 28157 7ff74821950a OleUninitialize 28156->28157 28158 7ff74825e330 28157->28158 28159->27938 28160->27947 28161->27951 28162->27955 28163->27964 28165 7ff74820dff4 GetModuleHandleW 28164->28165 28165->28008 28165->28009 28167 7ff7482051c8 GetVersionExW 28166->28167 28168 7ff7482051fb 28166->28168 28167->28168 28169 7ff748222320 _handle_error 8 API calls 28168->28169 28170 7ff748205228 28169->28170 28170->28048 28171->28016 28174 7ff74820d0d2 28172->28174 28173 7ff74820d106 28173->28038 28174->28173 28175 7ff7481f1744 33 API calls 28174->28175 28175->28174 28176->28046 28177->28079 28178->28081 28179->28069 28180->28033 28181->28099 28182->28110 28183->28111 28185 7ff74821864f SizeofResource 28184->28185 28186 7ff74821879b 28184->28186 28185->28186 28187 7ff748218669 LoadResource 28185->28187 28186->28129 28187->28186 28188 7ff748218682 LockResource 28187->28188 28188->28186 28189 7ff748218697 GlobalAlloc 28188->28189 28189->28186 28190 7ff7482186b8 GlobalLock 28189->28190 28191 7ff7482186ca BuildCatchObjectHelperInternal 28190->28191 28192 7ff748218792 GlobalFree 28190->28192 28193 7ff7482186d8 CreateStreamOnHGlobal 28191->28193 28192->28186 28194 7ff748218789 GlobalUnlock 28193->28194 28195 7ff7482186f6 GdipAlloc 28193->28195 28194->28192 28196 7ff74821870b 28195->28196 28196->28194 28197 7ff74821875a GdipCreateHBITMAPFromBitmap 28196->28197 28198 7ff748218772 28196->28198 28197->28198 28198->28194 28199->28141 28200->28146 28204 7ff7482098fe _snwprintf 28201->28204 28202 7ff748209973 28278 7ff7482068b0 48 API calls 28202->28278 28204->28202 28205 7ff748209a89 28204->28205 28208 7ff7482099fd 28205->28208 28209 7ff7481f20b0 33 API calls 28205->28209 28206 7ff7481f1fa0 31 API calls 28206->28208 28207 7ff74820997d BuildCatchObjectHelperInternal 28207->28206 28266 7ff74820a42e 28207->28266 28211 7ff7482024c0 54 API calls 28208->28211 28209->28208 28210 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 28212 7ff74820a434 28210->28212 28213 7ff748209a1a 28211->28213 28214 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 28212->28214 28215 7ff748209a22 28213->28215 28222 7ff748209aad 28213->28222 28216 7ff74820a43a 28214->28216 28218 7ff74820204c 100 API calls 28215->28218 28217 7ff748209b17 28270 7ff74822a450 28217->28270 28220 7ff748209a2b 28218->28220 28220->28212 28227 7ff748209a66 28220->28227 28222->28217 28225 7ff748208e58 33 API calls 28222->28225 28223 7ff74822a450 31 API calls 28238 7ff748209b57 __vcrt_FlsAlloc 28223->28238 28224 7ff748222320 _handle_error 8 API calls 28226 7ff74820a40e 28224->28226 28225->28222 28226->28149 28227->28224 28228 7ff748209c89 28229 7ff748202aa0 101 API calls 28228->28229 28241 7ff748209d5c 28228->28241 28232 7ff748209ca1 28229->28232 28230 7ff748202bb0 101 API calls 28230->28238 28231 7ff7482028d0 104 API calls 28231->28238 28235 7ff7482028d0 104 API calls 28232->28235 28232->28241 28233 7ff74820204c 100 API calls 28236 7ff74820a3f5 28233->28236 28234 7ff748202aa0 101 API calls 28234->28238 28239 7ff748209cc9 28235->28239 28237 7ff7481f1fa0 31 API calls 28236->28237 28237->28227 28238->28228 28238->28230 28238->28231 28238->28234 28238->28241 28239->28241 28262 7ff748209cd7 __vcrt_FlsAlloc 28239->28262 28279 7ff748210bbc MultiByteToWideChar 28239->28279 28241->28233 28242 7ff74820a1ec 28251 7ff74820a2c2 28242->28251 28285 7ff74822cf90 31 API calls 2 library calls 28242->28285 28244 7ff74820a157 28244->28242 28282 7ff74822cf90 31 API calls 2 library calls 28244->28282 28245 7ff74820a14b 28245->28149 28248 7ff74820a249 28286 7ff74822b7bc 31 API calls _invalid_parameter_noinfo_noreturn 28248->28286 28249 7ff74820a3a2 28252 7ff74822a450 31 API calls 28249->28252 28250 7ff74820a2ae 28250->28251 28287 7ff748208cd0 33 API calls 2 library calls 28250->28287 28251->28249 28254 7ff748208e58 33 API calls 28251->28254 28253 7ff74820a3cb 28252->28253 28256 7ff74822a450 31 API calls 28253->28256 28254->28251 28256->28241 28258 7ff74820a16d 28283 7ff74822b7bc 31 API calls _invalid_parameter_noinfo_noreturn 28258->28283 28259 7ff74820a1d8 28259->28242 28284 7ff748208cd0 33 API calls 2 library calls 28259->28284 28260 7ff748210f68 WideCharToMultiByte 28260->28262 28262->28241 28262->28242 28262->28244 28262->28245 28262->28260 28263 7ff74820a429 28262->28263 28280 7ff74820aa88 45 API calls _snwprintf 28262->28280 28281 7ff74822a270 31 API calls 2 library calls 28262->28281 28288 7ff748222624 8 API calls 28263->28288 28266->28210 28269 7ff74820a468 28268->28269 28269->28151 28271 7ff74822a47d 28270->28271 28277 7ff74822a492 28271->28277 28289 7ff74822d69c 15 API calls _set_errno_from_matherr 28271->28289 28273 7ff74822a487 28290 7ff7482278e4 31 API calls _invalid_parameter_noinfo_noreturn 28273->28290 28274 7ff748222320 _handle_error 8 API calls 28276 7ff748209b37 28274->28276 28276->28223 28277->28274 28278->28207 28279->28262 28280->28262 28281->28262 28282->28258 28283->28259 28284->28242 28285->28248 28286->28250 28287->28251 28288->28266 28289->28273 28290->28277 28291 7ff748220df5 14 API calls _com_raise_error 27826 7ff7482211cf 27827 7ff748221102 27826->27827 27828 7ff748221900 _com_raise_error 14 API calls 27827->27828 27828->27827 28306 7ff7482220f0 28307 7ff748222106 _com_error::_com_error 28306->28307 28308 7ff748224078 Concurrency::cancel_current_task 2 API calls 28307->28308 28309 7ff748222117 28308->28309 28310 7ff748221900 _com_raise_error 14 API calls 28309->28310 28311 7ff748222163 28310->28311 28311->28311 28317 7ff7482203e0 28318 7ff748220497 28317->28318 28319 7ff74822041f 28317->28319 28320 7ff74820aae0 48 API calls 28318->28320 28321 7ff74820aae0 48 API calls 28319->28321 28322 7ff7482204ab 28320->28322 28323 7ff748220433 28321->28323 28324 7ff74820da98 48 API calls 28322->28324 28325 7ff74820da98 48 API calls 28323->28325 28326 7ff748220442 BuildCatchObjectHelperInternal 28324->28326 28325->28326 28327 7ff7481f1fa0 31 API calls 28326->28327 28329 7ff7482205cc 28326->28329 28330 7ff7482205c6 28326->28330 28328 7ff748220541 28327->28328 28331 7ff7481f250c SetDlgItemTextW 28328->28331 28334 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 28329->28334 28333 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 28330->28333 28332 7ff748220556 SetWindowTextW 28331->28332 28336 7ff74822056f 28332->28336 28337 7ff74822059c 28332->28337 28333->28329 28335 7ff7482205d2 28334->28335 28336->28337 28339 7ff7482205c1 28336->28339 28338 7ff748222320 _handle_error 8 API calls 28337->28338 28340 7ff7482205af 28338->28340 28341 7ff748227904 _invalid_parameter_noinfo_noreturn 31 API calls 28339->28341 28341->28330
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                                                                      • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                                      • API String ID: 255727823-2702805183
                                                                                      • Opcode ID: a16cb47bdfb6fee4db4bfb79902e9f0668d6127c4b7364f0942a7c7ecdd17f3a
                                                                                      • Instruction ID: 09a53b05651313006a79a5e6b64860a9824c9d955228bf74603b277b1537683b
                                                                                      • Opcode Fuzzy Hash: a16cb47bdfb6fee4db4bfb79902e9f0668d6127c4b7364f0942a7c7ecdd17f3a
                                                                                      • Instruction Fuzzy Hash: A8D2C262A4D68AC5EA21FB24EC542F9E361FF85780FD04236DA4D076A9DF3CE544C728
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                                                                      • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                                      • API String ID: 3007431893-3916287355
                                                                                      • Opcode ID: af06c8a4905a423708c1acb01ccb4a88de9c5df89cc584b1d2d64bedd2fe971c
                                                                                      • Instruction ID: 9af73b0e680e04ba30edd6bdda439fdc67af2f3f537fce91ece84a09f641d4a5
                                                                                      • Opcode Fuzzy Hash: af06c8a4905a423708c1acb01ccb4a88de9c5df89cc584b1d2d64bedd2fe971c
                                                                                      • Instruction Fuzzy Hash: 61138F62A0CB8AD9EB10FF64DC402ECF7A1EB41798F901536DA1D16AD9DF38D584C368

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1466 7ff748220754-7ff748220829 call 7ff74820dfd0 call 7ff7482062dc call 7ff74821946c call 7ff748223cf0 call 7ff748219a14 1477 7ff74822082b-7ff748220840 1466->1477 1478 7ff748220860-7ff748220883 1466->1478 1479 7ff74822085b call 7ff74822220c 1477->1479 1480 7ff748220842-7ff748220855 1477->1480 1481 7ff7482208ba-7ff7482208dd 1478->1481 1482 7ff748220885-7ff74822089a 1478->1482 1479->1478 1480->1479 1483 7ff748220ddd-7ff748220de2 call 7ff748227904 1480->1483 1487 7ff7482208df-7ff7482208f4 1481->1487 1488 7ff748220914-7ff748220937 1481->1488 1485 7ff74822089c-7ff7482208af 1482->1485 1486 7ff7482208b5 call 7ff74822220c 1482->1486 1502 7ff748220de3-7ff748220df0 call 7ff748227904 1483->1502 1485->1483 1485->1486 1486->1481 1491 7ff74822090f call 7ff74822220c 1487->1491 1492 7ff7482208f6-7ff748220909 1487->1492 1493 7ff748220939-7ff74822094e 1488->1493 1494 7ff74822096e-7ff74822097a GetCommandLineW 1488->1494 1491->1488 1492->1483 1492->1491 1499 7ff748220969 call 7ff74822220c 1493->1499 1500 7ff748220950-7ff748220963 1493->1500 1496 7ff748220b47-7ff748220b5e call 7ff748206454 1494->1496 1497 7ff748220980-7ff7482209b7 call 7ff74822797c call 7ff7481f129c call 7ff74821cad0 1494->1497 1510 7ff748220b89-7ff748220ce4 call 7ff7481f1fa0 SetEnvironmentVariableW GetLocalTime call 7ff748203e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff74821b014 call 7ff7482098ac call 7ff7482167b4 * 2 DialogBoxParamW call 7ff7482168a8 * 2 1496->1510 1511 7ff748220b60-7ff748220b85 call 7ff7481f1fa0 call 7ff748223640 1496->1511 1526 7ff7482209b9-7ff7482209cc 1497->1526 1527 7ff7482209ec-7ff7482209f3 1497->1527 1499->1494 1500->1483 1500->1499 1513 7ff748220df5-7ff748220e2f call 7ff748221900 1502->1513 1572 7ff748220cec-7ff748220cf3 1510->1572 1573 7ff748220ce6 Sleep 1510->1573 1511->1510 1522 7ff748220e34-7ff748220e99 1513->1522 1522->1513 1530 7ff7482209e7 call 7ff74822220c 1526->1530 1531 7ff7482209ce-7ff7482209e1 1526->1531 1532 7ff7482209f9-7ff748220a13 OpenFileMappingW 1527->1532 1533 7ff748220adb-7ff748220b05 call 7ff74822797c call 7ff7481f129c call 7ff74821fd0c 1527->1533 1530->1527 1531->1502 1531->1530 1534 7ff748220a19-7ff748220a39 MapViewOfFile 1532->1534 1535 7ff748220ad0-7ff748220ad9 CloseHandle 1532->1535 1552 7ff748220b0a-7ff748220b12 1533->1552 1534->1535 1541 7ff748220a3f-7ff748220a6f UnmapViewOfFile MapViewOfFile 1534->1541 1535->1496 1541->1535 1544 7ff748220a71-7ff748220aca call 7ff74821a190 call 7ff74821fd0c call 7ff74820b9b4 call 7ff74820bb00 call 7ff74820bb70 UnmapViewOfFile 1541->1544 1544->1535 1552->1496 1555 7ff748220b14-7ff748220b27 1552->1555 1558 7ff748220b29-7ff748220b3c 1555->1558 1559 7ff748220b42 call 7ff74822220c 1555->1559 1558->1559 1562 7ff748220dd7-7ff748220ddc call 7ff748227904 1558->1562 1559->1496 1562->1483 1575 7ff748220cfa-7ff748220d1d call 7ff74820b8e0 DeleteObject 1572->1575 1576 7ff748220cf5 call 7ff748219f4c 1572->1576 1573->1572 1581 7ff748220d1f DeleteObject 1575->1581 1582 7ff748220d25-7ff748220d2c 1575->1582 1576->1575 1581->1582 1583 7ff748220d48-7ff748220d59 1582->1583 1584 7ff748220d2e-7ff748220d35 1582->1584 1586 7ff748220d5b-7ff748220d67 call 7ff74821fe24 CloseHandle 1583->1586 1587 7ff748220d6d-7ff748220d7a 1583->1587 1584->1583 1585 7ff748220d37-7ff748220d43 call 7ff7481fba0c 1584->1585 1585->1583 1586->1587 1589 7ff748220d7c-7ff748220d89 1587->1589 1590 7ff748220d9f-7ff748220da4 call 7ff7482194e4 1587->1590 1593 7ff748220d99-7ff748220d9b 1589->1593 1594 7ff748220d8b-7ff748220d93 1589->1594 1598 7ff748220da9-7ff748220dd6 call 7ff748222320 1590->1598 1593->1590 1597 7ff748220d9d 1593->1597 1594->1590 1596 7ff748220d95-7ff748220d97 1594->1596 1596->1590 1597->1590
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                                      • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                      • API String ID: 1048086575-3710569615
                                                                                      • Opcode ID: fcdfd6d8174970b9a236f1ff0dd38d9f465d88258eb4dfcd8f653860d12c6cc7
                                                                                      • Instruction ID: 599b3b2d6d5620fcb8abc95e18b1ecd355f340dac6f43020bb4cdf167f407c95
                                                                                      • Opcode Fuzzy Hash: fcdfd6d8174970b9a236f1ff0dd38d9f465d88258eb4dfcd8f653860d12c6cc7
                                                                                      • Instruction Fuzzy Hash: 5012B861E1DB8AC6EB10FB24E8552B9E361FF85794FC00231DA5D46AA9DF3CE140C728

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                                                      • String ID: $%s:$CAPTION
                                                                                      • API String ID: 2100155373-404845831
                                                                                      • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                      • Instruction ID: 987430d6e6e1a6fd402b8bb187f91a3a8727b21d239b9779ed74b2c7c4836032
                                                                                      • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                      • Instruction Fuzzy Hash: 1491E332B1C645C6E758BF29A80066AE7A1FB85784F845535EF8E47B98CE3CE805CB10

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                      • String ID: PNG
                                                                                      • API String ID: 211097158-364855578
                                                                                      • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                      • Instruction ID: a61a687a939a8aa1dec6a53f451b8aac433e395933a60fcd6fd8a69eb7ec0264
                                                                                      • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                      • Instruction Fuzzy Hash: C7415125A0DB4AD3EE04BF26D894379E3A0AF88B90F980435CD0D47764EF7CE4459324
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID: __tmp_reference_source_
                                                                                      • API String ID: 3668304517-685763994
                                                                                      • Opcode ID: f93a5901f091a80e527cf63f7fd92bb3ffac14f30fe3de6cd4a58ad4180e2ab3
                                                                                      • Instruction ID: 4b2ae11092df379c333d90772ca75007b973bf74a9c169fdb7e2b45325b8f12f
                                                                                      • Opcode Fuzzy Hash: f93a5901f091a80e527cf63f7fd92bb3ffac14f30fe3de6cd4a58ad4180e2ab3
                                                                                      • Instruction Fuzzy Hash: DAE29462A0C6CAD2EA64FB25E1403BEE761FB82744F804136DBAD136A5CF7CE455C718
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID: CMT
                                                                                      • API String ID: 3668304517-2756464174
                                                                                      • Opcode ID: b72a447c2ddb22f05185b9639a81e7227c320d37a75114c120090eb22b33af98
                                                                                      • Instruction ID: f3bcef1ef4adf30dfa673e31ec6c8df9d68cfd2aae7b4ac1d515daa48a81731a
                                                                                      • Opcode Fuzzy Hash: b72a447c2ddb22f05185b9639a81e7227c320d37a75114c120090eb22b33af98
                                                                                      • Instruction Fuzzy Hash: 55E2C162B0C68AC6EB14FB65E4502FEE7A1EB45384F80013ADB5E47696DF3CE055C728

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 3477 7ff7482040bc-7ff7482040f3 3478 7ff7482041d2-7ff7482041df FindNextFileW 3477->3478 3479 7ff7482040f9-7ff748204101 3477->3479 3482 7ff7482041f3-7ff7482041f6 3478->3482 3483 7ff7482041e1-7ff7482041f1 GetLastError 3478->3483 3480 7ff748204106-7ff748204118 FindFirstFileW 3479->3480 3481 7ff748204103 3479->3481 3480->3482 3484 7ff74820411e-7ff748204146 call 7ff748206a0c 3480->3484 3481->3480 3486 7ff748204211-7ff748204253 call 7ff74822797c call 7ff7481f129c call 7ff748208090 3482->3486 3487 7ff7482041f8-7ff748204200 3482->3487 3485 7ff7482041ca-7ff7482041cd 3483->3485 3497 7ff748204148-7ff748204164 FindFirstFileW 3484->3497 3498 7ff748204167-7ff748204170 3484->3498 3488 7ff7482042eb-7ff74820430e call 7ff748222320 3485->3488 3513 7ff748204255-7ff74820426c 3486->3513 3514 7ff74820428c-7ff7482042e6 call 7ff74820f168 * 3 3486->3514 3490 7ff748204205-7ff74820420c call 7ff7481f20b0 3487->3490 3491 7ff748204202 3487->3491 3490->3486 3491->3490 3497->3498 3501 7ff748204172-7ff748204189 3498->3501 3502 7ff7482041a9-7ff7482041ad 3498->3502 3504 7ff7482041a4 call 7ff74822220c 3501->3504 3505 7ff74820418b-7ff74820419e 3501->3505 3502->3482 3506 7ff7482041af-7ff7482041be GetLastError 3502->3506 3504->3502 3505->3504 3508 7ff748204315-7ff74820431b call 7ff748227904 3505->3508 3510 7ff7482041c0-7ff7482041c6 3506->3510 3511 7ff7482041c8 3506->3511 3510->3485 3510->3511 3511->3485 3518 7ff74820426e-7ff748204281 3513->3518 3519 7ff748204287 call 7ff74822220c 3513->3519 3514->3488 3518->3519 3520 7ff74820430f-7ff748204314 call 7ff748227904 3518->3520 3519->3514 3520->3508
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                                      • String ID:
                                                                                      • API String ID: 474548282-0
                                                                                      • Opcode ID: 5b7a682f346ba33cc6e8113bf8bb974c5d06c867b30d63dc8f71ee7e42fd28a6
                                                                                      • Instruction ID: d0d0787b70a0b8f678b98c1d2475478531d3312834b37f0d677076309eea9d43
                                                                                      • Opcode Fuzzy Hash: 5b7a682f346ba33cc6e8113bf8bb974c5d06c867b30d63dc8f71ee7e42fd28a6
                                                                                      • Instruction Fuzzy Hash: 01619662A0CA4AC6EA10BB24E84026DE361FB967A8F905331EBBD076D9DF3CD544C714

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 3614 7ff7481f5e24-7ff7481f6129 call 7ff74820833c call 7ff7482085f0 3620 7ff7481f612e-7ff7481f6132 3614->3620 3621 7ff7481f6134-7ff7481f613c call 7ff7481f6fcc 3620->3621 3622 7ff7481f6141-7ff7481f6171 call 7ff7482083d8 call 7ff748208570 call 7ff748208528 3620->3622 3627 7ff7481f697b 3621->3627 3640 7ff7481f6973-7ff7481f6976 call 7ff7481f466c 3622->3640 3641 7ff7481f6177-7ff7481f6179 3622->3641 3629 7ff7481f697e-7ff7481f6985 3627->3629 3631 7ff7481f69b4-7ff7481f69e3 call 7ff748222320 3629->3631 3632 7ff7481f6987-7ff7481f6998 3629->3632 3634 7ff7481f69af call 7ff74822220c 3632->3634 3635 7ff7481f699a-7ff7481f69ad 3632->3635 3634->3631 3635->3634 3638 7ff7481f69e4-7ff7481f69e9 call 7ff748227904 3635->3638 3648 7ff7481f69ea-7ff7481f69ef call 7ff748227904 3638->3648 3640->3627 3641->3640 3644 7ff7481f617f-7ff7481f6189 3641->3644 3644->3640 3646 7ff7481f618f-7ff7481f6192 3644->3646 3646->3640 3649 7ff7481f6198-7ff7481f61aa call 7ff7482085f0 3646->3649 3655 7ff7481f69f0-7ff7481f69f7 call 7ff748227904 3648->3655 3649->3621 3654 7ff7481f61ac-7ff7481f61fd call 7ff7482084f8 call 7ff748208528 * 2 3649->3654 3664 7ff7481f623f-7ff7481f6249 3654->3664 3665 7ff7481f61ff-7ff7481f6222 call 7ff7481f466c call 7ff7481fba0c 3654->3665 3666 7ff7481f6266-7ff7481f6270 3664->3666 3667 7ff7481f624b-7ff7481f6260 call 7ff748208528 3664->3667 3665->3664 3682 7ff7481f6224-7ff7481f622e call 7ff7481f433c 3665->3682 3670 7ff7481f6272-7ff7481f627b call 7ff748208528 3666->3670 3671 7ff7481f627e-7ff7481f6296 call 7ff7481f334c 3666->3671 3667->3640 3667->3666 3670->3671 3680 7ff7481f62b3 3671->3680 3681 7ff7481f6298-7ff7481f629b 3671->3681 3684 7ff7481f62b6-7ff7481f62c8 3680->3684 3681->3680 3683 7ff7481f629d-7ff7481f62b1 3681->3683 3682->3664 3683->3680 3683->3684 3686 7ff7481f62ce-7ff7481f62d1 3684->3686 3687 7ff7481f68b7-7ff7481f6929 call 7ff748204d04 call 7ff748208528 3684->3687 3689 7ff7481f6481-7ff7481f64f4 call 7ff748204c74 call 7ff748208528 * 2 3686->3689 3690 7ff7481f62d7-7ff7481f62da 3686->3690 3706 7ff7481f6936 3687->3706 3707 7ff7481f692b-7ff7481f6934 call 7ff748208528 3687->3707 3720 7ff7481f64f6-7ff7481f6500 3689->3720 3721 7ff7481f6507-7ff7481f6533 call 7ff748208528 3689->3721 3690->3689 3691 7ff7481f62e0-7ff7481f62e3 3690->3691 3694 7ff7481f62e5-7ff7481f62e8 3691->3694 3695 7ff7481f632e-7ff7481f6353 call 7ff748208528 3691->3695 3698 7ff7481f696d-7ff7481f6971 3694->3698 3699 7ff7481f62ee-7ff7481f6329 call 7ff748208528 3694->3699 3710 7ff7481f6355-7ff7481f638f call 7ff7481f4228 call 7ff7481f3c84 call 7ff7481f701c call 7ff7481f1fa0 3695->3710 3711 7ff7481f639e-7ff7481f63c5 call 7ff748208528 call 7ff748208384 3695->3711 3698->3629 3699->3698 3713 7ff7481f6939-7ff7481f6946 3706->3713 3707->3713 3757 7ff7481f6390-7ff7481f6399 call 7ff7481f1fa0 3710->3757 3733 7ff7481f6402-7ff7481f641f call 7ff748208444 3711->3733 3734 7ff7481f63c7-7ff7481f6400 call 7ff7481f4228 call 7ff7481f3c84 call 7ff7481f701c call 7ff7481f1fa0 3711->3734 3718 7ff7481f694c 3713->3718 3719 7ff7481f6948-7ff7481f694a 3713->3719 3724 7ff7481f694f-7ff7481f6959 3718->3724 3719->3718 3719->3724 3720->3721 3735 7ff7481f6535-7ff7481f6544 call 7ff7482083d8 call 7ff74820f134 3721->3735 3736 7ff7481f6549-7ff7481f6557 3721->3736 3724->3698 3728 7ff7481f695b-7ff7481f6968 call 7ff7481f4840 3724->3728 3728->3698 3753 7ff7481f6475-7ff7481f647c 3733->3753 3754 7ff7481f6421-7ff7481f646f call 7ff748208444 * 2 call 7ff74820c800 call 7ff748224a70 3733->3754 3734->3757 3735->3736 3738 7ff7481f6572-7ff7481f6595 call 7ff748208528 3736->3738 3739 7ff7481f6559-7ff7481f656c call 7ff7482083d8 3736->3739 3758 7ff7481f65a0-7ff7481f65b0 3738->3758 3759 7ff7481f6597-7ff7481f659e 3738->3759 3739->3738 3753->3698 3754->3753 3757->3711 3763 7ff7481f65b3-7ff7481f65eb call 7ff748208528 * 2 3758->3763 3759->3763 3778 7ff7481f65f6-7ff7481f65fa 3763->3778 3779 7ff7481f65ed-7ff7481f65f4 3763->3779 3781 7ff7481f6603-7ff7481f6632 3778->3781 3783 7ff7481f65fc 3778->3783 3779->3781 3784 7ff7481f6634-7ff7481f6638 3781->3784 3785 7ff7481f663f 3781->3785 3783->3781 3784->3785 3786 7ff7481f663a-7ff7481f663d 3784->3786 3787 7ff7481f6641-7ff7481f6656 3785->3787 3786->3787 3788 7ff7481f66ca 3787->3788 3789 7ff7481f6658-7ff7481f665b 3787->3789 3791 7ff7481f66d2-7ff7481f6731 call 7ff7481f3d00 call 7ff748208444 call 7ff748210d54 3788->3791 3789->3788 3790 7ff7481f665d-7ff7481f6683 3789->3790 3790->3791 3792 7ff7481f6685-7ff7481f66a9 3790->3792 3802 7ff7481f6745-7ff7481f6749 3791->3802 3803 7ff7481f6733-7ff7481f6740 call 7ff7481f4840 3791->3803 3794 7ff7481f66b2-7ff7481f66bf 3792->3794 3795 7ff7481f66ab 3792->3795 3794->3791 3797 7ff7481f66c1-7ff7481f66c8 3794->3797 3795->3794 3797->3791 3805 7ff7481f675b-7ff7481f6772 call 7ff74822797c 3802->3805 3806 7ff7481f674b-7ff7481f6756 call 7ff7481f473c 3802->3806 3803->3802 3812 7ff7481f6774 3805->3812 3813 7ff7481f6777-7ff7481f677e 3805->3813 3811 7ff7481f6859-7ff7481f6860 3806->3811 3814 7ff7481f6873-7ff7481f687b 3811->3814 3815 7ff7481f6862-7ff7481f6872 call 7ff7481f433c 3811->3815 3812->3813 3816 7ff7481f67a3-7ff7481f67ba call 7ff74822797c 3813->3816 3817 7ff7481f6780-7ff7481f6783 3813->3817 3814->3698 3820 7ff7481f6881-7ff7481f6892 3814->3820 3815->3814 3830 7ff7481f67bf-7ff7481f67c6 3816->3830 3831 7ff7481f67bc 3816->3831 3821 7ff7481f6785 3817->3821 3822 7ff7481f679c 3817->3822 3826 7ff7481f6894-7ff7481f68a7 3820->3826 3827 7ff7481f68ad-7ff7481f68b2 call 7ff74822220c 3820->3827 3823 7ff7481f6788-7ff7481f6791 3821->3823 3822->3816 3823->3816 3829 7ff7481f6793-7ff7481f679a 3823->3829 3826->3655 3826->3827 3827->3698 3829->3822 3829->3823 3830->3811 3833 7ff7481f67cc-7ff7481f67cf 3830->3833 3831->3830 3834 7ff7481f67d1 3833->3834 3835 7ff7481f67e8-7ff7481f67f0 3833->3835 3836 7ff7481f67d4-7ff7481f67dd 3834->3836 3835->3811 3837 7ff7481f67f2-7ff7481f6826 call 7ff748208360 call 7ff748208598 call 7ff748208528 3835->3837 3836->3811 3838 7ff7481f67df-7ff7481f67e6 3836->3838 3837->3811 3845 7ff7481f6828-7ff7481f6839 3837->3845 3838->3835 3838->3836 3846 7ff7481f6854 call 7ff74822220c 3845->3846 3847 7ff7481f683b-7ff7481f684e 3845->3847 3846->3811 3847->3648 3847->3846
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: CMT
                                                                                      • API String ID: 0-2756464174
                                                                                      • Opcode ID: b8fa635b894758bb4949fb57bddd48836ff0d2ecd2be86fe1bb2065c738ed5aa
                                                                                      • Instruction ID: 3532bf6c7d4ecc84f7cd21d954eccebba92a93cc8fb575c8364cf22476fd9f93
                                                                                      • Opcode Fuzzy Hash: b8fa635b894758bb4949fb57bddd48836ff0d2ecd2be86fe1bb2065c738ed5aa
                                                                                      • Instruction Fuzzy Hash: F842BB62B0C68ADAEB18FB74E5502FDE7A0EB45344F80013ADB5E53696DF38E518C714
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7db5a9875e5f6d1f603b63d16782f803fa3cf1fd728954a44ec6c9bafca29fc1
                                                                                      • Instruction ID: 3cf55820fb3c9df8f4676b0654a03f4a8e28ffbebb2c0fa571f9f8d670b918d8
                                                                                      • Opcode Fuzzy Hash: 7db5a9875e5f6d1f603b63d16782f803fa3cf1fd728954a44ec6c9bafca29fc1
                                                                                      • Instruction Fuzzy Hash: 4BE10322A0C6C6CAEB64FF28A8442BDFB92FB44748FA54135DB4E57685CF3CE5418718
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 27e1d97200dc275f03108a64776f1fd30e61297024d66dcfdcf317728c87068d
                                                                                      • Instruction ID: d5d3180e519230b34202a779b63cd9c237d81a32c44f5afd1920f2b48612a8bd
                                                                                      • Opcode Fuzzy Hash: 27e1d97200dc275f03108a64776f1fd30e61297024d66dcfdcf317728c87068d
                                                                                      • Instruction Fuzzy Hash: 50B1D1A2B087C9A2DE58EB69D9086EAE392B705FC4F948036DE4D07745DF3CE156C314
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                      • String ID:
                                                                                      • API String ID: 3340455307-0
                                                                                      • Opcode ID: fd8835e4233293591ea5a8582186aba0aa2126ac905c183a9a3c131a0123eb89
                                                                                      • Instruction ID: fb1a1865f6b0d1325ecfb03f33d7a3dac95e1ccbe3194f876316a56ce33c0426
                                                                                      • Opcode Fuzzy Hash: fd8835e4233293591ea5a8582186aba0aa2126ac905c183a9a3c131a0123eb89
                                                                                      • Instruction Fuzzy Hash: 0341F522B1DA5AC6FA64FE21A91076AE252FBC5788F848030DF5D07796DE3CE442871C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 7ff74820dfd0-7ff74820e024 call 7ff748222450 GetModuleHandleW 3 7ff74820e07b-7ff74820e3a5 0->3 4 7ff74820e026-7ff74820e039 GetProcAddress 0->4 7 7ff74820e3ab-7ff74820e3b4 call 7ff74822b788 3->7 8 7ff74820e503-7ff74820e521 call 7ff748206454 call 7ff748207df4 3->8 5 7ff74820e03b-7ff74820e04a 4->5 6 7ff74820e053-7ff74820e066 GetProcAddress 4->6 5->6 6->3 10 7ff74820e068-7ff74820e078 6->10 7->8 14 7ff74820e3ba-7ff74820e3fd call 7ff748206454 CreateFileW 7->14 20 7ff74820e525-7ff74820e52f call 7ff7482051a4 8->20 10->3 21 7ff74820e4f0-7ff74820e4fe CloseHandle call 7ff7481f1fa0 14->21 22 7ff74820e403-7ff74820e416 SetFilePointer 14->22 28 7ff74820e531-7ff74820e53c call 7ff74820dd88 20->28 29 7ff74820e564-7ff74820e5ac call 7ff74822797c call 7ff7481f129c call 7ff748208090 call 7ff7481f1fa0 call 7ff7482032bc 20->29 21->8 22->21 24 7ff74820e41c-7ff74820e43e ReadFile 22->24 24->21 27 7ff74820e444-7ff74820e452 24->27 32 7ff74820e458-7ff74820e4ac call 7ff74822797c call 7ff7481f129c 27->32 33 7ff74820e800-7ff74820e807 call 7ff748222624 27->33 28->29 38 7ff74820e53e-7ff74820e562 CompareStringW 28->38 71 7ff74820e5b1-7ff74820e5b4 29->71 50 7ff74820e4c3-7ff74820e4d9 call 7ff74820d0a0 32->50 38->29 42 7ff74820e5bd-7ff74820e5c6 38->42 42->20 45 7ff74820e5cc 42->45 48 7ff74820e5d1-7ff74820e5d4 45->48 51 7ff74820e63f-7ff74820e642 48->51 52 7ff74820e5d6-7ff74820e5d9 48->52 60 7ff74820e4db-7ff74820e4eb call 7ff7481f1fa0 * 2 50->60 61 7ff74820e4ae-7ff74820e4be call 7ff74820dd88 50->61 56 7ff74820e648-7ff74820e65b call 7ff748207eb0 call 7ff7482051a4 51->56 57 7ff74820e7c2-7ff74820e7ff call 7ff7481f1fa0 * 2 call 7ff748222320 51->57 58 7ff74820e5dd-7ff74820e62d call 7ff74822797c call 7ff7481f129c call 7ff748208090 call 7ff7481f1fa0 call 7ff7482032bc 52->58 82 7ff74820e661-7ff74820e701 call 7ff74820dd88 * 2 call 7ff74820aae0 call 7ff74820da98 call 7ff74820aae0 call 7ff74820dc2c call 7ff7482187ac call 7ff7481f19e0 56->82 83 7ff74820e706-7ff74820e753 call 7ff74820da98 AllocConsole 56->83 108 7ff74820e63c 58->108 109 7ff74820e62f-7ff74820e638 58->109 60->21 61->50 76 7ff74820e5ce 71->76 77 7ff74820e5b6 71->77 76->48 77->42 97 7ff74820e7b4-7ff74820e7bb call 7ff7481f19e0 ExitProcess 82->97 94 7ff74820e7b0 83->94 95 7ff74820e755-7ff74820e7aa GetCurrentProcessId AttachConsole call 7ff74820e868 call 7ff74820e858 GetStdHandle WriteConsoleW Sleep FreeConsole 83->95 94->97 95->94 108->51 109->58 111 7ff74820e63a 109->111 111->51
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                                                      • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                                      • API String ID: 1496594111-2013832382
                                                                                      • Opcode ID: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                                                                      • Instruction ID: 4dac749df60653006292747e77ed627cec4d234eeccecd63aa8bc622b7148f0d
                                                                                      • Opcode Fuzzy Hash: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                                                                      • Instruction Fuzzy Hash: 65323A35A0DB96DAEB12BB30E8501E9F3A4FB46354F900236DA9D06BA5EF3CD245C354
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF748208E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF748208F8D
                                                                                      • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF748209F75
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF74820A42F
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF74820A435
                                                                                        • Part of subcall function 00007FF748210BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF748210B44), ref: 00007FF748210BE9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                                      • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                                      • API String ID: 3629253777-3268106645
                                                                                      • Opcode ID: 3b26f4d226c81ed995e550c10dd8d2e0a3396c4394cac7f732fcd1ca91b42b00
                                                                                      • Instruction ID: 02e8ea831ee74464d794167b0a4ca438cd765325be75888e402ba0a731a92758
                                                                                      • Opcode Fuzzy Hash: 3b26f4d226c81ed995e550c10dd8d2e0a3396c4394cac7f732fcd1ca91b42b00
                                                                                      • Instruction Fuzzy Hash: 8562AE22A1D69AD5EB11FB24C4442BDE3A1FB42784FC04132DB6E47A95EF3DE584C368

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1911 7ff748221900-7ff748221989 call 7ff748221558 1914 7ff74822198b-7ff7482219af call 7ff748221868 RaiseException 1911->1914 1915 7ff7482219b4-7ff7482219d1 1911->1915 1921 7ff748221bb8-7ff748221bd5 1914->1921 1917 7ff7482219d3-7ff7482219e4 1915->1917 1918 7ff7482219e6-7ff7482219ea 1915->1918 1920 7ff7482219ed-7ff7482219f9 1917->1920 1918->1920 1922 7ff748221a1a-7ff748221a1d 1920->1922 1923 7ff7482219fb-7ff748221a0d 1920->1923 1924 7ff748221ac4-7ff748221acb 1922->1924 1925 7ff748221a23-7ff748221a26 1922->1925 1931 7ff748221b89-7ff748221b93 1923->1931 1932 7ff748221a13 1923->1932 1926 7ff748221acd-7ff748221adc 1924->1926 1927 7ff748221adf-7ff748221ae2 1924->1927 1928 7ff748221a28-7ff748221a3b 1925->1928 1929 7ff748221a3d-7ff748221a52 LoadLibraryExA 1925->1929 1926->1927 1933 7ff748221ae8-7ff748221aec 1927->1933 1934 7ff748221b85 1927->1934 1928->1929 1935 7ff748221aa9-7ff748221ab2 1928->1935 1929->1935 1936 7ff748221a54-7ff748221a67 GetLastError 1929->1936 1941 7ff748221bb0 call 7ff748221868 1931->1941 1942 7ff748221b95-7ff748221ba6 1931->1942 1932->1922 1939 7ff748221b1b-7ff748221b2e GetProcAddress 1933->1939 1940 7ff748221aee-7ff748221af2 1933->1940 1934->1931 1945 7ff748221abd 1935->1945 1946 7ff748221ab4-7ff748221ab7 FreeLibrary 1935->1946 1943 7ff748221a69-7ff748221a7c 1936->1943 1944 7ff748221a7e-7ff748221aa4 call 7ff748221868 RaiseException 1936->1944 1939->1934 1950 7ff748221b30-7ff748221b43 GetLastError 1939->1950 1940->1939 1947 7ff748221af4-7ff748221aff 1940->1947 1953 7ff748221bb5 1941->1953 1942->1941 1943->1935 1943->1944 1944->1921 1945->1924 1946->1945 1947->1939 1951 7ff748221b01-7ff748221b08 1947->1951 1955 7ff748221b5a-7ff748221b81 call 7ff748221868 RaiseException call 7ff748221558 1950->1955 1956 7ff748221b45-7ff748221b58 1950->1956 1951->1939 1958 7ff748221b0a-7ff748221b0f 1951->1958 1953->1921 1955->1934 1956->1934 1956->1955 1958->1939 1961 7ff748221b11-7ff748221b19 1958->1961 1961->1934 1961->1939
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                                                      • String ID: H
                                                                                      • API String ID: 3432403771-2852464175
                                                                                      • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                      • Instruction ID: 0779954a7ab12010d0d11b3a332aa405df67c89bec5d489eae54407c2e5a875e
                                                                                      • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                      • Instruction Fuzzy Hash: 63915C62A09B59CAEB10FFA5D8806A8F3B5FB08B94B854435DE0D27754EF38E445C324

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1989 7ff74821f4e0-7ff74821f523 1990 7ff74821f529-7ff74821f565 call 7ff748223cf0 1989->1990 1991 7ff74821f894-7ff74821f8b9 call 7ff7481f1fa0 call 7ff748222320 1989->1991 1996 7ff74821f567 1990->1996 1997 7ff74821f56a-7ff74821f571 1990->1997 1996->1997 2000 7ff74821f582-7ff74821f586 1997->2000 2001 7ff74821f573-7ff74821f577 1997->2001 2004 7ff74821f588 2000->2004 2005 7ff74821f58b-7ff74821f596 2000->2005 2002 7ff74821f579 2001->2002 2003 7ff74821f57c-7ff74821f580 2001->2003 2002->2003 2003->2005 2004->2005 2006 7ff74821f628 2005->2006 2007 7ff74821f59c 2005->2007 2009 7ff74821f62c-7ff74821f62f 2006->2009 2008 7ff74821f5a2-7ff74821f5a9 2007->2008 2010 7ff74821f5ab 2008->2010 2011 7ff74821f5ae-7ff74821f5b3 2008->2011 2012 7ff74821f637-7ff74821f63a 2009->2012 2013 7ff74821f631-7ff74821f635 2009->2013 2010->2011 2016 7ff74821f5e5-7ff74821f5f0 2011->2016 2017 7ff74821f5b5 2011->2017 2014 7ff74821f660-7ff74821f673 call 7ff7482063ac 2012->2014 2015 7ff74821f63c-7ff74821f643 2012->2015 2013->2012 2013->2014 2030 7ff74821f698-7ff74821f6ed call 7ff74822797c call 7ff7481f129c call 7ff7482032a8 call 7ff7481f1fa0 2014->2030 2031 7ff74821f675-7ff74821f693 call 7ff7482113c4 2014->2031 2015->2014 2018 7ff74821f645-7ff74821f65c 2015->2018 2020 7ff74821f5f2 2016->2020 2021 7ff74821f5f5-7ff74821f5fa 2016->2021 2022 7ff74821f5ca-7ff74821f5d0 2017->2022 2018->2014 2020->2021 2026 7ff74821f8ba-7ff74821f8c1 2021->2026 2027 7ff74821f600-7ff74821f607 2021->2027 2023 7ff74821f5b7-7ff74821f5be 2022->2023 2024 7ff74821f5d2 2022->2024 2034 7ff74821f5c0 2023->2034 2035 7ff74821f5c3-7ff74821f5c8 2023->2035 2024->2016 2028 7ff74821f8c3 2026->2028 2029 7ff74821f8c6-7ff74821f8cb 2026->2029 2032 7ff74821f609 2027->2032 2033 7ff74821f60c-7ff74821f612 2027->2033 2028->2029 2037 7ff74821f8de-7ff74821f8e6 2029->2037 2038 7ff74821f8cd-7ff74821f8d4 2029->2038 2056 7ff74821f6ef-7ff74821f73d call 7ff74822797c call 7ff7481f129c call 7ff748205b60 call 7ff7481f1fa0 2030->2056 2057 7ff74821f742-7ff74821f74f ShellExecuteExW 2030->2057 2031->2030 2032->2033 2033->2026 2041 7ff74821f618-7ff74821f622 2033->2041 2034->2035 2035->2022 2036 7ff74821f5d4-7ff74821f5db 2035->2036 2042 7ff74821f5dd 2036->2042 2043 7ff74821f5e0 2036->2043 2046 7ff74821f8e8 2037->2046 2047 7ff74821f8eb-7ff74821f8f6 2037->2047 2044 7ff74821f8d9 2038->2044 2045 7ff74821f8d6 2038->2045 2041->2006 2041->2008 2042->2043 2043->2016 2044->2037 2045->2044 2046->2047 2047->2009 2056->2057 2059 7ff74821f846-7ff74821f84e 2057->2059 2060 7ff74821f755-7ff74821f75f 2057->2060 2062 7ff74821f850-7ff74821f866 2059->2062 2063 7ff74821f882-7ff74821f88f 2059->2063 2064 7ff74821f76f-7ff74821f772 2060->2064 2065 7ff74821f761-7ff74821f764 2060->2065 2069 7ff74821f868-7ff74821f87b 2062->2069 2070 7ff74821f87d call 7ff74822220c 2062->2070 2063->1991 2066 7ff74821f78e-7ff74821f7ad call 7ff74825e1b8 call 7ff74821fe24 2064->2066 2067 7ff74821f774-7ff74821f77f call 7ff74825e188 2064->2067 2065->2064 2071 7ff74821f766-7ff74821f76d 2065->2071 2077 7ff74821f7e3-7ff74821f7f0 CloseHandle 2066->2077 2097 7ff74821f7af-7ff74821f7b2 2066->2097 2067->2066 2086 7ff74821f781-7ff74821f78c ShowWindow 2067->2086 2069->2070 2075 7ff74821f8fb-7ff74821f903 call 7ff748227904 2069->2075 2070->2063 2071->2064 2071->2077 2082 7ff74821f7f2-7ff74821f803 call 7ff7482113c4 2077->2082 2083 7ff74821f805-7ff74821f80c 2077->2083 2082->2083 2084 7ff74821f82e-7ff74821f830 2082->2084 2083->2084 2085 7ff74821f80e-7ff74821f811 2083->2085 2084->2059 2092 7ff74821f832-7ff74821f835 2084->2092 2085->2084 2091 7ff74821f813-7ff74821f828 2085->2091 2086->2066 2091->2084 2092->2059 2096 7ff74821f837-7ff74821f845 ShowWindow 2092->2096 2096->2059 2097->2077 2099 7ff74821f7b4-7ff74821f7c5 GetExitCodeProcess 2097->2099 2099->2077 2100 7ff74821f7c7-7ff74821f7dc 2099->2100 2100->2077
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                                                                      • String ID: .exe$.inf$Install$p
                                                                                      • API String ID: 1054546013-3607691742
                                                                                      • Opcode ID: fd3b58b5eb305c00c83d38e58d9e4083d0156c4e785351e455ab425b01f70423
                                                                                      • Instruction ID: 0c2b650c86fe2ff6c51821c38d7b4cf9fdb4e2e2145224e43ed22acc42dcd8ce
                                                                                      • Opcode Fuzzy Hash: fd3b58b5eb305c00c83d38e58d9e4083d0156c4e785351e455ab425b01f70423
                                                                                      • Instruction Fuzzy Hash: 38C19D62F0CA0AD5FB00FB25D950279E3A1BF85B84FA44131DE5D47AA9EF3CE4518328

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                      • String ID:
                                                                                      • API String ID: 3569833718-0
                                                                                      • Opcode ID: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                      • Instruction ID: bd1ba00cdbcaa4bc647125eab5ebaef93c5fc1b8282ce2cfdbf099a352d11911
                                                                                      • Opcode Fuzzy Hash: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                      • Instruction Fuzzy Hash: 9C41E335F5864AC6F340FF61E810BAAB360EB85B98F840235DD0A07B94CF3DD4498768
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: 3982dfa35720f311290c569a92371854ba117263ca7aa152baa728957ab7fb83
                                                                                      • Instruction ID: 6f111626c046e4342c11567a71b6237eb758f5b8b563219065fa76d21e5c8305
                                                                                      • Opcode Fuzzy Hash: 3982dfa35720f311290c569a92371854ba117263ca7aa152baa728957ab7fb83
                                                                                      • Instruction Fuzzy Hash: D912CF62F0C74AC5EB10FB64E4442ADE361AB457A8F80023ADF5D17AE9DF78D189C718

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 3528 7ff7482024c0-7ff7482024fb 3529 7ff748202506 3528->3529 3530 7ff7482024fd-7ff748202504 3528->3530 3531 7ff748202509-7ff748202578 3529->3531 3530->3529 3530->3531 3532 7ff74820257d-7ff7482025a8 CreateFileW 3531->3532 3533 7ff74820257a 3531->3533 3534 7ff7482025ae-7ff7482025de GetLastError call 7ff748206a0c 3532->3534 3535 7ff748202688-7ff74820268d 3532->3535 3533->3532 3544 7ff7482025e0-7ff74820262a CreateFileW GetLastError 3534->3544 3545 7ff74820262c 3534->3545 3536 7ff748202693-7ff748202697 3535->3536 3538 7ff7482026a5-7ff7482026a9 3536->3538 3539 7ff748202699-7ff74820269c 3536->3539 3542 7ff7482026cf-7ff7482026e3 3538->3542 3543 7ff7482026ab-7ff7482026af 3538->3543 3539->3538 3541 7ff74820269e 3539->3541 3541->3538 3547 7ff7482026e5-7ff7482026f0 3542->3547 3548 7ff74820270c-7ff748202735 call 7ff748222320 3542->3548 3543->3542 3546 7ff7482026b1-7ff7482026c9 SetFileTime 3543->3546 3549 7ff748202632-7ff74820263a 3544->3549 3545->3549 3546->3542 3550 7ff7482026f2-7ff7482026fa 3547->3550 3551 7ff748202708 3547->3551 3552 7ff748202673-7ff748202686 3549->3552 3553 7ff74820263c-7ff748202653 3549->3553 3556 7ff7482026ff-7ff748202703 call 7ff7481f20b0 3550->3556 3557 7ff7482026fc 3550->3557 3551->3548 3552->3536 3558 7ff748202655-7ff748202668 3553->3558 3559 7ff74820266e call 7ff74822220c 3553->3559 3556->3551 3557->3556 3558->3559 3561 7ff748202736-7ff74820273b call 7ff748227904 3558->3561 3559->3552
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3536497005-0
                                                                                      • Opcode ID: 7e74b88d639c8d570aa5cbccebcd9353285634c108726f52f9c563d03d833b9c
                                                                                      • Instruction ID: 62b2f16e1b52384970c6c68edeae014a223aaa3ae3001e0a32ddbdf782d4821d
                                                                                      • Opcode Fuzzy Hash: 7e74b88d639c8d570aa5cbccebcd9353285634c108726f52f9c563d03d833b9c
                                                                                      • Instruction Fuzzy Hash: 0F610362A0C645C6E721AB29E44036EE7B1FB857A8F501335CFA907AD8CF3DC0548718

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 3565 7ff74821fd0c-7ff74821fd37 3566 7ff74821fd39 3565->3566 3567 7ff74821fd3c-7ff74821fd76 SetEnvironmentVariableW call 7ff74820d0a0 3565->3567 3566->3567 3570 7ff74821fd78 3567->3570 3571 7ff74821fdc3-7ff74821fdcb 3567->3571 3574 7ff74821fd7c-7ff74821fd84 3570->3574 3572 7ff74821fdcd-7ff74821fde3 3571->3572 3573 7ff74821fdff-7ff74821fe1a call 7ff748222320 3571->3573 3575 7ff74821fdfa call 7ff74822220c 3572->3575 3576 7ff74821fde5-7ff74821fdf8 3572->3576 3578 7ff74821fd89-7ff74821fd94 call 7ff74820d4c0 3574->3578 3579 7ff74821fd86 3574->3579 3575->3573 3576->3575 3581 7ff74821fe1b-7ff74821fe23 call 7ff748227904 3576->3581 3587 7ff74821fda3-7ff74821fda8 3578->3587 3588 7ff74821fd96-7ff74821fda1 3578->3588 3579->3578 3589 7ff74821fdaa 3587->3589 3590 7ff74821fdad-7ff74821fdc2 SetEnvironmentVariableW 3587->3590 3588->3574 3589->3590 3590->3571
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID: sfxcmd$sfxpar
                                                                                      • API String ID: 3540648995-3493335439
                                                                                      • Opcode ID: 65c4bc3e57016a74e8805048ea790c6f4a694eba210e4a6448e418b17608a108
                                                                                      • Instruction ID: 85b145c856f9f61774a34fa15baf7096f942dc656a9a1ac409075ef5394d7df7
                                                                                      • Opcode Fuzzy Hash: 65c4bc3e57016a74e8805048ea790c6f4a694eba210e4a6448e418b17608a108
                                                                                      • Instruction Fuzzy Hash: 3F316172A18A09C5EB04BB65E8941BCE371FB44B98F941531DE6D177A9DE38D041C368

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                                                                      • String ID: ]
                                                                                      • API String ID: 3561356813-3352871620
                                                                                      • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                      • Instruction ID: 3dbd420a0a9d947d81e75387f14bb0635d76ca309f326453b0064dcbca18e383
                                                                                      • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                      • Instruction Fuzzy Hash: 2F118925F0D64AC2FA64BB219A95379D3E1AF88FC0F980034D95D07B95DE2DE8048729

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DialogDispatchPeekTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 1266772231-0
                                                                                      • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                      • Instruction ID: 1940763efe50135cda7d85d9a8346f62deba5ed7fe48991c70f7ee32f4449f79
                                                                                      • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                      • Instruction Fuzzy Hash: 05F0EC35E7C546D2FB90BB24E895A3AE361BF90705FC19531E54E42854DF2CD508CB18

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                      • String ID: EDIT
                                                                                      • API String ID: 4243998846-3080729518
                                                                                      • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                      • Instruction ID: 75ffcb3c4b18f328c163d993c634df51c3d70a316547b5fa2b00300d2376a0b1
                                                                                      • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                      • Instruction Fuzzy Hash: 71018125B1CA8BC1FAA0BB21EC203F6E390AF99740FC85132C94D07659DE3CE589C674

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 3864 7ff748202ce0-7ff748202d0a 3865 7ff748202d13-7ff748202d1b 3864->3865 3866 7ff748202d0c-7ff748202d0e 3864->3866 3868 7ff748202d1d-7ff748202d28 GetStdHandle 3865->3868 3869 7ff748202d2b 3865->3869 3867 7ff748202ea9-7ff748202ec4 call 7ff748222320 3866->3867 3868->3869 3871 7ff748202d31-7ff748202d3d 3869->3871 3873 7ff748202d86-7ff748202da2 WriteFile 3871->3873 3874 7ff748202d3f-7ff748202d44 3871->3874 3877 7ff748202da6-7ff748202da9 3873->3877 3875 7ff748202d46-7ff748202d7a WriteFile 3874->3875 3876 7ff748202daf-7ff748202db3 3874->3876 3875->3877 3878 7ff748202d7c-7ff748202d82 3875->3878 3879 7ff748202ea2-7ff748202ea6 3876->3879 3880 7ff748202db9-7ff748202dbd 3876->3880 3877->3876 3877->3879 3878->3875 3881 7ff748202d84 3878->3881 3879->3867 3880->3879 3882 7ff748202dc3-7ff748202dd8 call 7ff7481fb4f8 3880->3882 3881->3877 3885 7ff748202e1e-7ff748202e6d call 7ff74822797c call 7ff7481f129c call 7ff7481fbca8 3882->3885 3886 7ff748202dda-7ff748202de1 3882->3886 3885->3879 3897 7ff748202e6f-7ff748202e86 3885->3897 3886->3871 3888 7ff748202de7-7ff748202de9 3886->3888 3888->3871 3890 7ff748202def-7ff748202e19 3888->3890 3890->3871 3898 7ff748202e9d call 7ff74822220c 3897->3898 3899 7ff748202e88-7ff748202e9b 3897->3899 3898->3879 3899->3898 3900 7ff748202ec5-7ff748202ecb call 7ff748227904 3899->3900
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$Handle
                                                                                      • String ID:
                                                                                      • API String ID: 4209713984-0
                                                                                      • Opcode ID: 95d7fd16c8d926fcf5da752308064adee905e679e75eda990adbc5c1a1c917ca
                                                                                      • Instruction ID: a15f5e6639e0157850fd45d16bb6c6a30744a31990f6d73dcf7445766fe0ccd3
                                                                                      • Opcode Fuzzy Hash: 95d7fd16c8d926fcf5da752308064adee905e679e75eda990adbc5c1a1c917ca
                                                                                      • Instruction Fuzzy Hash: 9551F322A1DA4AC2EA11BB25D94477AE360FF46B90FC40132EB1D06A94DF7CE885C324
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2912839123-0
                                                                                      • Opcode ID: fd36aafed68ac2b833d06f3d88383486773bbaf805cde91742d6a60f850c9423
                                                                                      • Instruction ID: c8e8215d8b8f0989305a18e3f71328bd60c029a1aed40d5713eceefbc379b99a
                                                                                      • Opcode Fuzzy Hash: fd36aafed68ac2b833d06f3d88383486773bbaf805cde91742d6a60f850c9423
                                                                                      • Instruction Fuzzy Hash: 00516E62F1865AC5EB00BBA9D8452ADE362BB45B94F900635DA2C16AD9DF7CD440C328
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                      • String ID:
                                                                                      • API String ID: 1452418845-0
                                                                                      • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                      • Instruction ID: 00702e98e6e0eb61dd17ff905186b2ea9e7cb0743db911d64c2d334234fbb9d4
                                                                                      • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                      • Instruction Fuzzy Hash: F5311921E0C10BC2FA64BB64D4153BAE291EF41384FC41934EA4E4B2E7DE7EB905927D
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 2359106489-0
                                                                                      • Opcode ID: 9d9d2995018f7f6f648ac6a5d97c5d37007cde808aee1d861722df7aa9659c46
                                                                                      • Instruction ID: 4c9150417ff69fa73bd2caffcad24c5f174bea565d2255a823cf0f4c7e9a2c53
                                                                                      • Opcode Fuzzy Hash: 9d9d2995018f7f6f648ac6a5d97c5d37007cde808aee1d861722df7aa9659c46
                                                                                      • Instruction Fuzzy Hash: 1431EA62A0C74AD2EB20BB29945817AE351FF8A794FD40231EFAD476D5DF3CD4458218
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FileHandleRead
                                                                                      • String ID:
                                                                                      • API String ID: 2244327787-0
                                                                                      • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                      • Instruction ID: 8f333132fbc0fc74b8d0098874a3bf857111d89d1bbcc9f69e2b2b4bafe0da8a
                                                                                      • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                      • Instruction Fuzzy Hash: 7C218421E0C64AC2EA617F21E40023DE3A0FB46B94FA44532DB6D4A694CF7CD8858769
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF74820ECD8: ResetEvent.KERNEL32 ref: 00007FF74820ECF1
                                                                                        • Part of subcall function 00007FF74820ECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF74820ED07
                                                                                      • ReleaseSemaphore.KERNEL32 ref: 00007FF74820E974
                                                                                      • CloseHandle.KERNELBASE ref: 00007FF74820E993
                                                                                      • DeleteCriticalSection.KERNEL32 ref: 00007FF74820E9AA
                                                                                      • CloseHandle.KERNEL32 ref: 00007FF74820E9B7
                                                                                        • Part of subcall function 00007FF74820EA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF74820E95F,?,?,?,00007FF74820463A,?,?,?), ref: 00007FF74820EA63
                                                                                        • Part of subcall function 00007FF74820EA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF74820E95F,?,?,?,00007FF74820463A,?,?,?), ref: 00007FF74820EA6E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                      • String ID:
                                                                                      • API String ID: 502429940-0
                                                                                      • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                      • Instruction ID: b713f1a0047537136dba7b708f3d929004271f1c3398d8eff59f521781f11d0e
                                                                                      • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                      • Instruction Fuzzy Hash: 98012D36A1CA85D3E648BB21E59426DE370FB88B90F404031DB6D07625CF79E4B48754
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Thread$CreatePriority
                                                                                      • String ID: CreateThread failed
                                                                                      • API String ID: 2610526550-3849766595
                                                                                      • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                      • Instruction ID: 07b4e36a260b04d9bb5ebb0136b1c7fb96c0732222112fbca25e6a486de905a8
                                                                                      • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                      • Instruction Fuzzy Hash: 7A116D71A1CA4AC2E701FB10F8411A9F361FB84B94FD44236DB9D06668DF3CE581CB68
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryInitializeMallocSystem
                                                                                      • String ID: riched20.dll
                                                                                      • API String ID: 174490985-3360196438
                                                                                      • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                      • Instruction ID: 26d3fbc65d3cf7d6c09d71bae4317d2a0495a6a82d4d83ca0ef5dfb77508e547
                                                                                      • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                      • Instruction Fuzzy Hash: 9FF03C75A5CA89C2EB40BF20E45426AF3A0FB98754F800235EA8E42A54DF7CD1498B14
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF74821853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF74821856C
                                                                                        • Part of subcall function 00007FF74820AAE0: LoadStringW.USER32 ref: 00007FF74820AB67
                                                                                        • Part of subcall function 00007FF74820AAE0: LoadStringW.USER32 ref: 00007FF74820AB80
                                                                                        • Part of subcall function 00007FF7481F1FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7481F1FFB
                                                                                        • Part of subcall function 00007FF7481F129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7481F1396
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7482201BB
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7482201C1
                                                                                      • SendDlgItemMessageW.USER32 ref: 00007FF7482201F2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                                                      • String ID:
                                                                                      • API String ID: 3106221260-0
                                                                                      • Opcode ID: 7d1f69911a00d0741de56b49c262a8841e6eb375053cbff927e1aaae2ee712c8
                                                                                      • Instruction ID: a7a003105b2e0b2a723746ea089e4b0c11cad02f5746f3d08b2b78fb4d9a75bf
                                                                                      • Opcode Fuzzy Hash: 7d1f69911a00d0741de56b49c262a8841e6eb375053cbff927e1aaae2ee712c8
                                                                                      • Instruction Fuzzy Hash: 1C51AF62F0D64ADAEB00BBA5D4412EDE362AB85B84F800236DB1D577DADE3CD540C368
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 2272807158-0
                                                                                      • Opcode ID: 4ce248ffffd21e537046429b603db88a9fd2a3d13b10b45fb751dcef003d6319
                                                                                      • Instruction ID: dadf62840a8fe2b05c4bb8e2ae754feb910ba9568fbdaa4993e011688d1cb01b
                                                                                      • Opcode Fuzzy Hash: 4ce248ffffd21e537046429b603db88a9fd2a3d13b10b45fb751dcef003d6319
                                                                                      • Instruction Fuzzy Hash: B241C162A0C78AC6EB11BB15E444269E3A1FB857B4F905336DBBD07AD5CF3CE4908618
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 2176759853-0
                                                                                      • Opcode ID: 324ad9725680782466c8b9226039195d64c3332d7d8035b24254b52cca95445d
                                                                                      • Instruction ID: ab6dfec04a6e1f37c9c4c2fa810f6913de01c1f9e42835d3cf14d95637c15fa8
                                                                                      • Opcode Fuzzy Hash: 324ad9725680782466c8b9226039195d64c3332d7d8035b24254b52cca95445d
                                                                                      • Instruction Fuzzy Hash: 1E21A262A1CB85C1EA10AB65B84017EE364FB89BD0F945336EB9D03B99DF3CD191CB04
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: std::bad_alloc::bad_alloc
                                                                                      • String ID:
                                                                                      • API String ID: 1875163511-0
                                                                                      • Opcode ID: ed06525d720d284fc54222632f53f2fcbb29030dbea5caf8b24800418b5d5b0f
                                                                                      • Instruction ID: 172f6e408bae57d0858e48c39974f3d10812f4f15b97460d1af3a9db832bda6d
                                                                                      • Opcode Fuzzy Hash: ed06525d720d284fc54222632f53f2fcbb29030dbea5caf8b24800418b5d5b0f
                                                                                      • Instruction Fuzzy Hash: 5F31A612A1D68ED6FB24F714E8443B9E3E0FB50B84FA44131E24C165A5DF7CD986C319
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1203560049-0
                                                                                      • Opcode ID: 523e4a483c86c9ac9ee543cf6c476d9bf2e9d6353514affc3e0f4067b8c7bc61
                                                                                      • Instruction ID: bc2b3d373a6af3f12ce268be83316084640e035307602da176d8b3e542290fc1
                                                                                      • Opcode Fuzzy Hash: 523e4a483c86c9ac9ee543cf6c476d9bf2e9d6353514affc3e0f4067b8c7bc61
                                                                                      • Instruction Fuzzy Hash: FC21FB22B1C789C2EA20BB29E45526AE360FF89B94F805230EBAD46694DF3CD544C618
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3118131910-0
                                                                                      • Opcode ID: 9e0f12d03b62ccef14e62e4bf3878a3457daa81ed2db8d115c48a0739d4b379d
                                                                                      • Instruction ID: f357593d427ea8b65d090249b5f36d12c585ef6476021309852e4e071ce54ac5
                                                                                      • Opcode Fuzzy Hash: 9e0f12d03b62ccef14e62e4bf3878a3457daa81ed2db8d115c48a0739d4b379d
                                                                                      • Instruction Fuzzy Hash: 3A21CB22A1C785C2EE10BB29F45412EF3A0FB89B94F901231EBAD46A99DF3CD541C714
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1203560049-0
                                                                                      • Opcode ID: d981565e32c06465bb9ca9e6032df0ff87469bcd01ee0110978b6e45bf249536
                                                                                      • Instruction ID: 606b4416c5d699e07de90278fb8b05c731f74b6e89cf437e31f577b2056db658
                                                                                      • Opcode Fuzzy Hash: d981565e32c06465bb9ca9e6032df0ff87469bcd01ee0110978b6e45bf249536
                                                                                      • Instruction Fuzzy Hash: 4E21A722A1C785C2EA10BB28E48412EE361FBC97A4F900335EBAD47BD5DF3CD540C658
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                      • String ID:
                                                                                      • API String ID: 1703294689-0
                                                                                      • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                      • Instruction ID: 012f9a25479b1016e05b770ec36db37bbe382208a3a3f3aeefcbcf7b05679db7
                                                                                      • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                      • Instruction Fuzzy Hash: D0E04F24B0C70DC7EB647B3198A5379E352AF8C741F504438D84E0B3D6CE3DA4098725
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7481FF895
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7481FF89B
                                                                                        • Part of subcall function 00007FF748203EC8: FindClose.KERNELBASE(?,?,00000000,00007FF748210811), ref: 00007FF748203EFD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                                      • String ID:
                                                                                      • API String ID: 3587649625-0
                                                                                      • Opcode ID: 23f630cba899342486ec3d5de318505faaaca4e13abb6a95497164dac5ca7356
                                                                                      • Instruction ID: 208562ff1108ee26ff76fb3de57d3b6e1eff4ae0f08901fee35b050c6e062dcf
                                                                                      • Opcode Fuzzy Hash: 23f630cba899342486ec3d5de318505faaaca4e13abb6a95497164dac5ca7356
                                                                                      • Instruction Fuzzy Hash: D3919072A1CA89D4EB10FB24E4441ADE361FB84B98FD0423AEB5C07AE9DFB8D545C714
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: 402f2d810e1efc6a759daaa5297bed4678b331cbcfb426b8061d29b6a9ebee63
                                                                                      • Instruction ID: 0bc00e67c0b0382ea646e99dbfb0245bd27e77315c9c1fe84f8e955369b3713e
                                                                                      • Opcode Fuzzy Hash: 402f2d810e1efc6a759daaa5297bed4678b331cbcfb426b8061d29b6a9ebee63
                                                                                      • Instruction Fuzzy Hash: B041B362F1C65AC4FB00FBB5E8402ADE320AF44B94F94123ADF1D27AD9DF389482C614
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF74820274D), ref: 00007FF7482028A9
                                                                                      • GetLastError.KERNEL32(?,00007FF74820274D), ref: 00007FF7482028B8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastPointer
                                                                                      • String ID:
                                                                                      • API String ID: 2976181284-0
                                                                                      • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                      • Instruction ID: f1c1dd26ea9d5b987efab214695c2ea1ee85f9a02f8c4c6bce55d16f02a3d58c
                                                                                      • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                      • Instruction Fuzzy Hash: A731F826B1D94AC2EE617B2AD580674E350EF05BD4F940132DF2D077A0DE3CD842A374
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1746051919-0
                                                                                      • Opcode ID: 8763c555b957396376e96df864685bb2527d49eefc22d4d720e740779d29c564
                                                                                      • Instruction ID: 5e2d5999d7dffb7234cdd305db0a049930fb7a20c6cec0e25ac049212b1f6a17
                                                                                      • Opcode Fuzzy Hash: 8763c555b957396376e96df864685bb2527d49eefc22d4d720e740779d29c564
                                                                                      • Instruction Fuzzy Hash: C631D462A1C749C2EA10BB55F44536EF360EB84790F844236EB9C07B99DF3CE584C718
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$BuffersFlushTime
                                                                                      • String ID:
                                                                                      • API String ID: 1392018926-0
                                                                                      • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                      • Instruction ID: 69c83a3c70b9cc046fc2ec3cc8cfcd78c874719a54120ed6fa2eec5ee94f7332
                                                                                      • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                      • Instruction Fuzzy Hash: 1621E0A2E0DB9AD1EA63BE11D4443BAD790EF02794F944032DF5C47391EE3CD48AC224
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: LoadString
                                                                                      • String ID:
                                                                                      • API String ID: 2948472770-0
                                                                                      • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                      • Instruction ID: 07c77c891a5a24d4974c40a4a2ca8a0cf2b3145fbd26ffa5b6b0f5dca9342d57
                                                                                      • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                      • Instruction Fuzzy Hash: 421179A1B4CA59C6EA40BF16A840068F7A1BB99FC0BD54635CA1E93B24DF7CE541835C
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastPointer
                                                                                      • String ID:
                                                                                      • API String ID: 2976181284-0
                                                                                      • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                      • Instruction ID: e5b22f2eec6f006e346f8d296c52f6fccbe5df22334fe874d76ba49cbe46209d
                                                                                      • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                      • Instruction Fuzzy Hash: C7117261A0C64AC2EB61BB25E880279E260FB45BB8F944332DB7D562D4CF3CD582C715
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemRectTextWindow$Clientswprintf
                                                                                      • String ID:
                                                                                      • API String ID: 3322643685-0
                                                                                      • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                      • Instruction ID: a7888fc28a73ed1933b355cca8669df699e0752b7401b1ce92b2005d4c6634e4
                                                                                      • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                      • Instruction Fuzzy Hash: 58017520E0D24EC1FF557B51B4642B9D3919F45744FC8013ACA4E062E9DE2CE4C5C728
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF74820EBAD,?,?,?,?,00007FF748205752,?,?,?,00007FF7482056DE), ref: 00007FF74820EB5C
                                                                                      • GetProcessAffinityMask.KERNEL32 ref: 00007FF74820EB6F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$AffinityCurrentMask
                                                                                      • String ID:
                                                                                      • API String ID: 1231390398-0
                                                                                      • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                      • Instruction ID: b85314c8bb0a1fca52091cfe97fc1546f9dcfdfd8f47ffe4110774ffa34fa8cd
                                                                                      • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                      • Instruction Fuzzy Hash: 35E06565F2854AC7DB59AB65C4515A9E3A2BF88B40BC48035D60B87614DE2CE5458B10
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                      • String ID:
                                                                                      • API String ID: 1173176844-0
                                                                                      • Opcode ID: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                                                                                      • Instruction ID: 289c312508882f5dbb15fca28285c8f94f3e44283a583c89d55ef119a306a54e
                                                                                      • Opcode Fuzzy Hash: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                                                                                      • Instruction Fuzzy Hash: 02E0E240E0E20FC5FA28B26618265B4C0408F29770ED81F30EE3E086D7AE3EA5968538
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 485612231-0
                                                                                      • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                      • Instruction ID: 33bfc8df231e049360523c61f105078dcf32b30ec7d35857a16cdcf80fce0c37
                                                                                      • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                      • Instruction Fuzzy Hash: EBE0E670E4D54FC7FF197BB2A8551B4D2D16F94B51B844034D90D86392DE3CA4958628
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: db0f75601c8d953953658c1d14be6529ec917dbd1ad2d5887d518296e9f1c024
                                                                                      • Instruction ID: 102e9225db2307b34fdc051ef4fccc5f5dc30a675f8398ddaa444f1413aa8091
                                                                                      • Opcode Fuzzy Hash: db0f75601c8d953953658c1d14be6529ec917dbd1ad2d5887d518296e9f1c024
                                                                                      • Instruction Fuzzy Hash: 6DD1AB62B0C689D6EB68BB29E5402B9F7A1FB45B84F44013ACB1D477A1CF3CE561CB14
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1017591355-0
                                                                                      • Opcode ID: fa91c3799828e3c7186940546e344b2356dc381c1e63a9425ea543ecc2eeea66
                                                                                      • Instruction ID: e727e707a32d08bdcd9d7037cd9e41bf8caf509c697ebfdfdd764365cf2efe7c
                                                                                      • Opcode Fuzzy Hash: fa91c3799828e3c7186940546e344b2356dc381c1e63a9425ea543ecc2eeea66
                                                                                      • Instruction Fuzzy Hash: 9F61D111A0C64FC1FA64BF2596142BAD291BF47BD4FD44131EF6D2AAC5EE7CE4418238
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF74820E948: ReleaseSemaphore.KERNEL32 ref: 00007FF74820E974
                                                                                        • Part of subcall function 00007FF74820E948: CloseHandle.KERNELBASE ref: 00007FF74820E993
                                                                                        • Part of subcall function 00007FF74820E948: DeleteCriticalSection.KERNEL32 ref: 00007FF74820E9AA
                                                                                        • Part of subcall function 00007FF74820E948: CloseHandle.KERNEL32 ref: 00007FF74820E9B7
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF748211ACB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 904680172-0
                                                                                      • Opcode ID: c9fb0bd089dfeb63d9e2bdc9fa924defd0287578730a09343b72146483e13d02
                                                                                      • Instruction ID: d6a78be563e15a259c4db84988d46bba45dd5f40f2f1b57641cbf72731746f7f
                                                                                      • Opcode Fuzzy Hash: c9fb0bd089dfeb63d9e2bdc9fa924defd0287578730a09343b72146483e13d02
                                                                                      • Instruction Fuzzy Hash: AD619162B19A89E2EE08FB65D5540BCF365FF40B90BA45632D72D17AC6CF39E460C318
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: 69a943e656ee331f1661201cfe822fb8f69a168c4299475660200162fa714270
                                                                                      • Instruction ID: 2595b945b240bcf70ba24e7eed677932fe2176c8807583c94150bcf4d0b4c0f4
                                                                                      • Opcode Fuzzy Hash: 69a943e656ee331f1661201cfe822fb8f69a168c4299475660200162fa714270
                                                                                      • Instruction Fuzzy Hash: B151A452E0C649C1EA14BB15B4847ADE751EB86BC4F84013BEF5D0B796CE3DE485CB28
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF748203EC8: FindClose.KERNELBASE(?,?,00000000,00007FF748210811), ref: 00007FF748203EFD
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7481FE993
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1011579015-0
                                                                                      • Opcode ID: e982e273b1865209a75a3cfd535ad9023e3388265a11ab7418cbf5dec2d39955
                                                                                      • Instruction ID: 66a0956f63aafee1779f97b6a49d64464cd968af50ad7f5125063c89825e35e4
                                                                                      • Opcode Fuzzy Hash: e982e273b1865209a75a3cfd535ad9023e3388265a11ab7418cbf5dec2d39955
                                                                                      • Instruction Fuzzy Hash: 9D514162E1C689C1FA60BF65E48536DE351FB85B84FC4023ADB5D0B6A5DF2CD441CB28
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: 3e334cffbf4bbd7f84fd27d2e2c6653dbaa217111808a482ba64d9afad9c670d
                                                                                      • Instruction ID: 5c195855890f03c89faa409ed030ed69f85cbe17c6e55f80857497aba8287820
                                                                                      • Opcode Fuzzy Hash: 3e334cffbf4bbd7f84fd27d2e2c6653dbaa217111808a482ba64d9afad9c670d
                                                                                      • Instruction Fuzzy Hash: 8B41F762B1CA89C2EA14BA57AA4037AE251FB85FC0F848536EF5C17F5ADF3CD5918304
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: 71211bdb8fcfb718bc8c1f80de60d6f389c440e1fadeaa63cd7f355b18b082f6
                                                                                      • Instruction ID: 8367ae969c884b928c981f988aa51b1ff784ac45bda5de4fff2220e304d35791
                                                                                      • Opcode Fuzzy Hash: 71211bdb8fcfb718bc8c1f80de60d6f389c440e1fadeaa63cd7f355b18b082f6
                                                                                      • Instruction Fuzzy Hash: 8841E862A0DB09C0EF10BB29E54937AE3A1EB46BD4F941135EB6D077D9DF3DD4408628
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleModule$AddressFreeLibraryProc
                                                                                      • String ID:
                                                                                      • API String ID: 3947729631-0
                                                                                      • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                      • Instruction ID: 52eb84b5aa7205ba04296861f212eae3c5ed93a99db6d7bfd1b940872eca92fc
                                                                                      • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                      • Instruction Fuzzy Hash: E141C122A1D65AC3FB24BB21D850139E2A1BF54B40FC54436EA5D076E5CF7CE841CB68
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                                      • String ID:
                                                                                      • API String ID: 680105476-0
                                                                                      • Opcode ID: 3234b2b5ac3a40deddea539940c0fe254cec77c5e42e079e7c739459eb3fc390
                                                                                      • Instruction ID: 3441427544e6467f37a5ec98157df46706c0a6b46f52b1732c0a03ac6446c7d0
                                                                                      • Opcode Fuzzy Hash: 3234b2b5ac3a40deddea539940c0fe254cec77c5e42e079e7c739459eb3fc390
                                                                                      • Instruction Fuzzy Hash: 7D21AE22A0C259C5EA15BB92B400279E250EB04BF0FA80B36DF3E07BD5DE7CE091C718
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo
                                                                                      • String ID:
                                                                                      • API String ID: 3215553584-0
                                                                                      • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                      • Instruction ID: 0c5e067fcdfc4382a5925ad1d8d87f10c7ccc8c4614f3ca68266f6ed86b6b4d4
                                                                                      • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                      • Instruction Fuzzy Hash: 8C115E3291C69AC7F720BB60E450679F2A5FB44380FD50536FA8DA7695EF3CE4108728
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF74821F0A4: GetDlgItem.USER32 ref: 00007FF74821F0E3
                                                                                        • Part of subcall function 00007FF74821F0A4: ShowWindow.USER32 ref: 00007FF74821F109
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F11E
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F136
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F157
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F173
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F1B6
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F1D4
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F1E8
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F212
                                                                                        • Part of subcall function 00007FF74821F0A4: SendMessageW.USER32 ref: 00007FF74821F22A
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF74821FD03
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$ItemShowWindow_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1587882848-0
                                                                                      • Opcode ID: 0ecee51bcaebc13f66a433cccdbba23f80d9542112960a9b3272f635afdf41c4
                                                                                      • Instruction ID: 9fefcfdc220a598a6122843d4a3970830ae52024e8a2e03862d440e1abdaa3d1
                                                                                      • Opcode Fuzzy Hash: 0ecee51bcaebc13f66a433cccdbba23f80d9542112960a9b3272f635afdf41c4
                                                                                      • Instruction Fuzzy Hash: FA01C862A1C68D81EA10B764D44537EE311FFC9794FA01731EFAC06ADAEE3CE1408618
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: dd833eb704b03c62a36fea145c0b0b4abee32047d89ef2e694e61e0216d7ee09
                                                                                      • Instruction ID: be160fe300d32c0b9cd96b7fc160bcf2c6d9dda67ef13a2c7f659758595999c6
                                                                                      • Opcode Fuzzy Hash: dd833eb704b03c62a36fea145c0b0b4abee32047d89ef2e694e61e0216d7ee09
                                                                                      • Instruction Fuzzy Hash: FE01A162A1CA89C1EA11B728E455229F361FFC9790FC05236E79C07AE9DF2CD040CA18
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF748221604: GetModuleHandleW.KERNEL32(?,?,?,00007FF748221573,?,?,?,00007FF74822192A), ref: 00007FF74822162B
                                                                                      • DloadProtectSection.DELAYIMP ref: 00007FF7482215C9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: DloadHandleModuleProtectSection
                                                                                      • String ID:
                                                                                      • API String ID: 2883838935-0
                                                                                      • Opcode ID: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                                                                                      • Instruction ID: 13ada7b9c2cf68bd4c0d3832bb50f130dadfc5c411281785fa38278ce66802dc
                                                                                      • Opcode Fuzzy Hash: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                                                                                      • Instruction Fuzzy Hash: 1111F760E4C60FC3FB60BB98A851771E390AF14348F960974C90D662A1EF7CB495966C
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF7482040BC: FindFirstFileW.KERNELBASE ref: 00007FF74820410B
                                                                                        • Part of subcall function 00007FF7482040BC: FindFirstFileW.KERNELBASE ref: 00007FF74820415E
                                                                                        • Part of subcall function 00007FF7482040BC: GetLastError.KERNEL32 ref: 00007FF7482041AF
                                                                                      • FindClose.KERNELBASE(?,?,00000000,00007FF748210811), ref: 00007FF748203EFD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$FileFirst$CloseErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1464966427-0
                                                                                      • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                      • Instruction ID: 6570bb74d9413a6955770fa7b9ef81ce13b4d5af379214086ba855b94cb0d243
                                                                                      • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                      • Instruction Fuzzy Hash: 8BF0A46250C245C6EA14BB79A14817AF7A0AB17BB4F545339EB3D073C7CE29D44487A8
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: File
                                                                                      • String ID:
                                                                                      • API String ID: 749574446-0
                                                                                      • Opcode ID: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                      • Instruction ID: f8e413e9befa58a1bf1609bc0b5ba56866a10744eeb436526e7078222662eea6
                                                                                      • Opcode Fuzzy Hash: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                      • Instruction Fuzzy Hash: B0E0C212B28519C3EF20BB3AC852638E321EF8DF84B881031CF0C0B332CE2CC4818A18
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileType
                                                                                      • String ID:
                                                                                      • API String ID: 3081899298-0
                                                                                      • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                      • Instruction ID: c1b4a222518fc187c1ae5acfc5bad2cb8c7f4f99de8cfa777f6d0b15b80eb8fe
                                                                                      • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                      • Instruction Fuzzy Hash: C7D0C91690D445C3D911B63598A103CA250EF92735FE40721D63E856E1CA1D9496A229
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentDirectory
                                                                                      • String ID:
                                                                                      • API String ID: 1611563598-0
                                                                                      • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                      • Instruction ID: bacf3eebfd41bf9e4a46da5bfb06792fdf91dfb8c7a3155d66688d34be6e32c6
                                                                                      • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                      • Instruction Fuzzy Hash: F9C08C20F0960AC2DA087B26C8C901893A5FB40B04BA04034C20C81260CE2DC8FAA359
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocHeap
                                                                                      • String ID:
                                                                                      • API String ID: 4292702814-0
                                                                                      • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                      • Instruction ID: 80dbc6a65e7f24a00503012e772af10dfdf2feb68647b163fc343ca496351eb3
                                                                                      • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                      • Instruction Fuzzy Hash: 34F01D55B4D20FC9FE657B6599113B5D2916F54B80FC85471CD0E8A3C1ED3CE6814638
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocHeap
                                                                                      • String ID:
                                                                                      • API String ID: 4292702814-0
                                                                                      • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                      • Instruction ID: 6d0272587bfad95175339bf99609037cbd58a458279fd50bdae0352045534d15
                                                                                      • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                      • Instruction Fuzzy Hash: 06F01C61B0D24FC5FF6477B158512B5D6906F847A0FC85A30ED6E862C1DF3CE4818238
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2962429428-0
                                                                                      • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                      • Instruction ID: 00a9c4f05c5e33d80ba5bfa5c0192db5bf275e3e0869cfee5738d7786c681b42
                                                                                      • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                      • Instruction Fuzzy Hash: 86F0F422A0C28AC5FB21BB30E080378E660EB01B79F880336DB3C011D5CF68D895C728
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                                                      • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                      • API String ID: 2659423929-3508440684
                                                                                      • Opcode ID: 2109ac67ef454bbe604bd7410721986f8a24db34ebf8dc3af2521a2cef9c7c6b
                                                                                      • Instruction ID: 269778c5e07b7f04a8f2398f7eda1fe05aeeab3ce71295f6cbdb4cf80339e266
                                                                                      • Opcode Fuzzy Hash: 2109ac67ef454bbe604bd7410721986f8a24db34ebf8dc3af2521a2cef9c7c6b
                                                                                      • Instruction Fuzzy Hash: 0562C062F0C69AC5FB00FB74E4442ADE361AB857A4F900236DB6D57AD9DF38E184C718
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                                                      • String ID: %ls$%s: %s
                                                                                      • API String ID: 2539828978-2259941744
                                                                                      • Opcode ID: 945c123c5738f6103966ecffbffa27c83b3bf35cf43ea0aac1725ee40d95c140
                                                                                      • Instruction ID: c11f13574cc7ccdb2023879f5989141e436c130bd20e03b0eb29b4ae0e6e4405
                                                                                      • Opcode Fuzzy Hash: 945c123c5738f6103966ecffbffa27c83b3bf35cf43ea0aac1725ee40d95c140
                                                                                      • Instruction Fuzzy Hash: 0CB2A962A5C68AC1EA10B765E8941BAE361FFC67D0F904236E79D036E6EE7CD140C718
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfomemcpy_s
                                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                      • API String ID: 1759834784-2761157908
                                                                                      • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                      • Instruction ID: 552d138f4e5df1256bc92ca3258c27596202eb01c67fa8d325dd5fbeb1b7da62
                                                                                      • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                      • Instruction Fuzzy Hash: 2BB2F672A0C286CBE725BE79D4547FAF7A1FB44788F905135DA0A57B88CF38E6048B14
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                                                      • String ID: rtmp
                                                                                      • API String ID: 3587137053-870060881
                                                                                      • Opcode ID: 6f9f009cc68f79adfaa2d6c81f4dd6478a908af634b8d3a3b94ef6884c4367c6
                                                                                      • Instruction ID: 2d828bd5092747a38605c0f036300327f9321a5a2642739802ae8f81b1017f92
                                                                                      • Opcode Fuzzy Hash: 6f9f009cc68f79adfaa2d6c81f4dd6478a908af634b8d3a3b94ef6884c4367c6
                                                                                      • Instruction Fuzzy Hash: D5F1DF22B0CA4AC5EB10FF65D4801BEE7A1EB86384F900136EB5D57AA9DF3CD584C758
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1693479884-0
                                                                                      • Opcode ID: 35b10314ce3b8e4c64707b679fc70269f3b9094245ec8e91ba41ccecbc270bb7
                                                                                      • Instruction ID: 94adb960b7dda6746f677b7cec2d3c5fbe36f33c231669bb7b0930374b7ca16f
                                                                                      • Opcode Fuzzy Hash: 35b10314ce3b8e4c64707b679fc70269f3b9094245ec8e91ba41ccecbc270bb7
                                                                                      • Instruction Fuzzy Hash: D0A1B362F18B5AC5FF00BB7999441BCE321AB46BA4B945235DF6D27BC9DE3CE041C218
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 3140674995-0
                                                                                      • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                      • Instruction ID: 2c25907b0154d86eb71f3b3085c950c3c1d488ee746961ba8a52c7158a8a2a97
                                                                                      • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                      • Instruction Fuzzy Hash: 62315072608B85CAEB60AF64E8543EEB360FB88744F84443ADA4D47B98DF3CD548C724
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 1239891234-0
                                                                                      • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                      • Instruction ID: e4158591c849474e21458c2500a80c4141f420720aebc7d62d12b73c1169efb2
                                                                                      • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                      • Instruction Fuzzy Hash: 7031613260CB85CAEB60EF25E8502AEB3A0FB88754F940136EA8D47B59DF3CD555CB14
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: c264b490cac148f64dd39c131735208f64494c1dc21ecf378d5d3bcbd534f5da
                                                                                      • Instruction ID: 3e3863daa288f95b5837ce3eec3edd81557e5d620e15520db943385189ff9c35
                                                                                      • Opcode Fuzzy Hash: c264b490cac148f64dd39c131735208f64494c1dc21ecf378d5d3bcbd534f5da
                                                                                      • Instruction Fuzzy Hash: 77B1C062A1CA8AC6EB11BB65E8442EDE361FB85794F801236EB4C07B99DF3CD544C718
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF74822FAC4
                                                                                        • Part of subcall function 00007FF748227934: GetCurrentProcess.KERNEL32(00007FF748230CCD), ref: 00007FF748227961
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                                      • String ID: *?$.
                                                                                      • API String ID: 2518042432-3972193922
                                                                                      • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                      • Instruction ID: 3db680a2702f0851575c78c099687c6f12f8ad108988c61e14eec9abceb8de2f
                                                                                      • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                      • Instruction Fuzzy Hash: FB51B262B19B99C5EB20FFA698104F9E7A4FB48BD8B844531EE5D17B85DF3CD0428324
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy_s
                                                                                      • String ID:
                                                                                      • API String ID: 1502251526-0
                                                                                      • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                      • Instruction ID: c255ebf3701bd77ad25b488d8a08f6931ba30b53780783dd09970f698723b497
                                                                                      • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                      • Instruction Fuzzy Hash: 87D1D032B1C28AC7DB24EF25E1946AAF7A1FB98785F448135CB4E53B44DA3CE941CB04
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFormatFreeLastLocalMessage
                                                                                      • String ID:
                                                                                      • API String ID: 1365068426-0
                                                                                      • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                      • Instruction ID: e1779619200da0c858425f008dd6ee334b842aa51e96aaab05617e24af803f1c
                                                                                      • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                      • Instruction Fuzzy Hash: 1B01DA7560C746C2E610AF22B89057AE295FB89BC0F884139EB8D86B85CE3CD505DB18
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: .
                                                                                      • API String ID: 0-248832578
                                                                                      • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                      • Instruction ID: d9d9271987695fd644685883a7d867a512b84f067d3c246b8c25558ef09f00e7
                                                                                      • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                      • Instruction Fuzzy Hash: A131EA22B0C69985F731BA3698057BAEA91BB95BE4F948335EE5C47BC5CE3CD5018304
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionRaise_clrfp
                                                                                      • String ID:
                                                                                      • API String ID: 15204871-0
                                                                                      • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                      • Instruction ID: 9f5244ee0d36183258460d32e909f348c7a6de262b580505927a81ca1e0f2760
                                                                                      • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                      • Instruction Fuzzy Hash: F8B18A73608B8ACBEB15EF39C95636CBBA0F744B48F548821DA5D837A8CB39D451C714
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ObjectRelease$CapsDevice
                                                                                      • String ID:
                                                                                      • API String ID: 1061551593-0
                                                                                      • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                      • Instruction ID: aacc6df99472e64b50e485c1f57bb17610dd1cb31d21940d242beb7fd62b094e
                                                                                      • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                      • Instruction Fuzzy Hash: 4A814936B08A09C7EB20AF6AD8906ADB371FB88B88F914122DE0D57B24CF3CD545D354
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FormatInfoLocaleNumber
                                                                                      • String ID:
                                                                                      • API String ID: 2169056816-0
                                                                                      • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                      • Instruction ID: 25fd1dc26d384cc7454047fbf5d87b836f4908054419a9253eb61f2e3964850f
                                                                                      • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                      • Instruction Fuzzy Hash: 09113832A0DB89D6E661AB61E8103AAF360FF88B44FC44135DA4D02668DF3C9145C768
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF7482024C0: CreateFileW.KERNELBASE ref: 00007FF74820259B
                                                                                        • Part of subcall function 00007FF7482024C0: GetLastError.KERNEL32 ref: 00007FF7482025AE
                                                                                        • Part of subcall function 00007FF7482024C0: CreateFileW.KERNEL32 ref: 00007FF74820260E
                                                                                        • Part of subcall function 00007FF7482024C0: GetLastError.KERNEL32 ref: 00007FF748202617
                                                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7482015D0
                                                                                        • Part of subcall function 00007FF748203980: MoveFileW.KERNEL32 ref: 00007FF7482039BD
                                                                                        • Part of subcall function 00007FF748203980: MoveFileW.KERNEL32 ref: 00007FF748203A34
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 34527147-0
                                                                                      • Opcode ID: a3f7aeee67f5c6efee88f6f2c4f2f574ca9db3d7719bf1359f9a84a60e1a1e68
                                                                                      • Instruction ID: 0437519cfa9473b5bedb4b5b31a118ed0fe1040b832cc0610ed54a3e94e02971
                                                                                      • Opcode Fuzzy Hash: a3f7aeee67f5c6efee88f6f2c4f2f574ca9db3d7719bf1359f9a84a60e1a1e68
                                                                                      • Instruction Fuzzy Hash: 0791BD22B1CA4AC2EB10FF62D4442AEE361FB56BC4F800036EF5D67A95DE38D545C724
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Version
                                                                                      • String ID:
                                                                                      • API String ID: 1889659487-0
                                                                                      • Opcode ID: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                      • Instruction ID: 0a468921fa3166a827ea4e8fc3928052818ca43835887d5faba985ad8f2adc9f
                                                                                      • Opcode Fuzzy Hash: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                      • Instruction Fuzzy Hash: 0701AC7194D98BC5F631B720A8183B5E3909FA6709FC54234D6AC063D6DE3CB0448A3C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo
                                                                                      • String ID: 0
                                                                                      • API String ID: 3215553584-4108050209
                                                                                      • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                      • Instruction ID: 822c60dbe36b4c9284613800aea579ae26b2bda99f3ae458b5a550813460f192
                                                                                      • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                      • Instruction Fuzzy Hash: 45812921A1C14AC7FBA8BE35904067DE390EF50744FD41631ED098BA95CF3DE84AE769
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo
                                                                                      • String ID: 0
                                                                                      • API String ID: 3215553584-4108050209
                                                                                      • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                      • Instruction ID: 6933ab05e7dcd3427a93353eadee085ebe45a36efdfd3958ad033c204d951321
                                                                                      • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                      • Instruction Fuzzy Hash: 4E716761A0C28FC7FB68BA28804027DE390AF41704F985935DD0DC76CACE3DE846A729
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: gj
                                                                                      • API String ID: 0-4203073231
                                                                                      • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                      • Instruction ID: 91b3bbb87dc6ea655d6abcebfb7a9b0cb09e8ac093ff18a9f6e8c0e8ae942f3a
                                                                                      • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                      • Instruction Fuzzy Hash: 96518F77728694CBD724CF25E400A9AB3A5F388758F445126EF4A93F09CB39E945CF40
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: @
                                                                                      • API String ID: 0-2766056989
                                                                                      • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                      • Instruction ID: 6adbbceac17b7250c24155a6f9522f87fc3c4bde2699ca5eb5e01fe9382120b6
                                                                                      • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                      • Instruction Fuzzy Hash: D441BD62718A48C6EB04EF2AE8142A9F3A1B758FD0B8D9036DF0D87794EE3CD446C314
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: HeapProcess
                                                                                      • String ID:
                                                                                      • API String ID: 54951025-0
                                                                                      • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                      • Instruction ID: c423b43c6a6287de5d3503acda7621a4e2de24397885a578e1b78668a513a19a
                                                                                      • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                      • Instruction Fuzzy Hash: 10B09220E1BA0AC3EA093B21AC922A4A2A4BF88B00FD58039C14C41320DE2C20A65B24
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                      • Instruction ID: 0c7f2dc25cbc43de560af3815c887a2bc924182918384a7f724a4df30bab4377
                                                                                      • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                      • Instruction Fuzzy Hash: 0C821863A0DAC5C6D715EF28D8482BDFBA2E755B88F698136CA8E07385DE3CD445C324
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                      • Instruction ID: c5914e8ede38b043da66a416963674a668478b79c9572484ae31e446b4ac8cfd
                                                                                      • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                      • Instruction Fuzzy Hash: 7D627E9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                      • Instruction ID: 301bd757c3b80a71b71fca3374575b5d97bba8ec7ed13592e92e77658680896e
                                                                                      • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                      • Instruction Fuzzy Hash: 798212B3A0C6C68AD724EE24C9446FCF7A1F751B48F688176CA4D07789CA3CD885C724
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                      • Instruction ID: f74be81dbb71527a5c32968819b2de6641e5b9b2adda93040bb6e1cf6a3bbffb
                                                                                      • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                      • Instruction Fuzzy Hash: 052205B3B246508BD728CF25C89AE5E7766F799344B4B8228DF0ACB785DB38D505CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                      • Instruction ID: feb46c8ca83449c631187e90d4c308d837f847d3d4a68e7d29abb2d113d5db10
                                                                                      • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                      • Instruction Fuzzy Hash: 6A320273A08596CBE71CEF24D950ABCB7A1F754B08F518139DA4A87B88DB3CE860C754
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                      • Instruction ID: e9c1855199e5c12aa4e8db504645ca14d65aab17cdff2036bd9831781a77c47a
                                                                                      • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                      • Instruction Fuzzy Hash: 1BC1BCB7B281908FE350CF7AE400AAD7BB1F39878CB509125DF59A7B09D639E645CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                      • Instruction ID: 4aab7001547181c34648c4add5ed80cb36381dba5dd83623e94604ca9b5d9375
                                                                                      • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                      • Instruction Fuzzy Hash: 37A12873A0C189C6EB15FA28D8087FEE691EB91744FE54535EA8D07786CE3CE841C368
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                      • Instruction ID: eda48616916208a2768be2936de49775b4d0ae8bffbaa99ef14c01a2cc026f84
                                                                                      • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                      • Instruction Fuzzy Hash: 8EC10877A291E48DE302CBB594248FD3FF1E71E34DB864151EFA656B4AC6285201DF70
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID:
                                                                                      • API String ID: 190572456-0
                                                                                      • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                      • Instruction ID: f758bc54edf459a018ac3858674186d068b06b9f345bdfbd5a2cf37d06a24e86
                                                                                      • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                      • Instruction Fuzzy Hash: 54911F62A1C589D6EB11FF29E4502F9E721FB95788F840032EF4E07A59EE38D646C714
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                      • Instruction ID: 1189ff13e3b1e3b914a26ffd9278ca739c1e3a581ac86ef687b62d724eafbc97
                                                                                      • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                      • Instruction Fuzzy Hash: 22610223F1C1D9D9EB21AF7585044FDFFA1A70A784B858032CFAA53646CA38E506CB24
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                      • Instruction ID: 4f5af2ec0d3f5ba1576c903ca24a67c7be11247c041fab3a140553f0243259e4
                                                                                      • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                      • Instruction Fuzzy Hash: 5B510073B1C1958BE768EF2898087ADF752FB90B48FA44135EB4947688CE3DE941CB14
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                      • Instruction ID: f34590bb10d3262a278104605c8513a89089bae0232bcfa3406c3fbac14a30c3
                                                                                      • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                      • Instruction Fuzzy Hash: DC31E3B2A0C585CBD708FE1AD96027EFB91F745344F549139DB5A83B82DA3CE541C710
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                      • Instruction ID: 4a9da68d166103f52b15c875fce8f69d7c42bf47bd0049b4c5e37b371853e56a
                                                                                      • Opcode Fuzzy Hash: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                      • Instruction Fuzzy Hash: 12F0FE61F1E00BC2FB6830285819339E0569B13390FD44A35EB3FC62C5D9ADE881112F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                      • Instruction ID: c7f26e16c737a2f572a1b4b5bbe394bbac50cfd5ae372cb8c9b19e77e6b7e96d
                                                                                      • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                      • Instruction Fuzzy Hash: 61A0026190CC4AD2E645BB24E8740F1E330FB54300BD00035F00D451B4DF3CA511D369
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                                                      • API String ID: 3668304517-727060406
                                                                                      • Opcode ID: 036f0b4177b3bd4acf8be137eac01bdc749329f6e627dd372102b0288b9b6631
                                                                                      • Instruction ID: 0ded6eec410ec954aeaa05cfd2710f84735c672eed9e3e5e17f03315f4a961cf
                                                                                      • Opcode Fuzzy Hash: 036f0b4177b3bd4acf8be137eac01bdc749329f6e627dd372102b0288b9b6631
                                                                                      • Instruction Fuzzy Hash: 7841E876B09F09DAEB00AB60E4503E9B3B5FB48798F800536DA4C07B68EF38D155C358
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                      • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                      • API String ID: 2565136772-3242537097
                                                                                      • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                      • Instruction ID: 09e6991d9a179eed705c14a1ec21f6914e387a911ee6c5b64e0789e56e934e03
                                                                                      • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                      • Instruction Fuzzy Hash: 2F213C60E1DA0FC3FE65BB21E865175E3A0EF48B80FC40934C94E46AA0DF7DE4859328
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                                      • String ID: DXGIDebug.dll$UNC$\\?\
                                                                                      • API String ID: 4097890229-4048004291
                                                                                      • Opcode ID: caeda946b173b290eeb0eea351584ffd7bcd35d17f0c3fb79cdbd079912c01be
                                                                                      • Instruction ID: 296932cba1c05410d6885ef130c5eb7c699cd186a7d923d41333d7b075b17495
                                                                                      • Opcode Fuzzy Hash: caeda946b173b290eeb0eea351584ffd7bcd35d17f0c3fb79cdbd079912c01be
                                                                                      • Instruction Fuzzy Hash: 7412AF22A0CB4AC5EB10BB64E4441ADE371EB42B84F904236DB6D17BE9DF3DD549C358
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                                                                      • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                      • API String ID: 431506467-1315819833
                                                                                      • Opcode ID: 100daac0e34165666268f43f408bc6971489d972bf40231fa28c726ba550acfe
                                                                                      • Instruction ID: c26f7f91b76f274924f2f912986b705e783674341b3ce4c0b179ebe8994a6178
                                                                                      • Opcode Fuzzy Hash: 100daac0e34165666268f43f408bc6971489d972bf40231fa28c726ba550acfe
                                                                                      • Instruction Fuzzy Hash: EBB1B162F1D78AD5FB00BBA4D8442BCE372AB45394F904235DA1D26AD9DF3CE586C318
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                                                      • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                      • API String ID: 2868844859-1533471033
                                                                                      • Opcode ID: 31d7dc5894d1c9fa85229d9e77b41a308ef747ae09a8312bf4b27f03762016a6
                                                                                      • Instruction ID: 8b535b12847d8dcd053bed1e5167f7b64a2b8eca00b8ab44b6203958a73454bd
                                                                                      • Opcode Fuzzy Hash: 31d7dc5894d1c9fa85229d9e77b41a308ef747ae09a8312bf4b27f03762016a6
                                                                                      • Instruction Fuzzy Hash: 54818D62B1CA4AC9FB01FBB5D8501EDE371AB45784F900536DE1D16A99DF38D50AC328
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo
                                                                                      • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                      • API String ID: 3215553584-2617248754
                                                                                      • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                      • Instruction ID: 9f1a5487acbebf24225294caec434d951236482fb63e2d4fbe5add4b2646d361
                                                                                      • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                      • Instruction Fuzzy Hash: 6B41CD32A09B49C9E700EF34E8517E9B3A4EB18398F814136EE4C03B95DE3CD025C358
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                                                                      • String ID: STATIC
                                                                                      • API String ID: 2845197485-1882779555
                                                                                      • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                      • Instruction ID: 15aac44f8593eea3ae0f8bbe198aff686fa1f68dc13d8c605c75130bb9529246
                                                                                      • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                      • Instruction Fuzzy Hash: E031B425B0C74AC6FA60FB11A9947B9E391BF88BD0F950430DE5D07B56DE3CD4068764
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemTextWindow
                                                                                      • String ID: LICENSEDLG
                                                                                      • API String ID: 2478532303-2177901306
                                                                                      • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                      • Instruction ID: 874b3a249682c55ab488731d02328af33c3bb779f0025fcc3e1a1f8a015bcda9
                                                                                      • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                      • Instruction Fuzzy Hash: E5418F25E4CA5AC2FB54BB61AC14779E3A1AF84F80FD54235DD0E03B94CF3DA5858328
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                                      • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                                      • API String ID: 2915667086-2207617598
                                                                                      • Opcode ID: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                      • Instruction ID: 7c8fbc1d297e26ff8d3cafccd25ec7a4574802fa0ca6e412bb7bd926fc3447a7
                                                                                      • Opcode Fuzzy Hash: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                      • Instruction Fuzzy Hash: 80316D64E4DB0EC2FA25BB15E960175E3A0AF56B90FC50235CA6E077A4DF3CE541832C
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID: $
                                                                                      • API String ID: 3668304517-227171996
                                                                                      • Opcode ID: 21e62478960f4ce8d0e7242d7b9149d0a339b7dfd3a44c89ed8729fa7c19746b
                                                                                      • Instruction ID: b5be3aca65cc2e7d94716c0eba286409e65a3091cc52981378a10c6b0679e3e0
                                                                                      • Opcode Fuzzy Hash: 21e62478960f4ce8d0e7242d7b9149d0a339b7dfd3a44c89ed8729fa7c19746b
                                                                                      • Instruction Fuzzy Hash: 85F1C162F1874AC2EE04BB64D8841BDE361AB44B98FA05631CB2D17BD9DF7CD180D368
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                      • String ID: csm$csm$csm
                                                                                      • API String ID: 2940173790-393685449
                                                                                      • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                      • Instruction ID: f867f47c540852b2b30718fc39221372755dc4bc9e9efe003fa5f2253214a18e
                                                                                      • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                      • Instruction Fuzzy Hash: 98E1AE7290C68ACAE760BB24D4803BDF7A0FB44758F948236DE8D57696DF38E485CB14
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocClearStringVariant
                                                                                      • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                      • API String ID: 1959693985-3505469590
                                                                                      • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                      • Instruction ID: 66788eca8488e0fee06bc62340797719fcc9cfaae052fa0d14fb2f455080d9a2
                                                                                      • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                      • Instruction Fuzzy Hash: DB714C36A18A0AC6EB20EF25D9905ADF7B0FB89B98B815132DE5D47B64CF3CD544C314
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7482274F3,?,?,?,00007FF74822525E,?,?,?,00007FF748225219), ref: 00007FF748227371
                                                                                      • GetLastError.KERNEL32(?,?,00000000,00007FF7482274F3,?,?,?,00007FF74822525E,?,?,?,00007FF748225219), ref: 00007FF74822737F
                                                                                      • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7482274F3,?,?,?,00007FF74822525E,?,?,?,00007FF748225219), ref: 00007FF7482273A9
                                                                                      • FreeLibrary.KERNEL32(?,?,00000000,00007FF7482274F3,?,?,?,00007FF74822525E,?,?,?,00007FF748225219), ref: 00007FF7482273EF
                                                                                      • GetProcAddress.KERNEL32(?,?,00000000,00007FF7482274F3,?,?,?,00007FF74822525E,?,?,?,00007FF748225219), ref: 00007FF7482273FB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 2559590344-2084034818
                                                                                      • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                      • Instruction ID: 2bff59572252b56a7e5ef0c653fc2c53bef4121d75cbf497ccdb6ec59763363f
                                                                                      • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                      • Instruction Fuzzy Hash: FE31C221B1E64AD6EE21FB16A800575E2A4FF48BA0F998535DE1D4B794DF3CE050C738
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(?,?,?,00007FF748221573,?,?,?,00007FF74822192A), ref: 00007FF74822162B
                                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF748221573,?,?,?,00007FF74822192A), ref: 00007FF748221648
                                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF748221573,?,?,?,00007FF74822192A), ref: 00007FF748221664
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                      • API String ID: 667068680-1718035505
                                                                                      • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                      • Instruction ID: 5738d9cab7e3b7638aee707024c3f35ec155009f02ba11e67d5de2000716865c
                                                                                      • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                      • Instruction Fuzzy Hash: 8A115E20A1DB0AC3FE66BF90E950679D3916F08790FCE4535C85D1A354EE7CF4449638
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF7482051A4: GetVersionExW.KERNEL32 ref: 00007FF7482051D5
                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7481F5AB4), ref: 00007FF74820ED8C
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7481F5AB4), ref: 00007FF74820ED98
                                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7481F5AB4), ref: 00007FF74820EDA8
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7481F5AB4), ref: 00007FF74820EDB6
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7481F5AB4), ref: 00007FF74820EDC4
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7481F5AB4), ref: 00007FF74820EE05
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$File$System$Local$SpecificVersion
                                                                                      • String ID:
                                                                                      • API String ID: 2092733347-0
                                                                                      • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                      • Instruction ID: 00ef93b443cfd2dffaa869b78205622eee04924701112fe05e15fffaa8934c27
                                                                                      • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                      • Instruction Fuzzy Hash: 875178B2B14659CBEB44EFB8D4400ACB7B1F748B98BA0403ADE1D67B58DB38E542C710
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$File$System$Local$SpecificVersion
                                                                                      • String ID:
                                                                                      • API String ID: 2092733347-0
                                                                                      • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                      • Instruction ID: 6270b4c5be0b9aee813d530f2024eaa8892563eff55ef8e41b65291b925d68f3
                                                                                      • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                      • Instruction Fuzzy Hash: 34314A62B14A55CEFB00EFB5D8901ACB370FB08759B94502AEF0DA7A58EF38D895C314
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID: .rar$exe$rar$sfx
                                                                                      • API String ID: 3668304517-630704357
                                                                                      • Opcode ID: 2fc35cbdd70ebaba8229e08f8487c40f3259a53efddd90ef8447a9b59f22dcea
                                                                                      • Instruction ID: b9a42fc25df0c8f2470de3cfde10f2b8602c48fcea01dba6303f8b6b69595422
                                                                                      • Opcode Fuzzy Hash: 2fc35cbdd70ebaba8229e08f8487c40f3259a53efddd90ef8447a9b59f22dcea
                                                                                      • Instruction Fuzzy Hash: 29A1C162A1CA0AC5EB00BB25D8542BCE361BF52B98FD01235DE2D076D9DF3DE585C368
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: abort$CallEncodePointerTranslator
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 2889003569-2084237596
                                                                                      • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                      • Instruction ID: 15623f47b2700e9cc5ccbe1e2d3c3922c76882bc01a1abd7b3c0fa8b7b1bdf99
                                                                                      • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                      • Instruction Fuzzy Hash: 42919073A08B9ACAE750EF65E4402ADF7A0FB04788F94812AEE4C17759DF38D195CB14
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                      • String ID: csm$f
                                                                                      • API String ID: 2395640692-629598281
                                                                                      • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                      • Instruction ID: e48c2c61d39e1072e3f211065f25e376a3cdd2956d69a39dc761a4e7e4db6cb6
                                                                                      • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                      • Instruction Fuzzy Hash: DF51C032A1D60BC6EB94FB21E944A39F395FB44B98F90C130DA1A47788DF78E9418758
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                                                      • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                      • API String ID: 2102711378-639343689
                                                                                      • Opcode ID: 6c1d5a5d5395298d9d74f6f4ee4569930d238c95dd33962f37e3fdaa32d53d1a
                                                                                      • Instruction ID: c64478c32a3f3e777fc85e073dbc989a98922b1061ec9f98d08facfde8cd666d
                                                                                      • Opcode Fuzzy Hash: 6c1d5a5d5395298d9d74f6f4ee4569930d238c95dd33962f37e3fdaa32d53d1a
                                                                                      • Instruction Fuzzy Hash: CC51C262F0C64AC5FB00FB64E8501BDE360AF857A4F84023ADF1D17696DE3CA485C628
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Show$Rect
                                                                                      • String ID: RarHtmlClassName
                                                                                      • API String ID: 2396740005-1658105358
                                                                                      • Opcode ID: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                      • Instruction ID: cc5fc8e8ba9680620051b892b660e4b1db232ff23fa3a91ad35129f114d2f3b4
                                                                                      • Opcode Fuzzy Hash: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                      • Instruction Fuzzy Hash: 1F519226A0CB4ACAEA64BF21E84437AE3A0FB85B80F904535DE4E43B59DF3CE0458714
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                      • API String ID: 0-56093855
                                                                                      • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                      • Instruction ID: fe978cf4c748e9fd2a866a9548cb2117c2ce0d9337185f533ec735d99ba3340d
                                                                                      • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                      • Instruction Fuzzy Hash: 5721032595DB4FD1FA10BB29EC44178E3A0BB4AB88FE50136D99D432A4CF7CE485836C
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                      • Instruction ID: 44a56226dbbfa90f4500f44fb6b2aadd43f5b2cbe3d915cfd2bd07126371dc49
                                                                                      • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                      • Instruction Fuzzy Hash: A4F06265A2DA4AC3EF49BB21F860379E3A0EF887A0F841035D94F46764DE3CE584C724
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo
                                                                                      • String ID:
                                                                                      • API String ID: 3215553584-0
                                                                                      • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                      • Instruction ID: 184b698acb003b8a0fd19ad0e267552b7e88cf1cde273b97c8285896395dc703
                                                                                      • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                      • Instruction Fuzzy Hash: 1A81DE22F1CA0AD6F710BBB5D8606BDE6A1BB65B88FC04175DD0E13695CF3CA441C728
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 2398171386-0
                                                                                      • Opcode ID: 14fdea18fdcf977c61dce6ecaccc8aa35300d093acc7d7c713630260d7cb0aba
                                                                                      • Instruction ID: f81aa9967a288ff9a3c46700473243641bd5a5fecad87859b4d7df04d8f7cbc2
                                                                                      • Opcode Fuzzy Hash: 14fdea18fdcf977c61dce6ecaccc8aa35300d093acc7d7c713630260d7cb0aba
                                                                                      • Instruction Fuzzy Hash: 3251E562B0CA4AC9FB50FB79E4443BEE3B1AB457A8F804635DF2D867D4DE3894458318
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 3659116390-0
                                                                                      • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                      • Instruction ID: 358ed13475d7c84a2dabe6491343f6a485f69bcb25a3e42a6dc4b5bad656c74a
                                                                                      • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                      • Instruction Fuzzy Hash: F051EF32A18A55C6E711EB75E4503ACFBB0FB54B98F848135CE4A57A98CF38D146C324
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$AllocString
                                                                                      • String ID:
                                                                                      • API String ID: 262959230-0
                                                                                      • Opcode ID: d07b7da074abff0e0d457bce77dac1cb0a8e060b1f374ff54e111f1298ea021c
                                                                                      • Instruction ID: 466886d89e2e07093c6529c467268682a1509dce7035e4b211538088a11d51e1
                                                                                      • Opcode Fuzzy Hash: d07b7da074abff0e0d457bce77dac1cb0a8e060b1f374ff54e111f1298ea021c
                                                                                      • Instruction Fuzzy Hash: F741D221A0C78ACAEB14BFB19850678E290EF08BA4FD44735EA6D57BD5DF3CE0418324
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID:
                                                                                      • API String ID: 190572456-0
                                                                                      • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                      • Instruction ID: 35ea2a6003ac0daafab6429270a7e260b6327f066f9934afe4c4bd38b7d34888
                                                                                      • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                      • Instruction Fuzzy Hash: 68412722B0DA4AC2FA25BF26A810575E395BF44BD0F894535DF1D4BB94EF7CE0408328
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _set_statfp
                                                                                      • String ID:
                                                                                      • API String ID: 1156100317-0
                                                                                      • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                      • Instruction ID: b7c06b8c9e9c806a7e0e8c99d8d2c13e3941f7c670c84f058ed923f24ebbf4c9
                                                                                      • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                      • Instruction Fuzzy Hash: 6D118F76E1CA0FE3F6543134E762379D1816F557A0FC84634EA7E0A6D6DF2CA440422D
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                                      • String ID:
                                                                                      • API String ID: 3621893840-0
                                                                                      • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                      • Instruction ID: 18e307399fef4a04e510e97d29ad564b984ef73576163fc27a989591b4c7ea42
                                                                                      • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                      • Instruction Fuzzy Hash: 5DF04926F3C44AC3F790BB30E894A3AE221FFA4B05FD45130EA4E418949E3CD549CB28
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: __except_validate_context_recordabort
                                                                                      • String ID: csm$csm
                                                                                      • API String ID: 746414643-3733052814
                                                                                      • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                      • Instruction ID: 5f0779d343f69b675e34e036310b6913def32ae010e16d0e730499225bfec836
                                                                                      • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                      • Instruction Fuzzy Hash: 6371B07360C685CAD770BF25945077DFBA1EB05B88F948236DA8C07A89CB3CD691C768
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo
                                                                                      • String ID: $*
                                                                                      • API String ID: 3215553584-3982473090
                                                                                      • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                      • Instruction ID: 99d4a16ae39c1127e42e9611f7f23f53d1e8ef7d30472ec27d6230be63e53db7
                                                                                      • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                      • Instruction Fuzzy Hash: 4451647291C68ACBF764BE28845437CF7A0FB15B0AF941236D64A412D9CF3CE481E629
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$StringType
                                                                                      • String ID: $%s
                                                                                      • API String ID: 3586891840-3791308623
                                                                                      • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                      • Instruction ID: 387a44900e00e7de43f83724469acab921855b50de372dd0d4341c84dec8f9da
                                                                                      • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                      • Instruction Fuzzy Hash: 95418622B18B89CAFB51BF35D8102A9E291FB54BA8F884635EE1D177C5DF3CE4458318
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                      • String ID: csm
                                                                                      • API String ID: 2466640111-1018135373
                                                                                      • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                      • Instruction ID: e56a7e2df51438651362d4855831d03739e352defc0e89a2e92f185efc8d0bd2
                                                                                      • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                      • Instruction Fuzzy Hash: 7C514A7361C746C7D660BB16A14026EF7A4FB89B90F944235EA8D07B96DF3CE450CB14
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                      • String ID: U
                                                                                      • API String ID: 2456169464-4171548499
                                                                                      • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                      • Instruction ID: 86419bdffe647ae53368f4597e375416c8e26d8b7f5c34c85b923ef34eb1b3ca
                                                                                      • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                      • Instruction Fuzzy Hash: 5E41A02261DA89C2EB20AF65E8543AAE7A0FB98794F844131EE4D87788DF7CD441C754
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ObjectRelease
                                                                                      • String ID:
                                                                                      • API String ID: 1429681911-3916222277
                                                                                      • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                      • Instruction ID: 7d12f9d473de8abcf9797d1cdbb2c72fb1f50ed00e5799223eb44a746ccbbe51
                                                                                      • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                      • Instruction Fuzzy Hash: 60314C39A1874686EB44AF12B81862AF7A0F789FD1F814535ED4E53B58CE3CE449CB14
                                                                                      APIs
                                                                                      • InitializeCriticalSection.KERNEL32(?,?,?,00007FF74821317F,?,?,00001000,00007FF7481FE51D), ref: 00007FF74820E8BB
                                                                                      • CreateSemaphoreW.KERNEL32(?,?,?,00007FF74821317F,?,?,00001000,00007FF7481FE51D), ref: 00007FF74820E8CB
                                                                                      • CreateEventW.KERNEL32(?,?,?,00007FF74821317F,?,?,00001000,00007FF7481FE51D), ref: 00007FF74820E8E4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                      • String ID: Thread pool initialization failed.
                                                                                      • API String ID: 3340455307-2182114853
                                                                                      • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                      • Instruction ID: fa99cdd2968184039cadfce4b0ba02955431aa508ba127c1b8e5cdbbf607cc0f
                                                                                      • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                      • Instruction Fuzzy Hash: 2521D572E1D609C7F750BF24E4547A9B2A2EB94B08F988134CB1D0A295CF7E9485C7A8
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsDeviceRelease
                                                                                      • String ID:
                                                                                      • API String ID: 127614599-3916222277
                                                                                      • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                      • Instruction ID: c82b3971ac57819aa748e08f2ec58138f66759db68d3c496d0055cbfd6a9749a
                                                                                      • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                      • Instruction Fuzzy Hash: C2E0C224F0C645C2FB887BB6B58903AE261AB4CBD0F568136DA1F83B98CE3CC4C44314
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                                                      • String ID:
                                                                                      • API String ID: 1137671866-0
                                                                                      • Opcode ID: 6a66750d7d38e285348c6a4672a5517d432b12a502a6a2b91e6f62eece89d76d
                                                                                      • Instruction ID: d0a14338c6be091a252468b0dc0562b7cd4ff72fb18bbb0d940d321a772140ac
                                                                                      • Opcode Fuzzy Hash: 6a66750d7d38e285348c6a4672a5517d432b12a502a6a2b91e6f62eece89d76d
                                                                                      • Instruction Fuzzy Hash: 66A19162A1CA8AC2EA10FB65E4441BEE371FF85784F805136EB5D07AA9DF3CE544C718
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1452528299-0
                                                                                      • Opcode ID: 47ce399c8b5a93a9ee7e183f504d796df39c479f65169f8ae0637efe197c3b7b
                                                                                      • Instruction ID: 7969501338bc3e4b1e22c8512468e062bdd57d4a2c62277dc32e1f9c0eccb71b
                                                                                      • Opcode Fuzzy Hash: 47ce399c8b5a93a9ee7e183f504d796df39c479f65169f8ae0637efe197c3b7b
                                                                                      • Instruction Fuzzy Hash: 6851B162B18A4AD9FB00BB74D8442ACE321EB85BD8F904236DA5C17B99DE38D145C368
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                      • String ID:
                                                                                      • API String ID: 1077098981-0
                                                                                      • Opcode ID: b863cc91c4db730fc30b640aae8101ad1aab9759ecbd7d6557df89d0553ffb74
                                                                                      • Instruction ID: 4b1930717a4626ba38e0cbdafaa067058da0d0dc8705b46d5082a341068caebf
                                                                                      • Opcode Fuzzy Hash: b863cc91c4db730fc30b640aae8101ad1aab9759ecbd7d6557df89d0553ffb74
                                                                                      • Instruction Fuzzy Hash: F8515C32A2CB46C6E740AF61E8447AEF3A4FB84B84F901136EA4E57A58DF3CD444CB54
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 4141327611-0
                                                                                      • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                      • Instruction ID: 229b8b8c68e7457eff4c3ad2971ea0162796c9b9c9ea8a88f65e1a271dbf8eb2
                                                                                      • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                      • Instruction Fuzzy Hash: A2418F72A0C68EC6FB65BE14D0443B9E290EF90BE0F948131DE4D46AD5DF7CE8418728
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3823481717-0
                                                                                      • Opcode ID: 47dbf0decc8272d9a7ae459b130201949f9107b8ec80fb87a20ec63cf3da1f82
                                                                                      • Instruction ID: 0d2cacb0435cee3c4c6095ec0758ef316a874038352d587ea2bc64171d8e1213
                                                                                      • Opcode Fuzzy Hash: 47dbf0decc8272d9a7ae459b130201949f9107b8ec80fb87a20ec63cf3da1f82
                                                                                      • Instruction Fuzzy Hash: 1141C262F1CB55C5FB00FBB9D8481ADE371BB45BA4B805231DF6D26A99DF38D045C218
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF74822C45B), ref: 00007FF748230B91
                                                                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF74822C45B), ref: 00007FF748230BF3
                                                                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF74822C45B), ref: 00007FF748230C2D
                                                                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF74822C45B), ref: 00007FF748230C57
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                      • String ID:
                                                                                      • API String ID: 1557788787-0
                                                                                      • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                      • Instruction ID: 78b2cc2c02018bf42ce2201efcd7852f14b902f77016b26913d3bc45f53b90c9
                                                                                      • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                      • Instruction Fuzzy Hash: 37219831F1CB59C2D624BF22A450029F6A5FB54BD0B884534DE8D27BD4DF3CE4528728
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$abort
                                                                                      • String ID:
                                                                                      • API String ID: 1447195878-0
                                                                                      • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                      • Instruction ID: 33264eeb625abff479b1e9ca6df5802ec84ae496c894dbc9f2c26496fb674654
                                                                                      • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                      • Instruction Fuzzy Hash: 41019E34B0C64EC3FB98B771AA55238D1A1AF44790FC40438DD1E06BD6ED3CB8058238
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsDevice$Release
                                                                                      • String ID:
                                                                                      • API String ID: 1035833867-0
                                                                                      • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                      • Instruction ID: b245d9cb07141ebd5e44fc166578fb75031eaaf460cdfbaa6e3cbaca43b569c9
                                                                                      • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                      • Instruction Fuzzy Hash: ACE09264E8D70AC2FF487B756858136E190AF08702F89467ACC1F46754DE3CA084C728
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID: DXGIDebug.dll
                                                                                      • API String ID: 3668304517-540382549
                                                                                      • Opcode ID: 2b89549b7426e50bfd34945384ed8c0e8b0bf6c6c1231d7991053c614d04a2bf
                                                                                      • Instruction ID: 5fe31cecb8090c948d49b5ae058e03da645e554ee9ff3d33c02d7231c26e1f79
                                                                                      • Opcode Fuzzy Hash: 2b89549b7426e50bfd34945384ed8c0e8b0bf6c6c1231d7991053c614d04a2bf
                                                                                      • Instruction Fuzzy Hash: 2071BD72A08B85C2EB14EF25E8403ADF3A4FB54794F80422ADBAD07B99DF78D151C304
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo
                                                                                      • String ID: e+000$gfff
                                                                                      • API String ID: 3215553584-3030954782
                                                                                      • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                      • Instruction ID: 629d885efea0488960ace5b43311378cb298112808fa7751be58e0fccf9cbccb
                                                                                      • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                      • Instruction Fuzzy Hash: B7511366F1C7C9C6E764BB359840369EB91AB81B90F888231CA9C87BD6CF3CD4448714
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                                      • String ID: SIZE
                                                                                      • API String ID: 449872665-3243624926
                                                                                      • Opcode ID: 1ee6a6b9fbbd6c3126f8bc5ffec1b6aa008f2877db1f13591811bbd6ed408201
                                                                                      • Instruction ID: 088556fd7b26c6687f61d3b7264bec81c3d857b3c2124b029f4d45cbeab9f399
                                                                                      • Opcode Fuzzy Hash: 1ee6a6b9fbbd6c3126f8bc5ffec1b6aa008f2877db1f13591811bbd6ed408201
                                                                                      • Instruction Fuzzy Hash: 0F41C562A1C74AC5EE11FB15E4453BDE360EF86790F904231EBAE066D6EE3DD540C718
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                      • String ID: C:\Users\user\Desktop\file.exe
                                                                                      • API String ID: 3307058713-1957095476
                                                                                      • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                      • Instruction ID: 3adca9117ec671a84a303dffc9e2612cabbff28db2e50cef06edc0e0a53844c5
                                                                                      • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                      • Instruction Fuzzy Hash: EF419B36A0CA5ACAEB15BF25A4400B9F7A4FF44B94B854032EA4E47B85DF3DE441C368
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemText$DialogWindow
                                                                                      • String ID: ASKNEXTVOL
                                                                                      • API String ID: 445417207-3402441367
                                                                                      • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                      • Instruction ID: 798fbdd5ef92fd22f5c97c2f291d6fafb209eb8588f1a5f6e55c5e8d99aa83c1
                                                                                      • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                      • Instruction Fuzzy Hash: 1F418322A0C69AC1FA11BB15E8502BAE3A1AF89BC0FE40035DE4D07799CF3DE545C768
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide_snwprintf
                                                                                      • String ID: $%s$@%s
                                                                                      • API String ID: 2650857296-834177443
                                                                                      • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                      • Instruction ID: 4c685f810a952a9823b0892311cdfe7cc9f50efc5304ecc4ecb7e83de3b14b23
                                                                                      • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                      • Instruction Fuzzy Hash: 2531E3B2B1CA5AD5EA11BF66D4402E9E3A0EB46784FC00032DF0E17B95DE3CE505C714
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileHandleType
                                                                                      • String ID: @
                                                                                      • API String ID: 3000768030-2766056989
                                                                                      • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                      • Instruction ID: 267217ecfc9566b4bf9ef929fd45d2ceb776b8fb409c2cc76eb9d22051ac0d12
                                                                                      • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                      • Instruction Fuzzy Hash: A7218166E0CA8AC1EBA0BB249490139E751FB45774FA80335D66F077D5CE3CD881E329
                                                                                      APIs
                                                                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF748221D3E), ref: 00007FF7482240BC
                                                                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF748221D3E), ref: 00007FF748224102
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFileHeaderRaise
                                                                                      • String ID: csm
                                                                                      • API String ID: 2573137834-1018135373
                                                                                      • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                      • Instruction ID: ec1665ad5ed4bcd1ff1dc931cb34c66ee82becacf65eb99e568f366f562f606d
                                                                                      • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                      • Instruction Fuzzy Hash: 9C111922608B45C2EB24AB15E440269F7E1FB88B94F584231EA8D07754DF3DD695C704
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF74820E95F,?,?,?,00007FF74820463A,?,?,?), ref: 00007FF74820EA63
                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF74820E95F,?,?,?,00007FF74820463A,?,?,?), ref: 00007FF74820EA6E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastObjectSingleWait
                                                                                      • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                      • API String ID: 1211598281-2248577382
                                                                                      • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                      • Instruction ID: de325e359fd87da6a12ade819e04193bde783f303027569726379f5c4d42b551
                                                                                      • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                      • Instruction Fuzzy Hash: 31E01A65E1D80AC3F600B730EC92478E211BF65B70FD00331D23E855E59E2CA985C728
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1679800691.00007FF7481F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7481F0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1679786677.00007FF7481F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679869237.00007FF748238000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF74824B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679895992.00007FF748254000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1679947717.00007FF74825E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ff7481f0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: FindHandleModuleResource
                                                                                      • String ID: RTL
                                                                                      • API String ID: 3537982541-834975271
                                                                                      • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                      • Instruction ID: 5b76c15237ceb1f85e736f419a7222a3747b1c8832239d74df0cf3c5fb1f846c
                                                                                      • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                      • Instruction Fuzzy Hash: F5D01791F2D60AC3FF1A7B75A45933492905B1AB41FC84038C98A0A390EE6C9088C769

                                                                                      Execution Graph

                                                                                      Execution Coverage:5.8%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:14.9%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:102
                                                                                      execution_graph 63892 11108d30 63935 1110f420 63892->63935 63895 11108da9 OpenEventA 63898 11108ed1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 63895->63898 63899 11108e18 CloseHandle GetSystemDirectoryA 63895->63899 63900 1110f420 std::locale::_Init 268 API calls 63898->63900 63901 11108e38 63899->63901 63902 11108f23 63900->63902 63901->63901 63903 11108e40 LoadLibraryA 63901->63903 63904 11108f3c 63902->63904 64012 110f4680 271 API calls std::locale::_Init 63902->64012 63903->63898 63905 11108e71 63903->63905 63963 1110f2b0 63904->63963 63979 111450a0 63905->63979 63909 11108e7b 63911 11108e82 GetProcAddress 63909->63911 63912 11108e9a GetProcAddress 63909->63912 63911->63912 63913 11108ec4 FreeLibrary 63912->63913 63914 11108eb6 63912->63914 63913->63898 63914->63898 63917 11109005 64015 11161d01 63917->64015 63918 1110f420 std::locale::_Init 268 API calls 63920 11108f73 63918->63920 63922 11108f84 63920->63922 63923 11108f8d 63920->63923 63921 1110901f 64013 110f4680 271 API calls std::locale::_Init 63922->64013 63925 1110f2b0 427 API calls 63923->63925 63926 11108fa9 CloseHandle 63925->63926 63927 111450a0 std::locale::_Init 91 API calls 63926->63927 63928 11108fba 63927->63928 63928->63917 63929 1110f420 std::locale::_Init 268 API calls 63928->63929 63930 11108fc8 63929->63930 63931 11108fe2 63930->63931 64014 110f4680 271 API calls std::locale::_Init 63930->64014 63933 1110f2b0 427 API calls 63931->63933 63934 11108ffe CloseHandle 63933->63934 63934->63917 64023 11162b51 63935->64023 63938 1110f473 _memset 63942 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 63938->63942 63939 1110f447 wsprintfA 64040 11029450 268 API calls 2 library calls 63939->64040 63943 11108d91 63942->63943 63943->63895 63944 11107290 63943->63944 64049 1110f520 63944->64049 63947 1110f520 3 API calls 63948 111072dc 63947->63948 63949 1110f520 3 API calls 63948->63949 63950 111072ee 63949->63950 63951 1110f520 3 API calls 63950->63951 63952 111072ff 63951->63952 63953 1110f520 3 API calls 63952->63953 63954 11107310 63953->63954 63955 1110f420 std::locale::_Init 268 API calls 63954->63955 63956 11107321 63955->63956 63957 1110740a 63956->63957 63958 1110732c LoadLibraryA LoadLibraryA 63956->63958 64056 1116219a 66 API calls std::exception::_Copy_str 63957->64056 63958->63895 63960 11107419 64057 111625f1 RaiseException 63960->64057 63962 1110742e 63964 1110f2d0 CreateThread 63963->63964 63965 1110f2bf CreateEventA 63963->63965 63967 1110f2f6 63964->63967 63968 1110f30d 63964->63968 64061 11102c50 63964->64061 64083 1110fde0 63964->64083 64097 11027270 63964->64097 64122 1102c410 63964->64122 63965->63964 64060 11029450 268 API calls 2 library calls 63967->64060 63970 1110f311 WaitForSingleObject CloseHandle 63968->63970 63971 11108f58 CloseHandle 63968->63971 63970->63971 63973 1109e9e0 63971->63973 63974 1109e9ef GetCurrentProcess OpenProcessToken 63973->63974 63975 1109ea2d 63973->63975 63974->63975 63976 1109ea12 63974->63976 63975->63917 63975->63918 64502 1109e910 63976->64502 63978 1109ea1b CloseHandle 63978->63975 63980 111450c1 GetVersionExA 63979->63980 63988 1114529c 63979->63988 63981 111450e3 63980->63981 63980->63988 63983 111450f0 RegOpenKeyExA 63981->63983 63981->63988 63982 111452a5 63984 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 63982->63984 63987 1114511d _memset 63983->63987 63983->63988 63985 111452b2 63984->63985 63985->63909 63986 11145304 63989 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 63986->63989 64515 11143000 RegQueryValueExA 63987->64515 63988->63982 63988->63986 64526 11081c60 87 API calls 2 library calls 63988->64526 63990 11145314 63989->63990 63990->63909 63994 11143000 std::locale::_Init RegQueryValueExA 63996 11145189 63994->63996 63995 111452ec 63995->63982 63998 11162de7 std::locale::_Init 80 API calls 63995->63998 63997 1114528f RegCloseKey 63996->63997 64517 11162de7 63996->64517 63997->63988 64000 111452fd 63998->64000 64000->63982 64000->63986 64003 111451ad 64004 111451c6 64003->64004 64005 11163a2d std::locale::_Init 80 API calls 64003->64005 64006 11162de7 std::locale::_Init 80 API calls 64004->64006 64005->64003 64008 111451d2 _strncpy 64006->64008 64007 11145271 64007->63997 64008->64007 64009 11143000 std::locale::_Init RegQueryValueExA 64008->64009 64010 11145248 64009->64010 64011 11143000 std::locale::_Init RegQueryValueExA 64010->64011 64011->64007 64012->63904 64013->63923 64014->63931 64016 11161d0b IsDebuggerPresent 64015->64016 64017 11161d09 64015->64017 64663 11177637 64016->64663 64017->63921 64020 1116bc99 SetUnhandledExceptionFilter UnhandledExceptionFilter 64021 1116bcbe GetCurrentProcess TerminateProcess 64020->64021 64022 1116bcb6 __call_reportfault 64020->64022 64021->63921 64022->64021 64024 11162bce 64023->64024 64033 11162b5f 64023->64033 64047 1116d4a8 DecodePointer 64024->64047 64026 11162b6a 64026->64033 64041 1116d99d 66 API calls __NMSG_WRITE 64026->64041 64042 1116d7ee 66 API calls 6 library calls 64026->64042 64043 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 64026->64043 64027 11162bd4 64048 111692ef 66 API calls __getptd_noexit 64027->64048 64030 11162b8d RtlAllocateHeap 64031 1110f43e 64030->64031 64030->64033 64031->63938 64031->63939 64033->64026 64033->64030 64034 11162bba 64033->64034 64038 11162bb8 64033->64038 64044 1116d4a8 DecodePointer 64033->64044 64045 111692ef 66 API calls __getptd_noexit 64034->64045 64046 111692ef 66 API calls __getptd_noexit 64038->64046 64041->64026 64042->64026 64044->64033 64045->64038 64046->64031 64047->64027 64048->64031 64050 1110f536 CreateEventA 64049->64050 64051 1110f549 64049->64051 64050->64051 64052 1110f557 64051->64052 64058 1110f260 InterlockedIncrement 64051->64058 64054 111072cc 64052->64054 64059 1110f3c0 InterlockedIncrement 64052->64059 64054->63947 64056->63960 64057->63962 64058->64052 64059->64054 64157 11089280 64061->64157 64063 11102c5d 64064 11102c69 GetCurrentThreadId GetThreadDesktop OpenDesktopA 64063->64064 64065 11102ccf GetLastError 64064->64065 64066 11102c8f SetThreadDesktop 64064->64066 64069 11146450 std::locale::_Init 21 API calls 64065->64069 64067 11102cb1 GetLastError 64066->64067 64068 11102c9a 64066->64068 64071 11146450 std::locale::_Init 21 API calls 64067->64071 64168 11146450 64068->64168 64072 11102ce1 64069->64072 64074 11102cc3 CloseDesktop 64071->64074 64162 11102bd0 64072->64162 64074->64072 64076 11102ceb 64174 1110f340 64076->64174 64078 11102cf2 64179 110f4740 16 API calls 64078->64179 64080 11102cf9 64180 1110f370 SetEvent PulseEvent 64080->64180 64082 11102d00 std::ios_base::_Ios_base_dtor 64233 110b7a20 64083->64233 64085 1110fdee GetCurrentThreadId 64086 1110f340 269 API calls 64085->64086 64087 1110fe09 std::ios_base::_Ios_base_dtor 64086->64087 64088 1110fe80 64087->64088 64089 1110fe20 WaitForSingleObject 64087->64089 64093 1110fe43 64087->64093 64236 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 64087->64236 64237 1110f370 SetEvent PulseEvent 64088->64237 64235 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 64089->64235 64091 1110fe8a 64094 1110fe53 PostMessageA 64093->64094 64095 1110fe58 PostThreadMessageA 64093->64095 64094->64087 64095->64087 64098 110272a2 64097->64098 64099 11089280 5 API calls 64098->64099 64100 110272a9 CreateEventA 64099->64100 64101 1110f420 std::locale::_Init 268 API calls 64100->64101 64102 110272c6 64101->64102 64103 110272e7 64102->64103 64238 111100d0 64102->64238 64105 1110f340 269 API calls 64103->64105 64114 110272ff 64105->64114 64106 11027316 WaitForMultipleObjects 64107 1102732d 64106->64107 64106->64114 64108 11027336 PostMessageA 64107->64108 64109 1102734a SetEvent Sleep 64107->64109 64108->64109 64108->64114 64109->64114 64110 110273f4 64111 1102740e CloseHandle 64110->64111 64267 1110fc70 281 API calls 2 library calls 64110->64267 64268 1110f370 SetEvent PulseEvent 64111->64268 64112 11027375 PostMessageA 64112->64114 64114->64106 64114->64110 64114->64112 64119 110273ba GetCurrentThreadId GetThreadDesktop 64114->64119 64266 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 64114->64266 64117 11027405 std::ios_base::_Ios_base_dtor 64117->64111 64118 11027423 64119->64114 64120 110273c9 SetThreadDesktop 64119->64120 64120->64114 64121 110273d4 CloseDesktop 64120->64121 64121->64114 64123 1102c442 64122->64123 64124 1110f340 269 API calls 64123->64124 64125 1102c44f WaitForSingleObject 64124->64125 64126 1102c466 64125->64126 64127 1102c67d 64125->64127 64129 1102c470 GetTickCount 64126->64129 64130 1102c666 WaitForSingleObject 64126->64130 64366 1110f370 SetEvent PulseEvent 64127->64366 64272 110d1550 64129->64272 64130->64126 64130->64127 64131 1102c684 CloseHandle 64367 1110f580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 64131->64367 64134 1102c695 std::ios_base::_Ios_base_dtor 64136 110d1550 271 API calls 64137 1102c486 64136->64137 64137->64136 64138 1102c6b4 64137->64138 64140 1102c6c8 64137->64140 64142 1102c6dc 64137->64142 64146 1102c574 GetTickCount 64137->64146 64282 110d0710 64137->64282 64294 11029590 LoadLibraryA 64137->64294 64346 110d1370 272 API calls 2 library calls 64137->64346 64368 11029450 268 API calls 2 library calls 64138->64368 64369 11029450 268 API calls 2 library calls 64140->64369 64370 11029450 268 API calls 2 library calls 64142->64370 64145 1102c6f0 64371 11029450 268 API calls 2 library calls 64145->64371 64156 1102c571 std::ios_base::_Ios_base_dtor 64146->64156 64150 11146450 std::locale::_Init 21 API calls 64150->64156 64151 110d07c0 268 API calls 64151->64156 64154 110679c0 301 API calls 64154->64156 64156->64138 64156->64140 64156->64145 64156->64146 64156->64150 64156->64151 64156->64154 64347 11142290 64156->64347 64356 11042530 270 API calls 2 library calls 64156->64356 64357 110d07c0 64156->64357 64181 1110f6c0 64157->64181 64159 11089290 64160 110892b3 64159->64160 64161 110892a2 UnhookWindowsHookEx 64159->64161 64160->64063 64161->64160 64163 1110f420 std::locale::_Init 268 API calls 64162->64163 64164 11102bfd 64163->64164 64165 11102c30 64164->64165 64187 11102ab0 64164->64187 64165->64076 64167 11102c1d 64167->64076 64169 11146461 64168->64169 64170 1114645c 64168->64170 64207 111458f0 64169->64207 64210 111456a0 18 API calls std::locale::_Init 64170->64210 64175 1110f360 SetEvent 64174->64175 64176 1110f349 64174->64176 64175->64078 64232 11029450 268 API calls 2 library calls 64176->64232 64179->64080 64180->64082 64182 1110f6d7 EnterCriticalSection 64181->64182 64183 1110f6ce GetCurrentThreadId 64181->64183 64184 1110f6ee ___DllMainCRTStartup 64182->64184 64183->64182 64185 1110f6f5 LeaveCriticalSection 64184->64185 64186 1110f708 LeaveCriticalSection 64184->64186 64185->64159 64186->64159 64194 1115f550 64187->64194 64190 11102b81 CreateWindowExA 64190->64167 64191 11102b17 std::locale::_Init 64192 11102b50 GetStockObject RegisterClassA 64191->64192 64192->64190 64193 11102b7a 64192->64193 64193->64190 64197 1115e380 GlobalAddAtomA 64194->64197 64198 1115e3b5 GetLastError wsprintfA 64197->64198 64199 1115e407 GlobalAddAtomA GlobalAddAtomA 64197->64199 64206 11029450 268 API calls 2 library calls 64198->64206 64201 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64199->64201 64203 11102ae1 GlobalAddAtomA 64201->64203 64203->64190 64203->64191 64211 111457a0 64207->64211 64209 11102ca5 CloseDesktop 64209->64072 64210->64169 64212 111457c4 64211->64212 64213 111457c9 64211->64213 64231 111456a0 18 API calls std::locale::_Init 64212->64231 64215 11145832 64213->64215 64216 111457d2 64213->64216 64217 111458de 64215->64217 64218 1114583f wsprintfA 64215->64218 64219 11145809 64216->64219 64220 111457e0 64216->64220 64221 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64217->64221 64222 11145862 64218->64222 64225 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64219->64225 64227 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64220->64227 64224 111458ea 64221->64224 64222->64222 64223 11145869 wvsprintfA 64222->64223 64230 11145884 64223->64230 64224->64209 64226 1114582e 64225->64226 64226->64209 64228 11145805 64227->64228 64228->64209 64229 111458d1 OutputDebugStringA 64229->64217 64230->64229 64230->64230 64231->64213 64234 110b7a28 std::locale::_Init 64233->64234 64234->64085 64235->64087 64236->64087 64237->64091 64239 1110f420 std::locale::_Init 268 API calls 64238->64239 64240 11110101 64239->64240 64241 11110123 GetCurrentThreadId InitializeCriticalSection 64240->64241 64243 1110f420 std::locale::_Init 268 API calls 64240->64243 64244 11110190 EnterCriticalSection 64241->64244 64245 11110183 InitializeCriticalSection 64241->64245 64246 1111011c 64243->64246 64247 1111024a LeaveCriticalSection 64244->64247 64248 111101be CreateEventA 64244->64248 64245->64244 64246->64241 64269 1116219a 66 API calls std::exception::_Copy_str 64246->64269 64247->64103 64249 111101d1 64248->64249 64250 111101e8 64248->64250 64271 11029450 268 API calls 2 library calls 64249->64271 64253 1110f420 std::locale::_Init 268 API calls 64250->64253 64257 111101ef 64253->64257 64254 1111013f 64270 111625f1 RaiseException 64254->64270 64258 1111020c 64257->64258 64259 111100d0 421 API calls 64257->64259 64260 1110f420 std::locale::_Init 268 API calls 64258->64260 64259->64258 64261 1111021c 64260->64261 64262 1111022d 64261->64262 64263 1110f520 3 API calls 64261->64263 64264 1110f2b0 421 API calls 64262->64264 64263->64262 64265 11110245 64264->64265 64265->64247 64266->64114 64267->64117 64268->64118 64269->64254 64270->64241 64372 110d1480 64272->64372 64275 110d159b 64278 110d15b5 64275->64278 64279 110d1598 64275->64279 64276 110d1584 64386 11029450 268 API calls 2 library calls 64276->64386 64278->64137 64279->64275 64387 11029450 268 API calls 2 library calls 64279->64387 64283 110d0724 64282->64283 64427 11163cf8 64283->64427 64290 110d077c 64290->64137 64291 110d0765 64452 11029450 268 API calls 2 library calls 64291->64452 64339 11029621 std::ios_base::_Ios_base_dtor 64294->64339 64295 11029653 GetProcAddress 64296 11029671 SetLastError 64295->64296 64295->64339 64296->64339 64297 11029748 InternetOpenA 64297->64339 64298 1102972f GetProcAddress 64298->64297 64299 11029779 SetLastError 64298->64299 64299->64339 64300 110296a5 GetProcAddress 64301 11029762 SetLastError 64300->64301 64300->64339 64302 110296d2 GetLastError 64301->64302 64302->64339 64303 11142290 std::locale::_Init 268 API calls 64303->64339 64304 11162be5 66 API calls _free 64304->64339 64305 110296f5 GetProcAddress 64306 1102976f SetLastError 64305->64306 64305->64339 64306->64339 64307 11162b51 66 API calls _malloc 64307->64339 64308 11029a40 64311 11029b76 GetProcAddress 64308->64311 64312 11029a31 64308->64312 64309 11029bb0 64309->64156 64310 11029ba9 FreeLibrary 64310->64309 64311->64312 64315 11029b97 SetLastError 64311->64315 64312->64309 64312->64310 64313 11081a70 IsDBCSLeadByte 64313->64339 64314 11029a57 GetProcAddress 64316 11029b2e SetLastError 64314->64316 64317 11029a1a std::ios_base::_Ios_base_dtor 64314->64317 64315->64312 64335 11029b36 std::ios_base::_Ios_base_dtor 64316->64335 64317->64308 64317->64312 64317->64314 64333 11029a88 std::ios_base::_Ios_base_dtor 64317->64333 64317->64335 64320 11029b5b 64487 110278a0 GetProcAddress SetLastError 64320->64487 64321 110297ff GetProcAddress 64326 1102981c SetLastError 64321->64326 64321->64339 64322 1102982b GetProcAddress 64323 1102983e InternetConnectA 64322->64323 64328 11029881 SetLastError 64322->64328 64323->64339 64325 11029b6a 64325->64308 64326->64339 64328->64339 64329 110298a3 GetProcAddress 64331 110298d6 SetLastError 64329->64331 64329->64339 64330 11029864 GetProcAddress 64332 11029891 SetLastError 64330->64332 64330->64339 64331->64339 64332->64339 64333->64317 64334 110d1090 271 API calls 64333->64334 64333->64335 64478 1110f4a0 64333->64478 64485 11027850 GetProcAddress SetLastError 64333->64485 64334->64333 64486 110278a0 GetProcAddress SetLastError 64335->64486 64336 110298f1 GetProcAddress 64337 11029918 SetLastError 64336->64337 64336->64339 64338 11029922 GetLastError 64337->64338 64338->64339 64340 1102993d GetProcAddress 64338->64340 64339->64295 64339->64297 64339->64298 64339->64300 64339->64302 64339->64303 64339->64304 64339->64305 64339->64307 64339->64313 64339->64317 64339->64321 64339->64322 64339->64323 64339->64329 64339->64330 64339->64336 64339->64338 64342 11029975 GetLastError 64339->64342 64343 1102998c GetDesktopWindow 64339->64343 64340->64339 64341 1102996d SetLastError 64340->64341 64341->64342 64342->64339 64342->64343 64343->64339 64344 1102999a GetProcAddress 64343->64344 64344->64339 64345 110299d6 SetLastError 64344->64345 64345->64339 64346->64137 64348 1114229a 64347->64348 64349 1114229c 64347->64349 64348->64156 64350 1110f4a0 std::locale::_Init 268 API calls 64349->64350 64351 111422c2 64350->64351 64352 111422e9 64351->64352 64353 111422cb _strncpy 64351->64353 64489 11029450 268 API calls 2 library calls 64352->64489 64353->64156 64356->64156 64490 110d05c0 64357->64490 64360 110d07e9 64495 11162be5 64360->64495 64361 110d07d2 64494 11029450 268 API calls 2 library calls 64361->64494 64364 110d07f2 64364->64130 64366->64131 64367->64134 64373 110d148c 64372->64373 64374 110d14a7 64373->64374 64375 110d1490 64373->64375 64388 110d0190 64374->64388 64417 11029450 268 API calls 2 library calls 64375->64417 64382 110d14de 64382->64275 64382->64276 64383 110d14c7 64418 11029450 268 API calls 2 library calls 64383->64418 64389 110d0199 64388->64389 64390 110d019d 64389->64390 64392 110d01b4 64389->64392 64419 11029450 268 API calls 2 library calls 64390->64419 64393 110d01b1 64392->64393 64394 110d01e8 64392->64394 64393->64392 64420 11029450 268 API calls 2 library calls 64393->64420 64396 110d01e5 64394->64396 64397 110d0206 64394->64397 64396->64394 64421 11029450 268 API calls 2 library calls 64396->64421 64400 110d1090 64397->64400 64401 110d109e 64400->64401 64402 110d10b9 64401->64402 64403 110d10a2 64401->64403 64406 110d10b6 64402->64406 64407 110d10ec 64402->64407 64422 11029450 268 API calls 2 library calls 64403->64422 64405 110d1160 64405->64382 64405->64383 64406->64402 64423 11029450 268 API calls 2 library calls 64406->64423 64407->64405 64407->64407 64424 110d09e0 268 API calls std::locale::_Init 64407->64424 64409 110d1113 64413 110d111f _memmove 64409->64413 64425 110d0920 271 API calls 2 library calls 64409->64425 64413->64405 64414 110d1149 64413->64414 64426 11029450 268 API calls 2 library calls 64414->64426 64424->64409 64425->64413 64428 11163d09 _strlen 64427->64428 64431 110d072f 64427->64431 64429 11162b51 _malloc 66 API calls 64428->64429 64430 11163d1c 64429->64430 64430->64431 64453 1116be9f 64430->64453 64435 110d0450 64431->64435 64436 110d045b 64435->64436 64437 110d0472 64435->64437 64474 11029450 268 API calls 2 library calls 64436->64474 64440 110cfe70 64437->64440 64441 110cfe7d 64440->64441 64442 110cfe98 64441->64442 64443 110cfe81 64441->64443 64445 110cfe95 64442->64445 64446 110cfeb6 64442->64446 64475 11029450 268 API calls 2 library calls 64443->64475 64445->64442 64476 11029450 268 API calls 2 library calls 64445->64476 64448 110cfeb3 64446->64448 64451 110cfed9 64446->64451 64448->64446 64477 11029450 268 API calls 2 library calls 64448->64477 64451->64290 64451->64291 64454 1116beb4 64453->64454 64455 1116bead 64453->64455 64465 111692ef 66 API calls __getptd_noexit 64454->64465 64455->64454 64457 1116bed2 64455->64457 64459 11163d2e 64457->64459 64467 111692ef 66 API calls __getptd_noexit 64457->64467 64459->64431 64462 1116deb2 64459->64462 64461 1116beb9 64466 1116df04 11 API calls _fgets 64461->64466 64468 1116dd89 64462->64468 64465->64461 64466->64459 64467->64461 64469 1116dda8 _memset __call_reportfault 64468->64469 64470 1116ddc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 64469->64470 64471 1116de94 __call_reportfault 64470->64471 64472 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64471->64472 64473 1116deb0 GetCurrentProcess TerminateProcess 64472->64473 64473->64431 64479 11162b51 _malloc 66 API calls 64478->64479 64480 1110f4ae 64479->64480 64481 1110f4b7 64480->64481 64482 1110f4ce _memset 64480->64482 64488 11029450 268 API calls 2 library calls 64481->64488 64482->64333 64485->64333 64486->64320 64487->64325 64491 110d05d9 64490->64491 64493 110d05ec 64490->64493 64492 110d0450 268 API calls 64491->64492 64491->64493 64492->64493 64493->64360 64493->64361 64496 11162bf0 HeapFree 64495->64496 64497 11162c19 __dosmaperr 64495->64497 64496->64497 64498 11162c05 64496->64498 64497->64364 64501 111692ef 66 API calls __getptd_noexit 64498->64501 64500 11162c0b GetLastError 64500->64497 64501->64500 64503 1109e9c6 64502->64503 64504 1109e930 GetTokenInformation 64502->64504 64505 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64503->64505 64506 1109e952 __crtLCMapStringA_stat 64504->64506 64507 1109e9d8 64505->64507 64506->64503 64508 1109e958 GetTokenInformation 64506->64508 64507->63978 64508->64503 64509 1109e96a 64508->64509 64510 1109e99f EqualSid 64509->64510 64511 1109e973 AllocateAndInitializeSid 64509->64511 64510->64503 64512 1109e9ad 64510->64512 64511->64503 64511->64510 64513 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64512->64513 64514 1109e9c2 64513->64514 64514->63978 64516 1114302a 64515->64516 64516->63994 64518 11162dd1 64517->64518 64527 1116364b 64518->64527 64521 11163a2d 64522 11163a4d 64521->64522 64523 11163a3b 64521->64523 64662 111639dc 80 API calls 2 library calls 64522->64662 64523->64003 64525 11163a57 64525->64003 64526->63995 64528 11163664 64527->64528 64531 11163420 64528->64531 64543 11163399 64531->64543 64533 11163444 64551 111692ef 66 API calls __getptd_noexit 64533->64551 64536 11163449 64552 1116df04 11 API calls _fgets 64536->64552 64539 1116347a 64540 111634c1 64539->64540 64553 11170c05 80 API calls 3 library calls 64539->64553 64541 1114519e 64540->64541 64554 111692ef 66 API calls __getptd_noexit 64540->64554 64541->64521 64544 111633ac 64543->64544 64548 111633f9 64543->64548 64555 1116b7b5 64544->64555 64546 111633d9 64546->64548 64575 11170744 68 API calls 6 library calls 64546->64575 64548->64533 64548->64539 64551->64536 64552->64541 64553->64539 64554->64541 64576 1116b73c GetLastError 64555->64576 64557 1116b7bd 64558 111633b1 64557->64558 64590 1116d7aa 66 API calls 3 library calls 64557->64590 64558->64546 64560 111704a8 64558->64560 64561 111704b4 __getstream 64560->64561 64562 1116b7b5 __getptd 66 API calls 64561->64562 64564 111704b9 64562->64564 64563 111704e7 64613 1117373c 64563->64613 64564->64563 64565 111704cb 64564->64565 64567 1116b7b5 __getptd 66 API calls 64565->64567 64570 111704d0 64567->64570 64568 111704ee 64620 1117045b 75 API calls 3 library calls 64568->64620 64573 111704de __getstream 64570->64573 64612 1116d7aa 66 API calls 3 library calls 64570->64612 64571 11170502 64621 11170515 LeaveCriticalSection _doexit 64571->64621 64573->64546 64575->64548 64591 1116b5fa TlsGetValue 64576->64591 64579 1116b7a9 SetLastError 64579->64557 64582 1116b76f DecodePointer 64583 1116b784 64582->64583 64584 1116b7a0 64583->64584 64585 1116b788 64583->64585 64587 11162be5 _free 62 API calls 64584->64587 64600 1116b688 66 API calls 4 library calls 64585->64600 64589 1116b7a6 64587->64589 64588 1116b790 GetCurrentThreadId 64588->64579 64589->64579 64592 1116b60f DecodePointer TlsSetValue 64591->64592 64593 1116b62a 64591->64593 64592->64593 64593->64579 64594 11169dbe 64593->64594 64597 11169dc7 64594->64597 64596 11169e04 64596->64579 64596->64582 64597->64596 64598 11169de5 Sleep 64597->64598 64601 11170166 64597->64601 64599 11169dfa 64598->64599 64599->64596 64599->64597 64600->64588 64602 11170172 64601->64602 64608 1117018d 64601->64608 64603 1117017e 64602->64603 64602->64608 64610 111692ef 66 API calls __getptd_noexit 64603->64610 64604 111701a0 RtlAllocateHeap 64604->64608 64609 111701c7 64604->64609 64606 11170183 64606->64597 64608->64604 64608->64609 64611 1116d4a8 DecodePointer 64608->64611 64609->64597 64610->64606 64611->64608 64614 11173764 EnterCriticalSection 64613->64614 64615 11173751 64613->64615 64614->64568 64622 1117367a 64615->64622 64617 11173757 64617->64614 64649 1116d7aa 66 API calls 3 library calls 64617->64649 64620->64571 64621->64570 64623 11173686 __getstream 64622->64623 64624 11173696 64623->64624 64625 111736ae 64623->64625 64650 1116d99d 66 API calls __NMSG_WRITE 64624->64650 64633 111736bc __getstream 64625->64633 64653 11169d79 64625->64653 64628 1117369b 64651 1116d7ee 66 API calls 6 library calls 64628->64651 64631 111736ce 64659 111692ef 66 API calls __getptd_noexit 64631->64659 64632 111736dd 64636 1117373c __lock 65 API calls 64632->64636 64633->64617 64634 111736a2 64652 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 64634->64652 64638 111736e4 64636->64638 64640 11173717 64638->64640 64641 111736ec InitializeCriticalSectionAndSpinCount 64638->64641 64642 11162be5 _free 65 API calls 64640->64642 64643 11173708 64641->64643 64644 111736fc 64641->64644 64642->64643 64661 11173733 LeaveCriticalSection _doexit 64643->64661 64645 11162be5 _free 65 API calls 64644->64645 64647 11173702 64645->64647 64660 111692ef 66 API calls __getptd_noexit 64647->64660 64650->64628 64651->64634 64655 11169d82 64653->64655 64654 11162b51 _malloc 65 API calls 64654->64655 64655->64654 64656 11169db8 64655->64656 64657 11169d99 Sleep 64655->64657 64656->64631 64656->64632 64658 11169dae 64657->64658 64658->64655 64658->64656 64659->64633 64660->64643 64661->64633 64662->64525 64663->64020 64664 11115b70 64682 11145320 64664->64682 64667 11115bb5 64668 11115bc4 CoInitialize CoCreateInstance 64667->64668 64669 11115b98 64667->64669 64670 11115bf4 LoadLibraryA 64668->64670 64674 11115be9 64668->64674 64671 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64669->64671 64673 11115c10 GetProcAddress 64670->64673 64670->64674 64675 11115ba6 64671->64675 64672 111450a0 std::locale::_Init 91 API calls 64672->64667 64676 11115c20 SHGetSettings 64673->64676 64677 11115c34 FreeLibrary 64673->64677 64678 11115cd1 CoUninitialize 64674->64678 64679 11115cd7 64674->64679 64676->64677 64677->64674 64678->64679 64680 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64679->64680 64681 11115ce6 64680->64681 64683 111450a0 std::locale::_Init 91 API calls 64682->64683 64684 11115b8e 64683->64684 64684->64667 64684->64669 64684->64672 64685 11173a35 64686 1116b7b5 __getptd 66 API calls 64685->64686 64687 11173a52 _LcidFromHexString 64686->64687 64688 11173a5f GetLocaleInfoA 64687->64688 64689 11173a92 64688->64689 64697 11173a86 64688->64697 64708 111646ce 86 API calls 3 library calls 64689->64708 64691 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64693 11173c02 64691->64693 64692 11173a9e 64694 11173aa8 GetLocaleInfoA 64692->64694 64705 11173ad8 _LangCountryEnumProc@4 _strlen 64692->64705 64695 11173ac7 64694->64695 64694->64697 64709 111646ce 86 API calls 3 library calls 64695->64709 64696 11173b4b GetLocaleInfoA 64696->64697 64699 11173b6e 64696->64699 64697->64691 64711 111646ce 86 API calls 3 library calls 64699->64711 64701 11173ad2 64701->64705 64710 11163784 86 API calls 3 library calls 64701->64710 64702 11173b79 64702->64697 64706 11173b81 _strlen 64702->64706 64712 111646ce 86 API calls 3 library calls 64702->64712 64705->64696 64705->64697 64706->64697 64713 111739da GetLocaleInfoW _GetPrimaryLen _strlen 64706->64713 64708->64692 64709->64701 64710->64705 64711->64702 64712->64706 64713->64697 64714 1102e640 64715 1102e683 64714->64715 64716 1110f420 std::locale::_Init 268 API calls 64715->64716 64717 1102e68a 64716->64717 64719 1102e6aa 64717->64719 65774 11142a60 64717->65774 65109 11142bb0 64719->65109 64722 1102e701 64725 11142bb0 87 API calls 64722->64725 64724 1102e6e6 64727 11081bb0 87 API calls 64724->64727 64726 1102e72a 64725->64726 64728 11162de7 std::locale::_Init 80 API calls 64726->64728 64733 1102e737 64726->64733 64727->64722 64728->64733 64729 1102e766 64730 1102e7e5 CreateEventA 64729->64730 64731 1102e7bf GetSystemMetrics 64729->64731 64738 1102e805 64730->64738 64739 1102e819 64730->64739 64731->64730 64732 1102e7ce 64731->64732 64734 11146450 std::locale::_Init 21 API calls 64732->64734 64733->64729 64736 111450a0 std::locale::_Init 91 API calls 64733->64736 64737 1102e7d8 64734->64737 64736->64729 65792 1102d330 64737->65792 65936 11029450 268 API calls 2 library calls 64738->65936 64742 1110f420 std::locale::_Init 268 API calls 64739->64742 64743 1102e820 64742->64743 64744 1102e840 64743->64744 64745 111100d0 427 API calls 64743->64745 64746 1110f420 std::locale::_Init 268 API calls 64744->64746 64745->64744 64747 1102e854 64746->64747 64748 111100d0 427 API calls 64747->64748 64749 1102e874 64747->64749 64748->64749 64750 1110f420 std::locale::_Init 268 API calls 64749->64750 64751 1102e8f3 64750->64751 64752 1110f420 std::locale::_Init 268 API calls 64751->64752 64753 1102e93d 64752->64753 64754 1102e962 FindWindowA 64753->64754 65937 11060be0 291 API calls std::locale::_Init 64753->65937 64757 1102eab7 64754->64757 64758 1102e99b 64754->64758 65115 110613d0 64757->65115 64758->64757 64761 1102e9b3 GetWindowThreadProcessId 64758->64761 64763 11146450 std::locale::_Init 21 API calls 64761->64763 64762 110613d0 271 API calls 64764 1102ead5 64762->64764 64765 1102e9d9 OpenProcess 64763->64765 64766 110613d0 271 API calls 64764->64766 64765->64757 64767 1102e9f9 64765->64767 64768 1102eae1 64766->64768 65938 11094b30 106 API calls 64767->65938 64770 1102eaf8 64768->64770 64771 1102eaef 64768->64771 65122 11145910 64770->65122 65939 11027d60 120 API calls 2 library calls 64771->65939 64772 1102ea18 64775 11146450 std::locale::_Init 21 API calls 64772->64775 64778 1102ea2c 64775->64778 64776 1102eaf4 64776->64770 64777 1102eb07 65137 11144dc0 ExpandEnvironmentStringsA 64777->65137 64779 1102ea6b CloseHandle FindWindowA 64778->64779 64783 11146450 std::locale::_Init 21 API calls 64778->64783 64780 1102ea93 GetWindowThreadProcessId 64779->64780 64781 1102eaa7 64779->64781 64780->64781 64784 11146450 std::locale::_Init 21 API calls 64781->64784 64786 1102ea3e SendMessageA WaitForSingleObject 64783->64786 64787 1102eab4 64784->64787 64786->64779 64789 1102ea5e 64786->64789 64787->64757 64791 11146450 std::locale::_Init 21 API calls 64789->64791 64790 1102eb2a 64793 1102ec01 64790->64793 65161 11062d60 64790->65161 64792 1102ea68 64791->64792 64792->64779 65176 110274c0 64793->65176 64799 1102ec26 64809 1102ec41 64799->64809 65195 1102a620 64799->65195 65999 11142ac0 65109->65999 65111 11142bc5 65112 1102e6d4 65111->65112 65113 11142ac0 IsDBCSLeadByte 65111->65113 65114 11165797 86 API calls std::locale::_Init 65111->65114 65112->64722 65782 11081bb0 65112->65782 65113->65111 65114->65111 65116 11061446 65115->65116 65121 110613f7 65115->65121 65117 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65116->65117 65120 1102eac9 65117->65120 65118 11081bb0 87 API calls 65118->65121 65120->64762 65121->65116 65121->65118 66011 110612f0 271 API calls 4 library calls 65121->66011 66012 11144bd0 65122->66012 65125 11144bd0 std::locale::_Init 268 API calls 65126 11145947 wsprintfA 65125->65126 65127 11143230 std::locale::_Init 8 API calls 65126->65127 65128 11145964 65127->65128 65129 11145990 65128->65129 65131 11143230 std::locale::_Init 8 API calls 65128->65131 65130 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65129->65130 65132 1114599c 65130->65132 65133 11145979 65131->65133 65132->64777 65133->65129 65134 11145980 65133->65134 65135 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65134->65135 65136 1114598c 65135->65136 65136->64777 65138 11144df7 65137->65138 65139 11144e14 std::locale::_Init 65138->65139 65140 11144e2e 65138->65140 65148 11144e04 65138->65148 65144 11144e25 GetModuleFileNameA 65139->65144 65141 11144bd0 std::locale::_Init 268 API calls 65140->65141 65142 11144e34 65141->65142 65146 11081b40 std::locale::_Init IsDBCSLeadByte 65142->65146 65143 11142290 std::locale::_Init 268 API calls 65145 11144e88 65143->65145 65144->65142 65147 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65145->65147 65146->65148 65149 1102eb18 65147->65149 65148->65143 65150 11143230 65149->65150 65151 11143251 CreateFileA 65150->65151 65153 111432ee CloseHandle 65151->65153 65154 111432ce 65151->65154 65157 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65153->65157 65155 111432d2 CreateFileA 65154->65155 65156 1114330b 65154->65156 65155->65153 65155->65156 65159 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65156->65159 65158 11143307 65157->65158 65158->64790 65160 1114331a 65159->65160 65160->64790 65162 1105dd10 80 API calls 65161->65162 65163 11062d88 65162->65163 66061 11061c90 65163->66061 65177 110274f4 65176->65177 65178 1105dd10 80 API calls 65177->65178 65181 11027509 65178->65181 65179 110275d8 65185 1102768c 65179->65185 65193 11081bb0 87 API calls 65179->65193 65194 111450a0 std::locale::_Init 91 API calls 65179->65194 66769 110612f0 271 API calls 4 library calls 65179->66769 65180 1102755f LoadIconA 65183 11027571 65180->65183 65184 1102757a GetSystemMetrics GetSystemMetrics LoadImageA 65180->65184 65181->65179 65181->65180 65182 11145320 std::locale::_Init 91 API calls 65181->65182 65186 11027542 LoadLibraryExA 65182->65186 65183->65184 65187 110275b3 65184->65187 65188 1102759f LoadIconA 65184->65188 65189 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65185->65189 65186->65180 65186->65188 65187->65179 65191 110275b7 GetSystemMetrics GetSystemMetrics LoadImageA 65187->65191 65188->65187 65192 11027699 65189->65192 65191->65179 65192->64799 65193->65179 65194->65179 65775 11142aa8 65774->65775 65778 11142a6e 65774->65778 65776 11142290 std::locale::_Init 268 API calls 65775->65776 65777 11142ab0 65776->65777 65777->64719 65778->65775 65779 11142a92 65778->65779 67812 11142310 270 API calls std::locale::_Init 65779->67812 65781 11142a98 65781->64719 65783 11081bbd 65782->65783 65784 11081bc2 65782->65784 67813 11081990 IsDBCSLeadByte 65783->67813 65786 11081bcb 65784->65786 65790 11081bdf 65784->65790 67814 111646ce 86 API calls 3 library calls 65786->67814 65788 11081bd8 65788->64724 65789 11081c43 65789->64724 65790->65789 65791 11165797 86 API calls std::locale::_Init 65790->65791 65791->65790 65793 11146450 std::locale::_Init 21 API calls 65792->65793 65794 1102d36c 65793->65794 65795 11145320 std::locale::_Init 91 API calls 65794->65795 65796 1102d374 65795->65796 65797 1102d3a9 GetCurrentProcess SetPriorityClass 65796->65797 65798 1102d37d InterlockedIncrement 65796->65798 65801 1102d3dd 65797->65801 65798->65797 65799 1102d38c 65798->65799 65800 11146450 std::locale::_Init 21 API calls 65799->65800 65802 1102d396 65800->65802 65803 1102d3e6 SetEvent 65801->65803 65806 1102d3ed 65801->65806 65804 1102d3a0 Sleep 65802->65804 65803->65806 65804->65804 65805 1102d424 65810 1102d452 65805->65810 67834 1109f1d0 276 API calls std::locale::_Init 65805->67834 65806->65805 67832 11029370 280 API calls 2 library calls 65806->67832 65809 1102d40d 67833 110ff6c0 279 API calls 2 library calls 65809->67833 67815 11028090 SetEvent 65810->67815 65813 1102d468 65814 1102d47d 65813->65814 67835 110ec980 457 API calls 65813->67835 65816 1102d49f 65814->65816 67836 110594a0 SetEvent 65814->67836 65818 1102d4de 65816->65818 65819 1102d4b3 Sleep 65816->65819 65820 11146450 std::locale::_Init 21 API calls 65818->65820 65819->65818 65821 1102d4e8 65820->65821 65822 1102d518 65821->65822 65823 1105dd10 80 API calls 65821->65823 65825 1102d53f 65822->65825 65828 1102d58a 65822->65828 65823->65822 67816 110affa0 65825->67816 65830 1102d5a9 65828->65830 65842 1102d5cb 65828->65842 65833 1102d5af PostThreadMessageA 65830->65833 65830->65842 65831 1102d613 65834 1102d62d 65831->65834 65847 11146450 std::locale::_Init 21 API calls 65831->65847 67839 1110f3a0 WaitForSingleObject 65833->67839 65838 1102d66b 65834->65838 65839 1102d65c 65834->65839 65835 1102d5f0 67841 11059400 DeleteCriticalSection CloseHandle 65835->67841 65837 1102d56a 65844 1102d57d 65837->65844 67838 111352b0 301 API calls 5 library calls 65837->67838 65846 1102d681 65838->65846 65851 11075d10 404 API calls 65838->65851 67842 11105420 26 API calls std::locale::_Init 65839->67842 65842->65831 65842->65835 67840 1110f3a0 WaitForSingleObject 65842->67840 67861 1100d4e0 FreeLibrary 65844->67861 65852 11146450 std::locale::_Init 21 API calls 65846->65852 65847->65834 65849 1102d661 67843 11107b50 652 API calls std::locale::_Init 65849->67843 65851->65846 65855 1102d68b 65852->65855 65854 1102d889 65858 1102d8a0 65854->65858 67862 1100d200 wsprintfA 65854->67862 65859 1113cc30 302 API calls 65855->65859 65856 1102d666 67844 11105ac0 350 API calls std::locale::_Init 65856->67844 65865 1102d8c7 GetModuleFileNameA GetFileAttributesA 65858->65865 65880 1102d9fa 65858->65880 65860 1102d690 65859->65860 65863 11146450 std::locale::_Init 21 API calls 65860->65863 65866 1102d69a 65863->65866 65864 1102d895 65867 11146450 std::locale::_Init 21 API calls 65864->65867 65868 1102d8ef 65865->65868 65865->65880 65869 1102d6b7 65866->65869 65870 1102d6a9 65866->65870 65867->65858 65872 1110f420 std::locale::_Init 268 API calls 65868->65872 65875 11146450 std::locale::_Init 21 API calls 65869->65875 67845 1109d920 WaitForSingleObject SetEvent WaitForSingleObject CloseHandle 65870->67845 65871 11146450 std::locale::_Init 21 API calls 65874 1102da92 65871->65874 65876 1102d8f6 65872->65876 67865 11146410 FreeLibrary 65874->67865 65879 1102d6c1 65875->65879 65881 11142a60 270 API calls 65876->65881 65882 1102d918 65876->65882 65889 1102d6d5 std::ios_base::_Ios_base_dtor 65879->65889 67846 1110e5c0 DeleteCriticalSection std::ios_base::_Ios_base_dtor 65879->67846 65880->65871 65881->65882 65900 11142bb0 87 API calls 65882->65900 65883 1102da9a 65884 1102dad6 65883->65884 65890 1102dac4 ExitWindowsEx 65883->65890 65891 1102dab4 ExitWindowsEx Sleep 65883->65891 65886 1102dae6 65884->65886 65887 1102dadb Sleep 65884->65887 65892 11146450 std::locale::_Init 21 API calls 65886->65892 65887->65886 65888 1102d74f 65893 1102d75b 65888->65893 65894 1102d769 65888->65894 65889->65888 67847 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 65889->67847 65890->65884 65891->65890 65897 1102daf0 ExitProcess 65892->65897 67849 1110fc70 281 API calls 2 library calls 65893->67849 65899 1102d7e2 65894->65899 65913 1102d760 std::ios_base::_Ios_base_dtor 65894->65913 65902 11146450 std::locale::_Init 21 API calls 65899->65902 65903 1102d93d 65900->65903 65904 1102d7ec 65902->65904 65905 1102d9e3 65903->65905 65908 11081b40 std::locale::_Init IsDBCSLeadByte 65903->65908 65906 1102d7fb 65904->65906 65907 1102d809 CloseHandle 65904->65907 65905->65880 67851 1108a570 65906->67851 65909 1102d824 65907->65909 65910 1102d82a 65907->65910 65914 1102d953 65908->65914 65916 11162be5 _free 66 API calls 65909->65916 65935 1102d869 std::ios_base::_Ios_base_dtor 65910->65935 67858 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 65910->67858 65911 11146450 std::locale::_Init 21 API calls 65925 1102d6ff std::ios_base::_Ios_base_dtor 65911->65925 65913->65894 65913->65899 67850 1110fc70 281 API calls 2 library calls 65913->67850 65915 1102d96e _memset 65914->65915 67863 11029450 268 API calls 2 library calls 65914->67863 65920 1102d988 FindFirstFileA 65915->65920 65916->65910 65917 1102d800 std::ios_base::_Ios_base_dtor 65917->65907 65924 1102d858 65924->65935 67860 1110fc70 281 API calls 2 library calls 65924->67860 65925->65888 65925->65911 67848 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 65925->67848 65926 1102d7d9 std::ios_base::_Ios_base_dtor 65926->65899 65927 11162be5 _free 66 API calls 65930 1102d83c 65927->65930 65930->65924 65930->65927 67859 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 65930->67859 65935->65844 65937->64754 65938->64772 65939->64776 66000 11142ad6 65999->66000 66002 11142b93 66000->66002 66006 11081a70 66000->66006 66002->65111 66003 11142afb 66004 11081a70 IsDBCSLeadByte 66003->66004 66005 11142b2b _memmove 66004->66005 66005->65111 66007 11081a7c 66006->66007 66009 11081a81 __mbschr_l std::locale::_Init 66006->66009 66010 11081990 IsDBCSLeadByte 66007->66010 66009->66003 66010->66009 66011->65121 66013 11144bf2 66012->66013 66017 11144c09 std::locale::_Init 66012->66017 66058 11029450 268 API calls 2 library calls 66013->66058 66016 11144d97 66018 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 66016->66018 66017->66016 66019 11144c3c GetModuleFileNameA 66017->66019 66020 11144db3 wsprintfA 66018->66020 66036 11081b40 66019->66036 66020->65125 66022 11144c51 66023 11144c61 SHGetFolderPathA 66022->66023 66035 11144d48 66022->66035 66024 11144c8e 66023->66024 66025 11144cad SHGetFolderPathA 66023->66025 66024->66025 66028 11144c94 66024->66028 66029 11144ce2 66025->66029 66026 11142290 std::locale::_Init 265 API calls 66026->66016 66059 11029450 268 API calls 2 library calls 66028->66059 66032 1102a620 std::locale::_Init 147 API calls 66029->66032 66033 11144cf3 66032->66033 66040 11144670 66033->66040 66035->66026 66037 11081b53 _strrchr 66036->66037 66039 11081b6a std::locale::_Init 66037->66039 66060 11081990 IsDBCSLeadByte 66037->66060 66039->66022 66041 111446fa 66040->66041 66042 1114467b 66040->66042 66041->66035 66042->66041 66043 1114468b GetFileAttributesA 66042->66043 66044 111446a5 66043->66044 66045 11144697 66043->66045 66046 11163cf8 __strdup 66 API calls 66044->66046 66045->66035 66047 111446ac 66046->66047 66048 11081b40 std::locale::_Init IsDBCSLeadByte 66047->66048 66049 111446b6 66048->66049 66050 11144670 std::locale::_Init 67 API calls 66049->66050 66056 111446d3 66049->66056 66051 111446c6 66050->66051 66052 111446dc 66051->66052 66053 111446ce 66051->66053 66055 11162be5 _free 66 API calls 66052->66055 66054 11162be5 _free 66 API calls 66053->66054 66054->66056 66057 111446e1 CreateDirectoryA 66055->66057 66056->66035 66057->66056 66060->66039 66175 11144ea0 66061->66175 66063 11061d1c 66064 110d1550 271 API calls 66063->66064 66065 11061d30 66064->66065 66066 11061f17 66065->66066 66112 11061d44 std::ios_base::_Ios_base_dtor 66065->66112 66184 1116449d 66065->66184 66182 11144eb3 std::ios_base::_Ios_base_dtor 66175->66182 66176 11144dc0 270 API calls 66176->66182 66178 11144f1a std::ios_base::_Ios_base_dtor 66178->66063 66179 11144ed5 GetLastError 66180 11144ee0 Sleep 66179->66180 66179->66182 66181 11163fed std::locale::_Init 144 API calls 66180->66181 66183 11144ef2 66181->66183 66182->66176 66182->66178 66182->66179 66262 11163fed 66182->66262 66183->66178 66183->66182 66265 11163f31 66262->66265 66266 11163f3d __getstream 66265->66266 66267 11163f50 66266->66267 66270 11163f7d 66266->66270 66322 111692ef 66 API calls __getptd_noexit 66267->66322 66769->65179 67812->65781 67813->65784 67814->65788 67815->65813 67866 110805f0 67816->67866 67821 1102d54a 67825 110eb080 67821->67825 67822 110affe7 67878 11029450 268 API calls 2 library calls 67822->67878 67826 110affa0 270 API calls 67825->67826 67827 110eb0ad 67826->67827 67894 110ea450 67827->67894 67829 110eb0f1 67904 110b0190 270 API calls std::locale::_Init 67829->67904 67831 1102d555 67837 110b0190 270 API calls std::locale::_Init 67831->67837 67832->65809 67833->65805 67834->65810 67835->65814 67836->65816 67837->65837 67838->65844 67839->65830 67840->65842 67842->65849 67843->65856 67844->65838 67846->65889 67847->65925 67848->65925 67849->65913 67850->65926 67852 1108a617 67851->67852 67856 1108a5aa std::ios_base::_Ios_base_dtor 67851->67856 67853 1108a61e DeleteCriticalSection 67852->67853 67907 1106e1b0 67853->67907 67854 1108a5be CloseHandle 67854->67856 67856->67852 67856->67854 67857 1108a644 std::ios_base::_Ios_base_dtor 67857->65917 67858->65930 67859->65930 67860->65935 67861->65854 67862->65864 67865->65883 67867 11080614 67866->67867 67868 11080618 67867->67868 67869 1108062f 67867->67869 67879 11029450 268 API calls 2 library calls 67868->67879 67871 11080648 67869->67871 67872 1108062c 67869->67872 67875 110aff90 67871->67875 67872->67869 67880 11029450 268 API calls 2 library calls 67872->67880 67881 110812d0 67875->67881 67882 1108131d 67881->67882 67883 110812f1 67881->67883 67885 1108136a wsprintfA 67882->67885 67886 11081345 wsprintfA 67882->67886 67883->67882 67884 1108130b 67883->67884 67887 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 67884->67887 67893 11029450 268 API calls 2 library calls 67885->67893 67886->67882 67889 11081319 67887->67889 67889->67821 67889->67822 67896 110ea45b 67894->67896 67895 110ea4f5 67895->67829 67896->67895 67897 110ea47e 67896->67897 67899 110ea495 67896->67899 67905 11029450 268 API calls 2 library calls 67897->67905 67900 110ea492 67899->67900 67901 110ea4c2 SendMessageTimeoutA 67899->67901 67900->67899 67906 11029450 268 API calls 2 library calls 67900->67906 67901->67895 67904->67831 67910 1106e1c4 67907->67910 67908 1106e1c8 67908->67857 67910->67908 67911 1106d9a0 67 API calls 2 library calls 67910->67911 67911->67910 67926 11022aa0 67927 11022aba 67926->67927 67928 11022bad 67926->67928 67931 11022ac0 67927->67931 67932 11022b97 67927->67932 67929 11022c07 67928->67929 67930 11022bb5 67928->67930 67943 11022b31 67929->67943 67965 11022a70 416 API calls _free 67929->67965 67934 11022bfc 67930->67934 67942 11022bb7 67930->67942 67938 11022b83 67931->67938 67939 11022ada 67931->67939 67931->67943 67950 11022afa 67931->67950 67963 1101e8f0 293 API calls 67932->67963 67964 1101e5b0 311 API calls 2 library calls 67934->67964 67936 11022ba4 67962 1101e8c0 373 API calls 67938->67962 67939->67943 67945 11022aeb SetFocus 67939->67945 67941 11022c32 67942->67943 67948 11022bd5 67942->67948 67952 11089a40 67942->67952 67949 11022b4b 67943->67949 67966 110cb890 7 API calls 67943->67966 67945->67943 67946 11022c05 67946->67943 67950->67943 67961 1101f9e0 335 API calls 2 library calls 67950->67961 67953 1110f6c0 ___DllMainCRTStartup 4 API calls 67952->67953 67954 11089a53 67953->67954 67955 11089a5d 67954->67955 67970 11089150 271 API calls std::locale::_Init 67954->67970 67957 11089a84 67955->67957 67971 11089150 271 API calls std::locale::_Init 67955->67971 67960 11089a93 67957->67960 67967 11089a10 67957->67967 67960->67943 67961->67943 67962->67943 67963->67936 67964->67946 67965->67943 67966->67941 67972 110896a0 67967->67972 67970->67955 67971->67957 68013 11088970 6 API calls ___DllMainCRTStartup 67972->68013 67974 110896d9 GetParent 67975 110896ec 67974->67975 67976 110896fd 67974->67976 67977 110896f0 GetParent 67975->67977 67978 11144dc0 270 API calls 67976->67978 67977->67976 67977->67977 67979 11089709 67978->67979 67980 11163fed std::locale::_Init 144 API calls 67979->67980 67981 11089716 std::ios_base::_Ios_base_dtor 67980->67981 67982 11144dc0 270 API calls 67981->67982 67983 1108972f 67982->67983 68014 11013830 22 API calls 2 library calls 67983->68014 67985 1108974a 67985->67985 67986 11143230 std::locale::_Init 8 API calls 67985->67986 67988 1108978a std::ios_base::_Ios_base_dtor 67986->67988 67987 110897a5 67989 11163db7 std::locale::_Init 103 API calls 67987->67989 67991 110897c3 67987->67991 67988->67987 67990 11142290 std::locale::_Init 268 API calls 67988->67990 67989->67991 67990->67987 67993 1102a620 std::locale::_Init 147 API calls 67991->67993 68002 11089874 std::ios_base::_Ios_base_dtor 67991->68002 67992 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 67994 11089962 67992->67994 67995 11089813 67993->67995 67994->67960 67996 11142290 std::locale::_Init 268 API calls 67995->67996 67997 1108981b 67996->67997 67998 11081b40 std::locale::_Init IsDBCSLeadByte 67997->67998 67999 11089832 67998->67999 68000 11081bb0 87 API calls 67999->68000 67999->68002 68001 1108984a 68000->68001 68003 1108988e 68001->68003 68004 11089851 68001->68004 68002->67992 68005 11081bb0 87 API calls 68003->68005 68015 110b75d0 68004->68015 68007 11089899 68005->68007 68007->68002 68010 110b75d0 68 API calls 68007->68010 68009 110b75d0 68 API calls 68009->68002 68011 110898a6 68010->68011 68011->68002 68012 110b75d0 68 API calls 68011->68012 68012->68002 68013->67974 68014->67985 68018 110b75b0 68015->68018 68021 111672e3 68018->68021 68024 11167264 68021->68024 68025 11167271 68024->68025 68026 1116728b 68024->68026 68042 11169302 66 API calls __getptd_noexit 68025->68042 68026->68025 68028 11167294 GetFileAttributesA 68026->68028 68030 111672a2 GetLastError 68028->68030 68036 111672b8 68028->68036 68029 11167276 68043 111692ef 66 API calls __getptd_noexit 68029->68043 68045 11169315 66 API calls __dosmaperr 68030->68045 68031 11089857 68031->68002 68031->68009 68034 1116727d 68044 1116df04 11 API calls _fgets 68034->68044 68035 111672ae 68046 111692ef 66 API calls __getptd_noexit 68035->68046 68036->68031 68047 11169302 66 API calls __getptd_noexit 68036->68047 68040 111672cb 68048 111692ef 66 API calls __getptd_noexit 68040->68048 68042->68029 68043->68034 68044->68031 68045->68035 68046->68031 68047->68040 68048->68035 68049 11134d10 68050 11134d19 68049->68050 68056 11134d48 68049->68056 68051 11145320 std::locale::_Init 91 API calls 68050->68051 68052 11134d1e 68051->68052 68053 11132bf0 276 API calls 68052->68053 68052->68056 68054 11134d27 68053->68054 68055 1105dd10 80 API calls 68054->68055 68054->68056 68055->68056 68057 110310c0 68058 110310ce 68057->68058 68059 11145e80 268 API calls 68058->68059 68060 110310df SetUnhandledExceptionFilter 68059->68060 68061 110310ef std::locale::_Init 68060->68061 68062 c41020 GetCommandLineA 68063 c41035 GetStartupInfoA 68062->68063 68065 c41090 GetModuleHandleA 68063->68065 68066 c4108b 68063->68066 68069 c41000 _NSMClient32 68065->68069 68066->68065 68068 c410a2 ExitProcess 68069->68068 68070 11040860 68071 11040892 68070->68071 68072 11040898 68071->68072 68079 110408b4 68071->68079 68073 110facc0 15 API calls 68072->68073 68075 110408aa CloseHandle 68073->68075 68074 110409c8 68076 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68074->68076 68075->68079 68078 110409d5 68076->68078 68077 11040948 68092 110facc0 GetTokenInformation 68077->68092 68079->68074 68082 110408ed 68079->68082 68102 11087ee0 297 API calls 5 library calls 68079->68102 68082->68074 68082->68077 68083 1104095a 68084 11040962 CloseHandle 68083->68084 68088 11040969 68083->68088 68084->68088 68085 110409ab 68086 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68085->68086 68089 110409c4 68086->68089 68087 11040991 68090 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68087->68090 68088->68085 68088->68087 68091 110409a7 68090->68091 68093 110fad08 68092->68093 68094 110facf7 68092->68094 68103 110f1f50 9 API calls 68093->68103 68095 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68094->68095 68097 110fad04 68095->68097 68097->68083 68098 110fad2c 68098->68094 68099 110fad34 68098->68099 68100 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68099->68100 68101 110fad5a 68100->68101 68101->68083 68102->68082 68103->68098 68104 11060e40 68105 11060760 271 API calls 68104->68105 68106 11060e8a 68105->68106 68107 110607f0 274 API calls 68106->68107 68111 11060e9c 68107->68111 68108 11060ed8 68115 11060640 69 API calls std::ios_base::_Ios_base_dtor 68108->68115 68110 11060eea 68112 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68110->68112 68111->68108 68114 110607f0 274 API calls 68111->68114 68113 11060f02 68112->68113 68114->68111 68115->68110 68116 111071e0 68117 111071ec 68116->68117 68118 1110721d 68117->68118 68120 111450a0 std::locale::_Init 91 API calls 68117->68120 68163 11106100 284 API calls std::locale::_Init 68118->68163 68122 11107201 68120->68122 68121 11107223 68122->68118 68126 111062e0 68122->68126 68125 11107218 68164 11163180 68126->68164 68128 111062fb LoadLibraryA 68175 11137340 279 API calls 2 library calls 68128->68175 68130 11106361 68131 11106365 68130->68131 68132 1110637d 68130->68132 68131->68132 68133 1110636a 68131->68133 68134 111450a0 std::locale::_Init 91 API calls 68132->68134 68135 11106375 68133->68135 68136 1110636e FreeLibrary 68133->68136 68137 11106386 68134->68137 68141 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68135->68141 68136->68135 68138 111063a1 LoadLibraryA GetProcAddress 68137->68138 68139 11106397 68137->68139 68140 111064d1 SetLastError 68138->68140 68152 11106443 68138->68152 68139->68138 68143 1110660f 68140->68143 68142 11106665 68141->68142 68142->68118 68142->68125 68144 111450a0 std::locale::_Init 91 API calls 68143->68144 68145 11106624 68144->68145 68146 11106635 FreeLibrary 68145->68146 68147 1110663c 68145->68147 68146->68147 68147->68135 68148 11106640 FreeLibrary 68147->68148 68148->68135 68149 111064f2 OpenProcess 68150 11106497 68149->68150 68149->68152 68150->68143 68150->68149 68151 111064a5 GetProcAddress 68150->68151 68150->68152 68155 111065e5 CloseHandle 68150->68155 68156 11081b40 std::locale::_Init IsDBCSLeadByte 68150->68156 68157 11081bb0 87 API calls 68150->68157 68158 11106556 OpenProcessToken 68150->68158 68159 11106574 GetTokenInformation 68150->68159 68160 111065d8 CloseHandle 68150->68160 68176 11106100 284 API calls std::locale::_Init 68150->68176 68177 110f5e90 25 API calls std::locale::_Init 68150->68177 68151->68150 68153 111064de SetLastError 68151->68153 68152->68143 68152->68149 68152->68150 68165 11025d00 68152->68165 68153->68150 68155->68143 68155->68150 68156->68150 68157->68150 68158->68150 68158->68155 68159->68150 68159->68160 68160->68155 68163->68121 68164->68128 68166 11025d0e GetProcAddress 68165->68166 68167 11025d1f 68165->68167 68166->68167 68168 11025d38 68167->68168 68169 11025d2c K32GetProcessImageFileNameA 68167->68169 68171 11025d3e GetProcAddress 68168->68171 68172 11025d4f 68168->68172 68169->68168 68170 11025d71 68169->68170 68170->68150 68171->68172 68173 11025d56 68172->68173 68174 11025d67 SetLastError 68172->68174 68173->68150 68174->68170 68175->68130 68176->68150 68177->68150 68178 110173f0 GetTickCount 68185 11017300 68178->68185 68183 11146450 std::locale::_Init 21 API calls 68184 11017437 68183->68184 68186 11017320 68185->68186 68187 110173d6 68185->68187 68188 11017342 CoInitialize _GetRawWMIStringW 68186->68188 68190 11017339 WaitForSingleObject 68186->68190 68189 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68187->68189 68191 110173c2 68188->68191 68194 11017375 68188->68194 68192 110173e5 68189->68192 68190->68188 68191->68187 68193 110173d0 CoUninitialize 68191->68193 68198 11017220 68192->68198 68193->68187 68194->68191 68195 110173bc 68194->68195 68197 11163a2d std::locale::_Init 80 API calls 68194->68197 68211 11163837 __fassign 68195->68211 68197->68194 68199 11017240 68198->68199 68206 110172e6 68198->68206 68200 11017258 CoInitialize _GetRawWMIStringW 68199->68200 68202 1101724f WaitForSingleObject 68199->68202 68203 110172d2 68200->68203 68207 1101728b 68200->68207 68201 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68204 110172f5 SetEvent GetTickCount 68201->68204 68202->68200 68205 110172e0 CoUninitialize 68203->68205 68203->68206 68204->68183 68205->68206 68206->68201 68207->68203 68208 110172cc 68207->68208 68210 11163a2d std::locale::_Init 80 API calls 68207->68210 68212 11163837 __fassign 68208->68212 68210->68207 68211->68191 68212->68203 68213 11025cd0 LoadLibraryA 68214 1113cd60 68215 1113cd69 68214->68215 68216 1113cd6e 68214->68216 68218 11139090 68215->68218 68219 111390d2 68218->68219 68220 111390c7 GetCurrentThreadId 68218->68220 68221 111390e0 68219->68221 68345 11029330 68219->68345 68220->68219 68352 11133920 68221->68352 68227 111391d1 68233 11139202 FindWindowA 68227->68233 68237 1113929a 68227->68237 68228 1113974a 68229 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68228->68229 68231 11139772 68229->68231 68231->68216 68232 1113911c IsWindow IsWindowVisible 68235 11146450 std::locale::_Init 21 API calls 68232->68235 68234 11139217 IsWindowVisible 68233->68234 68233->68237 68236 1113921e 68234->68236 68234->68237 68238 11139147 68235->68238 68236->68237 68242 11138c30 394 API calls 68236->68242 68239 1105dd10 80 API calls 68237->68239 68248 111392bf 68237->68248 68240 1105dd10 80 API calls 68238->68240 68258 111392e7 68239->68258 68244 11139163 IsWindowVisible 68240->68244 68241 1113948a 68247 111394a7 68241->68247 68583 1106b860 301 API calls 68241->68583 68246 1113923f IsWindowVisible 68242->68246 68243 1105dd10 80 API calls 68253 1113945f 68243->68253 68244->68227 68249 11139171 68244->68249 68245 11138c30 394 API calls 68245->68241 68246->68237 68251 1113924e IsIconic 68246->68251 68260 111394b4 68247->68260 68261 111394bd 68247->68261 68248->68243 68248->68253 68249->68227 68250 11139179 68249->68250 68254 11146450 std::locale::_Init 21 API calls 68250->68254 68251->68237 68255 1113925f GetForegroundWindow 68251->68255 68253->68241 68253->68245 68256 11139183 GetForegroundWindow 68254->68256 68581 11131210 149 API calls 68255->68581 68262 11139192 EnableWindow 68256->68262 68263 111391be 68256->68263 68258->68248 68259 11139334 68258->68259 68265 11081a70 IsDBCSLeadByte 68258->68265 68267 11143230 std::locale::_Init 8 API calls 68259->68267 68584 11131b00 90 API calls 2 library calls 68260->68584 68268 111394d4 68261->68268 68269 111394c8 68261->68269 68579 11131210 149 API calls 68262->68579 68263->68227 68281 111391ca SetForegroundWindow 68263->68281 68264 1113926e 68582 11131210 149 API calls 68264->68582 68265->68259 68274 11139346 68267->68274 68586 111317a0 302 API calls std::locale::_Init 68268->68586 68275 111394d9 68269->68275 68276 111394cd 68269->68276 68273 111394ba 68273->68261 68277 11139353 GetLastError 68274->68277 68295 11139361 68274->68295 68280 11139599 68275->68280 68286 111394f1 68275->68286 68287 1113959b 68275->68287 68585 11131870 302 API calls std::locale::_Init 68276->68585 68283 11146450 std::locale::_Init 21 API calls 68277->68283 68279 111391a9 68580 11131210 149 API calls 68279->68580 68288 111386b0 300 API calls 68280->68288 68281->68227 68282 11139275 68289 1113928b EnableWindow 68282->68289 68291 11139284 SetForegroundWindow 68282->68291 68283->68295 68284 111394d2 68284->68275 68286->68280 68297 1110f420 std::locale::_Init 268 API calls 68286->68297 68287->68280 68592 1103f000 68 API calls 68287->68592 68307 111395ee 68288->68307 68289->68237 68290 111391b0 EnableWindow 68290->68263 68291->68289 68292 11139615 68292->68228 68303 1105dd10 80 API calls 68292->68303 68294 111395aa 68593 1103f040 68 API calls 68294->68593 68295->68248 68296 111393b2 68295->68296 68299 11081a70 IsDBCSLeadByte 68295->68299 68301 11143230 std::locale::_Init 8 API calls 68296->68301 68300 11139512 68297->68300 68299->68296 68304 11139544 68300->68304 68305 11139524 68300->68305 68306 111393c4 68301->68306 68302 111395b5 68594 1103f060 68 API calls 68302->68594 68310 11139645 68303->68310 68588 1110f260 InterlockedIncrement 68304->68588 68587 110573b0 306 API calls std::locale::_Init 68305->68587 68306->68248 68312 111393cb GetLastError 68306->68312 68307->68292 68497 11142210 68307->68497 68310->68228 68321 11139662 68310->68321 68322 1113968d 68310->68322 68316 11146450 std::locale::_Init 21 API calls 68312->68316 68314 111395c0 68595 1103f020 68 API calls 68314->68595 68315 11139533 68315->68304 68316->68248 68317 11139558 68589 1104e340 452 API calls 68317->68589 68319 111395cb 68596 1110f270 InterlockedDecrement 68319->68596 68324 1113966a 68321->68324 68325 11139699 GetTickCount 68321->68325 68322->68228 68322->68325 68327 11146450 std::locale::_Init 21 API calls 68324->68327 68325->68228 68328 111396ab 68325->68328 68326 1113956e 68590 1104e3b0 274 API calls 68326->68590 68331 11139675 GetTickCount 68327->68331 68329 11142e80 147 API calls 68328->68329 68332 111396b7 68329->68332 68331->68228 68333 11146ee0 272 API calls 68332->68333 68334 111396c2 68333->68334 68335 11142e80 147 API calls 68334->68335 68337 111396d5 68335->68337 68336 11139579 68336->68280 68591 110ebf30 288 API calls 68336->68591 68597 11025bb0 LoadLibraryA 68337->68597 68340 111396e2 68340->68340 68598 1112c7a0 GetProcAddress SetLastError 68340->68598 68342 11139729 68343 11139733 FreeLibrary 68342->68343 68344 1113973a std::ios_base::_Ios_base_dtor 68342->68344 68343->68344 68344->68228 68599 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 68345->68599 68347 1102933e 68348 11029353 68347->68348 68600 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 68347->68600 68601 11089cc0 272 API calls 2 library calls 68348->68601 68351 1102935e 68351->68221 68353 11133962 68352->68353 68354 11133c84 68352->68354 68355 1105dd10 80 API calls 68353->68355 68356 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68354->68356 68358 11133982 68355->68358 68357 11133c9c 68356->68357 68400 11133400 68357->68400 68358->68354 68359 1113398a GetLocalTime 68358->68359 68360 111339c1 LoadLibraryA 68359->68360 68361 111339a0 68359->68361 68602 110098c0 LoadLibraryA 68360->68602 68362 11146450 std::locale::_Init 21 API calls 68361->68362 68364 111339b5 68362->68364 68364->68360 68365 11133a15 68603 11015c30 LoadLibraryA 68365->68603 68367 11133a20 GetCurrentProcess 68368 11133a45 GetProcAddress 68367->68368 68369 11133a5d GetProcessHandleCount 68367->68369 68368->68369 68370 11133a66 SetLastError 68368->68370 68371 11133a6e 68369->68371 68370->68371 68372 11133a92 68371->68372 68373 11133a78 GetProcAddress 68371->68373 68375 11133aa0 GetProcAddress 68372->68375 68376 11133aba 68372->68376 68373->68372 68374 11133ac7 SetLastError 68373->68374 68374->68375 68375->68376 68377 11133ad4 SetLastError 68375->68377 68378 11133adf GetProcAddress 68376->68378 68377->68378 68379 11133af1 K32GetProcessMemoryInfo 68378->68379 68380 11133aff SetLastError 68378->68380 68381 11133b07 68379->68381 68380->68381 68382 11146450 std::locale::_Init 21 API calls 68381->68382 68384 11133b7d 68381->68384 68382->68384 68383 11133c5a 68385 11133c6a FreeLibrary 68383->68385 68386 11133c6d 68383->68386 68384->68383 68390 1105dd10 80 API calls 68384->68390 68385->68386 68387 11133c77 FreeLibrary 68386->68387 68388 11133c7a 68386->68388 68387->68388 68388->68354 68389 11133c81 FreeLibrary 68388->68389 68389->68354 68391 11133bce 68390->68391 68392 1105dd10 80 API calls 68391->68392 68393 11133bf6 68392->68393 68394 1105dd10 80 API calls 68393->68394 68395 11133c1d 68394->68395 68396 1105dd10 80 API calls 68395->68396 68397 11133c44 68396->68397 68397->68383 68398 11133c55 68397->68398 68604 11027780 268 API calls 2 library calls 68398->68604 68402 1113342d 68400->68402 68401 111338e9 68401->68227 68401->68228 68501 11138c30 68401->68501 68402->68401 68403 110d1550 271 API calls 68402->68403 68404 1113348e 68403->68404 68405 110d1550 271 API calls 68404->68405 68406 11133499 68405->68406 68407 111334c7 68406->68407 68408 111334de 68406->68408 68605 11029450 268 API calls 2 library calls 68407->68605 68410 11146450 std::locale::_Init 21 API calls 68408->68410 68412 111334ec 68410->68412 68413 11133505 68412->68413 68414 1113351c 68412->68414 68606 11029450 268 API calls 2 library calls 68413->68606 68416 11081bb0 87 API calls 68414->68416 68418 1113352a 68416->68418 68419 11133541 68418->68419 68607 11009450 268 API calls std::locale::_Init 68418->68607 68421 11146450 std::locale::_Init 21 API calls 68419->68421 68425 111335e5 68419->68425 68423 11133556 68421->68423 68422 1113353b 68424 11081a70 IsDBCSLeadByte 68422->68424 68423->68425 68427 11146450 std::locale::_Init 21 API calls 68423->68427 68424->68419 68426 11146450 std::locale::_Init 21 API calls 68425->68426 68441 1113368e 68425->68441 68438 111335f7 68426->68438 68428 11133580 68427->68428 68608 110ed7a0 RegCloseKey 68428->68608 68430 11133598 68609 110ed430 273 API calls 3 library calls 68430->68609 68431 110ed1a0 2 API calls 68431->68438 68433 111335a9 68610 1102a0b0 268 API calls std::locale::_Init 68433->68610 68436 111335b3 68443 111335ca 68436->68443 68611 1101cdf0 268 API calls std::locale::_Init 68436->68611 68438->68431 68440 1113365b 68438->68440 68438->68441 68613 110ed430 273 API calls 3 library calls 68438->68613 68439 111335bf 68442 11146450 std::locale::_Init 21 API calls 68439->68442 68440->68438 68614 11029450 268 API calls 2 library calls 68440->68614 68445 111336c1 68441->68445 68446 111336aa 68441->68446 68442->68443 68443->68425 68612 1102a0b0 268 API calls std::locale::_Init 68443->68612 68450 111336be 68445->68450 68452 111336ec 68445->68452 68455 11133734 68445->68455 68615 11029450 268 API calls 2 library calls 68446->68615 68449 111337cc 68458 11133816 68449->68458 68459 111337ff 68449->68459 68450->68445 68616 11029450 268 API calls 2 library calls 68450->68616 68451 11133779 68451->68449 68453 11162be5 _free 66 API calls 68451->68453 68456 11081b40 std::locale::_Init IsDBCSLeadByte 68452->68456 68457 1113378b 68453->68457 68455->68449 68455->68451 68461 11133752 68455->68461 68462 11133769 68455->68462 68463 111336f7 68456->68463 68471 111337b3 68457->68471 68472 1113379c 68457->68472 68468 11133813 68458->68468 68475 11133845 68458->68475 68488 111338a1 68458->68488 68621 11029450 268 API calls 2 library calls 68459->68621 68619 11029450 268 API calls 2 library calls 68461->68619 68466 11081bb0 87 API calls 68462->68466 68463->68455 68481 11133725 68463->68481 68482 1113370e 68463->68482 68466->68451 68467 110d07c0 268 API calls 68470 111338da 68467->68470 68468->68458 68622 11029450 268 API calls 2 library calls 68468->68622 68476 110d07c0 268 API calls 68470->68476 68474 11163cf8 __strdup 66 API calls 68471->68474 68620 11029450 268 API calls 2 library calls 68472->68620 68478 111337bc 68474->68478 68480 11081bb0 87 API calls 68475->68480 68476->68401 68483 11146450 std::locale::_Init 21 API calls 68478->68483 68485 11133853 68480->68485 68618 110d0800 268 API calls 2 library calls 68481->68618 68617 11029450 268 API calls 2 library calls 68482->68617 68483->68449 68485->68488 68490 11133868 68485->68490 68491 1113387f 68485->68491 68488->68467 68623 11029450 268 API calls 2 library calls 68490->68623 68492 11081a70 IsDBCSLeadByte 68491->68492 68494 1113388a 68492->68494 68494->68488 68624 11009450 268 API calls std::locale::_Init 68494->68624 68498 1114222f 68497->68498 68499 1114221a 68497->68499 68498->68292 68625 11141890 68499->68625 68502 1113906f 68501->68502 68505 11138c4d 68501->68505 68503 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68502->68503 68504 1113907e 68503->68504 68504->68232 68505->68502 68506 111450a0 std::locale::_Init 91 API calls 68505->68506 68507 11138c8c 68506->68507 68507->68502 68508 1105dd10 80 API calls 68507->68508 68509 11138cbb 68508->68509 68759 1112c920 68509->68759 68511 11138e00 PostMessageA 68513 11138e15 68511->68513 68512 1105dd10 80 API calls 68514 11138dfc 68512->68514 68515 11138e25 68513->68515 68768 1110f270 InterlockedDecrement 68513->68768 68514->68511 68514->68513 68516 11138e2b 68515->68516 68517 11138e4d 68515->68517 68521 11138e83 std::ios_base::_Ios_base_dtor 68516->68521 68522 11138e9e 68516->68522 68769 11130410 318 API calls std::locale::_Init 68517->68769 68520 11138e55 68770 1112cb20 SetDlgItemTextA 68520->68770 68526 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68521->68526 68523 11142e80 147 API calls 68522->68523 68525 11138ea3 68523->68525 68527 11146ee0 272 API calls 68525->68527 68529 11138e9a 68526->68529 68530 11138eaa SetWindowTextA 68527->68530 68529->68232 68532 11138ec6 68530->68532 68538 11138ecd std::ios_base::_Ios_base_dtor 68530->68538 68531 11138e70 std::ios_base::_Ios_base_dtor 68531->68516 68771 111352b0 301 API calls 5 library calls 68532->68771 68533 11145b40 274 API calls 68535 11138dab 68533->68535 68535->68511 68535->68512 68536 11138f24 68539 11138f38 68536->68539 68540 11138ffc 68536->68540 68537 11138ef7 68537->68536 68543 11138f0c 68537->68543 68538->68536 68538->68537 68772 111352b0 301 API calls 5 library calls 68538->68772 68544 11138f5c 68539->68544 68774 111352b0 301 API calls 5 library calls 68539->68774 68542 1113901d 68540->68542 68546 1113900b 68540->68546 68547 11139004 68540->68547 68780 110f8640 87 API calls 68542->68780 68773 11131210 149 API calls 68543->68773 68776 110f8640 87 API calls 68544->68776 68779 11131210 149 API calls 68546->68779 68778 111352b0 301 API calls 5 library calls 68547->68778 68550 11138f67 68550->68502 68556 11138f6f IsWindowVisible 68550->68556 68552 11138f1c 68552->68536 68554 11139028 68554->68502 68558 1113902c IsWindowVisible 68554->68558 68556->68502 68560 11138f86 68556->68560 68557 1113901a 68557->68542 68558->68502 68561 1113903e IsWindowVisible 68558->68561 68559 11138f46 68559->68544 68562 11138f52 68559->68562 68565 111450a0 std::locale::_Init 91 API calls 68560->68565 68561->68502 68563 1113904b EnableWindow 68561->68563 68775 11131210 149 API calls 68562->68775 68781 11131210 149 API calls 68563->68781 68568 11138f91 68565->68568 68567 11138f59 68567->68544 68568->68502 68570 11138f9c GetForegroundWindow IsWindowVisible 68568->68570 68569 11139062 EnableWindow 68569->68502 68571 11138fc1 68570->68571 68572 11138fb6 EnableWindow 68570->68572 68777 11131210 149 API calls 68571->68777 68572->68571 68574 11138fc8 68575 11138fde EnableWindow 68574->68575 68577 11138fd7 SetForegroundWindow 68574->68577 68576 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68575->68576 68578 11138ff8 68576->68578 68577->68575 68578->68232 68579->68279 68580->68290 68581->68264 68582->68282 68583->68247 68584->68273 68585->68284 68586->68275 68587->68315 68588->68317 68589->68326 68590->68336 68591->68280 68592->68294 68593->68302 68594->68314 68595->68319 68596->68280 68597->68340 68598->68342 68599->68347 68600->68347 68601->68351 68602->68365 68603->68367 68604->68383 68607->68422 68608->68430 68609->68433 68610->68436 68611->68439 68612->68425 68613->68438 68618->68455 68624->68488 68626 111418cf 68625->68626 68670 111418c8 std::ios_base::_Ios_base_dtor 68625->68670 68627 1110f420 std::locale::_Init 268 API calls 68626->68627 68630 111418d6 68627->68630 68628 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68629 1114220a 68628->68629 68629->68498 68631 11061700 95 API calls 68630->68631 68632 11141942 68631->68632 68633 11141949 RegCloseKey 68632->68633 68634 11141950 68632->68634 68633->68634 68635 11144dc0 270 API calls 68634->68635 68636 1114196c 68635->68636 68637 11143230 std::locale::_Init 8 API calls 68636->68637 68638 11141980 68637->68638 68639 11141997 68638->68639 68640 11062d60 322 API calls 68638->68640 68641 1110f420 std::locale::_Init 268 API calls 68639->68641 68640->68639 68642 1114199e 68641->68642 68643 111419ba 68642->68643 68744 11060be0 291 API calls std::locale::_Init 68642->68744 68645 1110f420 std::locale::_Init 268 API calls 68643->68645 68646 111419d3 68645->68646 68647 111419ef 68646->68647 68745 11060be0 291 API calls std::locale::_Init 68646->68745 68649 1110f420 std::locale::_Init 268 API calls 68647->68649 68650 11141a08 68649->68650 68651 11141a24 68650->68651 68746 11060be0 291 API calls std::locale::_Init 68650->68746 68653 11060760 271 API calls 68651->68653 68654 11141a4d 68653->68654 68655 11060760 271 API calls 68654->68655 68689 11141a67 68655->68689 68656 11141d95 68658 110d1550 271 API calls 68656->68658 68660 11142179 68656->68660 68657 110607f0 274 API calls 68657->68689 68659 11141db3 68658->68659 68664 1105dd10 80 API calls 68659->68664 68757 11060640 69 API calls std::ios_base::_Ios_base_dtor 68660->68757 68661 11141d85 68662 11146450 std::locale::_Init 21 API calls 68661->68662 68662->68656 68663 11146450 21 API calls std::locale::_Init 68663->68689 68665 11141df0 68664->68665 68668 11060760 271 API calls 68665->68668 68673 11141f3d 68665->68673 68667 111421d2 68758 11060640 69 API calls std::ios_base::_Ios_base_dtor 68667->68758 68671 11141e0e 68668->68671 68670->68628 68672 110607f0 274 API calls 68671->68672 68680 11141e1d 68672->68680 68750 110679c0 301 API calls std::locale::_Init 68673->68750 68674 111319f0 87 API calls 68674->68689 68675 11141e52 68678 11060760 271 API calls 68675->68678 68677 11146450 std::locale::_Init 21 API calls 68677->68680 68681 11141e68 68678->68681 68679 11141f83 68682 11141fb3 EnterCriticalSection 68679->68682 68691 11141f87 68679->68691 68680->68675 68680->68677 68684 110607f0 274 API calls 68680->68684 68685 110607f0 274 API calls 68681->68685 68683 11060420 274 API calls 68682->68683 68695 11141fd0 68683->68695 68684->68680 68702 11141e78 68685->68702 68686 11081c60 87 API calls std::locale::_Init 68686->68689 68688 11081bb0 87 API calls 68688->68689 68689->68656 68689->68657 68689->68661 68689->68663 68689->68674 68689->68686 68689->68688 68690 11141eb1 68692 11060760 271 API calls 68690->68692 68691->68682 68751 110508e0 348 API calls 4 library calls 68691->68751 68752 110679c0 301 API calls std::locale::_Init 68691->68752 68693 11141ec7 68692->68693 68698 110607f0 274 API calls 68693->68698 68694 11141ffa LeaveCriticalSection 68700 1114204e 68694->68700 68701 1114200e 68694->68701 68695->68694 68699 1102a9f0 283 API calls 68695->68699 68696 11146450 std::locale::_Init 21 API calls 68696->68702 68718 11141ed6 68698->68718 68704 11141ff7 68699->68704 68705 11133400 275 API calls 68700->68705 68701->68700 68708 11146450 std::locale::_Init 21 API calls 68701->68708 68702->68690 68702->68696 68703 110607f0 274 API calls 68702->68703 68703->68702 68704->68694 68707 11142058 68705->68707 68706 11141f11 68747 11060640 69 API calls std::ios_base::_Ios_base_dtor 68706->68747 68709 110d1550 271 API calls 68707->68709 68711 1114201c 68708->68711 68714 11142066 68709->68714 68712 1113cc30 302 API calls 68711->68712 68717 11142021 68712->68717 68713 11146450 std::locale::_Init 21 API calls 68713->68718 68753 110cff20 268 API calls std::locale::_Init 68714->68753 68715 11141f1f 68748 11060640 69 API calls std::ios_base::_Ios_base_dtor 68715->68748 68720 111414a0 1066 API calls 68717->68720 68718->68706 68718->68713 68721 110607f0 274 API calls 68718->68721 68719 11141f2e 68749 11060640 69 API calls std::ios_base::_Ios_base_dtor 68719->68749 68724 11142027 68720->68724 68721->68718 68724->68700 68725 11146450 std::locale::_Init 21 API calls 68724->68725 68726 11142040 68725->68726 68729 11026ba0 405 API calls 68726->68729 68727 110d07c0 268 API calls 68730 1114215b 68727->68730 68728 1114209c 68731 111420c3 68728->68731 68732 111420da 68728->68732 68738 1114211f 68728->68738 68729->68700 68733 110d07c0 268 API calls 68730->68733 68754 11029450 268 API calls 2 library calls 68731->68754 68735 11081bb0 87 API calls 68732->68735 68733->68660 68737 111420eb 68735->68737 68737->68738 68755 11009450 268 API calls std::locale::_Init 68737->68755 68738->68727 68740 111420ff 68741 11081a70 IsDBCSLeadByte 68740->68741 68744->68643 68745->68647 68746->68651 68747->68715 68748->68719 68749->68673 68750->68679 68751->68691 68752->68691 68753->68728 68755->68740 68757->68667 68758->68670 68761 1112c93c 68759->68761 68760 1112c977 68782 1106b860 301 API calls 68760->68782 68761->68760 68762 1112c964 68761->68762 68764 11146ee0 272 API calls 68762->68764 68765 1112c96f 68764->68765 68766 1112c9c3 68765->68766 68767 11142290 std::locale::_Init 268 API calls 68765->68767 68766->68533 68766->68535 68767->68766 68768->68515 68769->68520 68770->68531 68771->68538 68772->68537 68773->68552 68774->68559 68775->68567 68776->68550 68777->68574 68778->68546 68779->68557 68780->68554 68781->68569 68782->68765 68783 11144200 68784 11144211 68783->68784 68797 11143c20 68784->68797 68788 11144295 68790 111442b2 68788->68790 68792 11144294 68788->68792 68789 1114425b 68791 11144262 ResetEvent 68789->68791 68805 11143de0 268 API calls 2 library calls 68791->68805 68792->68788 68806 11143de0 268 API calls 2 library calls 68792->68806 68795 11144276 SetEvent WaitForMultipleObjects 68795->68791 68795->68792 68796 111442af 68796->68790 68798 11143c2c GetCurrentProcess 68797->68798 68799 11143c4f 68797->68799 68798->68799 68801 11143c3d GetModuleFileNameA 68798->68801 68800 11143c79 WaitForMultipleObjects 68799->68800 68802 1110f420 std::locale::_Init 266 API calls 68799->68802 68800->68788 68800->68789 68801->68799 68803 11143c6b 68802->68803 68803->68800 68807 11143570 GetModuleFileNameA 68803->68807 68805->68795 68806->68796 68808 111435f3 68807->68808 68809 111435b3 68807->68809 68811 111435ff LoadLibraryA 68808->68811 68812 11143619 GetModuleHandleA GetProcAddress 68808->68812 68810 11081b40 std::locale::_Init IsDBCSLeadByte 68809->68810 68813 111435c1 68810->68813 68811->68812 68814 1114360e LoadLibraryA 68811->68814 68815 11143647 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 68812->68815 68816 11143639 68812->68816 68813->68808 68817 111435c8 LoadLibraryA 68813->68817 68814->68812 68818 11143673 10 API calls 68815->68818 68816->68818 68817->68808 68819 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68818->68819 68820 111436f0 68819->68820 68820->68800 68821 1115bde0 68822 1115bdf4 68821->68822 68823 1115bdec 68821->68823 68833 111631ab 68822->68833 68826 1115be14 68827 1115bf40 68829 11162be5 _free 66 API calls 68827->68829 68830 1115bf68 68829->68830 68831 1115be31 68831->68827 68832 1115bf24 SetLastError 68831->68832 68832->68831 68834 11170166 _calloc 66 API calls 68833->68834 68835 111631c5 68834->68835 68839 1115be08 68835->68839 68857 111692ef 66 API calls __getptd_noexit 68835->68857 68837 111631d8 68837->68839 68858 111692ef 66 API calls __getptd_noexit 68837->68858 68839->68826 68839->68827 68840 1115ba20 CoInitializeSecurity CoCreateInstance 68839->68840 68841 1115ba95 wsprintfW SysAllocString 68840->68841 68842 1115bc14 68840->68842 68846 1115badb 68841->68846 68843 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 68842->68843 68845 1115bc40 68843->68845 68844 1115bc01 SysFreeString 68844->68842 68845->68831 68846->68844 68846->68846 68847 1115bb6c 68846->68847 68848 1115bb5a wsprintfW 68846->68848 68856 1115bbe9 68846->68856 68859 110974a0 68847->68859 68848->68847 68850 1115bb7e 68851 110974a0 269 API calls 68850->68851 68852 1115bb93 68851->68852 68864 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 68852->68864 68854 1115bbd7 68865 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 68854->68865 68856->68844 68857->68837 68858->68839 68860 1110f420 std::locale::_Init 268 API calls 68859->68860 68861 110974d3 68860->68861 68862 110974e6 SysAllocString 68861->68862 68863 11097504 68861->68863 68862->68863 68863->68850 68864->68854 68865->68856 68866 1116970d 68867 1116971d 68866->68867 68868 11169718 68866->68868 68872 11169617 68867->68872 68884 11177075 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 68868->68884 68871 1116972b 68873 11169623 __getstream 68872->68873 68874 111696c0 __getstream 68873->68874 68878 11169670 68873->68878 68885 111694b3 68873->68885 68874->68871 68877 11169683 68879 111696a0 68877->68879 68881 11025e20 ___DllMainCRTStartup 7 API calls 68877->68881 68878->68874 68933 11025e20 68878->68933 68879->68874 68880 111694b3 __CRT_INIT@12 136 API calls 68879->68880 68880->68874 68882 11169697 68881->68882 68883 111694b3 __CRT_INIT@12 136 API calls 68882->68883 68883->68879 68884->68867 68886 111694bf __getstream 68885->68886 68887 111694c7 68886->68887 68888 11169541 68886->68888 68942 1116d4d0 HeapCreate 68887->68942 68889 11169547 68888->68889 68890 111695a2 68888->68890 68896 11169565 68889->68896 68914 111694d0 __getstream 68889->68914 69004 1116d79b 66 API calls _doexit 68889->69004 68892 111695a7 68890->68892 68893 11169600 68890->68893 68895 1116b5fa ___set_flsgetvalue 3 API calls 68892->68895 68893->68914 69010 1116b8fe 80 API calls __freefls@4 68893->69010 68894 111694cc 68894->68914 68943 1116b96c GetModuleHandleW 68894->68943 68898 111695ac 68895->68898 68900 11169579 68896->68900 69005 1117140e 67 API calls _free 68896->69005 68902 11169dbe __calloc_crt 66 API calls 68898->68902 69008 1116958c 70 API calls __mtterm 68900->69008 68906 111695b8 68902->68906 68904 111694dc __RTC_Initialize 68908 111694e0 68904->68908 68912 111694ec GetCommandLineA ___crtGetEnvironmentStringsA 68904->68912 68909 111695c4 DecodePointer 68906->68909 68906->68914 68907 1116956f 69006 1116b64b 70 API calls _free 68907->69006 69001 1116d4ee HeapDestroy 68908->69001 68916 111695d9 68909->68916 68968 111711c9 GetStartupInfoW 68912->68968 68913 11169574 69007 1116d4ee HeapDestroy 68913->69007 68914->68878 68919 111695f4 68916->68919 68920 111695dd 68916->68920 68924 11162be5 _free 66 API calls 68919->68924 69009 1116b688 66 API calls 4 library calls 68920->69009 68921 11169511 __setargv 68926 1116952a 68921->68926 68927 1116951a 68921->68927 68922 1116950a 69002 1116b64b 70 API calls _free 68922->69002 68924->68914 68926->68914 69003 1117140e 67 API calls _free 68926->69003 68981 11176c61 68927->68981 68928 111695e4 GetCurrentThreadId 68928->68914 68934 1110f7d0 68933->68934 68935 1110f804 ___DllMainCRTStartup 68934->68935 68936 1110f7f1 68934->68936 68937 1110f7dc 68934->68937 68935->68877 69018 1110f720 68936->69018 68937->68935 68939 1110f720 ___DllMainCRTStartup 7 API calls 68937->68939 68941 1110f7e5 68939->68941 68940 1110f7f8 68940->68877 68941->68877 68942->68894 68944 1116b980 68943->68944 68945 1116b989 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 68943->68945 69011 1116b64b 70 API calls _free 68944->69011 68947 1116b9d3 TlsAlloc 68945->68947 68950 1116bae2 68947->68950 68951 1116ba21 TlsSetValue 68947->68951 68948 1116b985 68948->68904 68950->68904 68951->68950 68952 1116ba32 68951->68952 69012 1116d557 EncodePointer EncodePointer __init_pointers __initp_misc_winsig 68952->69012 68954 1116ba37 EncodePointer EncodePointer EncodePointer EncodePointer 69013 111735c2 InitializeCriticalSectionAndSpinCount 68954->69013 68956 1116ba76 68957 1116badd 68956->68957 68958 1116ba7a DecodePointer 68956->68958 69015 1116b64b 70 API calls _free 68957->69015 68960 1116ba8f 68958->68960 68960->68957 68961 11169dbe __calloc_crt 66 API calls 68960->68961 68962 1116baa5 68961->68962 68962->68957 68963 1116baad DecodePointer 68962->68963 68964 1116babe 68963->68964 68964->68957 68965 1116bac2 68964->68965 69014 1116b688 66 API calls 4 library calls 68965->69014 68967 1116baca GetCurrentThreadId 68967->68950 68969 11169dbe __calloc_crt 66 API calls 68968->68969 68970 111711e7 68969->68970 68970->68970 68973 11169dbe __calloc_crt 66 API calls 68970->68973 68974 11169506 68970->68974 68976 111712dc 68970->68976 68977 1117135c 68970->68977 68971 11171392 GetStdHandle 68971->68977 68972 111713f6 SetHandleCount 68972->68974 68973->68970 68974->68921 68974->68922 68975 111713a4 GetFileType 68975->68977 68976->68977 68978 11171313 InitializeCriticalSectionAndSpinCount 68976->68978 68979 11171308 GetFileType 68976->68979 68977->68971 68977->68972 68977->68975 68980 111713ca InitializeCriticalSectionAndSpinCount 68977->68980 68978->68974 68978->68976 68979->68976 68979->68978 68980->68974 68980->68977 68982 11176c6a 68981->68982 68985 11176c6f _strlen 68981->68985 69016 11170be7 95 API calls __setmbcp 68982->69016 68984 1116951f 68984->68926 68997 1116d5ae 68984->68997 68985->68984 68986 11169dbe __calloc_crt 66 API calls 68985->68986 68990 11176ca4 _strlen 68986->68990 68987 11176cf3 68988 11162be5 _free 66 API calls 68987->68988 68988->68984 68989 11169dbe __calloc_crt 66 API calls 68989->68990 68990->68984 68990->68987 68990->68989 68991 11176d19 68990->68991 68993 1116be9f _strcpy_s 66 API calls 68990->68993 68994 11176d30 68990->68994 68992 11162be5 _free 66 API calls 68991->68992 68992->68984 68993->68990 68995 1116deb2 __invoke_watson 10 API calls 68994->68995 68996 11176d3c 68995->68996 68998 1116d5bc __IsNonwritableInCurrentImage 68997->68998 69017 1116c9cb EncodePointer 68998->69017 69000 1116d5da __initterm_e __cinit __IsNonwritableInCurrentImage 69000->68926 69001->68914 69002->68908 69003->68922 69004->68896 69005->68907 69006->68913 69007->68900 69008->68914 69009->68928 69010->68914 69011->68948 69012->68954 69013->68956 69014->68967 69015->68950 69016->68985 69017->69000 69019 1110f764 EnterCriticalSection 69018->69019 69020 1110f74f InitializeCriticalSection 69018->69020 69022 1110f785 69019->69022 69020->69019 69021 1110f7b3 LeaveCriticalSection 69021->68940 69022->69021 69023 1110f6c0 ___DllMainCRTStartup 4 API calls 69022->69023 69023->69022 69024 110304b8 69025 11142a60 270 API calls 69024->69025 69026 110304c6 69025->69026 69027 11142bb0 87 API calls 69026->69027 69028 11030503 69027->69028 69029 11030518 69028->69029 69030 11081bb0 87 API calls 69028->69030 69031 110ed1a0 2 API calls 69029->69031 69030->69029 69032 1103053f 69031->69032 69033 11030589 69032->69033 69096 110ed250 81 API calls 2 library calls 69032->69096 69036 11142bb0 87 API calls 69033->69036 69035 11030554 69097 110ed250 81 API calls 2 library calls 69035->69097 69038 110305a0 69036->69038 69041 1110f420 std::locale::_Init 268 API calls 69038->69041 69039 1103056b 69039->69033 69040 111463d0 19 API calls 69039->69040 69040->69033 69042 110305af 69041->69042 69043 110305d0 69042->69043 69098 11088860 271 API calls 69042->69098 69075 1108a470 69043->69075 69046 110305e3 OpenMutexA 69047 11030603 CreateMutexA 69046->69047 69048 1103071a CloseHandle 69046->69048 69049 11030623 69047->69049 69050 1108a570 69 API calls 69048->69050 69051 1110f420 std::locale::_Init 268 API calls 69049->69051 69053 11030730 69050->69053 69052 11030638 69051->69052 69054 1103065b 69052->69054 69099 11060be0 291 API calls std::locale::_Init 69052->69099 69056 11161d01 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 69053->69056 69086 11015c30 LoadLibraryA 69054->69086 69057 110310b3 69056->69057 69059 1103066d 69060 111450a0 std::locale::_Init 91 API calls 69059->69060 69061 1103067c 69060->69061 69062 11030689 69061->69062 69063 1103069c 69061->69063 69087 11145ae0 69062->69087 69065 110306a6 GetProcAddress 69063->69065 69066 11030690 69063->69066 69065->69066 69067 110306c0 SetLastError 69065->69067 69068 110281a0 47 API calls 69066->69068 69067->69066 69069 110306cd 69068->69069 69100 110092f0 430 API calls std::locale::_Init 69069->69100 69071 110306dc 69072 110306f0 WaitForSingleObject 69071->69072 69072->69072 69073 11030702 CloseHandle 69072->69073 69073->69048 69074 11030713 FreeLibrary 69073->69074 69074->69048 69076 1110f420 std::locale::_Init 268 API calls 69075->69076 69077 1108a4a7 69076->69077 69078 1108a4c9 InitializeCriticalSection 69077->69078 69080 1110f420 std::locale::_Init 268 API calls 69077->69080 69082 1108a52a 69078->69082 69081 1108a4c2 69080->69081 69081->69078 69101 1116219a 66 API calls std::exception::_Copy_str 69081->69101 69082->69046 69084 1108a4f9 69102 111625f1 RaiseException 69084->69102 69086->69059 69088 111450a0 std::locale::_Init 91 API calls 69087->69088 69089 11145af2 69088->69089 69090 11145b30 69089->69090 69091 11145af9 LoadLibraryA 69089->69091 69090->69066 69092 11145b2a 69091->69092 69093 11145b0b GetProcAddress 69091->69093 69092->69066 69094 11145b23 FreeLibrary 69093->69094 69095 11145b1b 69093->69095 69094->69092 69095->69094 69096->69035 69097->69039 69098->69043 69099->69054 69100->69071 69101->69084 69102->69078

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 716 1109e190-1109e1f2 call 1109d980 719 1109e1f8-1109e21b call 1109d440 716->719 720 1109e810 716->720 726 1109e221-1109e235 LocalAlloc 719->726 727 1109e384-1109e386 719->727 721 1109e812-1109e82d call 11161d01 720->721 729 1109e23b-1109e26d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 726->729 730 1109e805-1109e80b call 1109d4d0 726->730 728 1109e316-1109e33b CreateFileMappingA 727->728 734 1109e388-1109e39b GetLastError 728->734 735 1109e33d-1109e35d GetLastError call 1112ef20 728->735 731 1109e2fa-1109e310 729->731 732 1109e273-1109e29e call 1109d3a0 call 1109d3f0 729->732 730->720 731->728 762 1109e2e9-1109e2f1 732->762 763 1109e2a0-1109e2d6 GetSecurityDescriptorSacl 732->763 737 1109e39d 734->737 738 1109e3a2-1109e3b9 MapViewOfFile 734->738 748 1109e368-1109e370 735->748 749 1109e35f-1109e366 LocalFree 735->749 737->738 741 1109e3bb-1109e3d6 call 1112ef20 738->741 742 1109e3f7-1109e3ff 738->742 765 1109e3d8-1109e3d9 LocalFree 741->765 766 1109e3db-1109e3e3 741->766 746 1109e4a1-1109e4b3 742->746 747 1109e405-1109e41e GetModuleFileNameA 742->747 754 1109e4f9-1109e512 call 11161d20 GetTickCount 746->754 755 1109e4b5-1109e4b8 746->755 756 1109e4bd-1109e4d8 call 1112ef20 747->756 757 1109e424-1109e42d 747->757 750 1109e372-1109e373 LocalFree 748->750 751 1109e375-1109e37f 748->751 749->748 750->751 761 1109e7fe-1109e800 call 1109d8c0 751->761 781 1109e514-1109e519 754->781 758 1109e59f-1109e603 GetCurrentProcessId GetModuleFileNameA call 1109d810 755->758 779 1109e4da-1109e4db LocalFree 756->779 780 1109e4dd-1109e4e5 756->780 757->756 759 1109e433-1109e436 757->759 783 1109e60b-1109e622 CreateEventA 758->783 784 1109e605 758->784 768 1109e479-1109e49c call 1112ef20 call 1109d8c0 759->768 769 1109e438-1109e43c 759->769 761->730 762->731 773 1109e2f3-1109e2f4 FreeLibrary 762->773 763->762 772 1109e2d8-1109e2e3 SetSecurityDescriptorSacl 763->772 765->766 775 1109e3e8-1109e3f2 766->775 776 1109e3e5-1109e3e6 LocalFree 766->776 768->746 769->768 778 1109e43e-1109e449 769->778 772->762 773->731 775->761 776->775 785 1109e450-1109e454 778->785 779->780 786 1109e4ea-1109e4f4 780->786 787 1109e4e7-1109e4e8 LocalFree 780->787 788 1109e51b-1109e52a 781->788 789 1109e52c 781->789 793 1109e624-1109e643 GetLastError * 2 call 1112ef20 783->793 794 1109e646-1109e64e 783->794 784->783 791 1109e470-1109e472 785->791 792 1109e456-1109e458 785->792 786->761 787->786 788->781 788->789 795 1109e52e-1109e534 789->795 800 1109e475-1109e477 791->800 797 1109e45a-1109e460 792->797 798 1109e46c-1109e46e 792->798 793->794 801 1109e650 794->801 802 1109e656-1109e667 CreateEventA 794->802 803 1109e545-1109e59d 795->803 804 1109e536-1109e543 795->804 797->791 805 1109e462-1109e46a 797->805 798->800 800->756 800->768 801->802 807 1109e669-1109e688 GetLastError * 2 call 1112ef20 802->807 808 1109e68b-1109e693 802->808 803->758 804->795 804->803 805->785 805->798 807->808 810 1109e69b-1109e6ad CreateEventA 808->810 811 1109e695 808->811 812 1109e6af-1109e6ce GetLastError * 2 call 1112ef20 810->812 813 1109e6d1-1109e6d9 810->813 811->810 812->813 816 1109e6db 813->816 817 1109e6e1-1109e6f2 CreateEventA 813->817 816->817 819 1109e714-1109e722 817->819 820 1109e6f4-1109e711 GetLastError * 2 call 1112ef20 817->820 822 1109e724-1109e725 LocalFree 819->822 823 1109e727-1109e72f 819->823 820->819 822->823 825 1109e731-1109e732 LocalFree 823->825 826 1109e734-1109e73d 823->826 825->826 827 1109e743-1109e746 826->827 828 1109e7e7-1109e7f9 call 1112ef20 826->828 827->828 829 1109e74c-1109e74f 827->829 828->761 829->828 831 1109e755-1109e758 829->831 831->828 833 1109e75e-1109e761 831->833 834 1109e76c-1109e788 CreateThread 833->834 835 1109e763-1109e769 GetCurrentThreadId 833->835 836 1109e78a-1109e794 834->836 837 1109e796-1109e7a0 834->837 835->834 836->761 838 1109e7ba-1109e7e5 SetEvent call 1112ef20 call 1109d4d0 837->838 839 1109e7a2-1109e7b8 ResetEvent * 3 837->839 838->721 839->838
                                                                                      APIs
                                                                                        • Part of subcall function 1109D440: GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,581E67F8,00080000,00000000,00000000), ref: 1109D46D
                                                                                        • Part of subcall function 1109D440: OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                        • Part of subcall function 1109D440: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                        • Part of subcall function 1109D440: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                      • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,581E67F8,00080000,00000000,00000000), ref: 1109E225
                                                                                      • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E23E
                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E249
                                                                                      • GetVersionExA.KERNEL32(?), ref: 1109E260
                                                                                      • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2CE
                                                                                      • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E2E3
                                                                                      • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2F4
                                                                                      • CreateFileMappingA.KERNEL32(000000FF,11030063,00000004,00000000,?,?), ref: 1109E330
                                                                                      • GetLastError.KERNEL32 ref: 1109E33D
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E366
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E373
                                                                                      • GetLastError.KERNEL32 ref: 1109E390
                                                                                      • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E3AE
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E3D9
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E3E6
                                                                                        • Part of subcall function 1109D3A0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E27E), ref: 1109D3A8
                                                                                        • Part of subcall function 1109D3F0: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E412
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E4DB
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E4E8
                                                                                      • _memset.LIBCMT ref: 1109E500
                                                                                      • GetTickCount.KERNEL32 ref: 1109E508
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 1109E5B4
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E5CF
                                                                                      • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109E61B
                                                                                      • GetLastError.KERNEL32 ref: 1109E624
                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E62B
                                                                                      • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E660
                                                                                      • GetLastError.KERNEL32 ref: 1109E669
                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E670
                                                                                      • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109E6A6
                                                                                      • GetLastError.KERNEL32 ref: 1109E6AF
                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E6B6
                                                                                      • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E6EB
                                                                                      • GetLastError.KERNEL32 ref: 1109E6FA
                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E6FD
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E725
                                                                                      • LocalFree.KERNEL32(?), ref: 1109E732
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 1109E763
                                                                                      • CreateThread.KERNEL32(00000000,00002000,Function_0009DD20,00000000,00000000,00000030), ref: 1109E77D
                                                                                      • ResetEvent.KERNEL32(?), ref: 1109E7AC
                                                                                      • ResetEvent.KERNEL32(?), ref: 1109E7B2
                                                                                      • ResetEvent.KERNEL32(?), ref: 1109E7B8
                                                                                      • SetEvent.KERNEL32(?), ref: 1109E7BE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                      • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                      • API String ID: 3291243470-2792520954
                                                                                      • Opcode ID: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                      • Instruction ID: e0f3534def007632db5cc521867dfefedb1bc63d92e862916d16df31d0e36df5
                                                                                      • Opcode Fuzzy Hash: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                      • Instruction Fuzzy Hash: 221282B590026D9FE724DF61CCD4EAEF7BABB88308F0049A9E11997244D771AD84CF51

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 844 11029590-1102961e LoadLibraryA 845 11029621-11029626 844->845 846 11029628-1102962b 845->846 847 1102962d-11029630 845->847 848 11029645-1102964a 846->848 849 11029632-11029635 847->849 850 11029637-11029642 847->850 851 11029679-11029685 848->851 852 1102964c-11029651 848->852 849->848 850->848 855 1102972a-1102972d 851->855 856 1102968b-110296a3 call 11162b51 851->856 853 11029653-1102966a GetProcAddress 852->853 854 1102966c-1102966f 852->854 853->854 857 11029671-11029673 SetLastError 853->857 854->851 859 11029748-11029760 InternetOpenA 855->859 860 1102972f-11029746 GetProcAddress 855->860 866 110296c4-110296d0 856->866 867 110296a5-110296be GetProcAddress 856->867 857->851 864 11029784-11029790 call 11162be5 859->864 860->859 863 11029779-11029781 SetLastError 860->863 863->864 870 11029796-110297c7 call 11142290 call 11164390 864->870 871 11029a0a-11029a14 864->871 873 110296d2-110296db GetLastError 866->873 876 110296f1-110296f3 866->876 867->866 869 11029762-1102976a SetLastError 867->869 869->873 895 110297c9-110297cc 870->895 896 110297cf-110297e4 call 11081a70 * 2 870->896 871->845 875 11029a1a 871->875 873->876 877 110296dd-110296ef call 11162be5 call 11162b51 873->877 880 11029a2c-11029a2f 875->880 881 11029710-1102971c 876->881 882 110296f5-1102970e GetProcAddress 876->882 877->876 886 11029a31-11029a36 880->886 887 11029a3b-11029a3e 880->887 881->855 899 1102971e-11029727 881->899 882->881 885 1102976f-11029777 SetLastError 882->885 885->855 891 11029b9f-11029ba7 886->891 892 11029a40-11029a45 887->892 893 11029a4a 887->893 897 11029bb0-11029bc3 891->897 898 11029ba9-11029baa FreeLibrary 891->898 900 11029b6f-11029b74 892->900 901 11029a4d-11029a55 893->901 895->896 919 110297e6-110297ea 896->919 920 110297ed-110297f9 896->920 898->897 899->855 902 11029b76-11029b8d GetProcAddress 900->902 903 11029b8f-11029b95 900->903 905 11029a57-11029a6e GetProcAddress 901->905 906 11029a74-11029a7d 901->906 902->903 907 11029b97-11029b99 SetLastError 902->907 903->891 905->906 909 11029b2e-11029b30 SetLastError 905->909 910 11029a80-11029a82 906->910 907->891 912 11029b36-11029b3d 909->912 910->912 914 11029a88-11029a8d 910->914 915 11029b4c-11029b6d call 110278a0 * 2 912->915 914->915 917 11029a93-11029acf call 1110f4a0 call 11027850 914->917 915->900 945 11029ae1-11029ae3 917->945 946 11029ad1-11029ad4 917->946 919->920 921 11029824-11029829 920->921 922 110297fb-110297fd 920->922 928 1102982b-1102983c GetProcAddress 921->928 929 1102983e-11029855 InternetConnectA 921->929 925 11029814-1102981a 922->925 926 110297ff-11029812 GetProcAddress 922->926 925->921 926->925 932 1102981c-1102981e SetLastError 926->932 928->929 934 11029881-1102988c SetLastError 928->934 935 110299f7-11029a07 call 111618c1 929->935 936 1102985b-1102985e 929->936 932->921 934->935 935->871 940 11029860-11029862 936->940 941 11029899-110298a1 936->941 947 11029864-11029877 GetProcAddress 940->947 948 11029879-1102987f 940->948 943 110298a3-110298b7 GetProcAddress 941->943 944 110298b9-110298d4 941->944 943->944 949 110298d6-110298de SetLastError 943->949 955 110298e1-110298e4 944->955 951 11029ae5 945->951 952 11029aec-11029af1 945->952 946->945 950 11029ad6-11029ada 946->950 947->948 953 11029891-11029893 SetLastError 947->953 948->941 949->955 950->945 956 11029adc 950->956 951->952 957 11029af3-11029b09 call 110d1090 952->957 958 11029b0c-11029b0e 952->958 953->941 962 110299f2-110299f5 955->962 963 110298ea-110298ef 955->963 956->945 957->958 960 11029b10-11029b12 958->960 961 11029b14-11029b25 call 111618c1 958->961 960->961 967 11029b3f-11029b49 call 111618c1 960->967 961->915 975 11029b27-11029b29 961->975 962->935 965 11029a1c-11029a29 call 111618c1 962->965 969 110298f1-11029908 GetProcAddress 963->969 970 1102990a-11029916 963->970 965->880 967->915 969->970 974 11029918-11029920 SetLastError 969->974 979 11029922-1102993b GetLastError 970->979 974->979 975->901 980 11029956-1102996b 979->980 981 1102993d-11029954 GetProcAddress 979->981 984 11029975-11029983 GetLastError 980->984 981->980 982 1102996d-1102996f SetLastError 981->982 982->984 985 11029985-1102998a 984->985 986 1102998c-11029998 GetDesktopWindow 984->986 985->986 987 110299e2-110299e7 985->987 988 110299b3-110299cf 986->988 989 1102999a-110299b1 GetProcAddress 986->989 987->962 991 110299e9-110299ef 987->991 988->962 993 110299d1 988->993 989->988 990 110299d6-110299e0 SetLastError 989->990 990->962 991->962 993->955
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(WinInet.dll,581E67F8,74DF23A0,?,00000000), ref: 110295C5
                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102965F
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029673
                                                                                      • _malloc.LIBCMT ref: 11029697
                                                                                      • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110296B1
                                                                                      • GetLastError.KERNEL32 ref: 110296D2
                                                                                      • _free.LIBCMT ref: 110296DE
                                                                                      • _malloc.LIBCMT ref: 110296E7
                                                                                      • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029701
                                                                                      • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 1102973B
                                                                                      • InternetOpenA.WININET(11194244,?,?,000000FF,00000000), ref: 1102975A
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029764
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029771
                                                                                      • SetLastError.KERNEL32(00000078), ref: 1102977B
                                                                                      • _free.LIBCMT ref: 11029785
                                                                                        • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                        • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029805
                                                                                      • SetLastError.KERNEL32(00000078), ref: 1102981E
                                                                                      • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029831
                                                                                      • InternetConnectA.WININET(000000FF,11199690,00000050,00000000,00000000,00000003,00000000,00000000), ref: 1102984E
                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102986A
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029883
                                                                                      • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 110298A9
                                                                                      • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 110298FD
                                                                                      • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029A63
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029B30
                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029B82
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029B99
                                                                                      • FreeLibrary.KERNEL32(?), ref: 11029BAA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free_malloc$ConnectHeapLoadOpen
                                                                                      • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                      • API String ID: 921868004-913974648
                                                                                      • Opcode ID: df85d3a1662e4d01aa062a95c5ecba07d4916ff71ea5790ba3812fcab14611a4
                                                                                      • Instruction ID: e81a0880bf89439be6f70403065d0babe3f5b16467f55efefddb7e1ac6149969
                                                                                      • Opcode Fuzzy Hash: df85d3a1662e4d01aa062a95c5ecba07d4916ff71ea5790ba3812fcab14611a4
                                                                                      • Instruction Fuzzy Hash: 5E127FB0D04269EBEB11CFA9CC88A9EFBF9FF88754F604569E465E7240E7705940CB60
                                                                                      APIs
                                                                                        • Part of subcall function 11144EA0: GetLastError.KERNEL32(?,0281B878,000000FF,?), ref: 11144ED5
                                                                                        • Part of subcall function 11144EA0: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,0281B878,000000FF,?), ref: 11144EE5
                                                                                      • _fgets.LIBCMT ref: 11061DC2
                                                                                      • _strpbrk.LIBCMT ref: 11061E29
                                                                                      • _fgets.LIBCMT ref: 11061F2C
                                                                                      • _strpbrk.LIBCMT ref: 11061FA3
                                                                                      • __wcstoui64.LIBCMT ref: 11061FBC
                                                                                      • _fgets.LIBCMT ref: 11062035
                                                                                      • _strpbrk.LIBCMT ref: 1106205B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                      • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                      • API String ID: 716802716-1571441106
                                                                                      • Opcode ID: 46fe0e2f6ff4984a5f9afa3624aa9af9987d285b72e85ff2ff450320ced83e56
                                                                                      • Instruction ID: 9b454a0e08db4b844aa329f9a873b431930d9d904307df7fc69ae15b9a8492e5
                                                                                      • Opcode Fuzzy Hash: 46fe0e2f6ff4984a5f9afa3624aa9af9987d285b72e85ff2ff450320ced83e56
                                                                                      • Instruction Fuzzy Hash: 55A2D375E0461A9FEB21CF64CC80BEFB7B9AF44345F0041D9E849A7281EB71AA45CF61

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1646 11143570-111435b1 GetModuleFileNameA 1647 111435f3 1646->1647 1648 111435b3-111435c6 call 11081b40 1646->1648 1650 111435f9-111435fd 1647->1650 1648->1647 1657 111435c8-111435f1 LoadLibraryA 1648->1657 1651 111435ff-1114360c LoadLibraryA 1650->1651 1652 11143619-11143637 GetModuleHandleA GetProcAddress 1650->1652 1651->1652 1654 1114360e-11143616 LoadLibraryA 1651->1654 1655 11143647-11143670 GetProcAddress * 4 1652->1655 1656 11143639-11143645 1652->1656 1654->1652 1658 11143673-111436eb GetProcAddress * 10 call 11161d01 1655->1658 1656->1658 1657->1650 1660 111436f0-111436f3 1658->1660
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,74DF23A0), ref: 111435A3
                                                                                      • LoadLibraryA.KERNEL32(?), ref: 111435EC
                                                                                      • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 11143605
                                                                                      • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 11143614
                                                                                      • GetModuleHandleA.KERNEL32(?), ref: 1114361A
                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1114362E
                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114364D
                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11143658
                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11143663
                                                                                      • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114366E
                                                                                      • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11143679
                                                                                      • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11143684
                                                                                      • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114368F
                                                                                      • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114369A
                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 111436A5
                                                                                      • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 111436B0
                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 111436BB
                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 111436C6
                                                                                      • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111436D1
                                                                                      • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111436DC
                                                                                        • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                      • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                      • API String ID: 3874234733-2061581830
                                                                                      • Opcode ID: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                      • Instruction ID: 707b91cc949213dae1a505c6abf15ec2f20ed18dfa7402eb99b54f6ccfa65761
                                                                                      • Opcode Fuzzy Hash: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                      • Instruction Fuzzy Hash: 05411B70A04714AFD7309F768D84A6BFAF8BF55A04B10492EE496D3A10EBB5E8008F5D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1727 11139090-111390c5 1728 111390d2-111390d9 1727->1728 1729 111390c7-111390cd GetCurrentThreadId 1727->1729 1730 111390e0-111390fc call 11133920 call 11133400 1728->1730 1731 111390db call 11029330 1728->1731 1729->1728 1737 11139102-11139108 1730->1737 1738 111391db-111391e2 1730->1738 1731->1730 1739 1113975a-11139775 call 11161d01 1737->1739 1740 1113910e-1113916f call 11138c30 IsWindow IsWindowVisible call 11146450 call 1105dd10 IsWindowVisible 1737->1740 1741 1113929a-111392b0 1738->1741 1742 111391e8-111391ef 1738->1742 1780 111391d1 1740->1780 1781 11139171-11139177 1740->1781 1751 111392b6-111392bd 1741->1751 1752 111393ef 1741->1752 1742->1741 1745 111391f5-111391fc 1742->1745 1745->1741 1749 11139202-11139211 FindWindowA 1745->1749 1749->1741 1750 11139217-1113921c IsWindowVisible 1749->1750 1750->1741 1754 1113921e-11139225 1750->1754 1755 111392bf-111392c9 1751->1755 1756 111392ce-111392ee call 1105dd10 1751->1756 1757 111393f1-11139402 1752->1757 1758 11139435-11139440 1752->1758 1754->1741 1760 11139227-1113924c call 11138c30 IsWindowVisible 1754->1760 1755->1758 1756->1758 1777 111392f4-11139323 1756->1777 1762 11139404-11139414 1757->1762 1763 1113941a-1113942f 1757->1763 1764 11139442-11139462 call 1105dd10 1758->1764 1765 11139476-1113947c 1758->1765 1760->1741 1784 1113924e-1113925d IsIconic 1760->1784 1762->1763 1763->1758 1787 11139470 1764->1787 1788 11139464-1113946e call 1102cff0 1764->1788 1767 1113947e-1113948a call 11138c30 1765->1767 1768 1113948d-11139495 1765->1768 1767->1768 1775 111394a7-111394b2 call 1112ce90 1768->1775 1776 11139497-111394a2 call 1106b860 1768->1776 1798 111394b4-111394ba call 11131b00 1775->1798 1799 111394bd-111394c6 1775->1799 1776->1775 1796 11139325-11139339 call 11081a70 1777->1796 1797 1113933e-11139351 call 11143230 1777->1797 1780->1738 1781->1780 1782 11139179-11139190 call 11146450 GetForegroundWindow 1781->1782 1801 11139192-111391bc EnableWindow call 11131210 * 2 EnableWindow 1782->1801 1802 111391be-111391c0 1782->1802 1784->1741 1790 1113925f-1113927a GetForegroundWindow call 11131210 * 2 1784->1790 1787->1765 1788->1765 1835 1113928b-11139294 EnableWindow 1790->1835 1836 1113927c-11139282 1790->1836 1796->1797 1826 1113933b 1796->1826 1818 11139353-11139364 GetLastError call 11146450 1797->1818 1819 1113936e-11139375 1797->1819 1798->1799 1807 111394d4 call 111317a0 1799->1807 1808 111394c8-111394cb 1799->1808 1801->1802 1802->1780 1811 111391c2-111391c8 1802->1811 1816 111394d9-111394df 1807->1816 1808->1816 1817 111394cd-111394d2 call 11131870 1808->1817 1811->1780 1824 111391ca-111391cb SetForegroundWindow 1811->1824 1822 111394e5-111394eb 1816->1822 1823 111395e9-111395f4 call 111386b0 1816->1823 1817->1816 1818->1819 1829 11139377-11139392 1819->1829 1830 111393e8 1819->1830 1832 111394f1-111394f9 1822->1832 1833 1113959b-111395a3 1822->1833 1845 111395f6-11139608 call 110637c0 1823->1845 1846 11139615-1113961b 1823->1846 1824->1780 1826->1797 1843 11139395-111393a1 1829->1843 1830->1752 1832->1823 1839 111394ff-11139505 1832->1839 1833->1823 1842 111395a5-111395e3 call 1103f000 call 1103f040 call 1103f060 call 1103f020 call 1110f270 1833->1842 1835->1741 1836->1835 1841 11139284-11139285 SetForegroundWindow 1836->1841 1839->1823 1844 1113950b-11139522 call 1110f420 1839->1844 1841->1835 1842->1823 1851 111393a3-111393b7 call 11081a70 1843->1851 1852 111393bc-111393c9 call 11143230 1843->1852 1864 11139544 1844->1864 1865 11139524-11139542 call 110573b0 1844->1865 1845->1846 1867 1113960a-11139610 call 11142210 1845->1867 1849 11139621-11139628 1846->1849 1850 1113974a-11139752 1846->1850 1849->1850 1856 1113962e-11139647 call 1105dd10 1849->1856 1850->1739 1851->1852 1871 111393b9 1851->1871 1852->1830 1873 111393cb-111393e6 GetLastError call 11146450 1852->1873 1856->1850 1877 1113964d-11139660 1856->1877 1874 11139546-11139592 call 1110f260 call 1104ce00 call 1104e340 call 1104e3b0 call 1104ce40 1864->1874 1865->1874 1867->1846 1871->1852 1873->1758 1874->1823 1907 11139594-11139599 call 110ebf30 1874->1907 1888 11139662-11139668 1877->1888 1889 1113968d-11139693 1877->1889 1892 1113966a-11139688 call 11146450 GetTickCount 1888->1892 1893 11139699-111396a5 GetTickCount 1888->1893 1889->1850 1889->1893 1892->1850 1893->1850 1896 111396ab-111396eb call 11142e80 call 11146ee0 call 11142e80 call 11025bb0 1893->1896 1913 111396f0-111396f5 1896->1913 1907->1823 1913->1913 1914 111396f7-111396fd 1913->1914 1915 11139700-11139705 1914->1915 1915->1915 1916 11139707-11139731 call 1112c7a0 1915->1916 1919 11139733-11139734 FreeLibrary 1916->1919 1920 1113973a-11139747 call 111618c1 1916->1920 1919->1920 1920->1850
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 111390C7
                                                                                      • IsWindow.USER32(0002046A), ref: 11139125
                                                                                      • IsWindowVisible.USER32(0002046A), ref: 11139133
                                                                                      • IsWindowVisible.USER32(0002046A), ref: 1113916B
                                                                                      • GetForegroundWindow.USER32 ref: 11139186
                                                                                      • EnableWindow.USER32(0002046A,00000000), ref: 111391A0
                                                                                      • EnableWindow.USER32(0002046A,00000001), ref: 111391BC
                                                                                      • SetForegroundWindow.USER32(00000000), ref: 111391CB
                                                                                      • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 11139209
                                                                                      • IsWindowVisible.USER32(00000000), ref: 11139218
                                                                                      • IsWindowVisible.USER32(0002046A), ref: 11139248
                                                                                      • IsIconic.USER32(0002046A), ref: 11139255
                                                                                      • GetForegroundWindow.USER32 ref: 1113925F
                                                                                        • Part of subcall function 11131210: ShowWindow.USER32(0002046A,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                        • Part of subcall function 11131210: ShowWindow.USER32(0002046A,11139062,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131246
                                                                                      • SetForegroundWindow.USER32(00000000), ref: 11139285
                                                                                      • EnableWindow.USER32(0002046A,00000001), ref: 11139294
                                                                                      • GetLastError.KERNEL32 ref: 11139353
                                                                                      • GetLastError.KERNEL32 ref: 111393CB
                                                                                      • GetTickCount.KERNEL32 ref: 11139678
                                                                                      • GetTickCount.KERNEL32 ref: 11139699
                                                                                        • Part of subcall function 11025BB0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,111396E2), ref: 11025BB8
                                                                                      • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 11139734
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                      • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                      • API String ID: 2511061093-2542869446
                                                                                      • Opcode ID: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                      • Instruction ID: 168a4b77644d94df8a921335772b55db7e1a21360cf08f879ca3086e41f0bcfd
                                                                                      • Opcode Fuzzy Hash: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                      • Instruction Fuzzy Hash: 700229B8A1062ADFE716DFA4CDD4B6AF766BBC071EF500178E4255728CEB30A844CB51
                                                                                      APIs
                                                                                      • CoInitialize.OLE32(00000000), ref: 11115BC5
                                                                                      • CoCreateInstance.OLE32(111C081C,00000000,00000001,111C082C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104BADF), ref: 11115BDF
                                                                                      • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11115C04
                                                                                      • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11115C16
                                                                                      • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11115C29
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11115C35
                                                                                      • CoUninitialize.COMBASE(00000000), ref: 11115CD1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                      • String ID: SHELL32.DLL$SHGetSettings
                                                                                      • API String ID: 4195908086-2348320231
                                                                                      • Opcode ID: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                      • Instruction ID: 591e2108fd72310e634c09c07143bf968b2bad8d72189eb08e80a39284cb5d12
                                                                                      • Opcode Fuzzy Hash: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                      • Instruction Fuzzy Hash: 1751A075A0020A9FDB40DFE5C9C4AAFFBB9FF89304F104629E516AB244E731A941CB61
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _memset
                                                                                      • String ID: NBCTL32.DLL$_License$serial_no
                                                                                      • API String ID: 2102423945-35127696
                                                                                      • Opcode ID: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                      • Instruction ID: b704a80906741011c15d1468992a84ddd821d027e1e1ff2b1c0992d848e69eb8
                                                                                      • Opcode Fuzzy Hash: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                      • Instruction Fuzzy Hash: 64B18E75E00209AFE714CFA8DC81BAEB7F5FF88304F148169E9499B295DB71A901CB90
                                                                                      APIs
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(1102E480,?,00000000), ref: 110310E4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                      • String ID: Client32$NSMWClass$NSMWClass
                                                                                      • API String ID: 3192549508-611217420
                                                                                      • Opcode ID: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                      • Instruction ID: e21dedaf74b0f8cf59cf3be59171af9e644e6a1753dc25f7f597d2ad8de8aca1
                                                                                      • Opcode Fuzzy Hash: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                      • Instruction Fuzzy Hash: 44F04F7891112A9FCB06DFA9D890A9EF7E4AB4821CB508165E82587348EB30A605CB95
                                                                                      APIs
                                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,008BE0C8,008BE0C8,008BE0C8,008BE0C8,008BE0C8,008BE0C8,008BE0C8,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                      • EqualSid.ADVAPI32(?,008BE0C8,?,00000001,00000001), ref: 1109E9A3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InformationToken$AllocateEqualInitialize
                                                                                      • String ID:
                                                                                      • API String ID: 1878589025-0
                                                                                      • Opcode ID: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                      • Instruction ID: 8f268d00a2632c5decc73a479da56acc1190ac8ef7b7f04f8431c56e7d3a1b5e
                                                                                      • Opcode Fuzzy Hash: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                      • Instruction Fuzzy Hash: 22217131B0122EABEB10DBA4CC81BBEB7B8EB44708F100469E919D7184E671AD00CBA1
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,581E67F8,00080000,00000000,00000000), ref: 1109D46D
                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                      • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                      • String ID:
                                                                                      • API String ID: 2349140579-0
                                                                                      • Opcode ID: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                      • Instruction ID: 1acc50509d1dc0efa8f8b8857b060522b21de2b31161cc556941a9c494b785c9
                                                                                      • Opcode Fuzzy Hash: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                      • Instruction Fuzzy Hash: AE015EB5640218ABD710DFA4CC89BAAF7BCFF44B05F10452DFA1597280D7B1AA04CB71
                                                                                      APIs
                                                                                      • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109E810,00000244,cant create events), ref: 1109D4EC
                                                                                      • CloseHandle.KERNEL32(?,00000000,1109E810,00000244,cant create events), ref: 1109D4F5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                                      • String ID:
                                                                                      • API String ID: 81990902-0
                                                                                      • Opcode ID: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                      • Instruction ID: ae8e9f792a84aceb39bcb46fd7c9804e810fa9328d8f27f892a8d401e6504800
                                                                                      • Opcode Fuzzy Hash: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                      • Instruction Fuzzy Hash: 55E0EC71654614ABE738CF28DC95FA677ECAF09B01F11495DF9A6D6180CA60F8408B64
                                                                                      APIs
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                      • GetSystemMetrics.USER32(00002000), ref: 1102E7C4
                                                                                      • FindWindowA.USER32(NSMWClass,00000000), ref: 1102E985
                                                                                        • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                        • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                        • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                        • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                        • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102E9C1
                                                                                      • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102E9E9
                                                                                      • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102ECAB
                                                                                        • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B4C
                                                                                        • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B59
                                                                                        • Part of subcall function 11094B30: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B89
                                                                                      • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EA48
                                                                                      • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EA54
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 1102EA6C
                                                                                      • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EA79
                                                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EA9B
                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E7F6
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      • LoadIconA.USER32(11000000,000004C1), ref: 1102EE45
                                                                                      • LoadIconA.USER32(11000000,000004C2), ref: 1102EE55
                                                                                      • DestroyCursor.USER32(00000000), ref: 1102EE7E
                                                                                      • DestroyCursor.USER32(00000000), ref: 1102EE92
                                                                                      • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F45F
                                                                                      • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F4B2
                                                                                      • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 1102FA52
                                                                                      • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FA8C
                                                                                        • Part of subcall function 11132BF0: wsprintfA.USER32 ref: 11132C60
                                                                                        • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132C91
                                                                                        • Part of subcall function 11132BF0: SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                        • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132CAC
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • DispatchMessageA.USER32(?), ref: 1102FA96
                                                                                      • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FAA8
                                                                                      • CloseHandle.KERNEL32(00000000,11027270,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 1102FD40
                                                                                      • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1102FD78
                                                                                      • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 1102FD7F
                                                                                      • SetWindowPos.USER32(0002046A,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 1102FDB5
                                                                                      • CloseHandle.KERNEL32(00000000,11059C10,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1102FE36
                                                                                      • wsprintfA.USER32 ref: 1102FFA5
                                                                                      • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 110300F7
                                                                                      • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103010D
                                                                                      • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 11030136
                                                                                      • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103015F
                                                                                        • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,581E67F8,00000002,74DF2EE0), ref: 1112820A
                                                                                        • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 11128217
                                                                                        • Part of subcall function 111281B0: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00000000), ref: 1112825E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Message$Process$Window$CloseCreateEventHandlePostwsprintf$CriticalOpenSectionThread$CountCurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTickTokenVersionWait$ClassDispatchEnterErrorExitFolderLastMetricsPathPrioritySendSleepSystem__wcstoi64_malloc_memset
                                                                                      • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$120633$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.8$V12.10.8$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                      • API String ID: 1099283604-1297024707
                                                                                      • Opcode ID: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                      • Instruction ID: 27af1d42f1b4f6ddb2c14770db7fbacfca67435089f052a3aa779117de4136e9
                                                                                      • Opcode Fuzzy Hash: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                      • Instruction Fuzzy Hash: 3CE25D75F0022AABEF15DBE4DC80FADF7A5AB4474CF904068E925AB3C4D770A944CB52

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 994 1102db00-1102db50 call 1110f420 997 1102db52-1102db66 call 11142a60 994->997 998 1102db68 994->998 1000 1102db6e-1102dbb3 call 11142290 call 11142ac0 997->1000 998->1000 1006 1102dd53-1102dd62 call 11144dc0 1000->1006 1007 1102dbb9 1000->1007 1016 1102dd68-1102dd78 1006->1016 1008 1102dbc0-1102dbc3 1007->1008 1010 1102dbc5-1102dbc7 1008->1010 1011 1102dbe8-1102dbf1 1008->1011 1013 1102dbd0-1102dbe1 1010->1013 1014 1102dbf7-1102dbfe 1011->1014 1015 1102dd24-1102dd3d call 11142ac0 1011->1015 1013->1013 1019 1102dbe3 1013->1019 1014->1015 1020 1102dcf3-1102dd08 call 11162de7 1014->1020 1021 1102dc05-1102dc07 1014->1021 1022 1102dd0a-1102dd1f call 11162de7 1014->1022 1023 1102dc9a-1102dccd call 111618c1 call 11142290 1014->1023 1024 1102dcdb-1102dcf1 call 11164010 1014->1024 1025 1102dc8b-1102dc95 1014->1025 1026 1102dccf-1102dcd9 1014->1026 1027 1102dc4c-1102dc52 1014->1027 1028 1102dc7c-1102dc86 1014->1028 1015->1008 1046 1102dd43-1102dd45 1015->1046 1017 1102dd7a 1016->1017 1018 1102dd7f-1102dd93 call 1102cc10 1016->1018 1017->1018 1041 1102dd98-1102dd9d 1018->1041 1019->1015 1020->1015 1021->1015 1037 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 1021->1037 1022->1015 1023->1015 1024->1015 1025->1015 1026->1015 1030 1102dc54-1102dc68 call 11162de7 1027->1030 1031 1102dc6d-1102dc77 1027->1031 1028->1015 1030->1015 1031->1015 1037->1015 1048 1102de43-1102de5d call 111463d0 1041->1048 1049 1102dda3-1102ddc8 call 110b7920 call 11146450 1041->1049 1046->1048 1052 1102dd4b-1102dd51 1046->1052 1061 1102deb3-1102debf call 1102b4f0 1048->1061 1062 1102de5f-1102de78 call 1105dd10 1048->1062 1069 1102ddd3-1102ddd9 1049->1069 1070 1102ddca-1102ddd1 1049->1070 1052->1006 1052->1016 1073 1102dec1-1102dec8 1061->1073 1074 1102de98-1102de9f 1061->1074 1062->1061 1077 1102de7a-1102de8c 1062->1077 1075 1102dddb-1102dde2 call 11027d60 1069->1075 1076 1102de39 1069->1076 1070->1048 1078 1102dea5-1102dea8 1073->1078 1080 1102deca-1102ded4 1073->1080 1074->1078 1079 1102e0aa-1102e0cb GetComputerNameA 1074->1079 1075->1076 1093 1102dde4-1102de16 1075->1093 1076->1048 1077->1061 1088 1102de8e 1077->1088 1083 1102deaa-1102deb1 call 110b7920 1078->1083 1084 1102ded9 1078->1084 1086 1102e103-1102e109 1079->1086 1087 1102e0cd-1102e101 call 11027c30 1079->1087 1080->1079 1092 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 1083->1092 1084->1092 1090 1102e10b-1102e110 1086->1090 1091 1102e13f-1102e152 call 11164010 1086->1091 1087->1086 1116 1102e157-1102e163 1087->1116 1088->1074 1097 1102e116-1102e11a 1090->1097 1105 1102e347-1102e36a 1091->1105 1145 1102e07a-1102e082 SetLastError 1092->1145 1146 1102dfbc-1102dfd3 1092->1146 1107 1102de20-1102de2f call 110f6080 1093->1107 1108 1102de18-1102de1e 1093->1108 1102 1102e136-1102e138 1097->1102 1103 1102e11c-1102e11e 1097->1103 1112 1102e13b-1102e13d 1102->1112 1110 1102e132-1102e134 1103->1110 1111 1102e120-1102e126 1103->1111 1127 1102e392-1102e39a 1105->1127 1128 1102e36c-1102e372 1105->1128 1114 1102de32-1102de34 call 1102d330 1107->1114 1108->1107 1108->1114 1110->1112 1111->1102 1117 1102e128-1102e130 1111->1117 1112->1091 1112->1116 1114->1076 1118 1102e165-1102e17a call 110b7920 call 11029bd0 1116->1118 1119 1102e17c-1102e18f call 11081a70 1116->1119 1117->1097 1117->1110 1149 1102e1d3-1102e1ec call 11081a70 1118->1149 1139 1102e191-1102e1b4 1119->1139 1140 1102e1b6-1102e1b8 1119->1140 1129 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 1127->1129 1130 1102e39c-1102e3a9 call 11035dd0 call 111618c1 1127->1130 1128->1127 1134 1102e374-1102e38d call 1102d330 1128->1134 1130->1129 1134->1127 1139->1149 1144 1102e1c0-1102e1d1 1140->1144 1144->1144 1144->1149 1151 1102e043-1102e04f 1145->1151 1146->1151 1163 1102dfd5-1102dfde 1146->1163 1169 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 1149->1169 1170 1102e32c-1102e339 call 11164010 1149->1170 1154 1102e092-1102e0a1 1151->1154 1155 1102e051-1102e05d 1151->1155 1154->1079 1165 1102e0a3-1102e0a4 FreeLibrary 1154->1165 1161 1102e06f-1102e073 1155->1161 1162 1102e05f-1102e06d GetProcAddress 1155->1162 1166 1102e084-1102e086 SetLastError 1161->1166 1167 1102e075-1102e078 1161->1167 1162->1161 1163->1151 1171 1102dfe0-1102e016 call 11146450 call 1112b270 1163->1171 1165->1079 1175 1102e08c 1166->1175 1167->1175 1206 1102e283-1102e299 call 11128ec0 1169->1206 1207 1102e26f-1102e27e call 11029450 1169->1207 1183 1102e33c-1102e341 CharUpperA 1170->1183 1171->1151 1191 1102e018-1102e03e call 11146450 call 11027920 1171->1191 1175->1154 1183->1105 1191->1151 1211 1102e2b2-1102e2ec call 110d0bd0 * 2 1206->1211 1212 1102e29b-1102e2ad call 110d0bd0 1206->1212 1207->1206 1219 1102e302-1102e32a call 11164010 call 110d07c0 1211->1219 1220 1102e2ee-1102e2fd call 11029450 1211->1220 1212->1211 1219->1183 1220->1219
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _malloc_memsetwsprintf
                                                                                      • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$120633$14/03/16 10:38:31 V12.10F8$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                      • API String ID: 3802068140-3532162028
                                                                                      • Opcode ID: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                      • Instruction ID: 727bed6a5d63171c4319a8bac454151215a042d106ed124055d9f0508de139ba
                                                                                      • Opcode Fuzzy Hash: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                      • Instruction Fuzzy Hash: 7932D275D0022A9FDF12DFA4DC84BEDB7B8AB44308F9445E9E55867280EB70AF84CB51

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1661 110a9c90-110a9cf2 LoadLibraryA GetProcAddress 1662 110a9cf8-110a9d09 SetupDiGetClassDevsA 1661->1662 1663 110a9e05-110a9e0d SetLastError 1661->1663 1664 110a9d0f-110a9d1d 1662->1664 1665 110a9f13-110a9f15 1662->1665 1668 110a9e19-110a9e1b SetLastError 1663->1668 1669 110a9d20-110a9d24 1664->1669 1666 110a9f1e-110a9f20 1665->1666 1667 110a9f17-110a9f18 FreeLibrary 1665->1667 1670 110a9f37-110a9f52 call 11161d01 1666->1670 1667->1666 1671 110a9e21-110a9e2c GetLastError 1668->1671 1672 110a9d3d-110a9d55 1669->1672 1673 110a9d26-110a9d37 GetProcAddress 1669->1673 1674 110a9e32-110a9e3d call 11162be5 1671->1674 1675 110a9ec0-110a9ed1 GetProcAddress 1671->1675 1672->1671 1683 110a9d5b-110a9d5d 1672->1683 1673->1668 1673->1672 1674->1669 1679 110a9edb-110a9edd SetLastError 1675->1679 1680 110a9ed3-110a9ed9 SetupDiDestroyDeviceInfoList 1675->1680 1682 110a9ee3-110a9ee5 1679->1682 1680->1682 1682->1665 1685 110a9ee7-110a9f09 CreateFileA 1682->1685 1686 110a9d68-110a9d6a 1683->1686 1687 110a9d5f-110a9d65 call 11162be5 1683->1687 1688 110a9f0b-110a9f10 call 11162be5 1685->1688 1689 110a9f22-110a9f2c call 11162be5 1685->1689 1691 110a9d6c-110a9d7f GetProcAddress 1686->1691 1692 110a9d85-110a9d9b 1686->1692 1687->1686 1688->1665 1701 110a9f2e-110a9f2f FreeLibrary 1689->1701 1702 110a9f35 1689->1702 1691->1692 1695 110a9e42-110a9e4a SetLastError 1691->1695 1700 110a9d9d-110a9da6 GetLastError 1692->1700 1703 110a9dac-110a9dbf call 11162b51 1692->1703 1695->1700 1700->1703 1704 110a9e81-110a9e92 call 110a9c30 1700->1704 1701->1702 1702->1670 1711 110a9ea2-110a9eb3 call 110a9c30 1703->1711 1712 110a9dc5-110a9dcd 1703->1712 1709 110a9e9b-110a9e9d 1704->1709 1710 110a9e94-110a9e95 FreeLibrary 1704->1710 1709->1670 1710->1709 1711->1709 1719 110a9eb5-110a9ebe FreeLibrary 1711->1719 1713 110a9dcf-110a9de2 GetProcAddress 1712->1713 1714 110a9de4-110a9dfb 1712->1714 1713->1714 1716 110a9e4f-110a9e51 SetLastError 1713->1716 1720 110a9e57-110a9e71 call 110a9c30 call 11162be5 1714->1720 1721 110a9dfd-110a9e00 1714->1721 1716->1720 1719->1670 1720->1709 1726 110a9e73-110a9e7c FreeLibrary 1720->1726 1721->1669 1726->1670
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(setupapi.dll,581E67F8,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,11184778), ref: 110A9CC3
                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110A9CE7
                                                                                      • SetupDiGetClassDevsA.SETUPAPI(111A6E0C,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF), ref: 110A9D01
                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110A9D2C
                                                                                      • _free.LIBCMT ref: 110A9D60
                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9D72
                                                                                      • GetLastError.KERNEL32 ref: 110A9D9D
                                                                                      • _malloc.LIBCMT ref: 110A9DB3
                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9DD5
                                                                                      • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9E07
                                                                                      • SetLastError.KERNEL32(00000078), ref: 110A9E1B
                                                                                      • GetLastError.KERNEL32 ref: 110A9E21
                                                                                      • _free.LIBCMT ref: 110A9E33
                                                                                      • SetLastError.KERNEL32(00000078), ref: 110A9E44
                                                                                      • SetLastError.KERNEL32(00000078), ref: 110A9E51
                                                                                      • _free.LIBCMT ref: 110A9E64
                                                                                      • FreeLibrary.KERNEL32(?,?), ref: 110A9E74
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9F18
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                      • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                      • API String ID: 3464732724-3340099623
                                                                                      • Opcode ID: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                      • Instruction ID: 033bff87456eb4c9bd2d5bbaba34d7345019b106b940800e90953e4c12ebf53e
                                                                                      • Opcode Fuzzy Hash: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                      • Instruction Fuzzy Hash: F2816279E14259ABEB04DFF4EC84F9FFBB8AF48704F104528F921A6284EB759905CB50

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1923 11133920-1113395c 1924 11133962-11133984 call 1105dd10 1923->1924 1925 11133c84-11133c9f call 11161d01 1923->1925 1924->1925 1930 1113398a-1113399e GetLocalTime 1924->1930 1931 111339c1-11133a43 LoadLibraryA call 110098c0 call 11015c30 GetCurrentProcess 1930->1931 1932 111339a0-111339bc call 11146450 1930->1932 1939 11133a45-11133a5b GetProcAddress 1931->1939 1940 11133a5d-11133a64 GetProcessHandleCount 1931->1940 1932->1931 1939->1940 1941 11133a66-11133a68 SetLastError 1939->1941 1942 11133a6e-11133a76 1940->1942 1941->1942 1943 11133a92-11133a9e 1942->1943 1944 11133a78-11133a90 GetProcAddress 1942->1944 1947 11133aa0-11133ab8 GetProcAddress 1943->1947 1948 11133aba-11133ac5 1943->1948 1944->1943 1945 11133ac7-11133ad2 SetLastError 1944->1945 1945->1947 1947->1948 1949 11133ad4-11133adc SetLastError 1947->1949 1950 11133adf-11133aef GetProcAddress 1948->1950 1949->1950 1952 11133af1-11133afd K32GetProcessMemoryInfo 1950->1952 1953 11133aff-11133b01 SetLastError 1950->1953 1954 11133b07-11133b15 1952->1954 1953->1954 1955 11133b23-11133b2e 1954->1955 1956 11133b17-11133b1f 1954->1956 1957 11133b30-11133b38 1955->1957 1958 11133b3c-11133b47 1955->1958 1956->1955 1957->1958 1959 11133b55-11133b5f 1958->1959 1960 11133b49-11133b51 1958->1960 1961 11133b61-11133b68 1959->1961 1962 11133b6a-11133b6d 1959->1962 1960->1959 1963 11133b6f-11133b7d call 11146450 1961->1963 1962->1963 1964 11133b80-11133b92 1962->1964 1963->1964 1968 11133c5a-11133c68 1964->1968 1969 11133b98-11133baa call 110637c0 1964->1969 1971 11133c6a-11133c6b FreeLibrary 1968->1971 1972 11133c6d-11133c75 1968->1972 1969->1968 1976 11133bb0-11133bd1 call 1105dd10 1969->1976 1971->1972 1974 11133c77-11133c78 FreeLibrary 1972->1974 1975 11133c7a-11133c7f 1972->1975 1974->1975 1975->1925 1977 11133c81-11133c82 FreeLibrary 1975->1977 1980 11133bd3-11133bd9 1976->1980 1981 11133bdf-11133bfb call 1105dd10 1976->1981 1977->1925 1980->1981 1982 11133bdb 1980->1982 1985 11133c06-11133c22 call 1105dd10 1981->1985 1986 11133bfd-11133c00 1981->1986 1982->1981 1990 11133c24-11133c27 1985->1990 1991 11133c2d-11133c49 call 1105dd10 1985->1991 1986->1985 1987 11133c02 1986->1987 1987->1985 1990->1991 1992 11133c29 1990->1992 1995 11133c50-11133c53 1991->1995 1996 11133c4b-11133c4e 1991->1996 1992->1991 1995->1968 1997 11133c55 call 11027780 1995->1997 1996->1995 1996->1997 1997->1968
                                                                                      APIs
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,581E67F8), ref: 1113398E
                                                                                      • LoadLibraryA.KERNEL32(psapi.dll), ref: 111339E6
                                                                                      • GetCurrentProcess.KERNEL32 ref: 11133A27
                                                                                      • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11133A51
                                                                                      • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11133A62
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133A68
                                                                                      • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133A84
                                                                                      • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133AAC
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133AC9
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133AD6
                                                                                      • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 11133AE8
                                                                                      • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11133AFB
                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133B01
                                                                                      • FreeLibrary.KERNEL32(?), ref: 11133C6B
                                                                                      • FreeLibrary.KERNEL32(?), ref: 11133C78
                                                                                      • FreeLibrary.KERNEL32(?), ref: 11133C82
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                      • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                      • API String ID: 263027137-1001504656
                                                                                      • Opcode ID: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                      • Instruction ID: 17d7fdf42b282dadbb05295794651177f64ab9c07d211a437ec733fd2e53fcc2
                                                                                      • Opcode Fuzzy Hash: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                      • Instruction Fuzzy Hash: A3B1BFB1E242699FDB10DFE9CDC0AADFBB6EB48319F10452AE414E7348DB349844CB65

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1999 1102dbc9 2000 1102dbd0-1102dbe1 1999->2000 2000->2000 2001 1102dbe3 2000->2001 2002 1102dd24-1102dd3d call 11142ac0 2001->2002 2005 1102dd43-1102dd45 2002->2005 2006 1102dbc0-1102dbc3 2002->2006 2009 1102de43-1102de5d call 111463d0 2005->2009 2010 1102dd4b-1102dd51 2005->2010 2007 1102dbc5-1102dbc7 2006->2007 2008 1102dbe8-1102dbf1 2006->2008 2007->2000 2008->2002 2011 1102dbf7-1102dbfe 2008->2011 2036 1102deb3-1102debf call 1102b4f0 2009->2036 2037 1102de5f-1102de78 call 1105dd10 2009->2037 2013 1102dd53-1102dd62 call 11144dc0 2010->2013 2014 1102dd68-1102dd78 2010->2014 2011->2002 2017 1102dcf3-1102dd08 call 11162de7 2011->2017 2018 1102dc05-1102dc07 2011->2018 2019 1102dd0a-1102dd1f call 11162de7 2011->2019 2020 1102dc9a-1102dccd call 111618c1 call 11142290 2011->2020 2021 1102dcdb-1102dcf1 call 11164010 2011->2021 2022 1102dc8b-1102dc95 2011->2022 2023 1102dccf-1102dcd9 2011->2023 2024 1102dc4c-1102dc52 2011->2024 2025 1102dc7c-1102dc86 2011->2025 2013->2014 2015 1102dd7a 2014->2015 2016 1102dd7f-1102dd9d call 1102cc10 2014->2016 2015->2016 2016->2009 2049 1102dda3-1102ddc8 call 110b7920 call 11146450 2016->2049 2017->2002 2018->2002 2035 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 2018->2035 2019->2002 2020->2002 2021->2002 2022->2002 2023->2002 2028 1102dc54-1102dc68 call 11162de7 2024->2028 2029 1102dc6d-1102dc77 2024->2029 2025->2002 2028->2002 2029->2002 2035->2002 2056 1102dec1-1102dec8 2036->2056 2057 1102de98-1102de9f 2036->2057 2037->2036 2059 1102de7a-1102de8c 2037->2059 2083 1102ddd3-1102ddd9 2049->2083 2084 1102ddca-1102ddd1 2049->2084 2060 1102dea5-1102dea8 2056->2060 2063 1102deca-1102ded4 2056->2063 2057->2060 2061 1102e0aa-1102e0cb GetComputerNameA 2057->2061 2059->2036 2073 1102de8e 2059->2073 2068 1102deaa-1102deb1 call 110b7920 2060->2068 2069 1102ded9 2060->2069 2065 1102e103-1102e109 2061->2065 2066 1102e0cd-1102e101 call 11027c30 2061->2066 2063->2061 2077 1102e10b-1102e110 2065->2077 2078 1102e13f-1102e152 call 11164010 2065->2078 2066->2065 2103 1102e157-1102e163 2066->2103 2076 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 2068->2076 2069->2076 2073->2057 2134 1102e07a-1102e082 SetLastError 2076->2134 2135 1102dfbc-1102dfd3 2076->2135 2082 1102e116-1102e11a 2077->2082 2095 1102e347-1102e36a 2078->2095 2092 1102e136-1102e138 2082->2092 2093 1102e11c-1102e11e 2082->2093 2088 1102dddb-1102dde2 call 11027d60 2083->2088 2089 1102de39 2083->2089 2084->2009 2088->2089 2109 1102dde4-1102de16 2088->2109 2089->2009 2100 1102e13b-1102e13d 2092->2100 2097 1102e132-1102e134 2093->2097 2098 1102e120-1102e126 2093->2098 2113 1102e392-1102e39a 2095->2113 2114 1102e36c-1102e372 2095->2114 2097->2100 2098->2092 2104 1102e128-1102e130 2098->2104 2100->2078 2100->2103 2106 1102e165-1102e17a call 110b7920 call 11029bd0 2103->2106 2107 1102e17c-1102e18f call 11081a70 2103->2107 2104->2082 2104->2097 2140 1102e1d3-1102e1ec call 11081a70 2106->2140 2125 1102e191-1102e1b4 2107->2125 2126 1102e1b6-1102e1b8 2107->2126 2127 1102de20-1102de2f call 110f6080 2109->2127 2128 1102de18-1102de1e 2109->2128 2116 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 2113->2116 2117 1102e39c-1102e3a9 call 11035dd0 call 111618c1 2113->2117 2114->2113 2121 1102e374-1102e38d call 1102d330 2114->2121 2117->2116 2121->2113 2125->2140 2137 1102e1c0-1102e1d1 2126->2137 2130 1102de32-1102de34 call 1102d330 2127->2130 2128->2127 2128->2130 2130->2089 2142 1102e043-1102e04f 2134->2142 2135->2142 2158 1102dfd5-1102dfde 2135->2158 2137->2137 2137->2140 2159 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 2140->2159 2160 1102e32c-1102e339 call 11164010 2140->2160 2148 1102e092-1102e0a1 2142->2148 2149 1102e051-1102e05d 2142->2149 2148->2061 2156 1102e0a3-1102e0a4 FreeLibrary 2148->2156 2153 1102e06f-1102e073 2149->2153 2154 1102e05f-1102e06d GetProcAddress 2149->2154 2161 1102e084-1102e086 SetLastError 2153->2161 2162 1102e075-1102e078 2153->2162 2154->2153 2156->2061 2158->2142 2163 1102dfe0-1102e016 call 11146450 call 1112b270 2158->2163 2199 1102e283-1102e299 call 11128ec0 2159->2199 2200 1102e26f-1102e27e call 11029450 2159->2200 2177 1102e33c-1102e341 CharUpperA 2160->2177 2165 1102e08c 2161->2165 2162->2165 2163->2142 2184 1102e018-1102e03e call 11146450 call 11027920 2163->2184 2165->2148 2177->2095 2184->2142 2204 1102e2b2-1102e2ec call 110d0bd0 * 2 2199->2204 2205 1102e29b-1102e2ad call 110d0bd0 2199->2205 2200->2199 2212 1102e302-1102e32a call 11164010 call 110d07c0 2204->2212 2213 1102e2ee-1102e2fd call 11029450 2204->2213 2205->2204 2212->2177 2213->2212
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102DF31
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad
                                                                                      • String ID: $120633$14/03/16 10:38:31 V12.10F8$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                      • API String ID: 1029625771-2290342154
                                                                                      • Opcode ID: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                      • Instruction ID: 8eab5b2d156e186679f92ce27f1e5cdd209b728942572a9b5b46018c3091c824
                                                                                      • Opcode Fuzzy Hash: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                      • Instruction Fuzzy Hash: 97C1D275E0026AAFDF22DF959C84BEDF7B9AB44308F9440EDE55867280D770AE80CB51

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2219 111414a0-111414e1 call 11146450 2222 111414e7-11141543 LoadLibraryA 2219->2222 2223 11141569-11141593 call 11142e80 call 11146ee0 LoadLibraryA 2219->2223 2224 11141545-11141550 call 11017450 2222->2224 2225 11141557-11141560 2222->2225 2234 11141595-1114159b 2223->2234 2235 111415c3 2223->2235 2224->2225 2233 11141552 call 110cc7f0 2224->2233 2225->2223 2228 11141562-11141563 FreeLibrary 2225->2228 2228->2223 2233->2225 2234->2235 2237 1114159d-111415a3 2234->2237 2238 111415cd-111415ed GetClassInfoExA 2235->2238 2237->2235 2239 111415a5-111415c1 call 1105dd10 2237->2239 2240 111415f3-1114161a call 11161d20 call 111444b0 2238->2240 2241 1114168e-111416e6 2238->2241 2239->2238 2250 11141633-11141675 call 111444b0 call 111444e0 LoadCursorA GetStockObject RegisterClassExA 2240->2250 2251 1114161c-11141630 call 11029450 2240->2251 2252 11141722-11141728 2241->2252 2253 111416e8-111416ee 2241->2253 2250->2241 2277 11141677-1114168b call 11029450 2250->2277 2251->2250 2255 11141764-11141786 call 1105dd10 2252->2255 2256 1114172a-11141739 call 1110f420 2252->2256 2253->2252 2258 111416f0-111416f6 2253->2258 2272 11141794-11141799 2255->2272 2273 11141788-11141792 2255->2273 2270 1114175d 2256->2270 2271 1114173b-1114175b 2256->2271 2258->2252 2260 111416f8-1114170f call 1112c830 LoadLibraryA 2258->2260 2260->2252 2276 11141711-1114171d GetProcAddress 2260->2276 2278 1114175f 2270->2278 2271->2278 2274 111417a5-111417ab 2272->2274 2275 1114179b 2272->2275 2273->2274 2279 111417ad-111417b3 call 110f7d00 2274->2279 2280 111417b8-111417d1 call 1113cd80 2274->2280 2275->2274 2276->2252 2277->2241 2278->2255 2279->2280 2287 111417d7-111417dd 2280->2287 2288 11141879-1114188a 2280->2288 2289 111417df-111417f1 call 1110f420 2287->2289 2290 11141819-1114181f 2287->2290 2301 111417f3-11141809 call 1115d6d0 2289->2301 2302 1114180b 2289->2302 2291 11141845-11141851 2290->2291 2292 11141821-11141827 2290->2292 2296 11141853-11141859 2291->2296 2297 11141868-11141873 #17 LoadLibraryA 2291->2297 2294 1114182e-11141840 SetTimer 2292->2294 2295 11141829 call 11134930 2292->2295 2294->2291 2295->2294 2296->2297 2300 1114185b-11141861 2296->2300 2297->2288 2300->2297 2304 11141863 call 1112d6a0 2300->2304 2303 1114180d-11141814 2301->2303 2302->2303 2303->2290 2304->2297
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(User32.dll,00000000,00000000), ref: 111414F3
                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 11141563
                                                                                      • LoadLibraryA.KERNEL32(imm32,?,?,00000000,00000000), ref: 11141586
                                                                                      • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 111415E5
                                                                                      • _memset.LIBCMT ref: 111415F9
                                                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 11141649
                                                                                      • GetStockObject.GDI32(00000000), ref: 11141653
                                                                                      • RegisterClassExA.USER32(?), ref: 1114166A
                                                                                      • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,00000000), ref: 11141702
                                                                                      • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11141717
                                                                                      • SetTimer.USER32(00000000,00000000,000003E8,1113CD60), ref: 1114183A
                                                                                      • #17.COMCTL32(?,?,?,00000000,00000000), ref: 11141868
                                                                                      • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,00000000), ref: 11141873
                                                                                        • Part of subcall function 11017450: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,581E67F8,1102FCB2,00000000), ref: 1101747E
                                                                                        • Part of subcall function 11017450: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1101748E
                                                                                        • Part of subcall function 11017450: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 110174D2
                                                                                        • Part of subcall function 11017450: FreeLibrary.KERNEL32(00000000), ref: 110174F8
                                                                                        • Part of subcall function 110CC7F0: CreateWindowExA.USER32(00000000,button,11194244,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CC829
                                                                                        • Part of subcall function 110CC7F0: SetClassLongA.USER32(00000000,000000E8,110CC570), ref: 110CC840
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                      • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                      • API String ID: 3706574701-3145203681
                                                                                      • Opcode ID: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                      • Instruction ID: 9b294397b9efa9119a6c3372e39ca87a41eafe2d9b680e3b49ce131b24699399
                                                                                      • Opcode Fuzzy Hash: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                      • Instruction Fuzzy Hash: 6EA19DB4E0126AAFDB01DFE9C9C4AADFBB4FB4870DB60413EE52997644EB306440CB55

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2308 110285f0-1102860d 2309 11028613-11028642 2308->2309 2310 11028cd8-11028cdf 2308->2310 2311 110286d0-11028718 GetModuleFileNameA call 111631f0 call 11163fed 2309->2311 2312 11028648-1102864e 2309->2312 2313 11028cf1-11028cf5 2310->2313 2314 11028ce1-11028cea 2310->2314 2328 1102871d 2311->2328 2316 11028650-11028658 2312->2316 2318 11028cf7-11028d09 call 11161d01 2313->2318 2319 11028d0a-11028d1e call 11161d01 2313->2319 2314->2313 2317 11028cec 2314->2317 2316->2316 2321 1102865a-11028660 2316->2321 2317->2313 2325 11028663-11028668 2321->2325 2325->2325 2329 1102866a-11028674 2325->2329 2330 11028720-1102872a 2328->2330 2331 11028691-11028697 2329->2331 2332 11028676-1102867d 2329->2332 2333 11028730-11028733 2330->2333 2334 11028ccf-11028cd7 2330->2334 2336 11028698-1102869e 2331->2336 2335 11028680-11028686 2332->2335 2333->2334 2337 11028739-11028747 call 11026890 2333->2337 2334->2310 2335->2335 2338 11028688-1102868e 2335->2338 2336->2336 2339 110286a0-110286ce call 11163fed 2336->2339 2344 11028c55-11028c6a call 11163db7 2337->2344 2345 1102874d-11028760 call 11162de7 2337->2345 2338->2331 2339->2330 2344->2334 2350 11028c70-11028cca 2344->2350 2351 11028762-11028765 2345->2351 2352 1102876b-11028793 call 11026700 call 11026890 2345->2352 2350->2334 2351->2344 2351->2352 2352->2344 2357 11028799-110287b6 call 11026980 call 11026890 2352->2357 2362 11028bc5-11028bcc 2357->2362 2363 110287bc 2357->2363 2364 11028bf2-11028bf9 2362->2364 2365 11028bce-11028bd1 2362->2365 2366 110287c0-110287e0 call 11026700 2363->2366 2368 11028c11-11028c18 2364->2368 2369 11028bfb-11028c01 2364->2369 2365->2364 2367 11028bd3-11028bda 2365->2367 2376 110287e2-110287e5 2366->2376 2377 11028816-11028819 2366->2377 2371 11028be0-11028bf0 2367->2371 2373 11028c1a-11028c25 2368->2373 2374 11028c28-11028c2f 2368->2374 2372 11028c07-11028c0f 2369->2372 2371->2364 2371->2371 2372->2368 2372->2372 2373->2374 2378 11028c31-11028c3b 2374->2378 2379 11028c3e-11028c45 2374->2379 2382 110287e7-110287ee 2376->2382 2383 110287fe-11028801 2376->2383 2380 11028bae-11028bbf call 11026890 2377->2380 2381 1102881f-11028832 call 11164150 2377->2381 2378->2379 2379->2344 2384 11028c47-11028c52 2379->2384 2380->2362 2380->2366 2381->2380 2391 11028838-11028854 call 111646ce 2381->2391 2388 110287f4-110287fc 2382->2388 2383->2380 2385 11028807-11028811 2383->2385 2384->2344 2385->2380 2388->2383 2388->2388 2394 11028856-1102885c 2391->2394 2395 1102886f-11028885 call 111646ce 2391->2395 2396 11028860-11028868 2394->2396 2400 11028887-1102888d 2395->2400 2401 1102889f-110288b5 call 111646ce 2395->2401 2396->2396 2398 1102886a 2396->2398 2398->2380 2403 11028890-11028898 2400->2403 2406 110288b7-110288bd 2401->2406 2407 110288cf-110288e5 call 111646ce 2401->2407 2403->2403 2404 1102889a 2403->2404 2404->2380 2408 110288c0-110288c8 2406->2408 2412 110288e7-110288ed 2407->2412 2413 110288ff-11028915 call 111646ce 2407->2413 2408->2408 2410 110288ca 2408->2410 2410->2380 2414 110288f0-110288f8 2412->2414 2418 11028917-1102891d 2413->2418 2419 1102892f-11028945 call 111646ce 2413->2419 2414->2414 2416 110288fa 2414->2416 2416->2380 2420 11028920-11028928 2418->2420 2424 11028947-1102894d 2419->2424 2425 1102895f-11028975 call 111646ce 2419->2425 2420->2420 2422 1102892a 2420->2422 2422->2380 2426 11028950-11028958 2424->2426 2430 11028977-1102897d 2425->2430 2431 1102898f-110289a5 call 111646ce 2425->2431 2426->2426 2428 1102895a 2426->2428 2428->2380 2433 11028980-11028988 2430->2433 2436 110289a7-110289ad 2431->2436 2437 110289bf-110289d5 call 111646ce 2431->2437 2433->2433 2435 1102898a 2433->2435 2435->2380 2438 110289b0-110289b8 2436->2438 2442 110289d7-110289dd 2437->2442 2443 110289ef-11028a05 call 111646ce 2437->2443 2438->2438 2440 110289ba 2438->2440 2440->2380 2444 110289e0-110289e8 2442->2444 2448 11028a07-11028a0d 2443->2448 2449 11028a1f-11028a35 call 111646ce 2443->2449 2444->2444 2446 110289ea 2444->2446 2446->2380 2451 11028a10-11028a18 2448->2451 2454 11028a37-11028a3d 2449->2454 2455 11028a4f-11028a65 call 111646ce 2449->2455 2451->2451 2452 11028a1a 2451->2452 2452->2380 2456 11028a40-11028a48 2454->2456 2460 11028a86-11028a9c call 111646ce 2455->2460 2461 11028a67-11028a6d 2455->2461 2456->2456 2458 11028a4a 2456->2458 2458->2380 2466 11028ab3-11028ac9 call 111646ce 2460->2466 2467 11028a9e 2460->2467 2462 11028a77-11028a7f 2461->2462 2462->2462 2464 11028a81 2462->2464 2464->2380 2472 11028ae0-11028af6 call 111646ce 2466->2472 2473 11028acb 2466->2473 2468 11028aa4-11028aac 2467->2468 2468->2468 2470 11028aae 2468->2470 2470->2380 2478 11028b17-11028b2d call 111646ce 2472->2478 2479 11028af8-11028afe 2472->2479 2474 11028ad1-11028ad9 2473->2474 2474->2474 2476 11028adb 2474->2476 2476->2380 2484 11028b4f-11028b65 call 111646ce 2478->2484 2485 11028b2f-11028b3f 2478->2485 2481 11028b08-11028b10 2479->2481 2481->2481 2483 11028b12 2481->2483 2483->2380 2490 11028b67-11028b6d 2484->2490 2491 11028b7c-11028b92 call 111646ce 2484->2491 2486 11028b40-11028b48 2485->2486 2486->2486 2488 11028b4a 2486->2488 2488->2380 2492 11028b70-11028b78 2490->2492 2491->2380 2496 11028b94-11028b9a 2491->2496 2492->2492 2494 11028b7a 2492->2494 2494->2380 2497 11028ba4-11028bac 2496->2497 2497->2380 2497->2497
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,733B1370,?,0000001A), ref: 110286DD
                                                                                      • _strrchr.LIBCMT ref: 110286EC
                                                                                        • Part of subcall function 111646CE: __stricmp_l.LIBCMT ref: 1116470B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FileModuleName__stricmp_l_strrchr
                                                                                      • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                      • API String ID: 1609618855-357498123
                                                                                      • Opcode ID: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                      • Instruction ID: efd952e0d0f75bab71a6f775fe147756553f35749af42d5d105ea8c6321280ff
                                                                                      • Opcode Fuzzy Hash: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                      • Instruction Fuzzy Hash: ED12D67CD0929A8BDB17CF64CC807E5B7F5AB19308F8400EEE9D557201EB729686CB52

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2498 11086700-1108671d call 110866f0 2501 1108671f-1108672f call 11161d01 2498->2501 2502 11086730-11086740 call 11144bd0 2498->2502 2507 11086742-1108674a 2502->2507 2507->2507 2508 1108674c-11086752 2507->2508 2509 11086753-11086759 2508->2509 2509->2509 2510 1108675b-11086792 LoadLibraryA 2509->2510 2511 110867f9-1108680e GetProcAddress 2510->2511 2512 11086794-1108679b 2510->2512 2515 1108689c-110868ad call 11161d01 2511->2515 2516 11086814-11086823 GetProcAddress 2511->2516 2513 1108679d-110867ee GetModuleFileNameA call 11081b40 LoadLibraryA 2512->2513 2514 110867f0-110867f3 2512->2514 2513->2514 2514->2511 2514->2515 2516->2515 2518 11086825-11086834 GetProcAddress 2516->2518 2518->2515 2522 11086836-11086845 GetProcAddress 2518->2522 2522->2515 2523 11086847-11086856 GetProcAddress 2522->2523 2523->2515 2524 11086858-11086867 GetProcAddress 2523->2524 2524->2515 2525 11086869-11086878 GetProcAddress 2524->2525 2525->2515 2526 1108687a-11086889 GetProcAddress 2525->2526 2526->2515 2527 1108688b-1108689a GetProcAddress 2526->2527 2527->2515 2528 110868ae-110868c3 call 11161d01 2527->2528
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 1108678C
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110867AA
                                                                                      • LoadLibraryA.KERNEL32(?), ref: 110867EC
                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086807
                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108681C
                                                                                      • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108682D
                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108683E
                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108684F
                                                                                      • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086860
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                      • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                      • API String ID: 2201880244-3035937465
                                                                                      • Opcode ID: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                      • Instruction ID: c81deb3771c39ade44f8803fbe1e6421c41fb3d40bd553f41274565aeadcb2b4
                                                                                      • Opcode Fuzzy Hash: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                      • Instruction Fuzzy Hash: CD51C174E1834A9BD710DF79DC94BA6FBE9AF54304B1289AED885C7240EAB2E444CF50

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2531 11141890-111418c6 2532 111418cf-111418e4 call 1110f420 2531->2532 2533 111418c8-111418ca 2531->2533 2539 111418e6-1114190e call 11060f70 2532->2539 2540 11141910-11141912 2532->2540 2534 111421f2-1114220d call 11161d01 2533->2534 2542 11141918-11141947 call 11061700 2539->2542 2540->2542 2547 11141950-1114195d call 11142e50 2542->2547 2548 11141949-1114194a RegCloseKey 2542->2548 2551 11141964-11141985 call 11144dc0 call 11143230 2547->2551 2552 1114195f 2547->2552 2548->2547 2557 11141997-111419ad call 1110f420 2551->2557 2558 11141987-11141992 call 11062d60 2551->2558 2552->2551 2562 111419c2 2557->2562 2563 111419af-111419c0 call 11060be0 2557->2563 2558->2557 2564 111419c8-111419e2 call 1110f420 2562->2564 2563->2564 2569 111419e4-111419f5 call 11060be0 2564->2569 2570 111419f7 2564->2570 2572 111419fd-11141a17 call 1110f420 2569->2572 2570->2572 2576 11141a2c 2572->2576 2577 11141a19-11141a2a call 11060be0 2572->2577 2578 11141a32-11141a79 call 11060760 * 2 2576->2578 2577->2578 2585 11141a80 2578->2585 2586 11141a87-11141a8e 2585->2586 2587 11141a90-11141a97 2586->2587 2588 11141a9d-11141aa5 2586->2588 2587->2588 2589 11141d9a 2587->2589 2590 11141aa7-11141aad 2588->2590 2591 11141ac9-11141ad0 2588->2591 2594 11141da0-11141da2 2589->2594 2590->2591 2595 11141aaf-11141abc call 110607f0 2590->2595 2592 11141af5-11141b03 2591->2592 2593 11141ad2-11141ad9 2591->2593 2599 11141b05-11141b07 2592->2599 2600 11141b0d-11141b0f 2592->2600 2593->2592 2596 11141adb-11141ae8 call 110607f0 2593->2596 2597 1114217f-11142187 2594->2597 2598 11141da8-11141df2 call 110d1550 call 1105dd10 2594->2598 2617 11141ac7 2595->2617 2618 11141abe-11141ac5 2595->2618 2619 11141af3 2596->2619 2620 11141aea-11141af1 2596->2620 2603 11142191-11142199 2597->2603 2604 11142189-1114218d 2597->2604 2648 11141f3d-11141f85 call 11060f40 call 1106b5c0 call 110679c0 2598->2648 2649 11141df8-11141e1f call 11060760 call 110607f0 2598->2649 2599->2589 2599->2600 2606 11141b11-11141b13 2600->2606 2607 11141b5d-11141b5f 2600->2607 2612 111421a3-111421ab 2603->2612 2613 1114219b-1114219f 2603->2613 2604->2603 2615 11141b15-11141b1b 2606->2615 2616 11141b2f-11141b31 2606->2616 2610 11141b61-11141b66 2607->2610 2611 11141b68-11141b6a 2607->2611 2621 11141b8b-11141ba5 call 11081bb0 2610->2621 2622 11141b73-11141b89 call 11081bb0 2611->2622 2623 11141b6c-11141b71 2611->2623 2624 111421b5-111421f0 call 11060640 * 2 call 111618c1 2612->2624 2625 111421ad-111421b1 2612->2625 2613->2612 2615->2616 2626 11141b1d-11141b2a call 11146450 2615->2626 2627 11141d85-11141d98 call 11146450 2616->2627 2628 11141b37-11141b3e 2616->2628 2617->2591 2618->2591 2619->2592 2620->2592 2644 11141cac-11141ce9 call 1105de00 call 111319f0 2621->2644 2645 11141bab 2621->2645 2622->2621 2623->2621 2624->2534 2625->2624 2626->2585 2627->2594 2628->2627 2629 11141b44-11141b58 call 11146450 2628->2629 2629->2586 2679 11141cf1-11141cf8 2644->2679 2680 11141ceb 2644->2680 2650 11141bb5 2645->2650 2651 11141bad-11141baf 2645->2651 2703 11141f87 2648->2703 2704 11141fb3-11141fe8 EnterCriticalSection call 11060420 call 11060f40 2648->2704 2683 11141e21-11141e50 call 11146450 call 110607f0 2649->2683 2684 11141e52-11141e7a call 11060760 call 110607f0 2649->2684 2653 11141c3e-11141c7b call 1105de00 call 111319f0 2650->2653 2654 11141bbb-11141bc1 2650->2654 2651->2644 2651->2650 2692 11141c83-11141c8a 2653->2692 2693 11141c7d 2653->2693 2661 11141bc7-11141bcb 2654->2661 2668 11141be7-11141be9 2661->2668 2669 11141bcd-11141bcf 2661->2669 2677 11141bec-11141bee 2668->2677 2675 11141bd1-11141bd7 2669->2675 2676 11141be3-11141be5 2669->2676 2675->2668 2686 11141bd9-11141be1 2675->2686 2676->2677 2687 11141bf0-11141c2a call 1105de00 call 111319f0 2677->2687 2688 11141c32-11141c39 2677->2688 2681 11141d0a 2679->2681 2682 11141cfa-11141d08 2679->2682 2680->2679 2690 11141d11 2681->2690 2682->2681 2682->2690 2683->2684 2723 11141eb1-11141ed8 call 11060760 call 110607f0 2684->2723 2724 11141e7c 2684->2724 2686->2661 2686->2676 2687->2688 2725 11141c2c 2687->2725 2688->2690 2697 11141d18-11141d1a 2690->2697 2699 11141c9c 2692->2699 2700 11141c8c-11141c9a 2692->2700 2693->2692 2705 11141d1c-11141d1e 2697->2705 2706 11141d3e-11141d56 call 11081c60 2697->2706 2709 11141ca3-11141caa 2699->2709 2700->2699 2700->2709 2712 11141f90-11141f9e call 110508e0 2703->2712 2737 11141ffa-1114200c LeaveCriticalSection 2704->2737 2738 11141fea-11141ff7 call 1102a9f0 2704->2738 2705->2706 2713 11141d20-11141d38 call 11081bb0 2705->2713 2730 11141d58 2706->2730 2731 11141d5b-11141d73 call 11081c60 2706->2731 2709->2697 2733 11141fa0-11141fa1 2712->2733 2734 11141fa3 2712->2734 2713->2586 2713->2706 2757 11141f11-11141f38 call 11060640 * 3 2723->2757 2758 11141eda 2723->2758 2732 11141e80-11141eaf call 11146450 call 110607f0 2724->2732 2725->2688 2730->2731 2754 11141d75-11141d78 2731->2754 2755 11141d7d-11141d80 2731->2755 2732->2723 2735 11141fa4-11141fb1 call 110679c0 2733->2735 2734->2735 2735->2704 2735->2712 2744 11142051-1114209e call 11133400 call 110d1550 call 110cff20 2737->2744 2745 1114200e-11142010 2737->2745 2738->2737 2782 111420a4-111420c1 call 110d12e0 2744->2782 2783 1114214c-11142179 call 110d07c0 call 1106b620 call 110d07c0 2744->2783 2745->2744 2753 11142012-11142034 call 11146450 call 1113cc30 call 111414a0 2745->2753 2753->2744 2781 11142036-1114204e call 11146450 call 11026ba0 2753->2781 2754->2586 2755->2586 2757->2648 2761 11141ee0-11141f0f call 11146450 call 110607f0 2758->2761 2761->2757 2781->2744 2795 111420c3-111420d7 call 11029450 2782->2795 2796 111420da-111420f0 call 11081bb0 2782->2796 2783->2597 2795->2796 2803 111420f2-1114210a call 11009450 call 11081a70 2796->2803 2804 1114212b-11142145 2796->2804 2803->2804 2811 1114210c-11142129 call 11009450 2803->2811 2809 1114214a 2804->2809 2809->2783 2811->2809
                                                                                      APIs
                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 1114194A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Close
                                                                                      • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                      • API String ID: 3535843008-2062829784
                                                                                      • Opcode ID: 027c4974fe4e47a31e6b1b92b845a70a180c4de8d1209735ca177a368e2ea53b
                                                                                      • Instruction ID: 6553b1da6d6d14651d2a1fffef45e08f8fb4271012d2e4188a9b1e9169dedbc2
                                                                                      • Opcode Fuzzy Hash: 027c4974fe4e47a31e6b1b92b845a70a180c4de8d1209735ca177a368e2ea53b
                                                                                      • Instruction Fuzzy Hash: E4420778E002999FEB21CBA0CD90FEEF7766F95B08F1401D8D50967681EB727A84CB51

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                      • InitializeCriticalSection.KERNEL32(0000000C,?,00000000), ref: 11074AE5
                                                                                      • InitializeCriticalSection.KERNEL32(00000024,?,00000000), ref: 11074AEB
                                                                                      • InitializeCriticalSection.KERNEL32(0000003C,?,00000000), ref: 11074AF1
                                                                                      • InitializeCriticalSection.KERNEL32(0000DB1C,?,00000000), ref: 11074AFA
                                                                                      • InitializeCriticalSection.KERNEL32(00000054,?,00000000), ref: 11074B00
                                                                                      • InitializeCriticalSection.KERNEL32(0000006C,?,00000000), ref: 11074B06
                                                                                      • _strncpy.LIBCMT ref: 11074B68
                                                                                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000100,?,?,?,?,?,?,00000000), ref: 11074BCF
                                                                                      • CreateThread.KERNEL32(00000000,00004000,11070C60,00000000,00000000,?), ref: 11074C6C
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 11074C73
                                                                                      • SetTimer.USER32(00000000,00000000,000000FA,11063680), ref: 11074CB7
                                                                                      • std::exception::exception.LIBCMT ref: 11074D68
                                                                                      • __CxxThrowException@8.LIBCMT ref: 11074D83
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalInitializeSection$CloseCreateEnvironmentException@8ExpandHandleStringsThreadThrowTimer_malloc_memset_strncpystd::exception::exceptionwsprintf
                                                                                      • String ID: ..\ctl32\Connect.cpp$DefaultUsername$General$Password$RememberPassword$destroy_queue == NULL
                                                                                      • API String ID: 703120326-1497550179
                                                                                      • Opcode ID: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                      • Instruction ID: 2d3153b5a6430d98d64e81d2a1e668bfe4de0d121a1dff3557e595bbadcf65c6
                                                                                      • Opcode Fuzzy Hash: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                      • Instruction Fuzzy Hash: 79B1A4B5A00359AFD710CF64CD84FDAF7F4BB48708F0085A9E65997281EBB0B944CB65

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                      • OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11108E0A
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 11108E19
                                                                                      • GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11108E2B
                                                                                      • LoadLibraryA.KERNEL32(?), ref: 11108E61
                                                                                      • GetProcAddress.KERNEL32(?,GrabKM), ref: 11108E8E
                                                                                      • GetProcAddress.KERNEL32(?,LoggedOn), ref: 11108EA6
                                                                                      • FreeLibrary.KERNEL32(?), ref: 11108ECB
                                                                                        • Part of subcall function 1110F2B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                        • Part of subcall function 1110F2B0: CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                        • Part of subcall function 1110F2B0: WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                        • Part of subcall function 1110F2B0: CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                      • GetStockObject.GDI32(0000000D), ref: 11108EDF
                                                                                      • GetObjectA.GDI32(00000000,0000003C,?), ref: 11108EEF
                                                                                      • InitializeCriticalSection.KERNEL32(0000003C), ref: 11108F0B
                                                                                      • InitializeCriticalSection.KERNEL32(111F060C), ref: 11108F16
                                                                                        • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                        • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                      • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108F59
                                                                                        • Part of subcall function 1109E9E0: GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                        • Part of subcall function 1109E9E0: OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                        • Part of subcall function 1109E9E0: CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                      • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FAA
                                                                                      • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FFF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandle$Library$LoadObject$AddressCreateCriticalEventInitializeOpenProcProcessSection$CurrentDirectoryFreeSingleStockSystemThreadTokenWait_malloc_memsetwsprintf
                                                                                      • String ID: GrabKM$LPT1$LoggedOn$\pcigina$nsm_gina_sas
                                                                                      • API String ID: 3930710499-403456261
                                                                                      • Opcode ID: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                      • Instruction ID: 229803012459fbbe5cfd3a30b02a894d1af5bad55287ed163187595495ff030c
                                                                                      • Opcode Fuzzy Hash: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                      • Instruction Fuzzy Hash: DC81AFB4E0435AEFEB55DFB48C89B9AFBE9AB48308F00457DE569D7280E7309944CB11

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2938 11138c30-11138c47 2939 11139072-11139081 call 11161d01 2938->2939 2940 11138c4d-11138c54 2938->2940 2940->2939 2942 11138c5a-11138c61 2940->2942 2942->2939 2944 11138c67-11138c6e 2942->2944 2944->2939 2945 11138c74-11138c7b 2944->2945 2945->2939 2946 11138c81-11138c91 call 111450a0 2945->2946 2949 11138c93-11138c9a 2946->2949 2950 11138ca0-11138ce7 call 1105dd10 call 110637c0 2946->2950 2949->2939 2949->2950 2955 11138cf5-11138d1e call 1112c920 2950->2955 2956 11138ce9-11138cf0 2950->2956 2959 11138d24-11138d27 2955->2959 2960 11138dda call 110ea430 2955->2960 2956->2955 2962 11138d35 2959->2962 2963 11138d29-11138d2e 2959->2963 2964 11138ddf-11138de1 2960->2964 2966 11138d3b-11138d46 2962->2966 2963->2962 2965 11138d30-11138d33 2963->2965 2969 11138de3-11138dfe call 1105dd10 2964->2969 2970 11138e00-11138e0f PostMessageA 2964->2970 2965->2966 2967 11138d48 2966->2967 2968 11138d4d-11138d65 2966->2968 2967->2968 2979 11138dc1-11138dc8 2968->2979 2980 11138d67-11138d6d 2968->2980 2969->2970 2972 11138e15-11138e1a 2969->2972 2970->2972 2975 11138e25-11138e29 2972->2975 2976 11138e1c-11138e20 call 1110f270 2972->2976 2977 11138e2b-11138e33 2975->2977 2978 11138e4d-11138e76 call 11130410 call 11146ec0 call 1112cb20 call 111618c1 2975->2978 2976->2975 2984 11138e35-11138e4b 2977->2984 2985 11138e79-11138e81 2977->2985 2978->2985 2982 11138dd7 2979->2982 2983 11138dca-11138dd1 call 11131a80 2979->2983 2987 11138d6f-11138d74 2980->2987 2988 11138dbc 2980->2988 2982->2960 2983->2982 3001 11138dd3 2983->3001 2984->2985 2992 11138e83-11138e9d call 111618c1 call 11161d01 2985->2992 2993 11138e9e-11138ec4 call 11142e80 call 11146ee0 SetWindowTextA 2985->2993 2987->2988 2991 11138d76-11138d7b 2987->2991 2988->2979 2991->2988 2998 11138d7d-11138d9f 2991->2998 3012 11138ed0-11138ee9 call 111618c1 * 2 2993->3012 3013 11138ec6-11138ecd call 111352b0 2993->3013 2998->2988 3011 11138da1-11138db0 call 11145b40 2998->3011 3001->2982 3022 11138db2-11138dba 3011->3022 3025 11138eeb-11138eef 3012->3025 3026 11138f2e-11138f32 3012->3026 3013->3012 3022->2988 3022->3022 3027 11138f03-11138f0a 3025->3027 3028 11138ef1-11138f01 call 111352b0 3025->3028 3029 11138f38-11138f3a 3026->3029 3030 11138ffc-11138ffe 3026->3030 3034 11138f24 3027->3034 3035 11138f0c-11138f21 call 11131210 3027->3035 3028->3027 3028->3035 3036 11138f5c-11138f69 call 110f8640 3029->3036 3037 11138f3c-11138f3e 3029->3037 3032 11139000-11139002 3030->3032 3033 1113901d-1113902a call 110f8640 3030->3033 3040 11139013-1113901a call 11131210 3032->3040 3041 11139004-1113900e call 111352b0 3032->3041 3051 1113906f-11139071 3033->3051 3055 1113902c-1113903c IsWindowVisible 3033->3055 3034->3026 3035->3034 3036->3051 3052 11138f6f-11138f80 IsWindowVisible 3036->3052 3037->3036 3044 11138f40-11138f50 call 111352b0 3037->3044 3040->3033 3041->3040 3044->3036 3059 11138f52-11138f59 call 11131210 3044->3059 3051->2939 3052->3051 3057 11138f86-11138f96 call 111450a0 3052->3057 3055->3051 3058 1113903e-11139049 IsWindowVisible 3055->3058 3057->3051 3067 11138f9c-11138fb4 GetForegroundWindow IsWindowVisible 3057->3067 3058->3051 3060 1113904b-1113906d EnableWindow call 11131210 EnableWindow 3058->3060 3059->3036 3060->3051 3068 11138fc1-11138fcd call 11131210 3067->3068 3069 11138fb6-11138fbf EnableWindow 3067->3069 3072 11138fcf-11138fd5 3068->3072 3073 11138fde-11138ffb EnableWindow call 11161d01 3068->3073 3069->3068 3072->3073 3075 11138fd7-11138fd8 SetForegroundWindow 3072->3075 3075->3073
                                                                                      APIs
                                                                                        • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                        • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                        • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                        • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                      • PostMessageA.USER32(0002046A,000006CF,00000007,00000000), ref: 11138E0F
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • SetWindowTextA.USER32(0002046A,00000000), ref: 11138EB7
                                                                                      • IsWindowVisible.USER32(0002046A), ref: 11138F7C
                                                                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000), ref: 11138F9C
                                                                                      • IsWindowVisible.USER32(0002046A), ref: 11138FAA
                                                                                      • SetForegroundWindow.USER32(00000000), ref: 11138FD8
                                                                                      • EnableWindow.USER32(0002046A,00000001), ref: 11138FE7
                                                                                      • IsWindowVisible.USER32(0002046A), ref: 11139038
                                                                                      • IsWindowVisible.USER32(0002046A), ref: 11139045
                                                                                      • EnableWindow.USER32(0002046A,00000000), ref: 11139059
                                                                                      • EnableWindow.USER32(0002046A,00000000), ref: 11138FBF
                                                                                        • Part of subcall function 11131210: ShowWindow.USER32(0002046A,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                      • EnableWindow.USER32(0002046A,00000001), ref: 1113906D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                      • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                      • API String ID: 3453649892-3803836183
                                                                                      • Opcode ID: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                      • Instruction ID: ae8ec3c714d324370739ddb1cab1952d607c59122f5be0bb7ac7fd02d25128b2
                                                                                      • Opcode Fuzzy Hash: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                      • Instruction Fuzzy Hash: 86C12A75A1122A9BEB11DFF4CD80B6EF769ABC072DF140138EA159B28CEB75E804C751
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110281F1
                                                                                        • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                      • wsprintfA.USER32 ref: 11028214
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028259
                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 1102826D
                                                                                      • wsprintfA.USER32 ref: 11028291
                                                                                      • CloseHandle.KERNEL32(?), ref: 110282A7
                                                                                      • CloseHandle.KERNEL32(?), ref: 110282B0
                                                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028311
                                                                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028325
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                      • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                      • API String ID: 512045693-419896573
                                                                                      • Opcode ID: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                      • Instruction ID: 7a246749baaa4a6e23861a3fd22e5cd13303056935123195fcb9bb693944541c
                                                                                      • Opcode Fuzzy Hash: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                      • Instruction Fuzzy Hash: B841D678E04229ABD714CF65CCD5FEAB7B9EB44709F0081A5F95897280DA71AE44CBA0
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(PCIINV.DLL,581E67F8,02AD76F0,02AD76E0,?,00000000,1118276C,000000FF,?,11031942,02AD76F0,00000000,?,?,?), ref: 11085E45
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                        • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                      • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11085E6B
                                                                                      • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11085E7F
                                                                                      • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11085E93
                                                                                      • wsprintfA.USER32 ref: 11085F1B
                                                                                      • wsprintfA.USER32 ref: 11085F32
                                                                                      • wsprintfA.USER32 ref: 11085F49
                                                                                      • CloseHandle.KERNEL32(00000000,11085C70,00000001,00000000), ref: 1108609A
                                                                                        • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,02AD76F0,00000000,?,?,?), ref: 11085A98
                                                                                        • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,02AD76F0,00000000,?,?,?), ref: 11085AAB
                                                                                        • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,02AD76F0,00000000,?,?,?), ref: 11085ABE
                                                                                        • Part of subcall function 11085A80: FreeLibrary.KERNEL32(00000000,74DEF550,?,?,110860C0,?,11031942,02AD76F0,00000000,?,?,?), ref: 11085AD1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                      • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                      • API String ID: 4263811268-2492245516
                                                                                      • Opcode ID: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                      • Instruction ID: c264ff3baa83c9e34b1ea5f373b83d9ca187d225ad452563e08076ac2ec7b834
                                                                                      • Opcode Fuzzy Hash: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                      • Instruction Fuzzy Hash: 40718175E0874AABEB14CF75CC46BDBFBE4AB48304F10452AE956D7280EB71A500CB95
                                                                                      APIs
                                                                                      • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 110305F3
                                                                                      • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 1103060A
                                                                                      • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 110306AC
                                                                                      • SetLastError.KERNEL32(00000078), ref: 110306C2
                                                                                      • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                      • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                      • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                      • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                      • API String ID: 2061479752-1320826866
                                                                                      • Opcode ID: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                      • Instruction ID: 4511418fabb8e143c6e2e60e2068ec6a59f08b67eb8208c825473cc9362a61df
                                                                                      • Opcode Fuzzy Hash: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                      • Instruction Fuzzy Hash: 72613774E1635AAFEB10DFB09C44B9EB7B4AF8470DF1000A9D919A71C5EF70AA44CB51
                                                                                      APIs
                                                                                        • Part of subcall function 1110F340: SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C455
                                                                                      • GetTickCount.KERNEL32 ref: 1102C47A
                                                                                        • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                      • GetTickCount.KERNEL32 ref: 1102C574
                                                                                        • Part of subcall function 110D1370: wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                        • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C66C
                                                                                      • CloseHandle.KERNEL32(?), ref: 1102C688
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                      • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                      • API String ID: 596640303-1725438197
                                                                                      • Opcode ID: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                      • Instruction ID: 59613557395ae23f7967247d4baf4cae7550bfc3229e85cd4bc92fe2e2f2b4a8
                                                                                      • Opcode Fuzzy Hash: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                      • Instruction Fuzzy Hash: 6B818275E0020AABDF04DBE8CD94FEEF7B5AF59708F504258E82567284DB34BA05CB61
                                                                                      APIs
                                                                                      • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106175A
                                                                                        • Part of subcall function 11061140: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                        • Part of subcall function 11061140: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110617AB
                                                                                      • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11061865
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 11061881
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Enum$Open$CloseValue
                                                                                      • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                      • API String ID: 2823542970-1528906934
                                                                                      • Opcode ID: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                      • Instruction ID: 3a074a016260bf88f68c0586b8c591cabbb012c9b5ad66670ab8b6bf40d046b4
                                                                                      • Opcode Fuzzy Hash: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                      • Instruction Fuzzy Hash: 5F416179E4022DABD724CB55CC81FEAB7BCEB94748F1001D9EA48A6140D6B06E84CFA1
                                                                                      APIs
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • GetTickCount.KERNEL32 ref: 11137692
                                                                                        • Part of subcall function 11096970: CoInitialize.OLE32(00000000), ref: 11096984
                                                                                        • Part of subcall function 11096970: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                        • Part of subcall function 11096970: CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                        • Part of subcall function 11096970: CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                      • GetTickCount.KERNEL32 ref: 111376A1
                                                                                      • _memset.LIBCMT ref: 111376E3
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 111376F9
                                                                                      • _strrchr.LIBCMT ref: 11137708
                                                                                      • _free.LIBCMT ref: 1113775A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                      • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                      • API String ID: 711243594-1270230032
                                                                                      • Opcode ID: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                      • Instruction ID: 94b21c48fabd249aebac1ca0d473d12a11480cc4bb4ab1ee9f0f9b3b40903c19
                                                                                      • Opcode Fuzzy Hash: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                      • Instruction Fuzzy Hash: 9941AE7AE0022E97C710DF756C89BEFF7699B5471DF040079E90493140EAB1AD44CBE1
                                                                                      APIs
                                                                                        • Part of subcall function 11145440: _memset.LIBCMT ref: 11145485
                                                                                        • Part of subcall function 11145440: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                        • Part of subcall function 11145440: LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                        • Part of subcall function 11145440: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                        • Part of subcall function 11145440: FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                        • Part of subcall function 11145440: GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                      • AdjustWindowRectEx.USER32(111417B8,00CE0000,00000001,00000001), ref: 11133EC7
                                                                                      • LoadMenuA.USER32(00000000,000003EC), ref: 11133ED8
                                                                                      • GetSystemMetrics.USER32(00000021), ref: 11133EE9
                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 11133EF1
                                                                                      • GetSystemMetrics.USER32(00000004), ref: 11133EF7
                                                                                      • GetDC.USER32(00000000), ref: 11133F03
                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11133F0E
                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 11133F1A
                                                                                      • CreateWindowExA.USER32(00000001,NSMWClass,02AC0718,00CE0000,80000000,80000000,111417B8,?,00000000,?,11000000,00000000), ref: 11133F6F
                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,110F7D09,00000001,111417B8,_debug), ref: 11133F77
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                      • String ID: CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                      • API String ID: 1594747848-1114959992
                                                                                      • Opcode ID: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                      • Instruction ID: 5297cf036ba1cbd73fc44df567c8a611b910eb11675e7325f2afb4d5e36916b9
                                                                                      • Opcode Fuzzy Hash: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                      • Instruction Fuzzy Hash: C4316275E10219ABDB149FF58C85FAFFBB8EB48709F100529FA25B7284D67469008BA4
                                                                                      APIs
                                                                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,1102DD98,00000000,581E67F8,?,00000000,00000000), ref: 1102CE44
                                                                                      • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102CE5A
                                                                                      • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102CE6E
                                                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE75
                                                                                      • Sleep.KERNEL32(00000032), ref: 1102CE86
                                                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE96
                                                                                      • Sleep.KERNEL32(000003E8), ref: 1102CEE2
                                                                                      • CloseHandle.KERNEL32(?), ref: 1102CF0F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                      • String ID: >$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                      • API String ID: 83693535-2077998243
                                                                                      • Opcode ID: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                      • Instruction ID: 880dc79335238c7f7dd8ff78cda89552a6d5dde84d0873ba54ec41c4173cff75
                                                                                      • Opcode Fuzzy Hash: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                      • Instruction Fuzzy Hash: 27B19475E012259FDB25DFA4CD80BEDB7B5BB48708F5041E9E919AB381DB70AA80CF50
                                                                                      APIs
                                                                                      • wsprintfA.USER32 ref: 11132C60
                                                                                      • GetTickCount.KERNEL32 ref: 11132C91
                                                                                      • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                      • GetTickCount.KERNEL32 ref: 11132CAC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CountTick$FolderPathwsprintf
                                                                                      • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                      • API String ID: 1170620360-4157686185
                                                                                      • Opcode ID: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                      • Instruction ID: 1138b9c1199a8041912b1953dd267279d987a2a799c8ea79b9a25deb6d60bab0
                                                                                      • Opcode Fuzzy Hash: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                      • Instruction Fuzzy Hash: F33157BAE4022E67E700AFB0AC84FEDF36C9B9471EF1000A9E915A7145EA72B545C761
                                                                                      APIs
                                                                                      • GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                      • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                      • _memset.LIBCMT ref: 1114512D
                                                                                        • Part of subcall function 11143000: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                      • _strncpy.LIBCMT ref: 111451FA
                                                                                        • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                      • RegCloseKey.KERNEL32(00000000), ref: 11145296
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                      • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                      • API String ID: 3299820421-2117887902
                                                                                      • Opcode ID: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                      • Instruction ID: 1fcbe558ef897eaa1b38a7330f4b62b9d1ba330f7a3c6d488077e096d0eda0f8
                                                                                      • Opcode Fuzzy Hash: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                      • Instruction Fuzzy Hash: 6D51D9B1E0022BEFEB51CF60CD41F9EF7B9AB04B08F104199F519A7941E7716A48CB91
                                                                                      APIs
                                                                                      • _strtok.LIBCMT ref: 11026C26
                                                                                      • _strtok.LIBCMT ref: 11026C60
                                                                                      • Sleep.KERNEL32(1102FC53,?,*max_sessions,0000000A,00000000,00000000,00000002), ref: 11026D54
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _strtok$Sleep
                                                                                      • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                      • API String ID: 2009458258-3774545468
                                                                                      • Opcode ID: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                      • Instruction ID: 546c7fd96e7e5c201e62e0728b24f9c1e86d1f0ab762c79c207aecf2c2ec1ca9
                                                                                      • Opcode Fuzzy Hash: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                      • Instruction Fuzzy Hash: A951F375E0525E9BDF11EFA9CC80BBEFBB5EB84308FA44069DC1167284E631A846C742
                                                                                      APIs
                                                                                        • Part of subcall function 11089280: UnhookWindowsHookEx.USER32(?), ref: 110892A3
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 11102C6C
                                                                                      • GetThreadDesktop.USER32(00000000), ref: 11102C73
                                                                                      • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 11102C83
                                                                                      • SetThreadDesktop.USER32(00000000), ref: 11102C90
                                                                                      • CloseDesktop.USER32(00000000), ref: 11102CA9
                                                                                      • GetLastError.KERNEL32 ref: 11102CB1
                                                                                      • CloseDesktop.USER32(00000000), ref: 11102CC7
                                                                                      • GetLastError.KERNEL32 ref: 11102CCF
                                                                                      Strings
                                                                                      • SetThreadDesktop(%s) failed, e=%d, xrefs: 11102CB9
                                                                                      • SetThreadDesktop(%s) ok, xrefs: 11102C9B
                                                                                      • OpenDesktop(%s) failed, e=%d, xrefs: 11102CD7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                      • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                      • API String ID: 2036220054-60805735
                                                                                      • Opcode ID: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                      • Instruction ID: e6b285a79aa3308c0e4e86645e8e2c70f1a73097c1882eeb774c19519f5c9288
                                                                                      • Opcode Fuzzy Hash: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                      • Instruction Fuzzy Hash: 5D11C679A042167BE7086BB15C89FBFFA2DAFC571CF051438F91786545EE24B40483B6
                                                                                      APIs
                                                                                      • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115E3A8
                                                                                      • GetLastError.KERNEL32 ref: 1115E3B5
                                                                                      • wsprintfA.USER32 ref: 1115E3C8
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                        • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                      • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115E40C
                                                                                      • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115E419
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                      • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                      • API String ID: 1734919802-1728070458
                                                                                      • Opcode ID: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                      • Instruction ID: 2151ae3f148807adf1b9b51829e7bc1db46dc9b6ec15270657221fcdabbc1952
                                                                                      • Opcode Fuzzy Hash: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                      • Instruction Fuzzy Hash: 1B110479A01319ABC720EFE69C84A96F7B4FF2231CB40822EE46543240DA706944CB51
                                                                                      APIs
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                      • std::exception::exception.LIBCMT ref: 1111013A
                                                                                      • __CxxThrowException@8.LIBCMT ref: 1111014F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                      • InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                      • InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                      • EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                      • LeaveCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111024F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                      • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                      • API String ID: 1976012330-1024648535
                                                                                      • Opcode ID: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                      • Instruction ID: 7e481d80fa827a07ee7257280804c30d2ae959ce5d98406b053f8524d928f6e4
                                                                                      • Opcode Fuzzy Hash: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                      • Instruction Fuzzy Hash: 6C41C2B5E00216AFDB11CFB98C84BAEFBF5FB48708F00453AE815DB244E675A944CB91
                                                                                      APIs
                                                                                      • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,1117F505,00000000,00000000,581E67F8,00000000,?,00000000), ref: 11060874
                                                                                      • _malloc.LIBCMT ref: 110608BB
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,000000FF,?,581E67F8,00000000), ref: 110608FB
                                                                                      • RegEnumValueA.ADVAPI32(?,00000000,?,00000100,00000000,?,000000FF,?), ref: 11060962
                                                                                      • _free.LIBCMT ref: 11060974
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: EnumValue$ErrorExitInfoLastMessageProcessQuery_free_mallocwsprintf
                                                                                      • String ID: ..\ctl32\Config.cpp$err == 0$maxname < _tsizeof (m_szSectionAndKey)$strlen (k.m_k) < _tsizeof (m_szSectionAndKey)
                                                                                      • API String ID: 999355418-161875503
                                                                                      • Opcode ID: 25c6060889b0532266d56abace0ba5fbfa4960398331d3b945ebf36f5c2f89a7
                                                                                      • Instruction ID: c47c75eefe38bee888b154a00c4449ad07b8701d7df13cace45a3bfee881b040
                                                                                      • Opcode Fuzzy Hash: 25c6060889b0532266d56abace0ba5fbfa4960398331d3b945ebf36f5c2f89a7
                                                                                      • Instruction Fuzzy Hash: E3A1B075A007469FE721CF64C880BABFBF8AF45308F044A5CE99697684E770F508CBA1
                                                                                      APIs
                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,581E67F8,00000000,?), ref: 1115BA67
                                                                                      • CoCreateInstance.OLE32(111C4FEC,00000000,00000017,111C4F1C,?), ref: 1115BA87
                                                                                      • wsprintfW.USER32 ref: 1115BAA7
                                                                                      • SysAllocString.OLEAUT32(?), ref: 1115BAB3
                                                                                      • wsprintfW.USER32 ref: 1115BB67
                                                                                      • SysFreeString.OLEAUT32(?), ref: 1115BC08
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                      • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                      • API String ID: 3050498177-823534439
                                                                                      • Opcode ID: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                      • Instruction ID: 667e066b75244b2782fe63ff2368f72f8a2c2363a2cb4bcdb988270c73b3585f
                                                                                      • Opcode Fuzzy Hash: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                      • Instruction Fuzzy Hash: 7351B071B00219ABC764CF69CC84F9AF7B9FB8A714F1042A8E429E7240DA70AE40CF55
                                                                                      APIs
                                                                                        • Part of subcall function 11145330: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                        • Part of subcall function 11145330: RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                      • _memset.LIBCMT ref: 11145485
                                                                                      • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                      • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                      • GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                      • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                      • API String ID: 4251163631-545709139
                                                                                      • Opcode ID: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                      • Instruction ID: 76ed8f4553af2ae4cc76032582d3c5cf4b75be54885724a55a46303ac3459834
                                                                                      • Opcode Fuzzy Hash: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                      • Instruction Fuzzy Hash: 07313971E002299BD761DF74D984BE9F7B6EB08729F540164E42DC7A80D7344984CF91
                                                                                      APIs
                                                                                      • wsprintfA.USER32 ref: 110150CA
                                                                                      • _memset.LIBCMT ref: 1101510E
                                                                                      • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015148
                                                                                      Strings
                                                                                      • %012d, xrefs: 110150C4
                                                                                      • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101504B
                                                                                      • PackedCatalogItem, xrefs: 11015132
                                                                                      • NSLSP, xrefs: 11015158
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: QueryValue_memsetwsprintf
                                                                                      • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                      • API String ID: 1333399081-1346142259
                                                                                      • Opcode ID: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                      • Instruction ID: d38f3a4d66d5a90606c53f5b1b84405609ec5bb3b13ff7cea0d7775b25b40b12
                                                                                      • Opcode Fuzzy Hash: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                      • Instruction Fuzzy Hash: C6419D71D02269AFEB11DB64CC90BDEF7B8EB44314F0445E9E819A7281EB35AB48CF50
                                                                                      APIs
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100FDED
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100FE10
                                                                                      • std::bad_exception::bad_exception.LIBCMT ref: 1100FE94
                                                                                      • __CxxThrowException@8.LIBCMT ref: 1100FEA2
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100FEB5
                                                                                      • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100FECF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                      • String ID: bad cast
                                                                                      • API String ID: 2427920155-3145022300
                                                                                      • Opcode ID: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                      • Instruction ID: 563b417412927bd42dfe2d2268ce551a617b01fe8fe711e168dc892134580a96
                                                                                      • Opcode Fuzzy Hash: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                      • Instruction Fuzzy Hash: 5731E975D002669FD711DF94C890BAEF7B8EB04B68F10426DD921A7291DB717D40CB92
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                      • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                      • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                      • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                      • API String ID: 3494822531-1878648853
                                                                                      • Opcode ID: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                      • Instruction ID: dd955378f98185685044f21f066d1e50e049b7277ab8e5714ac6db0ba135c9a8
                                                                                      • Opcode Fuzzy Hash: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                      • Instruction Fuzzy Hash: AB518835D4022E5BD711CF24DC50BDEF7A4AF15B08F2401A4D8997BA80EBB27B84CBA5
                                                                                      APIs
                                                                                        • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                      • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                      • std::exception::exception.LIBCMT ref: 11107414
                                                                                      • __CxxThrowException@8.LIBCMT ref: 11107429
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$CreateEventException@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                      • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                      • API String ID: 2851125068-2390547818
                                                                                      • Opcode ID: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                      • Instruction ID: 20da51148d2406ef940ba90f631bbe284ff6dbb95dc7cb8c25b5cdc78ae8e1aa
                                                                                      • Opcode Fuzzy Hash: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                      • Instruction Fuzzy Hash: 2A4115B4D09B449FC761CF6A8940BDAFBE8EFA9604F00490EE5AE93210D7797500CF56
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 1101733C
                                                                                      • CoInitialize.OLE32(00000000), ref: 11017345
                                                                                      • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                      • CoUninitialize.COMBASE ref: 110173D0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                      • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                      • API String ID: 2407233060-578995875
                                                                                      • Opcode ID: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                      • Instruction ID: df925c951649f52390f194a40c23bf9fa59b5f59fb7a44760539d7ccd5920114
                                                                                      • Opcode Fuzzy Hash: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                      • Instruction Fuzzy Hash: 7F2137B5E041259BDB11DFA0CC46BBAB6E8AF40308F0040B9EC69DB184FA79E940D7A1
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 11017252
                                                                                      • CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                      • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                      • CoUninitialize.COMBASE ref: 110172E0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                      • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                      • API String ID: 2407233060-2037925671
                                                                                      • Opcode ID: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                      • Instruction ID: c2f3c346b695d23426c96ecc328f7bdb1aeadc280033f44fb53199f8ba8604cb
                                                                                      • Opcode Fuzzy Hash: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                      • Instruction Fuzzy Hash: 19210575E016299BD712DFE0CC45BEEB7E89F80718F0001A8FC29DB184EA7AE945C761
                                                                                      APIs
                                                                                      Strings
                                                                                      • DesktopTimerProc - Further ICF config checking will not be performed, xrefs: 1113879C
                                                                                      • Client, xrefs: 11138705
                                                                                      • AutoICFConfig, xrefs: 11138700
                                                                                      • DoICFConfig() OK, xrefs: 11138786
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CountTick
                                                                                      • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK
                                                                                      • API String ID: 536389180-1512301160
                                                                                      • Opcode ID: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                      • Instruction ID: a0019f70d98f4d819e239f855ef0bc8db2e19db1671bc02c3e0d3b7677daedde
                                                                                      • Opcode Fuzzy Hash: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                      • Instruction Fuzzy Hash: E4210578A247AB4AFB039B759ED4755FB83578073EF450278DE10862CCDB74A458CB42
                                                                                      APIs
                                                                                      • CoInitialize.OLE32(00000000), ref: 11096984
                                                                                      • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                      • CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                      • CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                      • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                      • API String ID: 3222248624-258972079
                                                                                      • Opcode ID: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                      • Instruction ID: ffe5b7852bae71a5603cb4f529131e3535c43cf5cc9a129c5e7f13935f1cb029
                                                                                      • Opcode Fuzzy Hash: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                      • Instruction Fuzzy Hash: 9C11AC74E0012DABC700EAE5DC95AEFBB68AF45709F100029F50AEB144EA21EA40C7E2
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11025D16
                                                                                      • K32GetProcessImageFileNameA.KERNEL32(?,?,?,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D32
                                                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025D46
                                                                                      • SetLastError.KERNEL32(00000078,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D69
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                      • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                      • API String ID: 4186647306-532032230
                                                                                      • Opcode ID: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                      • Instruction ID: 74662284ed99b9a54ad109221a671fe8fcdc3fa540ca7c31caa090441a4958f5
                                                                                      • Opcode Fuzzy Hash: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                      • Instruction Fuzzy Hash: 98016D72601718ABE330DEA5EC48F87B7E8EB88765F10052AF95697200D631E8018BA4
                                                                                      APIs
                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                      • CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                      • CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                      • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                      • API String ID: 3360349984-1136101629
                                                                                      • Opcode ID: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                      • Instruction ID: 7cf91fcea6c2a3c5c2684f5d08a561b662f4dc7f01f0c277a0d6c7245401f800
                                                                                      • Opcode Fuzzy Hash: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                      • Instruction Fuzzy Hash: E7015E7A7443166FE3209EA9CC86F57FBA8DB44764F104128FA25962C4DA60F805CB64
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: wsprintf
                                                                                      • String ID: %s%s%s.bin$120633$_HF$_HW$_SW
                                                                                      • API String ID: 2111968516-2278526650
                                                                                      • Opcode ID: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                      • Instruction ID: 34a826dfca0d5743c415d593f242b0f3cefc790b54bbadf5113738552eb06063
                                                                                      • Opcode Fuzzy Hash: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                      • Instruction Fuzzy Hash: 93E092A1D1870C6FF70085589C15F9EFAE87B4978EFC48051BEEDA7292E935D60082D6
                                                                                      APIs
                                                                                      • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 11102B03
                                                                                      • GetStockObject.GDI32(00000004), ref: 11102B5B
                                                                                      • RegisterClassA.USER32(?), ref: 11102B6F
                                                                                      • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 11102BAC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                      • String ID: NSMDesktopWnd
                                                                                      • API String ID: 2669163067-206650970
                                                                                      • Opcode ID: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                      • Instruction ID: 4c07b853b75387a4d851a66abc04609236edd6d81c14be1d28904dd9f6a0e6ac
                                                                                      • Opcode Fuzzy Hash: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                      • Instruction Fuzzy Hash: C231F4B0D15619AFDB44CFA9D980A9EFBF4FB08314F50962EE46AE3640E7346900CF94
                                                                                      APIs
                                                                                      • KillTimer.USER32(00000000,00000000,TermUI...), ref: 1113CC9A
                                                                                      • KillTimer.USER32(00000000,00007F5C,TermUI...), ref: 1113CCB3
                                                                                      • FreeLibrary.KERNEL32(75B40000,?,TermUI...), ref: 1113CD2B
                                                                                      • FreeLibrary.KERNEL32(00000000,?,TermUI...), ref: 1113CD43
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FreeKillLibraryTimer
                                                                                      • String ID: TermUI
                                                                                      • API String ID: 2006562601-4085834059
                                                                                      • Opcode ID: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                      • Instruction ID: 1c615ec055e307fcecd6c2f5a0081f3099d40e524c959ad3afbad8c7da76a6da
                                                                                      • Opcode Fuzzy Hash: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                      • Instruction Fuzzy Hash: 813182B46121329FE605DF9ACDE496EFB6ABBC4B1C750402BF4689720CE770A845CF91
                                                                                      APIs
                                                                                      • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                      • API String ID: 47109696-3245241687
                                                                                      • Opcode ID: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                      • Instruction ID: 3a61aca8bf2f26e8be4db12f87e0943ca7983303b4b50086f785ef97d0623835
                                                                                      • Opcode Fuzzy Hash: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                      • Instruction Fuzzy Hash: 56218875E0422A9BE760DB64CD80B9EF7B8EB44708F1042AAD85DF7540E771AD458BB0
                                                                                      APIs
                                                                                        • Part of subcall function 11111430: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                        • Part of subcall function 11111430: __wsplitpath.LIBCMT ref: 11111475
                                                                                        • Part of subcall function 11111430: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                      • GetComputerNameA.KERNEL32(?,?), ref: 11111578
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                      • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                      • API String ID: 806825551-1858614750
                                                                                      • Opcode ID: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                      • Instruction ID: bd5304e3d9974d7ab46afc427c644d654ac0d4b62daaa3d8a48381b774377c4d
                                                                                      • Opcode Fuzzy Hash: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                      • Instruction Fuzzy Hash: 4B214676A142491BD701CF309D80BBFFFBA9F8B249F080578D852DB145E626D914C391
                                                                                      APIs
                                                                                        • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                        • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                      • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144255
                                                                                      • ResetEvent.KERNEL32(00000260), ref: 11144269
                                                                                      • SetEvent.KERNEL32(00000260), ref: 1114427F
                                                                                      • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 1114428E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                      • String ID: MiniDump
                                                                                      • API String ID: 1494854734-2840755058
                                                                                      • Opcode ID: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                      • Instruction ID: 829689d5ebdc208bf7b78735a50f5ce9a06f611da5f38dced1c13c8e9b13f18e
                                                                                      • Opcode Fuzzy Hash: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                      • Instruction Fuzzy Hash: 4F113875E5422677E300DFF99C81F9AF768AB44B28F200230EA24D75C4EB71A504C7B1
                                                                                      APIs
                                                                                      • LoadStringA.USER32(00000000,0000194E,?,00000400), ref: 11146DCF
                                                                                      • wsprintfA.USER32 ref: 11146E06
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                      • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                      • API String ID: 1985783259-2296142801
                                                                                      • Opcode ID: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                      • Instruction ID: b1a6c5171231f01418375ac6f2de6c12625a8d09d3611db16d7d0d369645f93a
                                                                                      • Opcode Fuzzy Hash: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                      • Instruction Fuzzy Hash: FA11A5FAE00128ABC720DB65ED81FAAF77C9B4461DF000565EB19B6141EA35AA05C7A8
                                                                                      APIs
                                                                                      • _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                        • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                        • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                      • wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      • _memset.LIBCMT ref: 1110F477
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                      • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                      • API String ID: 3234921582-2664294811
                                                                                      • Opcode ID: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                      • Instruction ID: e8e28b36a5a63397ef775e95fa380a20e388029766e4784519104262db02a7f0
                                                                                      • Opcode Fuzzy Hash: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                      • Instruction Fuzzy Hash: 1CF0F6B5E0012863C720AFA5AC06FEFF37C9F91658F440169EE04A7241EA71BA11C7E9
                                                                                      APIs
                                                                                        • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                        • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                        • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                        • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                      • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030690,00000002), ref: 11145AFF
                                                                                      • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 11145B11
                                                                                      • FreeLibrary.KERNEL32(00000000,?,11030690,00000002), ref: 11145B24
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                      • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                      • API String ID: 1108920153-1959555903
                                                                                      • Opcode ID: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                      • Instruction ID: 699a5c6b52ff0bb6954823876d42b720b76b3255f49526743c1f98bd9e848574
                                                                                      • Opcode Fuzzy Hash: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                      • Instruction Fuzzy Hash: 67F0A03A70022877E21416BAAC08F9ABB5A8BC8A75F140230F928D69C0EB51C90086B5
                                                                                      APIs
                                                                                      • wsprintfA.USER32 ref: 11031926
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                      • String ID: %s%s.bin$120633$clientinv.cpp$m_pDoInv == NULL
                                                                                      • API String ID: 4180936305-487954936
                                                                                      • Opcode ID: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                      • Instruction ID: 64da4217f7417b153db366359b1c36bd372b32cb55e7c28d29c46c6ec3487e21
                                                                                      • Opcode Fuzzy Hash: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                      • Instruction Fuzzy Hash: 5421A1B9E04709AFD710CF65DC81BAAB7F4FB88718F40453EE86597680EB35A9008B65
                                                                                      APIs
                                                                                      • GetFileAttributesA.KERNEL32(11144D48,00000000,?,11144D48,00000000), ref: 1114468C
                                                                                      • __strdup.LIBCMT ref: 111446A7
                                                                                        • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                        • Part of subcall function 11144670: _free.LIBCMT ref: 111446CE
                                                                                      • _free.LIBCMT ref: 111446DC
                                                                                        • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                        • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                      • CreateDirectoryA.KERNEL32(11144D48,00000000,?,?,?,11144D48,00000000), ref: 111446E7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                      • String ID:
                                                                                      • API String ID: 398584587-0
                                                                                      • Opcode ID: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                      • Instruction ID: 9245e394badc27c9d68c775c1ae1103ae8f1f8453310ecf51c29309078bed6c3
                                                                                      • Opcode Fuzzy Hash: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                      • Instruction Fuzzy Hash: F4016D7A7441065BF301197D7C057ABBB8C8F82AADF144032F89DC3D80F752E41682A1
                                                                                      APIs
                                                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100EDA2
                                                                                        • Part of subcall function 11160824: _setlocale.LIBCMT ref: 11160836
                                                                                      • _free.LIBCMT ref: 1100EDB4
                                                                                        • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                        • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                      • _free.LIBCMT ref: 1100EDC7
                                                                                      • _free.LIBCMT ref: 1100EDDA
                                                                                      • _free.LIBCMT ref: 1100EDED
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                      • String ID:
                                                                                      • API String ID: 3515823920-0
                                                                                      • Opcode ID: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                      • Instruction ID: 71b49ece8787e94f553dd036e4ff5c8d0ec16ff98238e97fea1187b5179b4c62
                                                                                      • Opcode Fuzzy Hash: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                      • Instruction Fuzzy Hash: E61190B1D046109BD620DF599C40A5BF7FCEB44754F144A2AE456D3780E672F900CB91
                                                                                      APIs
                                                                                        • Part of subcall function 11144BD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                        • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                        • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                      • wsprintfA.USER32 ref: 1114593E
                                                                                      • wsprintfA.USER32 ref: 11145954
                                                                                        • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                        • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                        • Part of subcall function 11143230: CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                      • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                      • API String ID: 3779116287-2600120591
                                                                                      • Opcode ID: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                      • Instruction ID: 1f9a4f0ce9ce2038842d239495dc50e58c380b2d1dc072d0c6c391bd72002940
                                                                                      • Opcode Fuzzy Hash: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                      • Instruction Fuzzy Hash: 9C01B1B990521D66CB109BB0AC41FEAF77C9B1470DF100199EC1996940EE21BA548BA4
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateFile$CloseHandle
                                                                                      • String ID: "
                                                                                      • API String ID: 1443461169-123907689
                                                                                      • Opcode ID: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                      • Instruction ID: 150de81b6b92e27c68bcdd2e608667d56283c35638c5ea37a79585d4ca6bceb2
                                                                                      • Opcode Fuzzy Hash: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                      • Instruction Fuzzy Hash: 38217C30A1C269AFE3128E78DD54FD9BBA49F45B14F3041E0E4999B1C1DBB1A948C750
                                                                                      APIs
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,581E67F8,74DF2EE0,?,00000000,1118083B,000000FF,?,110300D6,UseIPC,00000001,00000000), ref: 1102D187
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                        • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D14A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                      • String ID: Client$DisableGeolocation
                                                                                      • API String ID: 3315423714-4166767992
                                                                                      • Opcode ID: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                      • Instruction ID: 1755caac6fc2658334c1ed2ebc8622a08952aff54e10c128aab6c20125b970ec
                                                                                      • Opcode Fuzzy Hash: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                      • Instruction Fuzzy Hash: 8521E474A40315BBE712CFA8CD42B6EF7A4E708B18F500269F921AB3C0D7B5B8008785
                                                                                      APIs
                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110271DA
                                                                                        • Part of subcall function 110CD550: EnterCriticalSection.KERNEL32(00000000,00000000,75BF3760,00000000,75C0A1D0,1105DCBB,?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD56B
                                                                                        • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD598
                                                                                        • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD5AA
                                                                                        • Part of subcall function 110CD550: LeaveCriticalSection.KERNEL32(?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD5B4
                                                                                      • TranslateMessage.USER32(?), ref: 110271F0
                                                                                      • DispatchMessageA.USER32(?), ref: 110271F6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                      • String ID: Exit Msgloop, quit=%d
                                                                                      • API String ID: 3212272093-2210386016
                                                                                      • Opcode ID: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                      • Instruction ID: 083e85bce0718499e1b375aadfda5de5654481b636091be3423b85693ac47093
                                                                                      • Opcode Fuzzy Hash: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                      • Instruction Fuzzy Hash: 3D01D876E0521D66EB15DAE99C82F6FF3BD6B64718FD00065EE1092185F760F404CBA1
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 110173FD
                                                                                        • Part of subcall function 11017300: WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 1101733C
                                                                                        • Part of subcall function 11017300: CoInitialize.OLE32(00000000), ref: 11017345
                                                                                        • Part of subcall function 11017300: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                        • Part of subcall function 11017300: CoUninitialize.COMBASE ref: 110173D0
                                                                                        • Part of subcall function 11017220: WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 11017252
                                                                                        • Part of subcall function 11017220: CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                        • Part of subcall function 11017220: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                        • Part of subcall function 11017220: CoUninitialize.COMBASE ref: 110172E0
                                                                                      • SetEvent.KERNEL32(0000031C), ref: 1101741D
                                                                                      • GetTickCount.KERNEL32 ref: 11017423
                                                                                      Strings
                                                                                      • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101742D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                      • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                      • API String ID: 3804766296-4122679463
                                                                                      • Opcode ID: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                      • Instruction ID: c54e938b4ab1921e6220328725fe5e45cb955b1045b44cf9de438437e8313787
                                                                                      • Opcode Fuzzy Hash: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                      • Instruction Fuzzy Hash: 47F0A0B6E1011C6BE700DBF9AC8AE6BBB9CDB4471CB100026F910C7245E9A6BC1087A1
                                                                                      APIs
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • CreateThread.KERNEL32(00000000,00001000,Function_00137630,00000000,00000000,11138782), ref: 1113782E
                                                                                      • CloseHandle.KERNEL32(00000000,?,11138782,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11137835
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseCreateHandleThread__wcstoi64
                                                                                      • String ID: *AutoICFConfig$Client
                                                                                      • API String ID: 3257255551-59951473
                                                                                      • Opcode ID: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                      • Instruction ID: 9aee7181833ba8711af7cecc10eced9f2f0784297ad8accf53734ae3fbf9e9e1
                                                                                      • Opcode Fuzzy Hash: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                      • Instruction Fuzzy Hash: 98E0D8757A062D7AF6149AE98C86F65F6199744B26F500154FA20A50C4D6A0A440CB64
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(000000FA), ref: 11070CB7
                                                                                      • EnterCriticalSection.KERNEL32(?), ref: 11070CC4
                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 11070D96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeaveSleep
                                                                                      • String ID: Push
                                                                                      • API String ID: 1566154052-4278761818
                                                                                      • Opcode ID: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                      • Instruction ID: e8f6e055aac827a13dfabc2dec6ad808bd843e21556e42594c7620890779e76f
                                                                                      • Opcode Fuzzy Hash: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                      • Instruction Fuzzy Hash: 1B51CC78E04784DFE721DF64C880B8AFBE0EF09318F1546A9D8998B285D770BC84CB91
                                                                                      APIs
                                                                                      • GetCommandLineA.KERNEL32 ref: 00C41027
                                                                                      • GetStartupInfoA.KERNEL32(?), ref: 00C4107B
                                                                                      • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 00C41096
                                                                                      • ExitProcess.KERNEL32 ref: 00C410A3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131208932.0000000000C41000.00000020.00000001.01000000.00000009.sdmp, Offset: 00C40000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131195486.0000000000C40000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_c40000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                      • String ID:
                                                                                      • API String ID: 2164999147-0
                                                                                      • Opcode ID: 9ff2e59df8655d5f12b998569705b0f2692ca76edd2f6e47006be56e1c4a0e8e
                                                                                      • Instruction ID: fd7c6c85cf215ff8b31033b3d74a69c4f912602a12512f30e0561d84805405f7
                                                                                      • Opcode Fuzzy Hash: 9ff2e59df8655d5f12b998569705b0f2692ca76edd2f6e47006be56e1c4a0e8e
                                                                                      • Instruction Fuzzy Hash: CE11C0248083C45AEB319FA098497EEFFA5BF03394F6C0048ECF696146D3564AC7C7A5
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                      • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                      • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandle$FreeLibraryObjectSingleWait
                                                                                      • String ID:
                                                                                      • API String ID: 1314093303-0
                                                                                      • Opcode ID: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                      • Instruction ID: 8e76f7fb4e107f93cb89770177b2081f40004907d07b5dfd0c3c9c847909df3d
                                                                                      • Opcode Fuzzy Hash: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                      • Instruction Fuzzy Hash: A7F08135E1425ADFE714DF60D889BADF774FB88319F0002A9D82A52180DF355940CB50
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CurrentFileModuleNameProcess
                                                                                      • String ID: C:\Users\Public\Netstat\bild.exe
                                                                                      • API String ID: 2251294070-3316297413
                                                                                      • Opcode ID: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                      • Instruction ID: b9aa28b4973dc8f7500fb142756b1fa860f28402029a3e5f5efe4e67c4e883a6
                                                                                      • Opcode Fuzzy Hash: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                      • Instruction Fuzzy Hash: F811E7747282235BE7149F76C994719F7A5AB40B5DF20403EE819C76C4DB71F845C744
                                                                                      APIs
                                                                                      • _malloc.LIBCMT ref: 1110F4A9
                                                                                        • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                        • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                        • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                      • _memset.LIBCMT ref: 1110F4D2
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                      • String ID: ..\ctl32\Refcount.cpp
                                                                                      • API String ID: 2803934178-2363596943
                                                                                      • Opcode ID: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                      • Instruction ID: 747f5be640ff5df7f7be77ac0748be8e5b1ae2afb2ba592a3adef8646797d69b
                                                                                      • Opcode Fuzzy Hash: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                      • Instruction Fuzzy Hash: B5E0C23AE4013933C112258A2C03FDBF69C8BD19FCF060021FE0CAA201E586B55181E6
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000,00000001,1102EFB6,MiniDumpType,000000FF,00000000,00000000,?,?,View), ref: 11014FE7
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,View,Client,Bridge), ref: 11014FF8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseCreateFileHandle
                                                                                      • String ID: \\.\NSWFPDrv
                                                                                      • API String ID: 3498533004-85019792
                                                                                      • Opcode ID: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                      • Instruction ID: 0b573536b28af4079515d3142ca801f5deca53cbeb6a996f0a1660ae0aa1d84a
                                                                                      • Opcode Fuzzy Hash: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                      • Instruction Fuzzy Hash: A9D0C971A051387AF23416B66C4CFC7AD09DF06BB5F210264B53DE11D886104C41C2F1
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _calloc
                                                                                      • String ID:
                                                                                      • API String ID: 1679841372-0
                                                                                      • Opcode ID: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                      • Instruction ID: 0024421513bb2e1abb717dbf2ce3cdefbb73aa1ee3cdb3a5feae03928f974db8
                                                                                      • Opcode Fuzzy Hash: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                      • Instruction Fuzzy Hash: 8C519E7560020AAFDB50CF68CC81FAAB7A6FF8A704F148459F929DB280D771E901CF95
                                                                                      APIs
                                                                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                      • __wsplitpath.LIBCMT ref: 11111475
                                                                                        • Part of subcall function 11169044: __splitpath_helper.LIBCMT ref: 11169086
                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                      • String ID:
                                                                                      • API String ID: 1847508633-0
                                                                                      • Opcode ID: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                      • Instruction ID: 71a9510f599fa1c136cb45ff21797ad5c5790827a759e4d2b52c0b71367846c8
                                                                                      • Opcode Fuzzy Hash: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                      • Instruction Fuzzy Hash: 34116175A4021DABEB14DF94CD42FE9F378AB48B04F404199E7246B1C0E7B12A48CB65
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                        • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                        • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                        • Part of subcall function 1109E910: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,008BE0C8,008BE0C8,008BE0C8,008BE0C8,008BE0C8,008BE0C8,008BE0C8,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                        • Part of subcall function 1109E910: EqualSid.ADVAPI32(?,008BE0C8,?,00000001,00000001), ref: 1109E9A3
                                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                      • String ID:
                                                                                      • API String ID: 2256153495-0
                                                                                      • Opcode ID: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                      • Instruction ID: 36b54363b319bb335bc5da0d0e9bdd0405b18079b131e91390d3ecc07929186c
                                                                                      • Opcode Fuzzy Hash: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                      • Instruction Fuzzy Hash: DCF05E78A15328EFD709CFF5D88482EB7A9AF08208700447DF629D3205E631EE009F50
                                                                                      APIs
                                                                                      • InitializeCriticalSection.KERNEL32(111F0908,581E67F8,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F754
                                                                                      • EnterCriticalSection.KERNEL32(111F0908,581E67F8,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F770
                                                                                      • LeaveCriticalSection.KERNEL32(111F0908,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F7B8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterInitializeLeave
                                                                                      • String ID:
                                                                                      • API String ID: 3991485460-0
                                                                                      • Opcode ID: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                      • Instruction ID: 724175da6b3b5eb63f60f43096b8b9410b0df93e13cce3f4766159a849acac97
                                                                                      • Opcode Fuzzy Hash: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                      • Instruction Fuzzy Hash: 3D11C675A0061AAFE700CF65CD85B5BF7A9FB88714F010129E829E3340F7359808CB92
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11068A12
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad
                                                                                      • String ID: ??CTL32.DLL
                                                                                      • API String ID: 1029625771-2984404022
                                                                                      • Opcode ID: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                      • Instruction ID: 38d720fc7c26638894156a2f8924bac31edb6b50614c34829f37a9a02c5b1e22
                                                                                      • Opcode Fuzzy Hash: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                      • Instruction Fuzzy Hash: 5831F5B2A04781DFE711CF59DC40B5AF7E8FB45724F0482AAE92897380E735A900CB92
                                                                                      APIs
                                                                                      • GetDriveTypeA.KERNEL32(?), ref: 11026B6D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: DriveType
                                                                                      • String ID: ?:\
                                                                                      • API String ID: 338552980-2533537817
                                                                                      • Opcode ID: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                      • Instruction ID: c0198090b602517e4922a9d0df48f1c050a77905515f879100581957a4b6d58d
                                                                                      • Opcode Fuzzy Hash: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                      • Instruction Fuzzy Hash: 64F09065C083DA2AEB23DE608844596BFE84B463A8F5488D9DCE887541D165E1C58791
                                                                                      APIs
                                                                                        • Part of subcall function 110ED160: RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                      • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED1BC
                                                                                        • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                      Strings
                                                                                      • Error %d Opening regkey %s, xrefs: 110ED1CA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseOpenwvsprintf
                                                                                      • String ID: Error %d Opening regkey %s
                                                                                      • API String ID: 1772833024-3994271378
                                                                                      • Opcode ID: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                      • Instruction ID: 33cf1931661e2960d377c619dd89904b97ea319b13ae6f8f8dcb9591a9c6775e
                                                                                      • Opcode Fuzzy Hash: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                      • Instruction Fuzzy Hash: 60E0927A6012187FD210961B9C89F9BBB2DDB856A4F000069FD1487201C972EC1082B0
                                                                                      APIs
                                                                                      • RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                        • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                      Strings
                                                                                      • Error %d closing regkey %x, xrefs: 110ED17D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Closewvsprintf
                                                                                      • String ID: Error %d closing regkey %x
                                                                                      • API String ID: 843752472-892920262
                                                                                      • Opcode ID: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                      • Instruction ID: 72b2cf3cdd4b8fd577e25b07e2838f9a8e734d144b1f96517ba84771a8eadcbb
                                                                                      • Opcode Fuzzy Hash: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                      • Instruction Fuzzy Hash: 4EE08679A022126BD3289A1EAC18F5BB6E8DFC4300F1604ADF850C3240DA70D8018664
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(NSMTRACE,?,1102DE54,11026580,0281B878,?,?,?,00000100,?,?,00000009), ref: 111463E9
                                                                                        • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: HandleLibraryLoadModule
                                                                                      • String ID: NSMTRACE
                                                                                      • API String ID: 4133054770-4175627554
                                                                                      • Opcode ID: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                      • Instruction ID: cf49eb18fee32400038a48a9d82a087192b912de878353ac6c822cd252c7dc11
                                                                                      • Opcode Fuzzy Hash: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                      • Instruction Fuzzy Hash: 50D05EB520033BCFDB489F7995B4269F7EAAB4CA1D3540075E469C2A07EBB0D848C714
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(psapi.dll,?,110302C4), ref: 11025CD8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad
                                                                                      • String ID: psapi.dll
                                                                                      • API String ID: 1029625771-80456845
                                                                                      • Opcode ID: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                      • Instruction ID: d2f0b82a95d6fc878682dccaf19b7a180456f678ee46f3fe844c8dbdc6f5fb44
                                                                                      • Opcode Fuzzy Hash: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                      • Instruction Fuzzy Hash: C9E001B1A11B248FC3B4CF3AA844642FAF0BB18A103118A3ED4AEC3A00E330A5448F80
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(nslsp.dll,00000000,1102EF80,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 11014F8E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad
                                                                                      • String ID: nslsp.dll
                                                                                      • API String ID: 1029625771-3933918195
                                                                                      • Opcode ID: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                      • Instruction ID: 60eb6736f29bf142f24d4cfcc231741db50fe0cc1946b431100be770a733e412
                                                                                      • Opcode Fuzzy Hash: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                      • Instruction Fuzzy Hash: E7C092B17152388FE3685F7CAC085D2FAE4EB48A91351986EE4B5D3308E6B09C40CFE4
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 11074E1F
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,11194245,?), ref: 11074E89
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary_memset
                                                                                      • String ID:
                                                                                      • API String ID: 1654520187-0
                                                                                      • Opcode ID: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                      • Instruction ID: 144a06a128bfe4de4bcaa8ee3b5ec3a734aa963de7831f9780c3e5d6e94517af
                                                                                      • Opcode Fuzzy Hash: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                      • Instruction Fuzzy Hash: 6E218376D04228A7D710DA99EC41FEFFBACEB44325F4045AAE909D7200D7315A55CBE1
                                                                                      APIs
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                      • std::exception::exception.LIBCMT ref: 1105FD93
                                                                                      • __CxxThrowException@8.LIBCMT ref: 1105FDA8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 1338273076-0
                                                                                      • Opcode ID: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                      • Instruction ID: 65be3d9b06008521879bde957bfb15225efad016ffb254945ac63f30ffb56918
                                                                                      • Opcode Fuzzy Hash: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                      • Instruction Fuzzy Hash: F5117FBA900619ABC710CF99C940ADAF7F8FB48614F10862EE91997740E774B900CBE1
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _malloc_memmove
                                                                                      • String ID:
                                                                                      • API String ID: 1183979061-0
                                                                                      • Opcode ID: 122672bb5393e061907174e6af5f55016b939f4fec596e378902c676719b8fee
                                                                                      • Instruction ID: db33143030e4a9298ca15ccbefe9b49d771c33472961b073c023ff9ae0ea679a
                                                                                      • Opcode Fuzzy Hash: 122672bb5393e061907174e6af5f55016b939f4fec596e378902c676719b8fee
                                                                                      • Instruction Fuzzy Hash: 98F0F47AE002666F9741CF2C9844896FBDCDF8A158314C4A2E999CB301D671EC0687E0
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 110883EF
                                                                                      • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070993,00000000,00000000,1118201E,000000FF), ref: 11088460
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalInitializeSection_memset
                                                                                      • String ID:
                                                                                      • API String ID: 453477542-0
                                                                                      • Opcode ID: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                      • Instruction ID: 54b2584c526ac61f8aa3306390e259e673957fd90be6398fea32980b523eb801
                                                                                      • Opcode Fuzzy Hash: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                      • Instruction Fuzzy Hash: EE1157B0911B148FC3A4CF7A88817C7FBE5BB58310F80892E96EEC2200DB716664CF94
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11144461
                                                                                      • ExtractIconExA.SHELL32(?,00000000,00040433,00020443,00000001), ref: 11144498
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ExtractFileIconModuleName
                                                                                      • String ID:
                                                                                      • API String ID: 3911389742-0
                                                                                      • Opcode ID: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                      • Instruction ID: eab236796224ce85d4984e15688285b8376dcc0e4438f4162dfbb4c1a1faa056
                                                                                      • Opcode Fuzzy Hash: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                      • Instruction Fuzzy Hash: 3EF0F0787581189FE708DFA0C892FF9B369F794709F444269E912C6184CE706A4C8B51
                                                                                      APIs
                                                                                        • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                      • __lock_file.LIBCMT ref: 11163DFE
                                                                                        • Part of subcall function 1116AF99: __lock.LIBCMT ref: 1116AFBE
                                                                                      • __fclose_nolock.LIBCMT ref: 11163E09
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                      • String ID:
                                                                                      • API String ID: 2800547568-0
                                                                                      • Opcode ID: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                      • Instruction ID: 92e00479c768bfe57184568fb50af5c8f285ad3b4a4164507b2fffc520e9ca87
                                                                                      • Opcode Fuzzy Hash: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                      • Instruction Fuzzy Hash: 5CF0F6348143079ED7119B79D80078EFBA86F0033CF518248C0289A0C0CBFA6521CE56
                                                                                      APIs
                                                                                        • Part of subcall function 11144DC0: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,NSM.LIC), ref: 11144DE7
                                                                                        • Part of subcall function 11163FED: __fsopen.LIBCMT ref: 11163FFA
                                                                                      • GetLastError.KERNEL32(?,0281B878,000000FF,?), ref: 11144ED5
                                                                                      • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,0281B878,000000FF,?), ref: 11144EE5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                      • String ID:
                                                                                      • API String ID: 3768737497-0
                                                                                      • Opcode ID: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                      • Instruction ID: cc8fd34c32098476147d622d57126809c91a32baa97f0e350d3592d26a0b2836
                                                                                      • Opcode Fuzzy Hash: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                      • Instruction Fuzzy Hash: 8D110875D4411AEBD7119F94C9C4A6EF3BCEF85A29F200164FC0497A00E775AD11C7A3
                                                                                      APIs
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 11010774
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LockitLockit::_std::_
                                                                                      • String ID:
                                                                                      • API String ID: 3382485803-0
                                                                                      • Opcode ID: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                      • Instruction ID: 0f97abe7109b731a14a0a5233c6982db04001c22e931a1e4a38e375530e3522e
                                                                                      • Opcode Fuzzy Hash: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                      • Instruction Fuzzy Hash: D9515D74E00645DFDB04CF98C980AADBBF5BF88318F24829DD5869B385C776E942CB90
                                                                                      APIs
                                                                                      • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: QueryValue
                                                                                      • String ID:
                                                                                      • API String ID: 3660427363-0
                                                                                      • Opcode ID: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                      • Instruction ID: 1cdda14904265755d753c391d3c49599355d775305d59026304f2c7825c43cec
                                                                                      • Opcode Fuzzy Hash: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                      • Instruction Fuzzy Hash: 5D1193716282655AEB218E14D690BAFFBAAEFC5B24F30836AE51547E04C3329886C750
                                                                                      APIs
                                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,?), ref: 110FACED
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InformationToken
                                                                                      • String ID:
                                                                                      • API String ID: 4114910276-0
                                                                                      • Opcode ID: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                      • Instruction ID: 5942e99df11cc5ddd12142181c934b3f7ef04b83757ceed83c361bf33f076152
                                                                                      • Opcode Fuzzy Hash: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                      • Instruction Fuzzy Hash: 8911AC71E1011DDBDB11DFA8DC557EE73F8DB58305F0041D9E9099B240DA71AE488B90
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000008,110310DF,00000000,?,11169DD4,?,110310DF,00000000,00000000,00000000,?,1116B767,00000001,00000214,?,1110F4AE), ref: 111701A9
                                                                                        • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap__getptd_noexit
                                                                                      • String ID:
                                                                                      • API String ID: 328603210-0
                                                                                      • Opcode ID: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                      • Instruction ID: 37eba9f6ddbe8283f17829f7b0a109b8136aa2f13792341ea1fc2e0acbbf6d66
                                                                                      • Opcode Fuzzy Hash: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                      • Instruction Fuzzy Hash: 590124392013669BEB099F25EC60B5BB799AB83365F014529EC15CA3C0DB70D900C340
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: __waccess_s
                                                                                      • String ID:
                                                                                      • API String ID: 4272103461-0
                                                                                      • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                      • Instruction ID: b67d37eb909022d12c4b3a5208e3be1f16578853890f7fcac85d973ba88585e6
                                                                                      • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                      • Instruction Fuzzy Hash: C5C09B3705811D7F5F055DE5EC00C557F5DD6806747148156F91C89590DD73E561D540
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: __fsopen
                                                                                      • String ID:
                                                                                      • API String ID: 3646066109-0
                                                                                      • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                      • Instruction ID: 3fb95567750ac4c2837cb65daf82bfaf3169cdeaa60eaf7921ceae4fe4d00650
                                                                                      • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                      • Instruction Fuzzy Hash: 76C0927645424C77DF112A82EC02E4A7F2E9BC0668F448060FB1C19160AAB3EA71DACA
                                                                                      APIs
                                                                                      • _NSMClient32@8.PCICL32(?,?,?,00C410A2,00000000), ref: 00C4100B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131208932.0000000000C41000.00000020.00000001.01000000.00000009.sdmp, Offset: 00C40000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131195486.0000000000C40000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4131222387.0000000000C42000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_c40000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Client32@8
                                                                                      • String ID:
                                                                                      • API String ID: 433899448-0
                                                                                      • Opcode ID: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                      • Instruction ID: 2768cac7c24d4c48fbbc64954a60127ac4f7c54adbd2dc68c0040e91d0c0fd68
                                                                                      • Opcode Fuzzy Hash: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                      • Instruction Fuzzy Hash: F3B092B211434D9B8714EE98E841C7B33DCBAA8600B04080ABD4943282CA61FCA0A671
                                                                                      APIs
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • wsprintfA.USER32 ref: 110EB1B8
                                                                                      • GetTickCount.KERNEL32 ref: 110EB212
                                                                                      • SendMessageA.USER32(?,0000004A,?,?), ref: 110EB226
                                                                                      • GetTickCount.KERNEL32 ref: 110EB22E
                                                                                      • SendMessageTimeoutA.USER32(?,0000004A,?,?,00000000,?,?), ref: 110EB276
                                                                                      • OpenEventA.KERNEL32(00000002,00000000,runplugin.dmp.1,?,00000001), ref: 110EB2A8
                                                                                      • SetEvent.KERNEL32(00000000,?,00000001), ref: 110EB2B5
                                                                                      • CloseHandle.KERNEL32(00000000,?,00000001), ref: 110EB2BC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CountEventMessageSendTick$CloseHandleOpenTimeout__wcstoi64wsprintf
                                                                                      • String ID: %s$DATA$Error. Runplugin is unresponsive$INIT$TracePlugins$Warning: SendMessage to Runplugin took %d ms (possibly unresponsive)$_debug$runplugin %s (hWnd=%x,u=%d,64=%d) $runplugin.dmp.1
                                                                                      • API String ID: 3451743168-2289091950
                                                                                      • Opcode ID: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                      • Instruction ID: f1114c107ee76d929ad16cd328bd8b6b93bc0bc6479e919ac6bcab8c7865c9c3
                                                                                      • Opcode Fuzzy Hash: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                      • Instruction Fuzzy Hash: D441A675A012199FD724DFA5DC44FAEF7B8EF48319F0085AEE91AA7240D631A940CFB1
                                                                                      APIs
                                                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,581E67F8,00000000,00000000,00000000), ref: 1103119A
                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                      • EnumWindows.USER32(110301B0,00000001), ref: 11031272
                                                                                      • EnumWindows.USER32(110301B0,00000000), ref: 110312CC
                                                                                      • Sleep.KERNEL32(00000014,?,?,?,?,?,00000000), ref: 110312DC
                                                                                      • Sleep.KERNEL32(?,?,?,?,?,?,00000000), ref: 11031313
                                                                                        • Part of subcall function 11027E50: _memset.LIBCMT ref: 11027E85
                                                                                        • Part of subcall function 11027E50: wsprintfA.USER32 ref: 11027EBA
                                                                                        • Part of subcall function 11027E50: WaitForSingleObject.KERNEL32(?,000000FF), ref: 11027EFF
                                                                                        • Part of subcall function 11027E50: GetExitCodeProcess.KERNEL32(?,?), ref: 11027F13
                                                                                        • Part of subcall function 11027E50: CloseHandle.KERNEL32(?,00000000), ref: 11027F45
                                                                                        • Part of subcall function 11027E50: CloseHandle.KERNEL32(?), ref: 11027F4E
                                                                                      • Sleep.KERNEL32(0000000A,?,?,?,?,?,00000000), ref: 1103132B
                                                                                      • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 110313E7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: SleepWindows$CloseEnumHandle$CodeDirectoryExitMessageObjectProcessSendSingleWait__wcstoi64_memsetwsprintf
                                                                                      • String ID: "%sNSMExec.exe" %s$*ExitMetroDelay$Client$No new explorer wnd$\Explorer.exe$close new explorer wnd x%x
                                                                                      • API String ID: 3887438110-1852639040
                                                                                      • Opcode ID: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                      • Instruction ID: 68f8b224c7beedd47666692ff363fa6bc3684c9dbb57027410f782db2506f70a
                                                                                      • Opcode Fuzzy Hash: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                      • Instruction Fuzzy Hash: 3391D0B5E002299FDB14CF64DC80BEEF7F5AF89308F1441A9D9599B640EB30AE45CB91
                                                                                      APIs
                                                                                        • Part of subcall function 1115ADD0: IsIconic.USER32(?), ref: 1115AE77
                                                                                        • Part of subcall function 1115ADD0: ShowWindow.USER32(?,00000009), ref: 1115AE87
                                                                                        • Part of subcall function 1115ADD0: BringWindowToTop.USER32(?), ref: 1115AE91
                                                                                      • CheckMenuItem.USER32(00000000,000013EB,-00000009), ref: 1102324D
                                                                                      • ShowWindow.USER32(?,00000003), ref: 110232D1
                                                                                      • LoadMenuA.USER32(00000000,000013A3), ref: 110233FB
                                                                                      • GetSubMenu.USER32(00000000,00000000), ref: 11023409
                                                                                      • CheckMenuItem.USER32(00000000,000013EB,?), ref: 11023429
                                                                                      • GetDlgItem.USER32(?,000013B2), ref: 1102343C
                                                                                      • GetWindowRect.USER32(00000000), ref: 11023443
                                                                                      • PostMessageA.USER32(?,00000111,?,00000000), ref: 11023499
                                                                                      • DestroyMenu.USER32(?,?,00000000,00000000,00000102,?,?,?,00000000), ref: 110234A3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Menu$Window$Item$CheckShow$BringDestroyIconicLoadMessagePostRect
                                                                                      • String ID: AddToJournal$Chat
                                                                                      • API String ID: 693070851-2976406578
                                                                                      • Opcode ID: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                      • Instruction ID: 337dba7d0f02a97e7c7211def3ec221287211942730252afe18814347e7ecccc
                                                                                      • Opcode Fuzzy Hash: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                      • Instruction Fuzzy Hash: 87A1F178B04616ABDB09DF74CC85FAEB3E5AB88704F504519EA26DF2C0CF74B9408B65
                                                                                      APIs
                                                                                      • GetStockObject.GDI32(00000007), ref: 11113167
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 11113176
                                                                                      • SetBrushOrgEx.GDI32(?,00000000,00000000,00000000,?,11119DB4,?,00000001,00000001,00000000,1111E6D7,00000000,?,00000000), ref: 11113181
                                                                                      • GetStockObject.GDI32(00000000), ref: 11113189
                                                                                      • SelectObject.GDI32(?,00000000), ref: 11113192
                                                                                      • GetStockObject.GDI32(0000000D), ref: 11113196
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 1111319F
                                                                                      • SelectClipRgn.GDI32(00000000,00000000), ref: 111131B3
                                                                                      • SelectClipRgn.GDI32(?,?), ref: 111131D5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Object$Select$Stock$Clip$Brush
                                                                                      • String ID:
                                                                                      • API String ID: 2690518013-0
                                                                                      • Opcode ID: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                      • Instruction ID: 6254f714a47a8412abfa64db40702d153c74c152478294c48941108971bda100
                                                                                      • Opcode Fuzzy Hash: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                      • Instruction Fuzzy Hash: CC114C71604214AFE320EFA9CC88F56F7E8AF48714F114529E698DB294C774E840CF60
                                                                                      APIs
                                                                                      • SetForegroundWindow.USER32(00000000), ref: 1115F12E
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      • SystemParametersInfoA.USER32(00002000,00000000,00000001,00000000), ref: 1115F14F
                                                                                      • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F15C
                                                                                      • SetForegroundWindow.USER32(00000000), ref: 1115F162
                                                                                      • SystemParametersInfoA.USER32(00002001,00000000,00000001,00000000), ref: 1115F177
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InfoParametersSystem$ForegroundWindow$ErrorExitLastMessageProcesswsprintf
                                                                                      • String ID: ..\ctl32\wndclass.cpp$m_hWnd
                                                                                      • API String ID: 3960414890-2201682149
                                                                                      • Opcode ID: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                      • Instruction ID: 490c9e9faa58dc1df28f1acf4c3aa341e93c1bd023cf24429d0d7fa3412acb83
                                                                                      • Opcode Fuzzy Hash: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                      • Instruction Fuzzy Hash: 8F01F276790318BBE30096A9CC86F55F398EB54B14F104126F718AA1C0DAF1B851C7E1
                                                                                      APIs
                                                                                      • GetWindowTextA.USER32(?,?,00000050), ref: 11025176
                                                                                      • _strncat.LIBCMT ref: 1102518B
                                                                                      • SetWindowTextA.USER32(?,?), ref: 11025198
                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                      • GetDlgItemTextA.USER32(?,00001395,?,00000040), ref: 11025224
                                                                                      • GetDlgItemTextA.USER32(?,00001397,?,00000040), ref: 11025238
                                                                                      • SetDlgItemTextA.USER32(?,00001397,?), ref: 11025250
                                                                                      • SetDlgItemTextA.USER32(?,00001395,?), ref: 11025262
                                                                                      • SetFocus.USER32(?), ref: 11025265
                                                                                        • Part of subcall function 11024C70: GetDlgItem.USER32(?,?), ref: 11024CC0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Text$Item$Window$Focus_malloc_memset_strncatwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 3832070631-0
                                                                                      • Opcode ID: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                      • Instruction ID: 7712de199883e751ea03bfa735f50b434bc7bb1cc5edca5bff12a9cf5cd7df4a
                                                                                      • Opcode Fuzzy Hash: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                      • Instruction Fuzzy Hash: 0E4192B5A10359ABE710DB74CC45BBAF7F8FB44714F01452AE61AD76C0EAB4A904CB50
                                                                                      APIs
                                                                                      • OpenThread.KERNEL32(0000004A,00000000,11147278,?,?,?,?,?,11147278), ref: 1114713A
                                                                                      • CreateThread.KERNEL32(00000000,00001000,111470B0,?,00000000,?), ref: 1114715E
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,11147278), ref: 11147169
                                                                                      • GetExitCodeThread.KERNEL32(00000000,00000000,?,?,?,?,?,?,11147278), ref: 11147174
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,11147278), ref: 11147181
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,11147278), ref: 11147187
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Thread$CloseHandle$CodeCreateExitObjectOpenSingleWait
                                                                                      • String ID:
                                                                                      • API String ID: 180989782-0
                                                                                      • Opcode ID: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                      • Instruction ID: 262247fb5796f255492f056fed215dfab2d13c04184fcb9cbdc2136a2e7489e8
                                                                                      • Opcode Fuzzy Hash: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                      • Instruction Fuzzy Hash: 6901FA75D14219ABDB04DFA8C845BAEBBB8EF08710F108166F924E7284D774AA018B91
                                                                                      APIs
                                                                                      • FindResourceA.KERNEL32(00000000,00001770,0000000A), ref: 1108918F
                                                                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000,?,110CEF56,?), ref: 110891A4
                                                                                      • LockResource.KERNEL32(00000000,?,00000000,?,110CEF56,?), ref: 110891D6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Resource$FindLoadLock
                                                                                      • String ID: ..\ctl32\Errorhan.cpp$hMap
                                                                                      • API String ID: 2752051264-327499879
                                                                                      • Opcode ID: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                      • Instruction ID: ac104577f0cb8d44e6482e86c7e4f76e51294e6aac98140987b3b76ba3c25106
                                                                                      • Opcode Fuzzy Hash: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                      • Instruction Fuzzy Hash: 08110D3AF4C22556DB12EBE9AC45B69B7E89BC07A8B410475FC6CD71C4FA61D440C3E1
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000), ref: 1114314B
                                                                                      • _strrchr.LIBCMT ref: 1114315A
                                                                                      • _strrchr.LIBCMT ref: 1114316A
                                                                                      • wsprintfA.USER32 ref: 11143185
                                                                                        • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Module_strrchr$FileHandleNamewsprintf
                                                                                      • String ID: BILD
                                                                                      • API String ID: 2529650285-1114602597
                                                                                      • Opcode ID: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                      • Instruction ID: d978b5afe12e8555e920acd6faf46f6bc40337599c773746d871781ff4fb06a8
                                                                                      • Opcode Fuzzy Hash: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                      • Instruction Fuzzy Hash: DD21DD31A182698FE712EF348D407DAFBB4DF15B0CF2000D8D8850B182D7716885C7A0
                                                                                      APIs
                                                                                      • RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                      • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                      • RegEnumValueA.ADVAPI32(?,00000001,?,00000080,00000000,?,?,00000480), ref: 110612C3
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 110612D4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: EnumValue$CloseOpen
                                                                                      • String ID:
                                                                                      • API String ID: 3785232357-0
                                                                                      • Opcode ID: 09fb15d0c68732edfea5ace0cf5911a31f17c813d2e0731e576c8a12812abe03
                                                                                      • Instruction ID: e119b506798adee895546c353bca4cd72f80153627c59e78ac85c5ed933e93b3
                                                                                      • Opcode Fuzzy Hash: 09fb15d0c68732edfea5ace0cf5911a31f17c813d2e0731e576c8a12812abe03
                                                                                      • Instruction Fuzzy Hash: 14412CB190061E9EDB20CB54CC84FDBBBBDAB89305F0045D9E649D7141EA70AA98CFA0
                                                                                      APIs
                                                                                      • ShowWindow.USER32(?,?), ref: 1100113B
                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                      Strings
                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001121
                                                                                      • m_hWnd, xrefs: 11001126
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.4131958506.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                      • Associated: 00000001.00000002.4131945665.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132070064.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132101983.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132117361.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.4132132824.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                      • API String ID: 1604732272-2830328467
                                                                                      • Opcode ID: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                      • Instruction ID: 825df7ee52a795a689a6901b0494195ba864db9fe7d9b2cdbf909eadc0dc9b6b
                                                                                      • Opcode Fuzzy Hash: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                      • Instruction Fuzzy Hash: 4ED02BB561031CABC314DA92DC41FD2F38CAB20364F004435F52542500D571F54083A4