Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Wow.exe

Overview

General Information

Sample name:Wow.exe
Analysis ID:1546274
MD5:5758d89ed392e2190c44c5183a6d23a3
SHA1:f397a538e6d7ecd362768303feb2d43d90227c31
SHA256:bf644876709c591acc17c0da8cdf1814edcc9f1e6bc109a8c0d5c38c79dc953c
Infos:

Detection

Score:7
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to query CPU information (cpuid)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • Wow.exe (PID: 6500 cmdline: "C:\Users\user\Desktop\Wow.exe" MD5: 5758D89ED392E2190C44C5183A6D23A3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T17:50:48.530175+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449732TCP
2024-10-31T17:51:32.810345+010020229301A Network Trojan was detected4.175.87.197443192.168.2.456997TCP

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Wow.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: d:\BuildServer\WoW\1\work\WoW-code\branches\wow-patch-3_3_5_A-BNet\WoW\Bin\Wow.pdb source: Wow.exe
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00771D10 GetModuleFileNameA,_memset,FindFirstFileA,FindClose,LeaveCriticalSection,FormatMessageA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LeaveCriticalSection,GetLocalTime,CloseHandle,CloseHandle,IsWindow,IsWindowVisible,MessageBoxA,LeaveCriticalSection,GetVersion,GetCurrentProcess,GetCurrentProcess,GetExitCodeProcess,GetCurrentProcess,TerminateProcess,0_2_00771D10
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49732
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:56997
Source: Wow.exeString found in binary or memory: http://cn.kbase.blizzard.com/kb/wow/
Source: Wow.exeString found in binary or memory: http://eu.tracker.worldofwarcraft.com:3724/announce
Source: Wow.exeString found in binary or memory: http://support.worldofwarcraft.co.kr/kb/
Source: Wow.exeString found in binary or memory: http://support.worldofwarcraft.com/kb/
Source: Wow.exeString found in binary or memory: http://support.worldofwarcraft.com/kb/http://support.wowtaiwan.com.tw/kb/http://cn.kbase.blizzard.co
Source: Wow.exeString found in binary or memory: http://support.wow-europe.com/kb/
Source: Wow.exeString found in binary or memory: http://support.wowtaiwan.com.tw/kb/
Source: Wow.exeString found in binary or memory: http://us.tracker.worldofwarcraft.com:3724/announce
Source: Wow.exeString found in binary or memory: http://us.tracker.worldofwarcraft.com:3724/announcehttp://eu.tracker.worldofwarcraft.com:3724/announ
Source: Wow.exeString found in binary or memory: http://www.blizzard.com
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00869760 GetAsyncKeyState,SendInput,SystemParametersInfoA,0_2_00869760
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_008706E0 GetModuleHandleA,DirectInput8Create,0_2_008706E0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004640A00_2_004640A0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004181B00_2_004181B0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004102B20_2_004102B2
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004186F20_2_004186F2
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00870B800_2_00870B80
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00418C340_2_00418C34
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004250D00_2_004250D0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_008591600_2_00859160
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004152D30_2_004152D3
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004192F40_2_004192F4
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_007793700_2_00779370
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0088D4200_2_0088D420
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0041167D0_2_0041167D
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_007297400_2_00729740
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004258500_2_00425850
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00891A790_2_00891A79
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00509DD00_2_00509DD0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00425DE00_2_00425DE0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00925EE00_2_00925EE0
Source: C:\Users\user\Desktop\Wow.exeCode function: String function: 0076ED20 appears 54 times
Source: C:\Users\user\Desktop\Wow.exeCode function: String function: 0076E540 appears 160 times
Source: C:\Users\user\Desktop\Wow.exeCode function: String function: 00767FC0 appears 271 times
Source: C:\Users\user\Desktop\Wow.exeCode function: String function: 005EEB70 appears 54 times
Source: C:\Users\user\Desktop\Wow.exeCode function: String function: 0076E5A0 appears 268 times
Source: C:\Users\user\Desktop\Wow.exeCode function: String function: 00817DB0 appears 33 times
Source: Wow.exeStatic PE information: Resource name: None type: b.out segmented executable V2.3 86
Source: Wow.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: clean7.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00434CE0 GetDiskFreeSpaceA,0_2_00434CE0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0077D710 CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,Thread32Next,Thread32Next,CloseHandle,GetCurrentThreadId,0_2_0077D710
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004294C0 FindResourceExA,LoadResource,LockResource,SizeofResource,0_2_004294C0
Source: C:\Users\user\Desktop\Wow.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: acspecfc.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: mscms.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: ddraw.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: opengl32.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: dinput8.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: divxdecoder.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Wow.exeSection loaded: glu32.dllJump to behavior
Source: Wow.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Wow.exeStatic file information: File size 7699456 > 1048576
Source: Wow.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x5dd400
Source: Wow.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: d:\BuildServer\WoW\1\work\WoW-code\branches\wow-patch-3_3_5_A-BNet\WoW\Bin\Wow.pdb source: Wow.exe
Source: Wow.exeStatic PE information: real checksum: 0x764074 should be: 0x7667db
Source: Wow.exeStatic PE information: section name: .zdata
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00869E00 IsIconic,GetWindowRect,AdjustWindowRectEx,PeekMessageA,PeekMessageA,GetMessageA,TranslateMessage,GetMessageA,TranslateMessage,DispatchMessageA,PeekMessageA,0_2_00869E00
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0077D710 CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,Thread32Next,Thread32Next,CloseHandle,GetCurrentThreadId,0_2_0077D710
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00771D10 GetModuleFileNameA,_memset,FindFirstFileA,FindClose,LeaveCriticalSection,FormatMessageA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LeaveCriticalSection,GetLocalTime,CloseHandle,CloseHandle,IsWindow,IsWindowVisible,MessageBoxA,LeaveCriticalSection,GetVersion,GetCurrentProcess,GetCurrentProcess,GetExitCodeProcess,GetCurrentProcess,TerminateProcess,0_2_00771D10
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0040C684 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040C684
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0077D710 CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,Thread32Next,Thread32Next,CloseHandle,GetCurrentThreadId,0_2_0077D710
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00770FA0 GetProcessHeap,HeapAlloc,0_2_00770FA0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0040C684 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040C684
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_004111C6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004111C6
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00414E28 cpuid 0_2_00414E28
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_007712D0 GetLocalTime,0_2_007712D0
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_0077CF70 GetUserNameA,0_2_0077CF70
Source: C:\Users\user\Desktop\Wow.exeCode function: 0_2_00771D10 GetModuleFileNameA,_memset,FindFirstFileA,FindClose,LeaveCriticalSection,FormatMessageA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LoadStringA,LeaveCriticalSection,GetLocalTime,CloseHandle,CloseHandle,IsWindow,IsWindowVisible,MessageBoxA,LeaveCriticalSection,GetVersion,GetCurrentProcess,GetCurrentProcess,GetExitCodeProcess,GetCurrentProcess,TerminateProcess,0_2_00771D10
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory3
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem14
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1546274 Sample: Wow.exe Startdate: 31/10/2024 Architecture: WINDOWS Score: 7 4 Wow.exe 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Wow.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://support.worldofwarcraft.com/kb/Wow.exefalse
    unknown
    http://support.worldofwarcraft.com/kb/http://support.wowtaiwan.com.tw/kb/http://cn.kbase.blizzard.coWow.exefalse
      unknown
      http://www.blizzard.comWow.exefalse
        unknown
        http://support.worldofwarcraft.co.kr/kb/Wow.exefalse
          unknown
          http://support.wowtaiwan.com.tw/kb/Wow.exefalse
            unknown
            http://support.wow-europe.com/kb/Wow.exefalse
              unknown
              http://eu.tracker.worldofwarcraft.com:3724/announceWow.exefalse
                unknown
                http://cn.kbase.blizzard.com/kb/wow/Wow.exefalse
                  unknown
                  http://us.tracker.worldofwarcraft.com:3724/announceWow.exefalse
                    unknown
                    http://us.tracker.worldofwarcraft.com:3724/announcehttp://eu.tracker.worldofwarcraft.com:3724/announWow.exefalse
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1546274
                      Start date and time:2024-10-31 17:49:33 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 44s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Wow.exe
                      Detection:CLEAN
                      Classification:clean7.winEXE@1/0@0/0
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 130
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target Wow.exe, PID 6500 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: Wow.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.731616867141346
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:Wow.exe
                      File size:7'699'456 bytes
                      MD5:5758d89ed392e2190c44c5183a6d23a3
                      SHA1:f397a538e6d7ecd362768303feb2d43d90227c31
                      SHA256:bf644876709c591acc17c0da8cdf1814edcc9f1e6bc109a8c0d5c38c79dc953c
                      SHA512:a9373f5d0f266d17291e56c7300ef71fa446c2a14a92e0c41dc65954fe8c8ddfe15682b3c7d8141e078cc80603a9ad19e2b4a723631ef8f2cee234d97bbca0c8
                      SSDEEP:98304:iSWhGvPwsP+Wc36vu00ovRwqZPNprDEYtUb17TLFkGrNQtT+W50hld:ifgTyovRwqZPNBwb1vNQl+d
                      TLSH:6B769ED1F540C137E9E201B6D6BE6FB9487D9637032E34D32AD428545EA0AE33A3539B
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K...........................................#.......-.......)...(4..K...(4..2...(4..L...(4......(4..............(4......Rich...
                      Icon Hash:1f7d6c6c69290907
                      Entrypoint:0x401000
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x4C2452FE [Fri Jun 25 06:55:58 2010 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:b7fc31b6422013c5f943a1da91692ed3
                      Instruction
                      call 00007F18A5141820h
                      jmp 00007F18A4DDEE26h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      mov ebp, esp
                      mov eax, dword ptr [ebp+08h]
                      push 00000000h
                      push FFFFFFFFh
                      push 009E0E14h
                      push eax
                      call 00007F18A51418B0h
                      pop ebp
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      mov ebp, esp
                      mov eax, dword ptr [ebp+08h]
                      test eax, eax
                      je 00007F18A4DD43A1h
                      push 00000000h
                      push FFFFFFFFh
                      push 009E0E18h
                      push eax
                      call 00007F18A51418ECh
                      pop ebp
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      mov eax, ecx
                      xor ecx, ecx
                      mov dword ptr [eax], 009E0E24h
                      mov dword ptr [eax+04h], ecx
                      mov dword ptr [eax+08h], ecx
                      mov dword ptr [eax+0Ch], ecx
                      mov dword ptr [eax+10h], ecx
                      mov dword ptr [eax+14h], FFFFFFFFh
                      ret
                      int3
                      int3
                      push ebp
                      mov ebp, esp
                      mov eax, dword ptr [ecx+08h]
                      mov edx, dword ptr [ebp+08h]
                      cmp edx, eax
                      push ebx
                      push esi
                      lea esi, dword ptr [ecx+08h]
                      push edi
                      mov edi, dword ptr [ebp+0Ch]
                      jc 00007F18A4DD439Eh
                      mov ebx, dword ptr [ecx+0Ch]
                      add ebx, eax
                      lea eax, dword ptr [edx+edi]
                      cmp eax, ebx
                      jbe 00007F18A4DD43B7h
                      mov ebx, dword ptr [ebp+14h]
                      mov eax, dword ptr [ecx]
                      push ebx
                      mov ebx, dword ptr [ebp+10h]
                      push ebx
                      lea ebx, dword ptr [ecx+0Ch]
                      push ebx
                      push esi
                      lea esi, dword ptr [ecx+04h]
                      push esi
                      push edi
                      push edx
                      mov edx, dword ptr [eax+0Ch]
                      call edx
                      test eax, eax
                      jne 00007F18A4DD4399h
                      pop edi
                      pop esi
                      pop ebx
                      pop ebp
                      retn 0010h
                      pop edi
                      pop esi
                      mov eax, 00000001h
                      pop ebx
                      pop ebp
                      retn 0010h
                      int3
                      int3
                      int3
                      int3
                      Programming Language:
                      • [LNK] VC++ 6.0 SP5 build 8804
                      • [ASM] VS2003 (.NET) build 3077
                      • [ASM] VS2005 build 50727
                      • [ C ] VS2005 build 50727
                      • [C++] VS2005 build 50727
                      • [EXP] VS2005 build 50727
                      • [RES] VS2005 build 50727
                      • [LNK] VS2005 build 50727
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x6b56300x49.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x6b2d100x168.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x9d30000x29ad0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x5e0b100x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x6aef700x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x5df0000x79c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x5dd3b30x5dd40032ec01576b5be7e96e8a66ff009806e9unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x5df0000xd66790xd6800ae02da553ee17cc7903e5796456f7c31False0.3668187281468531data5.931940019079788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x6b60000x31a5080x78e001fca65a45c4e2f9ed8349d6d68e1691bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .zdata0x9d10000x10000x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0x9d20000x190x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x9d30000x29ad00x29c006fbbb45aaf830b355c3f5e0e879588c6False0.6604310909431138data7.230200693559073IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      BLIZZARDCOMPONENT0x9d36080xc8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.68
                      DATA0x9d36d00x17a7aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0003715553720713
                      DATA0x9eb14c0xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators0.2687734668335419
                      DATA0x9ebdc80xc34XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsChineseTaiwan0.2762483994878361
                      DATA0x9ec9fc0xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsGermanGermany0.2687734668335419
                      DATA0x9ed6780xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsEnglishUnited States0.2687734668335419
                      DATA0x9ee2f40xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsSpanishSpain0.2687734668335419
                      DATA0x9eef700xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsFrenchFrance0.2687734668335419
                      DATA0x9efbec0xc50XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsKoreanNorth Korea0.28109137055837563
                      DATA0x9efbec0xc50XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsKoreanSouth Korea0.28109137055837563
                      DATA0x9f083c0xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsRussianRussia0.2690863579474343
                      DATA0x9f14b80xc34XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsChineseChina0.27560819462227915
                      DATA0x9f20ec0xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsEnglishGreat Britain0.2687734668335419
                      DATA0x9f2d680xc7cXML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminatorsSpanishMexico0.2687734668335419
                      RT_CURSOR0x9f39e40x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.1266233766233766
                      RT_BITMAP0x9f3b180x26cDevice independent bitmap graphic, 20 x 43 x 4, image size 516EnglishUnited States0.15806451612903225
                      RT_ICON0x9f3d840x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.6967842323651452
                      RT_ICON0x9f632c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.6967842323651452
                      RT_ICON0x9f88d40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.7680581613508443
                      RT_ICON0x9f997c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.7680581613508443
                      RT_ICON0x9faa240x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.805327868852459
                      RT_ICON0x9fb3ac0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.805327868852459
                      RT_ICON0x9fbd340x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.8617021276595744
                      RT_ICON0x9fc19c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.8617021276595744
                      RT_GROUP_CURSOR0x9fc6040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                      RT_GROUP_ICON0x9fc6180x3edataEnglishUnited States0.8064516129032258
                      RT_GROUP_ICON0x9fc6580x3edata0.8064516129032258
                      RT_VERSION0x9fc6980x38cPGP symmetric key encrypted data - Plaintext or unencrypted dataEnglishUnited States0.45044052863436124
                      RT_MANIFEST0x9fca240x56ASCII text, with CRLF line terminatorsEnglishUnited States1.0232558139534884
                      None0x9fca7c0x54b.out segmented executable V2.3 86EnglishUnited States1.0952380952380953
                      DLLImport
                      KERNEL32.dllSetEnvironmentVariableA, CompareStringA, FlushFileBuffers, CloseHandle, CreateFileA, GetTimeZoneInformation, GetConsoleOutputCP, DeleteCriticalSection, OpenFile, DeviceIoControl, OpenFileMappingA, CreateFileMappingA, MapViewOfFile, WriteConsoleA, WaitForMultipleObjectsEx, WriteFileEx, ReadFileEx, GetOverlappedResult, CancelIo, GetWindowsDirectoryA, GetSystemDirectoryA, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, TlsGetValue, TlsAlloc, RtlUnwind, SetStdHandle, GetFileType, SetHandleCount, GetLastError, GetEnvironmentStrings, FreeEnvironmentStringsA, GetModuleFileNameA, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleA, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetStartupInfoA, GetProcessHeap, HeapAlloc, GetVersionExA, HeapFree, GetCommandLineA, ConvertThreadToFiber, CreateFiberEx, DeleteFiber, GetDateFormatA, GetTimeFormatA, GetStringTypeA, LCMapStringA, GetConsoleMode, GetConsoleCP, SetFilePointer, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, GetCurrentThread, HeapDestroy, HeapCreate, VirtualFree, GetLocaleInfoA, HeapReAlloc, VirtualAlloc, GetOEMCP, GetACP, InitializeCriticalSection, LoadLibraryA, InterlockedExchange, FreeLibrary, EnterCriticalSection, LeaveCriticalSection, RaiseException, HeapSize, Sleep, VirtualQuery, UnmapViewOfFile, GetDriveTypeA, ExitThread, GetFullPathNameA, GlobalAlloc, GlobalFree, GlobalLock, GlobalUnlock, VirtualProtect, LocalFree, FlushInstructionCache, GetQueuedCompletionStatus, CreateIoCompletionPort, GetCommandLineW, GlobalMemoryStatusEx, GetPriorityClass, SetPriorityClass, IsBadWritePtr, OpenThread, SuspendThread, GetThreadContext, Thread32First, Thread32Next, lstrcpynA, IsBadReadPtr, MulDiv, SwitchToFiber, GetSystemInfo, SetEvent, WaitForSingleObject, CreateSemaphoreA, ReleaseSemaphore, GlobalMemoryStatus, ResumeThread, TerminateThread, SetThreadPriority, GetThreadPriority, GetProcessAffinityMask, SignalObjectAndWait, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, SizeofResource, LockResource, LoadResource, FindResourceExA, QueryPerformanceFrequency, Module32First, Module32Next, GetDiskFreeSpaceA, ReadFile, CreateThread, GetFileAttributesExA, GetFileSize, GetFileAttributesA, MoveFileA, DeleteFileA, CreateEventA, OpenEventA, GetComputerNameA, GetTempPathA, CreateToolhelp32Snapshot, SetThreadAffinityMask, WaitForSingleObjectEx, CreateProcessA, DuplicateHandle, SetCurrentDirectoryA, GetCurrentDirectoryA, FindClose, FindNextFileA, FindFirstFileA, GetDiskFreeSpaceExA, GetShortPathNameA, CreateDirectoryA, RemoveDirectoryA, SetEndOfFile, SetFileAttributesA, SetFileTime, ResetEvent, WaitForMultipleObjects, SetProcessAffinityMask, GetLocalTime, FormatMessageA, GetExitCodeProcess, GetVersion, OutputDebugStringA, CreateMutexA, ReleaseMutex
                      OPENGL32.dllglGenTextures, glEnable, glTexParameteri, glReadPixels, wglGetProcAddress, wglDeleteContext, wglMakeCurrent, wglCreateContext, glBindTexture, glTexImage2D, glDeleteTextures, glDisable, glGetError, glGetIntegerv, glGetString, glCopyTexSubImage2D, glCopyTexImage2D, wglGetCurrentDC, glCullFace, glBlendFunc, glMatrixMode, glPolygonOffset, wglGetCurrentContext, glColorPointer, glTexCoordPointer, glScissor, glClipPlane, glPolygonMode, glViewport, glDepthRange, glDepthMask, glColorMask, glTexGeni, glNormalPointer, glVertexPointer, glLightf, glLightfv, glLightModelfv, glColor4fv, glMaterialfv, glLoadIdentity, glLoadMatrixf, glFogf, glFogi, glPixelStorei, glColorMaterial, glLightModeli, glTexGenfv, glPointSize, glFrontFace, glDepthFunc, glFogfv, glAlphaFunc, glMaterialf, glTexSubImage2D, glClear, glClearColor, wglSwapLayerBuffers, glFinish, glDrawArrays, glDrawElements, glLineWidth, glTexEnviv, glHint, glTexEnvi, glTexEnvf, glTexEnvfv, glEnableClientState, glDisableClientState, glGetFloatv
                      VERSION.dllGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
                      IMM32.dllImmGetConversionStatus, ImmGetContext, ImmGetCompositionStringA, ImmAssociateContext, ImmSetConversionStatus, ImmAssociateContextEx, ImmNotifyIME, ImmGetCandidateListA, ImmReleaseContext
                      WININET.dllInternetReadFileExA, InternetCloseHandle, HttpQueryInfoA, InternetSetOptionA, InternetConnectA, InternetOpenA, HttpSendRequestA, InternetSetCookieA, HttpOpenRequestA, InternetCrackUrlA, InternetSetStatusCallback, InternetSetStatusCallbackA
                      WS2_32.dllWSACancelAsyncRequest, WSAAsyncGetHostByName, WSACleanup, accept, select, WSAGetLastError, WSAStartup, setsockopt, getsockopt, socket, closesocket, __WSAFDIsSet, connect, listen, bind, htons, htonl, gethostbyname, ntohs, getsockname, recv, getpeername, send, inet_addr, WSACloseEvent, WSACreateEvent, WSAEventSelect, WSAEnumNetworkEvents, sendto, recvfrom, inet_ntoa, ioctlsocket
                      DINPUT8.dllDirectInput8Create
                      USER32.dllGetParent, CloseClipboard, OpenClipboard, SetCapture, GetForegroundWindow, MessageBeep, GetKeyState, FillRect, IsDialogMessageA, TranslateAcceleratorA, GetKeyboardLayout, EmptyClipboard, SendInput, SystemParametersInfoA, GetAsyncKeyState, ClientToScreen, InvertRect, VkKeyScanA, DrawTextExA, CharLowerBuffA, GetDesktopWindow, GetActiveWindow, PostMessageA, IsIconic, IsZoomed, PostQuitMessage, SetFocus, KillTimer, SetTimer, WaitForInputIdle, MapVirtualKeyA, LoadBitmapA, GetMessageA, PeekMessageA, TranslateMessage, DispatchMessageA, wsprintfA, IsWindow, IsWindowVisible, MessageBoxA, LoadStringA, SetCursor, GetCursorPos, ScreenToClient, GetClientRect, LoadImageA, LoadCursorA, MapWindowPoints, BeginPaint, EndPaint, AdjustWindowRectEx, GetSystemMetrics, ShowWindow, ChangeDisplaySettingsExA, SetWindowPos, GetWindowRect, ClipCursor, GetWindowPlacement, SendMessageA, MoveWindow, SetClipboardData, ReleaseCapture, DefWindowProcA, RegisterClassExA, CreateWindowExA, GetDC, ReleaseDC, DestroyWindow, UnregisterClassA, EnumDisplaySettingsA, EnumDisplayDevicesA, MonitorFromPoint, GetMonitorInfoA, MsgWaitForMultipleObjects
                      GDI32.dllChoosePixelFormat, CreateBitmap, TranslateCharsetInfo, GetStockObject, SelectObject, DeleteObject, SetBkColor, GetDeviceGammaRamp, CreateSolidBrush, SetBkMode, GetPixelFormat, SetDeviceGammaRamp, DescribePixelFormat, SetTextColor, SetPixelFormat, DeleteDC, StretchBlt, BitBlt, CreateCompatibleDC, OffsetViewportOrgEx, SetViewportOrgEx, SelectClipRgn, CreateRectRgn, Rectangle, CreateFontIndirectA, GetObjectA, SetMapMode, GdiFlush, CreateDIBSection
                      ADVAPI32.dllCryptReleaseContext, ConvertStringSecurityDescriptorToSecurityDescriptorW, RegCloseKey, RegOpenKeyExA, RegQueryValueExA, RegFlushKey, RegSetValueExA, RegCreateKeyExA, GetUserNameA, RegEnumKeyA, CryptGenRandom, CryptAcquireContextA, RegOpenKeyA
                      SHELL32.dllFindExecutableA, ShellExecuteA
                      DivxDecoder.dllSetOutputFormat, DivxDecode, UnInitializeDivxDecoder, InitializeDivxDecoder
                      WINMM.dllwaveOutPrepareHeader, waveInReset, waveInClose, waveInOpen, waveInStart, waveInGetNumDevs, waveOutGetNumDevs, waveInGetDevCapsA, waveInUnprepareHeader, waveInPrepareHeader, waveInAddBuffer, waveOutGetPosition, waveOutReset, waveOutWrite, waveOutUnprepareHeader, waveOutOpen, waveOutClose, waveOutGetDevCapsA, timeKillEvent, timeSetEvent, mciSendCommandA, timeGetTime
                      MSACM32.dllacmStreamSize, acmStreamPrepareHeader, acmStreamConvert, acmStreamUnprepareHeader, acmFormatSuggest, acmStreamOpen
                      SETUPAPI.dllSetupDiGetClassDevsA, SetupDiGetDeviceInterfaceDetailA, SetupDiEnumDeviceInterfaces, SetupDiDestroyDeviceInfoList, SetupDiGetDeviceRegistryPropertyA, SetupDiEnumDeviceInfo
                      HID.DLLHidD_GetSerialNumberString, HidD_GetHidGuid, HidD_SetFeature, HidD_GetPreparsedData, HidD_GetAttributes, HidP_GetCaps, HidD_GetProductString, HidD_FreePreparsedData
                      ole32.dllPropVariantClear, CoCreateInstance, CoTaskMemFree, CoUninitialize, CLSIDFromString, CoInitialize
                      NameOrdinalAddress
                      AssertAndCrash10x8c51d0
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      ChineseTaiwan
                      GermanGermany
                      SpanishSpain
                      FrenchFrance
                      KoreanNorth Korea
                      KoreanSouth Korea
                      RussianRussia
                      ChineseChina
                      EnglishGreat Britain
                      SpanishMexico
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 31, 2024 17:50:53.449666977 CET53623271.1.1.1192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:12:50:28
                      Start date:31/10/2024
                      Path:C:\Users\user\Desktop\Wow.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\Wow.exe"
                      Imagebase:0x400000
                      File size:7'699'456 bytes
                      MD5 hash:5758D89ED392E2190C44C5183A6D23A3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,00CAE830,00000104,?,?,11111111), ref: 00771D85
                        • _memset.LIBCMT ref: 00771D97
                        • FindFirstFileA.KERNEL32(00CAE830,00CAE5E8,?,?,?,?,11111111), ref: 00771DA9
                        • FindClose.KERNEL32(00000000,?,?,?,?,11111111), ref: 00771DB4
                        • LeaveCriticalSection.KERNEL32(00CAD808,?,?,00CAE614,00000104,?,?,?,?,11111111), ref: 00771E67
                        • FormatMessageA.KERNEL32(-00001000,00000000,?,00000400,00CAE4E8,00000100,00000000,?,?,00CAE614,00000104,?,?,?,?,11111111), ref: 00771E9D
                        • LoadStringA.USER32(00000000,00005100,00CAD9C8,00000100), ref: 00771EE6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: FileFind$CloseCriticalFirstFormatLeaveLoadMessageModuleNameSectionString_memset
                        • String ID: : error %u: $%s$(%u)$Crash$Debug Details:$Error$Invalid or corrupt archive.$dmp$l7k$Jk
                        • API String ID: 2481244601-3713183331
                        • Opcode ID: 695b11399e98d7ee5ef2c8ca25bdd2209d57a9747ea88db0920259f00e0d9076
                        • Instruction ID: cbe8ee07396131f42ea6029cef8860db71f3d9024e27e0fa07ac1faba52f6350
                        • Opcode Fuzzy Hash: 695b11399e98d7ee5ef2c8ca25bdd2209d57a9747ea88db0920259f00e0d9076
                        • Instruction Fuzzy Hash: 8232FD71A01241EFEB14EFA8FC95BAB33A8AB49744F048525FC0BD7292D7789C41D7A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: - $%d. %s$%s%s$%s%s%s%s$.?AUPENDINGCHAT@@$.\ChatFrame.cpp$BATTLEGROUND$CHAT_%s_GET$CHAT_%s_NOTICE$CHAT_CHANNEL_LIST_GET$CHAT_CONVERSATION_%s_NOTICE$CHAT_EMOTE_UNKNOWN$CHAT_FILTERED$CHAT_IGNORED$CHAT_RESTRICTED$CHAT_SAY_UNKNOWN$CHAT_YELL_UNKNOWN$CONVERSATION_NAME$DEV$GUILD$LAUGH_WORD%d$PARTY$RAID$UNKNOWN$WHISPER$[%s] $text$|Hquest:
                        • API String ID: 1452528299-2126273031
                        • Opcode ID: 41d5052b1601055f5f3f07e93a531415ffa0470fd46334416ed5b93f38f4c5c1
                        • Instruction ID: dcde29385eb007c3fd86fef6596c13aacfd66d8d727daf0be6078cc3bd64ad38
                        • Opcode Fuzzy Hash: 41d5052b1601055f5f3f07e93a531415ffa0470fd46334416ed5b93f38f4c5c1
                        • Instruction Fuzzy Hash: C6920872A00309ABDF20DE58CC85FFE3B69BB85314F154599F909A72C2E7719D84C7A2
                        APIs
                        • IsIconic.USER32(00000000), ref: 00869E29
                        • GetWindowRect.USER32(00000000), ref: 00869E4B
                        • AdjustWindowRectEx.USER32(0040AABE,00000000), ref: 00869E7A
                        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00869F3D
                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00869F72
                        • TranslateMessage.USER32(?), ref: 00869F9E
                        • DispatchMessageA.USER32(?), ref: 00869FA4
                        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00869FC4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Message$PeekRectWindow$AdjustDispatchIconicTranslate
                        • String ID:
                        • API String ID: 2787673705-0
                        • Opcode ID: e602821f004aa38c60641905b5f02017e9f2828e4133840ecc3c8a5c8d97623f
                        • Instruction ID: e052fe3f3473febf3e8d18b6f492f7370ea2e0a7a65db0ad0bf94ced9525f010
                        • Opcode Fuzzy Hash: e602821f004aa38c60641905b5f02017e9f2828e4133840ecc3c8a5c8d97623f
                        • Instruction Fuzzy Hash: BD6153B9A002099FDB10DF68EC85FAA77BDFB49324F154119F909D7390D771A841CBA1
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,00000000,?,?,?,?,0077D92D,?,00000080,?), ref: 0077D72B
                        • Thread32First.KERNEL32(00000000,?), ref: 0077D743
                        • GetCurrentProcessId.KERNEL32(00000004,00000000,00000000), ref: 0077D74C
                        • Thread32Next.KERNEL32(00000000,0000001C), ref: 0077D75A
                        • Thread32Next.KERNEL32(00000000,0000001C), ref: 0077D78A
                        • CloseHandle.KERNEL32(00000000,00000004,00000000,00000000), ref: 0077D794
                        • GetCurrentThreadId.KERNEL32 ref: 0077D79F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Thread32$CurrentNext$CloseCreateFirstHandleProcessSnapshotThreadToolhelp32
                        • String ID:
                        • API String ID: 85298831-0
                        • Opcode ID: 2f7763a5da5f1e52d569ed74d44d8bb61dd3e14008cb4b090bd7d54a195b3df3
                        • Instruction ID: 2160ed5c83f5692580b2f63c845d85f4a3067814ae9c45c21ca99a774c214d0e
                        • Opcode Fuzzy Hash: 2f7763a5da5f1e52d569ed74d44d8bb61dd3e14008cb4b090bd7d54a195b3df3
                        • Instruction Fuzzy Hash: CD118E7550020A9FEF24EF64C885B7EB7F9FF51350F508528E85987280E7789D42CBA1
                        APIs
                        • FindResourceExA.KERNEL32(00000000,BLIZZARDCOMPONENT,BLIZZARDCOMPONENT,00000000), ref: 004294D9
                        • LoadResource.KERNEL32(00000000,00000000,?,?,00000000,?,004029C8,?), ref: 004294E7
                        • LockResource.KERNEL32(00000000,?,?,00000000,?,004029C8,?), ref: 004294F2
                        • SizeofResource.KERNEL32(00000000,00000000,?,?,00000000,?,004029C8,?), ref: 004294FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLockSizeof
                        • String ID: BLIZZARDCOMPONENT
                        • API String ID: 3473537107-1155112521
                        • Opcode ID: ba256a45b807c1956b0c80d480403c2d2feffa8586d512c79108128b70fb539a
                        • Instruction ID: 1ee5c23ec393aba4e63ecf9a9040902ef79495b50b8130b824d9dc799c874823
                        • Opcode Fuzzy Hash: ba256a45b807c1956b0c80d480403c2d2feffa8586d512c79108128b70fb539a
                        • Instruction Fuzzy Hash: 4D0121B27022206BE3002BAABC8AA57FB9CEF493E9B410032F40AD3341D6759D4087A0
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 004168ED
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00416902
                        • UnhandledExceptionFilter.KERNEL32(009E4184), ref: 0041690D
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 00416929
                        • TerminateProcess.KERNEL32(00000000), ref: 00416930
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 6356ac66df725dde44fd02b288a5746755390ab7b91c1317ceb2e62a73af14bc
                        • Instruction ID: 84e33fb469d015931e385df43bef00e319fc4f79f9f1b1f0b93ad4aefbad906e
                        • Opcode Fuzzy Hash: 6356ac66df725dde44fd02b288a5746755390ab7b91c1317ceb2e62a73af14bc
                        • Instruction Fuzzy Hash: 6A21E4B9517200DFD700DF5DEE556987BB8FB08346F20491AE529C3B70EBB459818F19
                        APIs
                        • GetLocalTime.KERNEL32(?,?,00000000,Crash), ref: 007712E6
                          • Part of subcall function 0077DE30: InterlockedIncrement.KERNEL32(00CB749C), ref: 0077DE3B
                          • Part of subcall function 0077DE30: _memset.LIBCMT ref: 0077DE72
                          • Part of subcall function 0077DE30: GetLocalTime.KERNEL32(007710B0), ref: 0077DED4
                          • Part of subcall function 0077DE30: _memset.LIBCMT ref: 0077DF0D
                          • Part of subcall function 0077DE30: InterlockedDecrement.KERNEL32(00CB749C), ref: 0077DF2D
                          • Part of subcall function 00771130: WriteFile.KERNEL32(00CAD838,?,00000000,00CADBCC,00000000,00000000,00CADBCC,?,00000000,?,?,0077133E,00000000,?,00000001,007710B0), ref: 007711AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: InterlockedLocalTime_memset$DecrementFileIncrementWrite
                        • String ID: ?#w$Crash$txt
                        • API String ID: 719532726-486834409
                        • Opcode ID: 0634a18b35ebe39a48a474faf840f85adde38816e43541223b3d40e7e0fcc78d
                        • Instruction ID: 3c95c2498194addc58636f6a727421ea1e3b45eaf9ff961fe55ab81efaa46e04
                        • Opcode Fuzzy Hash: 0634a18b35ebe39a48a474faf840f85adde38816e43541223b3d40e7e0fcc78d
                        • Instruction Fuzzy Hash: CF115C7274020867CF20AAACAC42EDB73A8DF853E4F408161FE0DA7181E5B99D5487E1
                        APIs
                        • GetUserNameA.ADVAPI32(?,007710B0), ref: 0077CF8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID: %-10s%s$<unknown>$User:
                        • API String ID: 2645101109-4283439889
                        • Opcode ID: f9395eb4352b04f4ac94938119a38ea3dcc52907cab1777377758bc1a59d1241
                        • Instruction ID: e407d64ee660cbc512bbfc580b8c010fb502f3a770b165326fdf37dd0976ee15
                        • Opcode Fuzzy Hash: f9395eb4352b04f4ac94938119a38ea3dcc52907cab1777377758bc1a59d1241
                        • Instruction Fuzzy Hash: 89F03A74918318ABCB10DF54DC85ADABBB8FB28345F008599E98D97201E7B05AC48B90
                        APIs
                        • GetAsyncKeyState.USER32(00000090), ref: 0086976B
                        • SendInput.USER32(00000001,?,0000001C), ref: 008697A6
                        • SystemParametersInfoA.USER32(00000071,00000000,?,00000000), ref: 008697C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: AsyncInfoInputParametersSendStateSystem
                        • String ID:
                        • API String ID: 2370078434-0
                        • Opcode ID: 6ab009622f8be3f2c610834c7dbc1f925fc8bae6756e709d4b57b720613c73db
                        • Instruction ID: 248ed728dce2b86af5651a8125ad7b100d62759f1decef41e119ab2dde6f3ea1
                        • Opcode Fuzzy Hash: 6ab009622f8be3f2c610834c7dbc1f925fc8bae6756e709d4b57b720613c73db
                        • Instruction Fuzzy Hash: AC01F678D90309EFEB50DFA8A8067ADBBF4FB04701F504066E915E62D1E3B51A81CBA1
                        APIs
                        • GetDiskFreeSpaceA.KERNEL32(?,?,00436910,009C5F98,?,?,?,?,?,00000000,?), ref: 00434D84
                        Strings
                        • d:\buildserver\wow\1\work\wow-code\branches\wow-patch-3_3_5_a-bnet\engine\source\blizzardcore\blizzardcore\source\system\memory\MemoryStorm.cpp, xrefs: 00434DCB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: DiskFreeSpace
                        • String ID: d:\buildserver\wow\1\work\wow-code\branches\wow-patch-3_3_5_a-bnet\engine\source\blizzardcore\blizzardcore\source\system\memory\MemoryStorm.cpp
                        • API String ID: 1705453755-13226479
                        • Opcode ID: 235ffd1046f24f085343563ae98a2bf7ed9693a6ef8a9400faacad9068978c54
                        • Instruction ID: d6b1e9adb3d96db3d405748de7162cae6799eeee6fe63372b47182478fee8a1f
                        • Opcode Fuzzy Hash: 235ffd1046f24f085343563ae98a2bf7ed9693a6ef8a9400faacad9068978c54
                        • Instruction Fuzzy Hash: CA3181B1500605AFC724DF55C841BEAB7F8EF88704F108A6EF45A97740E774AA488F90
                        APIs
                        • GetModuleHandleA.KERNEL32(00000000,00000800,00A592C4,00D41890,00000000,008709E9,FFFFFFFF,?,005F96D5,FFFFFFFF,00000000,005FA909), ref: 008706FC
                        • DirectInput8Create.DINPUT8(00000000,?,005F96D5,FFFFFFFF,00000000,005FA909), ref: 00870703
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CreateDirectHandleInput8Module
                        • String ID:
                        • API String ID: 805392807-0
                        • Opcode ID: 5726cda2ed94290d6134cb23a74f24e1b74b5a4e97c34a7e9443305cfaf973d1
                        • Instruction ID: 9d7079a8ce848654ca77f4c5083ca65b4a2efcd9a473688cbe958bc8c21d5901
                        • Opcode Fuzzy Hash: 5726cda2ed94290d6134cb23a74f24e1b74b5a4e97c34a7e9443305cfaf973d1
                        • Instruction Fuzzy Hash: 8BE01A38791305FBEB10DB648C86F363694F746B85F204454F208EA2D4D6B0E4809E14
                        APIs
                        • GetProcessHeap.KERNEL32(00000004,0000000C,00000001,?,00771E20,00000510,?,00CAE614,00000104,?,?,?,?,11111111), ref: 00770FC0
                        • HeapAlloc.KERNEL32(00000000,?,00771E20,00000510,?,00CAE614,00000104,?,?,?,?,11111111), ref: 00770FC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Heap$AllocProcess
                        • String ID:
                        • API String ID: 1617791916-0
                        • Opcode ID: efc29b4637c3ee19eb8215eac765c786fd7737cbfe9d82ceab1f9a737372dc10
                        • Instruction ID: 992bf65260a69c5e0cefb817fff2816940028252f5be570b7fa21189b90b073c
                        • Opcode Fuzzy Hash: efc29b4637c3ee19eb8215eac765c786fd7737cbfe9d82ceab1f9a737372dc10
                        • Instruction Fuzzy Hash: 78F01571804302DFDB20AF68D809B11B7E4AF09311F258469EA8E9B3A1D3B99880CBD4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0e4d06b4b6acfcda4dfba34dba352bfe6c9f9be1853cd65942d1ce77e37426e9
                        • Instruction ID: 80f8756704169a702ccc04824ff7481b0beb74123cd4bf3205d368f1cbe1f560
                        • Opcode Fuzzy Hash: 0e4d06b4b6acfcda4dfba34dba352bfe6c9f9be1853cd65942d1ce77e37426e9
                        • Instruction Fuzzy Hash: FB321621D69F414DDB23A674D822335A648FFB73C9F19D727F81AB5AA6EB28C5C34100
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuery
                        • String ID: external abort
                        • API String ID: 2783962273-848066739
                        • Opcode ID: 286f65de6fe2c56af043b0e8b8739e937673c5f4bd0629566d80027c28298448
                        • Instruction ID: a7e978e2f4bcfd29c2542127aaa5df9078d77e80bd22ebe54c0db48fad21d8dc
                        • Opcode Fuzzy Hash: 286f65de6fe2c56af043b0e8b8739e937673c5f4bd0629566d80027c28298448
                        • Instruction Fuzzy Hash: 05F159B9900709DFDB18CF08C888A6ABBB6FF84315F1585A9DC9A8B351D334E955CF50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ClientScreen$CreateCursorDirectHandleInput8Module
                        • String ID:
                        • API String ID: 4235201544-0
                        • Opcode ID: 2b91190527839b03c2fdca4a8a1dc19581425c0ce21003f3eda2896e6626cba3
                        • Instruction ID: 2ca9f246b124a8479e96bc49251914b2b0e6930841f7097c35c92c4aaa42d3eb
                        • Opcode Fuzzy Hash: 2b91190527839b03c2fdca4a8a1dc19581425c0ce21003f3eda2896e6626cba3
                        • Instruction Fuzzy Hash: 5552B2B1E00205EBDF15DF98C8847D97BB5FB44314F2582A8D849EB29AE731AE51CF90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 32433c3daab2241922e435a7a0c4b49acc57eeb98e95f7fb4d621572c611304a
                        • Instruction ID: b3f7cfcbda999de5ab250b322fdb97a2fd416a0b352e419bc18767558561f658
                        • Opcode Fuzzy Hash: 32433c3daab2241922e435a7a0c4b49acc57eeb98e95f7fb4d621572c611304a
                        • Instruction Fuzzy Hash: D24285B7F502198FDB08CE95DCC05D9B3F3BBD831471A916DD909E7305EA78AA468B80
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 53496a95d08954e9e7f0bce6e910805be23e8ff9573c4b2aa81eba228fc34961
                        • Instruction ID: 2daba34adda93c4dc1d2518c96b73ad840901f9a580862a61fb8012be1bb4c50
                        • Opcode Fuzzy Hash: 53496a95d08954e9e7f0bce6e910805be23e8ff9573c4b2aa81eba228fc34961
                        • Instruction Fuzzy Hash: 672295B7E5151A9BDB08CA95CC415D8B3E3BBC831471F9169C819E3305EE79BA078BC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5edac482ce17af7276291aa57b3872cb61b8fc5799521f1d8477f30bee51b26a
                        • Instruction ID: 23eed8a8c571ec95e887df51d10d9a59ef266f79bda5e3d5da3a002272c44f44
                        • Opcode Fuzzy Hash: 5edac482ce17af7276291aa57b3872cb61b8fc5799521f1d8477f30bee51b26a
                        • Instruction Fuzzy Hash: EDE18E72B041708BDB588F2ED890275B7E2AFC520174EC1A6EC59CF34EE638DA16D764
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 88f8a732e454312713937c6adbb197e44fd3e25292fceffa2f9d15dc7db96840
                        • Instruction ID: a4c7a1bd5d895a7b7b4b1ecb1fa4f242bea44e0b109ca7d0b9293c2426b31e46
                        • Opcode Fuzzy Hash: 88f8a732e454312713937c6adbb197e44fd3e25292fceffa2f9d15dc7db96840
                        • Instruction Fuzzy Hash: 42D1E672E106318B8728CF29D484529F7E5BF8832075646AEDC4ADBB85DA70EC91CBC4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: acb78d60c60803f3cca968157e3021f94224ef00b32ecd3dde12fb62507ce675
                        • Instruction ID: d348979ce07c640d980fc85970f132949040bc9177a10e73d31412404cb06f14
                        • Opcode Fuzzy Hash: acb78d60c60803f3cca968157e3021f94224ef00b32ecd3dde12fb62507ce675
                        • Instruction Fuzzy Hash: 3AF12DB6E016188FDB04CF89E8847DDB7B2BFCC308F1A85A9C849A7355D7756905CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: da06240785d481651f624763f5c1c2d04d6d579b50ee8ff51e8ab170df024852
                        • Instruction ID: 130457b15c64649e190b922145f73372ab5fbc1137016035e730921363bfa3fa
                        • Opcode Fuzzy Hash: da06240785d481651f624763f5c1c2d04d6d579b50ee8ff51e8ab170df024852
                        • Instruction Fuzzy Hash: 5A915371F923247AFB18DAB59D52FAFB664AB44B00F64802EB701FA1C0E6F46544879C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e7931973afb6dbb533dac33d2b30478ef893e81c67b91707b09636c588f0dafa
                        • Instruction ID: 99611fa2024dd3bb30237dc71f80a0d3a0fe8611b71da3af167a564ab1278c98
                        • Opcode Fuzzy Hash: e7931973afb6dbb533dac33d2b30478ef893e81c67b91707b09636c588f0dafa
                        • Instruction Fuzzy Hash: B09193313043204BDB24CE59F295BE2B3A6AF91314F1C816EDE895B342D77AEC86C760
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction ID: 57741a349a0d1fef3eeb1c91c0291c0d681225f22bbe5517f11ac085ce5ce669
                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction Fuzzy Hash: 561108B724034643D614EA6DD4B46B6A395FAD6321B2C836AD082CF7D4D232B9459708
                        APIs
                          • Part of subcall function 0077CA70: InitializeCriticalSection.KERNEL32(00CB7484,00000000,Crash,00000000,0077E0ED,00000000,0077238F), ref: 0077CA8B
                          • Part of subcall function 0077CA70: EnterCriticalSection.KERNEL32(00CB7484), ref: 0077CA96
                          • Part of subcall function 0077CA70: GetModuleHandleA.KERNEL32(dbghelp.dll), ref: 0077CAA1
                          • Part of subcall function 0077CA70: LoadLibraryA.KERNEL32(dbghelp.dll), ref: 0077CAB2
                          • Part of subcall function 0077CA70: LeaveCriticalSection.KERNEL32(00CB7484), ref: 0077CB8D
                          • Part of subcall function 0077CA70: DeleteCriticalSection.KERNEL32(00CB7484), ref: 0077CB98
                        • GetLastError.KERNEL32(-00000002), ref: 0077D89F
                        • GetCurrentProcess.KERNEL32 ref: 0077D8C8
                        • GetLastError.KERNEL32 ref: 0077D8DE
                        Strings
                        • **** Couldn't load DBGHELP.DLL, error: %d, xrefs: 0077D8A8
                        • **** Unable to gain access to the thread, error: , xrefs: 0077D9B0
                        • Showing %d/%d threads..., xrefs: 0077D938
                        • --- Thread ID: %d [Current Thread] ---, xrefs: 0077D978
                        • Crash, xrefs: 0077D860
                        • **** Unable to retrieve thread context, error: %d, xrefs: 0077DA2A
                        • Stack Trace (Using DBGHELP.DLL), xrefs: 0077D884
                        • --- Thread ID: %d ---, xrefs: 0077D97F, 0077D988
                        • **** Couldn't initialize Debug Help library, error: %d, xrefs: 0077D8E7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$ErrorLast$CurrentDeleteEnterHandleInitializeLeaveLibraryLoadModuleProcess
                        • String ID: **** Couldn't initialize Debug Help library, error: %d$**** Couldn't load DBGHELP.DLL, error: %d$**** Unable to gain access to the thread, error: $**** Unable to retrieve thread context, error: %d$--- Thread ID: %d ---$--- Thread ID: %d [Current Thread] ---$Crash$Showing %d/%d threads...$Stack Trace (Using DBGHELP.DLL)
                        • API String ID: 1004859952-3860508031
                        • Opcode ID: b1fa1012a1bbb24fe817f48088b9dfe1c49374e17ba4ae6df2512b48efc0a626
                        • Instruction ID: 7b6d630dc1aa4f8451208302427f2144c606ee417d2b68b9934fdd9f1ea36652
                        • Opcode Fuzzy Hash: b1fa1012a1bbb24fe817f48088b9dfe1c49374e17ba4ae6df2512b48efc0a626
                        • Instruction Fuzzy Hash: A3717D71904214ABCF20DF68DC89B9AB7B9FF48310F1481AAFD49A7245D7349E44CFA1
                        APIs
                        • InitializeCriticalSection.KERNEL32(00CB7484,00000000,Crash,00000000,0077E0ED,00000000,0077238F), ref: 0077CA8B
                        • EnterCriticalSection.KERNEL32(00CB7484), ref: 0077CA96
                        • GetModuleHandleA.KERNEL32(dbghelp.dll), ref: 0077CAA1
                        • LoadLibraryA.KERNEL32(dbghelp.dll), ref: 0077CAB2
                        • LeaveCriticalSection.KERNEL32(00CB7484), ref: 0077CB8D
                        • DeleteCriticalSection.KERNEL32(00CB7484), ref: 0077CB98
                        • LeaveCriticalSection.KERNEL32(00CB7484), ref: 0077CBB6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$Leave$DeleteEnterHandleInitializeLibraryLoadModule
                        • String ID: Crash$MiniDumpWriteDump$StackWalk$SymCleanup$SymEnumerateModules$SymEnumerateSymbols$SymFunctionTableAccess$SymGetLineFromAddr$SymGetModuleBase$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymSetOptions$dbghelp.dll$7k
                        • API String ID: 1892734288-1436553852
                        • Opcode ID: 6622139a114f5520e31be0ca0339ed0c9b3a54ab9567c4ba181d90ec08bdeacd
                        • Instruction ID: 50d8ecb93100ea5837bf07b295d4b82974cd2ae40806d1881a5dcbf787385bbd
                        • Opcode Fuzzy Hash: 6622139a114f5520e31be0ca0339ed0c9b3a54ab9567c4ba181d90ec08bdeacd
                        • Instruction Fuzzy Hash: 8D31D4B0685B13FFC7529F7A9C52E8A7AD4BF687927004239F408D1590EB68CD408BE8
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CrackInternet_memset
                        • String ID: <$Content-Length: %d$Content-Type: %s$Content-Type: text/html$GET$HEAD$If-Modified-Since: %s$POST$Range: bytes=%lld-%lld
                        • API String ID: 1413715105-1550339808
                        • Opcode ID: 975a229c80cef4f6737d2ee93b5879781f48d9beed6954a8c05c168c6eeaac7d
                        • Instruction ID: cb5d87d614b373674101d1f8a10deafa9f5857e3a432a11243e79febced601ed
                        • Opcode Fuzzy Hash: 975a229c80cef4f6737d2ee93b5879781f48d9beed6954a8c05c168c6eeaac7d
                        • Instruction Fuzzy Hash: 62C1E9B5A00204ABDB14DF65DC81FEEB3B9EF48304F14855AE609A7391DB38EE45CB94
                        APIs
                        • _strcpy_s.LIBCMT ref: 0040D248
                        • __invoke_watson.LIBCMT ref: 0040D259
                        • GetModuleFileNameA.KERNEL32(00000000,00B31269,00000104,?,?,00000000), ref: 0040D275
                        • _strcpy_s.LIBCMT ref: 0040D28A
                        • __invoke_watson.LIBCMT ref: 0040D29D
                        • _strlen.LIBCMT ref: 0040D2A6
                        • _strlen.LIBCMT ref: 0040D2B3
                        • __invoke_watson.LIBCMT ref: 0040D2E0
                        • _strcat_s.LIBCMT ref: 0040D2F3
                        • __invoke_watson.LIBCMT ref: 0040D304
                        • _strcat_s.LIBCMT ref: 0040D315
                        • __invoke_watson.LIBCMT ref: 0040D326
                        • GetStdHandle.KERNEL32(000000F4,?,?,00000000,006B3688,00000003,0040D3A8,000000FC,0041509C,00000001,00000000,00000000,*w,004111E2,?,00000001), ref: 0040D345
                        • _strlen.LIBCMT ref: 0040D366
                        • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000), ref: 0040D370
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $l7k
                        • API String ID: 1879448924-3670131500
                        • Opcode ID: 4b2bd5dcc293a0b00b07665290df1fbd670e408a1f4e504a2a3296b8ed346f71
                        • Instruction ID: ac9613f24ef61aef5e8cd1e166686db70265cd08fde5abaf524f873d8d8b3e60
                        • Opcode Fuzzy Hash: 4b2bd5dcc293a0b00b07665290df1fbd670e408a1f4e504a2a3296b8ed346f71
                        • Instruction Fuzzy Hash: F53148B2D002017AE62136B69D5BFBB324C9B15758F04063BFD05F22D3EA7DCA5940AE
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 0077DB55
                          • Part of subcall function 0077D710: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,00000000,?,?,?,?,0077D92D,?,00000080,?), ref: 0077D72B
                          • Part of subcall function 0077D710: Thread32First.KERNEL32(00000000,?), ref: 0077D743
                          • Part of subcall function 0077D710: GetCurrentProcessId.KERNEL32(00000004,00000000,00000000), ref: 0077D74C
                          • Part of subcall function 0077D710: Thread32Next.KERNEL32(00000000,0000001C), ref: 0077D75A
                          • Part of subcall function 0077D710: Thread32Next.KERNEL32(00000000,0000001C), ref: 0077D78A
                          • Part of subcall function 0077D710: CloseHandle.KERNEL32(00000000,00000004,00000000,00000000), ref: 0077D794
                          • Part of subcall function 0077D710: GetCurrentThreadId.KERNEL32 ref: 0077D79F
                        • OpenThread.KERNEL32(0000004A,00000000,?), ref: 0077DBB5
                        • GetCurrentThread.KERNEL32 ref: 0077DBF2
                        • SuspendThread.KERNEL32(00000000), ref: 0077DC04
                        • _memset.LIBCMT ref: 0077DC18
                        • GetThreadContext.KERNEL32(00000000,?), ref: 0077DC35
                        • ResumeThread.KERNEL32(00000000), ref: 0077DC41
                        • GetLastError.KERNEL32 ref: 0077DC4B
                        • IsBadWritePtr.KERNEL32(?,00000008), ref: 0077DCDE
                        • IsBadWritePtr.KERNEL32(?,00000008), ref: 0077DD00
                        • CloseHandle.KERNEL32(00000000), ref: 0077DD20
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Thread$Current$Thread32$CloseHandleNextWrite$ContextCreateErrorFirstLastOpenProcessResumeSnapshotSuspendToolhelp32_memset
                        • String ID: %08X %08X %04X:%08X %s$**** Unable to retrieve thread context, error: %d$--- Thread ID: %d ---$--- Thread ID: %d [Current Thread] ---$Address Frame Logical addr Module$Crash$Showing %d/%d threads...$Stack Trace (Manual)
                        • API String ID: 21015935-3065893634
                        • Opcode ID: a3923bfdf3d47dc59eea7d05dc1529e607aeac71185dc6c1dea757aad6ecc339
                        • Instruction ID: 394e2060b9b46538e334c3a506f4f8cb868b67ac493329175866c8e0248cb3df
                        • Opcode Fuzzy Hash: a3923bfdf3d47dc59eea7d05dc1529e607aeac71185dc6c1dea757aad6ecc339
                        • Instruction Fuzzy Hash: EC6160B5E40218ABCF20DF94CC85ADEB7B8FF48740F158599EA19B7240D774AE40CBA5
                        Strings
                        • InitializeStreaming - Could not initialize storage, xrefs: 0046196C
                        • (6@, xrefs: 004616B0
                        • InitializeStreaming - Failed to make absolute manifest path, xrefs: 0046179A
                        • Stream BG DL %d, xrefs: 00461A3D
                        • InitializeStreaming - Failed to get working directory, xrefs: 0046171A
                        • http://, xrefs: 0046176C
                        • (6@, xrefs: 0046173A, 0046176D, 0046178B, 004618CC
                        • InitializeStreaming - Failed to change working directory, xrefs: 0046188C
                        • InitializeStreaming - Invalid data path specified, xrefs: 0046184A
                        • InitializeStreaming - Failed to restore working directory, xrefs: 00461AC3
                        • InitializeStreaming - Could not load manifest, xrefs: 004618FF
                        • WoW.mfil, xrefs: 0046173F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID: (6@$(6@$InitializeStreaming - Could not initialize storage$InitializeStreaming - Could not load manifest$InitializeStreaming - Failed to change working directory$InitializeStreaming - Failed to get working directory$InitializeStreaming - Failed to make absolute manifest path$InitializeStreaming - Failed to restore working directory$InitializeStreaming - Invalid data path specified$Stream BG DL %d$WoW.mfil$http://
                        • API String ID: 0-3395970352
                        • Opcode ID: 826ea20281c7ff84e677dc16e152037f5ca7d095fd5af54e510da43e6f5b829d
                        • Instruction ID: b5458c856051e03416bba4df5e21e9469e989a20f3b58a7788324b06e9e9dce5
                        • Opcode Fuzzy Hash: 826ea20281c7ff84e677dc16e152037f5ca7d095fd5af54e510da43e6f5b829d
                        • Instruction Fuzzy Hash: FCC16CB1E402446BDB10DF55AC42BEFB3A4EB91708F08419FF90897362F7794A45C697
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _sprintf$Read_memset
                        • String ID: %02X %02X %02X %02X $%08X: $<can't read from this address>$=$a$r
                        • API String ID: 3774887145-4128492993
                        • Opcode ID: cb5962a9c45e91cea340465d16aa3d93c8fb910385b5a3b3f5b4bb0aa6f6fe5a
                        • Instruction ID: fc3555bd82b33dc3725468a3a06b6ea39908ab8fb1d27eb2e00718b1f36c4461
                        • Opcode Fuzzy Hash: cb5962a9c45e91cea340465d16aa3d93c8fb910385b5a3b3f5b4bb0aa6f6fe5a
                        • Instruction Fuzzy Hash: 52515D715083D4ABC7118BE98C51ABF7FF99F85704F08C46DF9989A643D2789A04D770
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00450C0C
                        • EnterCriticalSection.KERNEL32 ref: 00450C20
                        • LeaveCriticalSection.KERNEL32(00B33718), ref: 00450C3D
                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002,0045384F), ref: 00450C89
                        • GetCurrentThread.KERNEL32 ref: 00450C8C
                        • GetCurrentProcess.KERNEL32(00000000), ref: 00450C93
                        • DuplicateHandle.KERNEL32(00000000), ref: 00450C96
                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00450CA8
                        • CloseHandle.KERNEL32(00000000), ref: 00450D07
                        • LeaveCriticalSection.KERNEL32(00B33718), ref: 00450D12
                        Strings
                        • Blizzard TLS Destructor, xrefs: 00450CC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Current$CriticalSection$HandleLeaveProcessThread$CloseCreateDuplicateEnterEvent
                        • String ID: Blizzard TLS Destructor
                        • API String ID: 2067508929-2584723564
                        • Opcode ID: a368710e6a29126e7cc959e1b6bb327e29ab4b68487cbe80bf99e6b8506febd0
                        • Instruction ID: 7c175406177c6aaa138e401e7c39d0fc1c64ae88a3ad0fc2af51f5c7ef9566f4
                        • Opcode Fuzzy Hash: a368710e6a29126e7cc959e1b6bb327e29ab4b68487cbe80bf99e6b8506febd0
                        • Instruction Fuzzy Hash: CD4136B5A45304EFCB04CF48EC59B5AB7F0FB44B05F24816EE40A9B361DB799946CB80
                        APIs
                        • GetModuleHandleA.KERNEL32(ntdll.dll,LdrUnloadDll,?,?,?,?,0041C7E5,kernel32.dll,WriteConsoleW,00B2EDB8,0041CE95), ref: 0041CC20
                        • InterlockedExchange.KERNEL32(?,?), ref: 0041CC9C
                        • LoadLibraryA.KERNEL32(?,?,?,?,?,0041C7E5,kernel32.dll,WriteConsoleW,00B2EDB8,0041CE95), ref: 0041CCBE
                        • LoadLibraryA.KERNEL32(security.dll,?,?,?,?,0041C7E5,kernel32.dll,WriteConsoleW,00B2EDB8,0041CE95), ref: 0041CCD1
                        • InterlockedExchange.KERNEL32(00000001,00000000), ref: 0041CCD7
                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,0041C7E5,kernel32.dll,WriteConsoleW,00B2EDB8,0041CE95), ref: 0041CCE2
                        • InterlockedExchange.KERNEL32(00AB79B4,00000000), ref: 0041CD0F
                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,0041C7E5,kernel32.dll,WriteConsoleW,00B2EDB8,0041CE95), ref: 0041CD1A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Library$ExchangeInterlocked$FreeLoad$HandleModule
                        • String ID: LdrUnloadDll$ntdll.dll$security.dll
                        • API String ID: 3965272021-4032047154
                        • Opcode ID: 6127439045bd31ece458a120f4773ff9cdcad21a4088e822ee0c567b0b27c409
                        • Instruction ID: 0798b405da647302b3fafe83feb89deaae7210be7f7a5444b15aefb1757fdc64
                        • Opcode Fuzzy Hash: 6127439045bd31ece458a120f4773ff9cdcad21a4088e822ee0c567b0b27c409
                        • Instruction Fuzzy Hash: 7D31F7312C52069BC7218F69AC856FB3BA9EB95351B040127E94983360F779CCC1E7E4
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,Crash), ref: 007711E5
                        • CreateDirectoryA.KERNEL32(?,00000000,?,Errors\,00000104,?,?,00000104), ref: 0077122F
                        • GetLastError.KERNEL32 ref: 00771239
                        • GetFileAttributesA.KERNEL32(?), ref: 0077124C
                        • _sprintf.LIBCMT ref: 00771290
                        • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000,?,?,00000104), ref: 007712BC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: File$Create$AttributesDirectoryErrorLastModuleName_sprintf
                        • String ID: %04d-%02d-%02d %02d.%02d.%02d %s.%s$Crash$Errors\$l7k
                        • API String ID: 2514545036-3400744642
                        • Opcode ID: d4a9794f09c916f442dca0e4e13d975718cc9159904510ee1b5bbe4e1b407c80
                        • Instruction ID: dae42cd90dfcbb28128b2466fc861f25400eb9351849c1b851a5f0b1370a6797
                        • Opcode Fuzzy Hash: d4a9794f09c916f442dca0e4e13d975718cc9159904510ee1b5bbe4e1b407c80
                        • Instruction Fuzzy Hash: 99310670244214BBEB209F94DC9AFFBB369BF48700F008515FE59951C2E7BCAA8087B5
                        APIs
                        • InterlockedIncrement.KERNEL32(00CB749C), ref: 0077E051
                        • GetCurrentThreadId.KERNEL32 ref: 0077E062
                        • GetModuleHandleA.KERNEL32(psapi.dll,?,?,007723D9,00000000,?,00000001,?), ref: 0077E082
                        • LoadLibraryA.KERNEL32(psapi.dll,?,?,007723D9,00000000,?,00000001,?), ref: 0077E091
                        • CreateThread.KERNEL32(00000000,00000000,0077DF40,?,00000000,?), ref: 0077E0A8
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,007723D9,00000000,?,00000001,?), ref: 0077E0B7
                        • CloseHandle.KERNEL32(00000000,?,?,007723D9,00000000,?,00000001,?), ref: 0077E0BE
                        • InterlockedDecrement.KERNEL32(00CB749C), ref: 0077E0CD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: HandleInterlockedThread$CloseCreateCurrentDecrementIncrementLibraryLoadModuleObjectSingleWait
                        • String ID: .8k$psapi.dll
                        • API String ID: 2955480788-2202553288
                        • Opcode ID: 228f1f8ee0215a3ff24e09fed642ddbc01cb94243765606f5a8b2ba188a83f56
                        • Instruction ID: 67286457fe6e45f046bce30e4147aab6284b9ab6759be8fa9cb14094b072bfb7
                        • Opcode Fuzzy Hash: 228f1f8ee0215a3ff24e09fed642ddbc01cb94243765606f5a8b2ba188a83f56
                        • Instruction Fuzzy Hash: 0B110675945204AF8F10DFA4EC098EEBBB4FF88710B108166F926E3250D7305941CFA0
                        APIs
                        • _strrchr.LIBCMT ref: 0081C3C9
                          • Part of subcall function 0076E540: _calloc.LIBCMT ref: 0076E557
                        • _strrchr.LIBCMT ref: 0081C655
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _strrchr$_calloc
                        • String ID: .\M2Cache.cpp$.m2$.mdl$.mdx$Model2: File not found: %s$Model2: Invalid file extension: %s$delete
                        • API String ID: 219155012-2904044663
                        • Opcode ID: 570956851acff1d11f4d62377e5385848c49cdd1ec261d9ab728d12fadf74bbe
                        • Instruction ID: fc396ab2f2db8ce8be36bf6b150f07ed3af54e6386837601080eaf7857410d39
                        • Opcode Fuzzy Hash: 570956851acff1d11f4d62377e5385848c49cdd1ec261d9ab728d12fadf74bbe
                        • Instruction Fuzzy Hash: F2A17C72B402099BCB20CE69D8517FAB7ADFF94310F5441ADE949DB281EB31AD94C790
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID: Error loading texure file "%s": unsupported image format$TextureLoadImage() blocking load: %s.$dataFormat$filename$height$width
                        • API String ID: 3213747228-550823336
                        • Opcode ID: 1289b4da69732e3a58d44a31ba44fa7aef4a14513f7290b8a0a1aacab685ab43
                        • Instruction ID: a90e31122d77018d11ac63467a7595bdac199484c7a1d3f110cd970d251bb25d
                        • Opcode Fuzzy Hash: 1289b4da69732e3a58d44a31ba44fa7aef4a14513f7290b8a0a1aacab685ab43
                        • Instruction Fuzzy Hash: 2F51C57590020CABDB14CE58DC82FEB77ACEB88714F14419EFD0597381DAB99E44CBA5
                        APIs
                        • InterlockedIncrement.KERNEL32(00ADE858), ref: 00771B89
                        • InitializeCriticalSection.KERNEL32(00CAD808,?,00406D14,Function_000034F0,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 00771B9E
                        • InitializeCriticalSection.KERNEL32(00CAD7EC,?,00406D14,Function_000034F0,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 00771BA5
                        • InterlockedDecrement.KERNEL32(00ADE858), ref: 00771BAE
                        • EnterCriticalSection.KERNEL32(00CAD808,?,00406D14,Function_000034F0,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 00771BB9
                        • GetProcessHeap.KERNEL32(00000004,0000000C,?,00406D14,Function_000034F0,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 00771BC3
                        • HeapAlloc.KERNEL32(00000000,?,00406D14,Function_000034F0,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 00771BCA
                        • LeaveCriticalSection.KERNEL32(00CAD808,00000000,00000001,00000000,?,00406D14,Function_000034F0,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A), ref: 00771C0A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$HeapInitializeInterlocked$AllocDecrementEnterIncrementLeaveProcess
                        • String ID: .8k
                        • API String ID: 845503538-7190227
                        • Opcode ID: 7a5238924dca917e51f3f4b8e20a8d7a06eee4e404ccb6a97a50fd6de0216f3a
                        • Instruction ID: 280a2d1eda099a3464e959732e1a0b1cbc9f044f8e65a3fa3b76bc7789972469
                        • Opcode Fuzzy Hash: 7a5238924dca917e51f3f4b8e20a8d7a06eee4e404ccb6a97a50fd6de0216f3a
                        • Instruction Fuzzy Hash: 4301A775695302AFDB106FF5DC1AB5A7FA4EB45740F40C43BF617CB6A0DAB48480AB90
                        APIs
                          • Part of subcall function 0077D310: _memset.LIBCMT ref: 0077D336
                          • Part of subcall function 0077D310: GetCurrentProcess.KERNEL32(0077DAC8,?,0077DAC8,?,00000000), ref: 0077D356
                          • Part of subcall function 0077D310: _memset.LIBCMT ref: 0077D3DA
                          • Part of subcall function 0077D310: GetCurrentProcess.KERNEL32(0077DAC8,0077DAC8,?), ref: 0077D408
                          • Part of subcall function 0077D310: GetCurrentProcess.KERNEL32(0077DAC8,0077DAC8,?,?,?,00000100), ref: 0077D454
                          • Part of subcall function 0077D310: _strncpy.LIBCMT ref: 0077D473
                        • GetLastError.KERNEL32(?,?,?,0077DAC8,00000000), ref: 0077D528
                        • GetLastError.KERNEL32(?,?,?,0077DAC8,00000000), ref: 0077D54C
                        • GetLastError.KERNEL32(?,?,?,0077DAC8,00000000), ref: 0077D570
                        Strings
                        • %08X %-12s %s+%d (0x%08X,0x%08X,0x%08X,0x%08X), xrefs: 0077D5A6, 0077D5D6
                        • **** SymGetModuleInfo() failed, error: %d, xrefs: 0077D53B
                        • **** SymGetLineFromAddr() failed, error: %d, xrefs: 0077D55F
                        • %08X %-12s %s+%d (0x%08X,0x%08X,0x%08X,0x%08X) (%s,%d), xrefs: 0077D59F
                        • **** SymGetSymFromAddr() failed, error: %d, xrefs: 0077D583
                        • %08X %-12s %s+%d, xrefs: 0077D5F5, 0077D618
                        • %08X %-12s %s+%d (%s,%d), xrefs: 0077D5EE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CurrentErrorLastProcess$_memset$_strncpy
                        • String ID: %08X %-12s %s+%d$%08X %-12s %s+%d (%s,%d)$%08X %-12s %s+%d (0x%08X,0x%08X,0x%08X,0x%08X)$%08X %-12s %s+%d (0x%08X,0x%08X,0x%08X,0x%08X) (%s,%d)$**** SymGetLineFromAddr() failed, error: %d$**** SymGetModuleInfo() failed, error: %d$**** SymGetSymFromAddr() failed, error: %d
                        • API String ID: 1843923062-2785283178
                        • Opcode ID: 5959456d57ef70d8f3caa4ea295b42e32142b3079d09c947bea72a00e454bc52
                        • Instruction ID: 92584ae2c17fd859cb64a885ff9da89b9c5f79480877cc23fc2ee17337c711d7
                        • Opcode Fuzzy Hash: 5959456d57ef70d8f3caa4ea295b42e32142b3079d09c947bea72a00e454bc52
                        • Instruction Fuzzy Hash: C0414DB1600208BBDB24CF98DC89FEF7779EF88714F14C559FA0A96141D634AE64CBA0
                        APIs
                        • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,00000000,00020006,00000000,?,?,00000000,?,00000104,?), ref: 0077060B
                        • RegSetValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?), ref: 0077068C
                        • RegFlushKey.ADVAPI32(?), ref: 007706DD
                        • RegCloseKey.ADVAPI32(?), ref: 007706ED
                        • RegCloseKey.ADVAPI32(?), ref: 00770705
                        • SetLastError.KERNEL32(00000000), ref: 0077070C
                        Strings
                        • Software\Blizzard Entertainment\, xrefs: 007705AD
                        • Software\Battle.net\, xrefs: 0077059F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Close$CreateErrorFlushLastValue
                        • String ID: Software\Battle.net\$Software\Blizzard Entertainment\
                        • API String ID: 432849994-275565298
                        • Opcode ID: 6fb4d6d85785b045e9ad0a2c555d2039662dcf8ea8dde04fdfd26684ed8de4c5
                        • Instruction ID: c1a16a8d255b831f2c48b5bb94b80b117b1d8ef10864471e2326302df5e1cdc1
                        • Opcode Fuzzy Hash: 6fb4d6d85785b045e9ad0a2c555d2039662dcf8ea8dde04fdfd26684ed8de4c5
                        • Instruction Fuzzy Hash: EA418575650218FBEF34CB50DC96FEA3378AB49750F108658BA09A71C0D7B8AE44DBE0
                        APIs
                        • _memset.LIBCMT ref: 0077D336
                        • GetCurrentProcess.KERNEL32(0077DAC8,?,0077DAC8,?,00000000), ref: 0077D356
                        • _memset.LIBCMT ref: 0077D3DA
                        • GetCurrentProcess.KERNEL32(0077DAC8,0077DAC8,?), ref: 0077D408
                        • GetCurrentProcess.KERNEL32(0077DAC8,0077DAC8,?,?,?,00000100), ref: 0077D454
                        • _strncpy.LIBCMT ref: 0077D473
                          • Part of subcall function 0077CE70: _strrchr.LIBCMT ref: 0077CE76
                          • Part of subcall function 0077CE70: _strrchr.LIBCMT ref: 0077CE87
                          • Part of subcall function 0077CE70: _strrchr.LIBCMT ref: 0077CE9C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CurrentProcess_strrchr$_memset$_strncpy
                        • String ID: <unknown module>$<unknown symbol>
                        • API String ID: 2095339858-4143156116
                        • Opcode ID: 34175cfaf853627ec847c0897374cf373290a528a3d1c59e595d9591f3656c54
                        • Instruction ID: ede8356bdbe2f439d39eee18b2c5209d50ac8d9154afa597001e02f730da046f
                        • Opcode Fuzzy Hash: 34175cfaf853627ec847c0897374cf373290a528a3d1c59e595d9591f3656c54
                        • Instruction Fuzzy Hash: 435138B5904248DFDB11DF68D885BDABBF8FF49314F148199E808AB351D774AA40CFA0
                        APIs
                        • LoadLibraryA.KERNEL32(00000002), ref: 0041CA6A
                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041CA8C
                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0041CAA4
                        • GetModuleFileNameA.KERNEL32(?,?,00000104,00000001), ref: 0041CAC9
                        • GetModuleHandleA.KERNEL32(00000000,?,00000104), ref: 0041CADE
                        • GetModuleFileNameA.KERNEL32(00000000), ref: 0041CAE5
                          • Part of subcall function 0041C8C9: CompareStringA.KERNEL32(00000409,00000001,?,000000FF,?,000000FF,?,0041CB95,?,?,?,?,?,?,?,?), ref: 0041C8DF
                        • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041CBE5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Module$DirectoryFileLibraryName$CompareFreeHandleLoadStringSystemWindows
                        • String ID: l7k
                        • API String ID: 3624046510-4109104050
                        • Opcode ID: af3ef4156148dea70581d5904d0f96d423bb939b6559b7e21a3e94bec1139a66
                        • Instruction ID: ba4701c06416e035fca677cc10eaaa7b8eeedd528b07888be5a1b5f35a94c018
                        • Opcode Fuzzy Hash: af3ef4156148dea70581d5904d0f96d423bb939b6559b7e21a3e94bec1139a66
                        • Instruction Fuzzy Hash: 6751827298416D9ACB21DBA4DCD5AEB77BCAF19344F0041E6E549E3201E634EBC88F54
                        APIs
                        • InterlockedExchange.KERNEL32(00011482,00000001), ref: 008E4F5C
                        • Sleep.KERNEL32(00000001,?,008D2029,008E5414,000000FF,?,008E5414,00000000,?,?,0087C50A,?,?,?,008D146F,0087C50A), ref: 008E4F63
                        • InterlockedExchange.KERNEL32(00011482,00000001), ref: 008E4F71
                        • ResetEvent.KERNEL32(00011486,?,008D2029,008E5414,000000FF,?,008E5414,00000000,?,?,0087C50A,?,?,?,008D146F,0087C50A), ref: 008E4F87
                        • InterlockedExchange.KERNEL32(00011482,00000000), ref: 008E4F96
                        • WaitForSingleObject.KERNEL32(00000000,?,?,008D2029,008E5414,000000FF,?,008E5414,00000000,?,?,0087C50A,?,?,?,008D146F), ref: 008E4F9F
                        • InterlockedExchange.KERNEL32(00011482,00000000), ref: 008E4FBE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ExchangeInterlocked$EventObjectResetSingleSleepWait
                        • String ID: 89k
                        • API String ID: 67365806-31283280
                        • Opcode ID: 0f8fc8eda861889955d77150c1ff238ea1bd4712e92df3e15ca0cb8b43ec6594
                        • Instruction ID: 4bfc8095fa583484776a0aaea2c97b5907674f49a0d807c45ec1b0167897aa52
                        • Opcode Fuzzy Hash: 0f8fc8eda861889955d77150c1ff238ea1bd4712e92df3e15ca0cb8b43ec6594
                        • Instruction Fuzzy Hash: 5E1108762003055BE7109B6ADC84E52F3ECFF84334B14852AFA5AD7250C635FC818F20
                        APIs
                        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,00AAF2B0,0000000C,0040DF68,00000000,00000000,?,?,00000000), ref: 0040DE68
                        • InterlockedIncrement.KERNEL32(00AB6BD0), ref: 0040DECE
                        • __lock.LIBCMT ref: 0040DED6
                        • ___addlocaleref.LIBCMT ref: 0040DEF5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: HandleIncrementInterlockedModule___addlocaleref__lock
                        • String ID: .8k$DecodePointer$EncodePointer$KERNEL32.DLL
                        • API String ID: 2801583907-2026239226
                        • Opcode ID: 86e4911a1d643e921abac7d0b7299ceb13e74087765f15d4ede9ded016745879
                        • Instruction ID: b29c56c5404c714b88aae89ce81279eee8bc1568ad8336ecb621f51bf5eb361e
                        • Opcode Fuzzy Hash: 86e4911a1d643e921abac7d0b7299ceb13e74087765f15d4ede9ded016745879
                        • Instruction Fuzzy Hash: 0C118271944701AFD711DFBAC80679ABBE0BF54318F00892EE8A5A73D1CBB89944CF54
                        APIs
                        • InterlockedIncrement.KERNEL32(00ADE858), ref: 00771969
                        • InitializeCriticalSection.KERNEL32(00CAD808,?,?,0040350A,?,00000104), ref: 0077197E
                        • InitializeCriticalSection.KERNEL32(00CAD7EC,?,?,0040350A,?,00000104), ref: 00771985
                        • InterlockedDecrement.KERNEL32(00ADE858), ref: 0077198E
                        • EnterCriticalSection.KERNEL32(00CAD808,?,?,0040350A,?,00000104), ref: 00771999
                        • LeaveCriticalSection.KERNEL32(00CAD808,?,?,0040350A,?,00000104), ref: 007719C6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$InitializeInterlocked$DecrementEnterIncrementLeave
                        • String ID: 5@$.8k
                        • API String ID: 3329029089-3844348367
                        • Opcode ID: afd833dcda9e4d141b9c107e98065267fa48542964bc0edb7eb94ac8178a25e2
                        • Instruction ID: 7eec12bb11f87fc31e8b4a8b6fdfab8c5aaa27f897fb1ccb8ed9ad7a351a0076
                        • Opcode Fuzzy Hash: afd833dcda9e4d141b9c107e98065267fa48542964bc0edb7eb94ac8178a25e2
                        • Instruction Fuzzy Hash: 39F02E393C4355B7CB007BE8BC1AA997F58EB45794B404033BB4787AD0CAAC6880DBE0
                        APIs
                        • InterlockedIncrement.KERNEL32(00ADE858), ref: 00771808
                        • InitializeCriticalSection.KERNEL32(00CAD808,?,?,008889C0,00000000,00000000,?,0050ADA2,009E14FF,009E14FF,00000000,00000003,?,00401376,?,00000000), ref: 0077181E
                        • InitializeCriticalSection.KERNEL32(00CAD7EC,?,008889C0,00000000,00000000,?,0050ADA2,009E14FF,009E14FF,00000000,00000003,?,00401376,?,00000000,00000000), ref: 00771825
                        • InterlockedDecrement.KERNEL32(00ADE858), ref: 0077182F
                        • EnterCriticalSection.KERNEL32(00CAD808,?,008889C0,00000000,00000000,?,0050ADA2,009E14FF,009E14FF,00000000,00000003,?,00401376,?,00000000,00000000), ref: 0077183A
                        • GetCurrentThreadId.KERNEL32 ref: 00771851
                        • LeaveCriticalSection.KERNEL32(00CAD808,?,008889C0,00000000,00000000,?,0050ADA2,009E14FF,009E14FF,00000000,00000003,?,00401376,?,00000000,00000000), ref: 00771861
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$InitializeInterlocked$CurrentDecrementEnterIncrementLeaveThread
                        • String ID: .8k
                        • API String ID: 1559281605-7190227
                        • Opcode ID: 2b8fbadd1ef8647d1cb5138defb3f121b84bf965b12324a84df2a04c79502bcd
                        • Instruction ID: 2a7d71216699cbbe787dc4c0cefbe73d3479c16fa81e97c76f22971456fe7ebf
                        • Opcode Fuzzy Hash: 2b8fbadd1ef8647d1cb5138defb3f121b84bf965b12324a84df2a04c79502bcd
                        • Instruction Fuzzy Hash: 51F089395D5205AB8B00BFA8AC1A58C3FB4FA597653404037F51783A90DA784080ABD5
                        APIs
                        • lstrcpynA.KERNEL32(?,<unknown>,00000104,00000000,?,?,?,?,0077DCB6,?,00000104,?,?), ref: 0077D227
                        • VirtualQuery.KERNEL32(?,?,0000001C,?,?,?,?,0077DCB6,?,00000104,?,?), ref: 0077D246
                        • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,0077DCB6,?,00000104,?,?), ref: 0077D25D
                        • GetModuleFileNameA.KERNEL32(?,?,00000104,?,?,?,?,?,0077DCB6,?,00000104,?,?), ref: 0077D26B
                        • lstrcpynA.KERNEL32(?,<unknown>,00000104,?,?,?,?,0077DCB6,?,00000104,?,?), ref: 0077D27F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Modulelstrcpyn$FileHandleNameQueryVirtual
                        • String ID: <unknown>$l7k
                        • API String ID: 3737176529-3108756107
                        • Opcode ID: 60f91d6f10a7ee45235500d301f9a1a942e3fdb4996e94bb5adecda9c604ae57
                        • Instruction ID: 154de44304d6026c44cfe5075247f5b7f0806b1c6ca93b8caa02e2bb27c64d48
                        • Opcode Fuzzy Hash: 60f91d6f10a7ee45235500d301f9a1a942e3fdb4996e94bb5adecda9c604ae57
                        • Instruction Fuzzy Hash: 5D31A476B012189FCF20CF99DC84AAEB7B9FF88791B148169E909D7251D774EC42C7A0
                        APIs
                        • InterlockedIncrement.KERNEL32(00ADE858), ref: 00771898
                        • InitializeCriticalSection.KERNEL32(00CAD808,00000001,?,00406CF9,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 007718AE
                        • InitializeCriticalSection.KERNEL32(00CAD7EC,?,00406CF9,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 007718B5
                        • InterlockedDecrement.KERNEL32(00ADE858), ref: 007718BF
                        • EnterCriticalSection.KERNEL32(00CAD808,?,00406CF9,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 007718CA
                        • LeaveCriticalSection.KERNEL32(00CAD808,00CAD838,?,00000080,?,00406CF9,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?), ref: 007718E8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$InitializeInterlocked$DecrementEnterIncrementLeave
                        • String ID: .8k
                        • API String ID: 3329029089-7190227
                        • Opcode ID: 91bfc97ba02fb628c183fc670a97648eb092360680f87640ae8951cab84580e1
                        • Instruction ID: d2dbb5d663ea324d1376ea05e969085ba8a222cc4a938a0f0c5319fa2cd85b3e
                        • Opcode Fuzzy Hash: 91bfc97ba02fb628c183fc670a97648eb092360680f87640ae8951cab84580e1
                        • Instruction Fuzzy Hash: 9CE092393D5306B79900BBE8AC1BDDD3B68EB95B557404033BB17929D08AD81480A7A6
                        APIs
                        • InterlockedIncrement.KERNEL32(00ADE858), ref: 00770FF8
                        • InitializeCriticalSection.KERNEL32(00CAD808,00000001,?,00771E04,00CAD808,00CAE614,00000104,?,?,?,?,11111111), ref: 0077100E
                        • InitializeCriticalSection.KERNEL32(00CAD7EC,?,00771E04,00CAD808,00CAE614,00000104,?,?,?,?,11111111), ref: 00771015
                        • EnterCriticalSection.KERNEL32(00771E04,00771E04,00CAD808,00CAE614,00000104,?,?,?,?,11111111), ref: 0077101C
                        • InterlockedDecrement.KERNEL32(00ADE858), ref: 00771029
                        • EnterCriticalSection.KERNEL32(00771E04,?,00771E04,00CAD808,00CAE614,00000104,?,?,?,?,11111111), ref: 00771033
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterInitializeInterlocked$DecrementIncrement
                        • String ID: .8k
                        • API String ID: 4239887445-7190227
                        • Opcode ID: 0d66f6234817c7c63cf175fa1b08466e5142c29f320de727f6f1a48fc79e62b5
                        • Instruction ID: 4feaf041aa73dc3d93733aed1c920bfff83e13c95fb82e096e3a975d6bf50f67
                        • Opcode Fuzzy Hash: 0d66f6234817c7c63cf175fa1b08466e5142c29f320de727f6f1a48fc79e62b5
                        • Instruction Fuzzy Hash: BAE04F396D5219B78E00AFE9FC1E8D93F6CEA487653004423FA1BC3650CBB49580ABA1
                        APIs
                        • InterlockedIncrement.KERNEL32(00ADE858), ref: 00771908
                        • InitializeCriticalSection.KERNEL32(00CAD808,00000001,?,00406D03,Function_00004B80,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 0077191E
                        • InitializeCriticalSection.KERNEL32(00CAD7EC,?,00406D03,Function_00004B80,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 00771925
                        • InterlockedDecrement.KERNEL32(00ADE858), ref: 0077192F
                        • EnterCriticalSection.KERNEL32(00CAD808,?,00406D03,Function_00004B80,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 0077193A
                        • LeaveCriticalSection.KERNEL32(00CAD808,?,00406D03,Function_00004B80,World of WarCraft (build 12340),World of Warcraft\Client,SendErrorLogs,00000000,?,0000000B,?,00000004,0000000A,?,00000004), ref: 0077194D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$InitializeInterlocked$DecrementEnterIncrementLeave
                        • String ID: .8k
                        • API String ID: 3329029089-7190227
                        • Opcode ID: b5d14185ac1caa1745f2da84b1aad1811fdecd1b17235407d904bcd051ef9545
                        • Instruction ID: 7c438ec0bc004b1b2044af97d44e9450fb3e1b7ce28ae2c2dc477fcb8a61f442
                        • Opcode Fuzzy Hash: b5d14185ac1caa1745f2da84b1aad1811fdecd1b17235407d904bcd051ef9545
                        • Instruction Fuzzy Hash: 6FE0D8396D5306B74B00BFE8AC1B8CC3F74EA5AB553404033F717C3A90DAA45080ABD1
                        APIs
                        • InterlockedIncrement.KERNEL32(00CB749C), ref: 0077DE3B
                        • _memset.LIBCMT ref: 0077DE72
                        • GetLocalTime.KERNEL32(007710B0), ref: 0077DED4
                        • _memset.LIBCMT ref: 0077DF0D
                        • InterlockedDecrement.KERNEL32(00CB749C), ref: 0077DF2D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Interlocked_memset$DecrementIncrementLocalTime
                        • String ID: .8k
                        • API String ID: 921610498-7190227
                        • Opcode ID: c7b9f5c7af8ba6aeadc077e92d8a9ad2dd965e4f1dc1d84527b82743bec5a5db
                        • Instruction ID: e2c41bd5712698e833eb42466d596258459a5c5711a7736199b78654a848497d
                        • Opcode Fuzzy Hash: c7b9f5c7af8ba6aeadc077e92d8a9ad2dd965e4f1dc1d84527b82743bec5a5db
                        • Instruction Fuzzy Hash: D731F461A403486ADF32AA949C4AFFF3778AF517C4F084018FD0C661C1E7A8AD44C6A1
                        APIs
                        • ResetEvent.KERNEL32(00000002,00000008,00000000,?,00774544,00000000,00000000,00000000,?,00774DC7,00000001,00000002,005242B9,00000000,00B41670), ref: 00774468
                        • Sleep.KERNEL32(00000000,00000008,00000008,00000000,?,00774544,00000000,00000000,00000000,?,00774DC7,00000001,00000002,005242B9,00000000,00B41670), ref: 007744E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: EventResetSleep
                        • String ID: 89k$IFreeEvent: too many %s event frees$SUAREVTYPE$SUMREVTYPE
                        • API String ID: 1751251717-1645541761
                        • Opcode ID: d5c1bc7f4a683cad8834c6ff7c9353d8d906d3aa71c1ba439a3d6bcb9730168c
                        • Instruction ID: 5b6fe33290675041f4cba70a1436955496c5018d00e8b5ae4fdc02ab33742b58
                        • Opcode Fuzzy Hash: d5c1bc7f4a683cad8834c6ff7c9353d8d906d3aa71c1ba439a3d6bcb9730168c
                        • Instruction Fuzzy Hash: 3E113633A013718FCB158A58EC44B95739AEBD2794F098131EA09CB314DB38DD0196E1
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 007700CD
                        • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00770388,00000000,0076FEF0,00000000,00000000,00000000,0000000C,.\W32\SThread.cpp,00000055,00000000), ref: 00770110
                        • CreateThread.KERNEL32(00000000,?,0076FF30,00000000,00000000,?), ref: 00770150
                        • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00770388,00000000,0076FEF0,00000000,00000000,00000000,0000000C,.\W32\SThread.cpp,00000055,00000000), ref: 007701AF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalLeaveSectionThread$CreateCurrent
                        • String ID: .\W32\SThread.cpp$main
                        • API String ID: 3911777484-1209113557
                        • Opcode ID: ce58be8bf823fa4f4c47f987d3031ed2409654e16dc873d23206e3a2a4fe245a
                        • Instruction ID: 29ee6d3b4b21fec80c9b9c38f172a32cc5834704e2e08aaae833071e6d911386
                        • Opcode Fuzzy Hash: ce58be8bf823fa4f4c47f987d3031ed2409654e16dc873d23206e3a2a4fe245a
                        • Instruction Fuzzy Hash: 9731ADB5604314DFD714CF14D8A5AAA7BE9FB96748B00852EFA0BC7351D7B4A840CFA0
                        APIs
                        • EnterCriticalSection.KERNEL32(00CB732C,00000000,?), ref: 00775416
                        • LeaveCriticalSection.KERNEL32(00CB732C,00000000,00000008,00000104,?,00CB7228,00000104), ref: 00775442
                        • GetModuleHandleA.KERNEL32(00000000,?,00000104), ref: 0077544F
                        • GetModuleFileNameA.KERNEL32(00000000), ref: 00775456
                        • LeaveCriticalSection.KERNEL32(00CB732C,?,00000008,00000104,?,009E4F88,00000104), ref: 00775487
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$LeaveModule$EnterFileHandleName
                        • String ID: l7k
                        • API String ID: 411475927-4109104050
                        • Opcode ID: b13ec85bb4dc81e18cf76ec0847aadb5ca6de11b592161debd2182cf8c58aeed
                        • Instruction ID: 16136ac3eda5da6cbc77ffa33ff470dadc03fae0964708c98bc423407ee0afc9
                        • Opcode Fuzzy Hash: b13ec85bb4dc81e18cf76ec0847aadb5ca6de11b592161debd2182cf8c58aeed
                        • Instruction Fuzzy Hash: 8C01C06568D390BAEF2123357C4FFAB2A9C8B92782F0C4164FD06A0192D79C98849172
                        APIs
                        • InternetConnectA.WININET(?,?,00000000,00000000,00000000,00000003,00000000,?), ref: 0042CDE3
                        • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,00000003,00000000,?,00462E98,00000000,?,0045158E,00000000,?,?,00000000), ref: 0042CDEF
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00000000,00000000,00000003,00000000,?,00462E98,00000000,?,0045158E,00000000,?), ref: 0042CE08
                        • InternetSetOptionA.WININET(00000000,00000002,?,00000004), ref: 0042CE2A
                        • InternetSetOptionA.WININET(00000000,00000006,?,00000004), ref: 0042CE35
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Internet$Option$ConnectErrorLastObjectSingleWait
                        • String ID: >Ak
                        • API String ID: 1775512703-3803633436
                        • Opcode ID: add00070dcdd40b5f824e1acb10e7a371390ad5973d93460551d3c586fc68a59
                        • Instruction ID: 78cfa1b1b5bbac4effdadac3a716893f1c5cf8aa38f73af8458577a0e05078e6
                        • Opcode Fuzzy Hash: add00070dcdd40b5f824e1acb10e7a371390ad5973d93460551d3c586fc68a59
                        • Instruction Fuzzy Hash: 7E018475340218BBE710DFA8DC45F9A7769EF88760F108216FA19DB6D0D7B0E9408BD0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID:
                        • API String ID: 4168288129-0
                        • Opcode ID: 44f4585b87e09c3a463c5eae916921ce4d6e92acc8550b44e82411806e1a3b90
                        • Instruction ID: 9a2f86a35311a59be6ebd9f9e53b57846c3214af61e4ea0711390cf549c8ae35
                        • Opcode Fuzzy Hash: 44f4585b87e09c3a463c5eae916921ce4d6e92acc8550b44e82411806e1a3b90
                        • Instruction Fuzzy Hash: F6919970E0510ADFDB00AF91EA8A2EEBF71FF80301FA24594D08576099D73159B5DF9A
                        APIs
                        • OpenFileMappingA.KERNEL32(00000000,00000000,?), ref: 008E4E45
                        • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000014,00000000), ref: 008E4E62
                        • GetLastError.KERNEL32 ref: 008E4E73
                        • MapViewOfFile.KERNEL32(?,00000002,00000000,00000000,00000000), ref: 008E4E87
                        • InterlockedExchange.KERNEL32(00000000,00000001), ref: 008E4EC5
                        • Sleep.KERNEL32(00000000), ref: 008E4EE3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: File$Mapping$CreateErrorExchangeInterlockedLastOpenSleepView
                        • String ID:
                        • API String ID: 1953592740-0
                        • Opcode ID: f2bd1c0e955f26f90b9d82fcff2d319ceb5e2228b478a2bc219f0f239a54d8be
                        • Instruction ID: 328b3a0f3961d5d030a1e42317e697c470422ca6e321366c23f49e8127ad5013
                        • Opcode Fuzzy Hash: f2bd1c0e955f26f90b9d82fcff2d319ceb5e2228b478a2bc219f0f239a54d8be
                        • Instruction Fuzzy Hash: BC217F75645305DBE720CF19DC45B96B3A4FB89721F10856AFA5DDB2E0D3B0A880CB90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: .?AVCImVector@NTempest@@$DNClouds0$DNClouds1
                        • API String ID: 2102423945-2462753906
                        • Opcode ID: 3d32031310715f9ebb91cedd14f1008073a89b9c68cced3934a05844cebb3fe1
                        • Instruction ID: 1c7860408f46c714977d5f383f8d96e1fdfd4f0e2b5483d860d85a76d79ac699
                        • Opcode Fuzzy Hash: 3d32031310715f9ebb91cedd14f1008073a89b9c68cced3934a05844cebb3fe1
                        • Instruction Fuzzy Hash: 6F516CB4600704AFD724DF69CD82E67B7F9BB48344B804A2EF59AC7B41E674BC458B60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: %s%s$arena%d$arenapet%d$cleared
                        • API String ID: 2102423945-2036640561
                        • Opcode ID: 671896430e473cf5bb66376c2968c7e18f3b0f6bdaab8c512c01cdee753041a7
                        • Instruction ID: 49320915bbd25b9f3e7bb7f4b0416a31c57b7bd0f6a399abe25caaa4fb58f2fa
                        • Opcode Fuzzy Hash: 671896430e473cf5bb66376c2968c7e18f3b0f6bdaab8c512c01cdee753041a7
                        • Instruction Fuzzy Hash: CD511BB1D013849EC710DF6AECC16A9BFF8F758314B41466EE509AB2A1DB702944CF92
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _strncpy
                        • String ID: ...$[string "
                        • API String ID: 2961919466-3942789791
                        • Opcode ID: a0856ce2d5a2b49b7768279e8f803a090a6a2493d4299c7d42d0aaeab564a7c5
                        • Instruction ID: 2b83af826aff6978f75dc21ca13b53dca539ba6d7010aa88305f4accec209c19
                        • Opcode Fuzzy Hash: a0856ce2d5a2b49b7768279e8f803a090a6a2493d4299c7d42d0aaeab564a7c5
                        • Instruction Fuzzy Hash: 3741FD366042995BCB159F3C9C612B67FD2FFD63287298658FC99CB382D2339816C390
                        APIs
                        • GetActiveWindow.USER32 ref: 0086CB42
                        • GetParent.USER32(?), ref: 0086CB6D
                        • TranslateAcceleratorA.USER32(0040150E,?,?,?,?,00869F85,?,?,?,?,0048045A,00000000,?,?,0040AABE,00000000), ref: 0086CB86
                        • SendMessageA.USER32(?,00000407,00000000,?), ref: 0086CC0A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: AcceleratorActiveMessageParentSendTranslateWindow
                        • String ID: OsGuiPointer
                        • API String ID: 3292363293-935425413
                        • Opcode ID: 264f7adb544f8bcf0d6929f46e286146d36dc1157bbd48ffc0dd0eccdc772afd
                        • Instruction ID: c1b7ce8672874055d81d4527d6584bcd4aa344a98e50962a304e1c9256d83dc7
                        • Opcode Fuzzy Hash: 264f7adb544f8bcf0d6929f46e286146d36dc1157bbd48ffc0dd0eccdc772afd
                        • Instruction Fuzzy Hash: 0331E479A012149BCB208F65FC96B7A77A4FB46365B0B416AE989D7250D731EC80CBA0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _sprintf_strrchr
                        • String ID: %02d.skin$.mdl$.mdx
                        • API String ID: 818094922-818848951
                        • Opcode ID: 681b14993603a95640e26402d22302dc20b29e9ae633847f7d16c2e3e88bc07d
                        • Instruction ID: 67022b238a84ea98687a29b15cd494f8bef154ae74fe90cd1a7fc1757418eb51
                        • Opcode Fuzzy Hash: 681b14993603a95640e26402d22302dc20b29e9ae633847f7d16c2e3e88bc07d
                        • Instruction Fuzzy Hash: 9A216A7260021817DF30AE619DD5BA27F69BB94351F4404B9EA49FB291EAB5AC80C7A0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _fprintf
                        • String ID: .\SFile2-Core.cpp$SArchive$archive %s opened$mpq
                        • API String ID: 1654120334-3559159448
                        • Opcode ID: 02961034ebf8a721b10056605d9655d62d32a217031b8e7fbb2162dceffd445b
                        • Instruction ID: e2a526d2c911f97d7fff098d86d06e980fc56eb31a78ce2c1ab15c727bea7070
                        • Opcode Fuzzy Hash: 02961034ebf8a721b10056605d9655d62d32a217031b8e7fbb2162dceffd445b
                        • Instruction Fuzzy Hash: 0311B2B67002046BD700AF5BEC82E6B77ACEFD4759F10481AF94897342D679DC1087B9
                        APIs
                        • SetEvent.KERNEL32(?,?,?,00000000,?,00000000,00000008), ref: 004508DA
                        • Sleep.KERNEL32(0000000A,?,?,00000000,?,00000000,00000008), ref: 004508F2
                        • CloseHandle.KERNEL32(?,?,?,00000000,?,00000000,00000008), ref: 00450903
                        • DeleteCriticalSection.KERNEL32(00B325C0,?,?,00000000,?,00000000,00000008), ref: 0045090E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CloseCriticalDeleteEventHandleSectionSleep
                        • String ID: 7k
                        • API String ID: 1098469564-2924907640
                        • Opcode ID: 033dcca7df1ab7e2c756ea9cf0c9643346f7c675da85f56dc82c49c1de435efb
                        • Instruction ID: 22e3bb4bce9a46f7ce74395d5ec963f8189f03ebf4ae8f3377925b9df1e30927
                        • Opcode Fuzzy Hash: 033dcca7df1ab7e2c756ea9cf0c9643346f7c675da85f56dc82c49c1de435efb
                        • Instruction Fuzzy Hash: 061138BA944340AFD700DF74FC9581F7BA9AB48305764402FFA4993323DE34A94ACBA5
                        APIs
                        • GetTickCount.KERNEL32 ref: 007752B4
                        • GetLocalTime.KERNEL32(?,?,?,00775AE5,00000001,00000200, -######## TOO MANY ERRORS. NO FURTHER ERRORS WILL BE LOGGED.), ref: 007752CB
                        • wsprintfA.USER32 ref: 007752F9
                        • _memset.LIBCMT ref: 0077535D
                        Strings
                        • %u/%u %02u:%02u:%02u.%03u , xrefs: 007752EF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CountLocalTickTime_memsetwsprintf
                        • String ID: %u/%u %02u:%02u:%02u.%03u
                        • API String ID: 3562032647-3984056914
                        • Opcode ID: 097d4b9746f803942db763ce377b6bff5d37db73ad795a822047f2c640255104
                        • Instruction ID: bf0a127c2b718f285ca0d1088a6ab947f156daedf68051a7eddfc9025dd0a02e
                        • Opcode Fuzzy Hash: 097d4b9746f803942db763ce377b6bff5d37db73ad795a822047f2c640255104
                        • Instruction Fuzzy Hash: 06210576504708EBC7109BA4DC46BFEB3F8FB88B05F00065AFD4A92161E3B86650D7B1
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,?,ClientMovement.txt,00000104,World of Warcraft\Client,MoveLogFile,00000000,ClientMovement.txt,World of Warcraft\Client,MoveLogFile,00000000,?,00000104), ref: 00401580
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: %04d.txt$ClientMovement.txt$MoveLogFile$World of Warcraft\Client
                        • API String ID: 2050909247-3150852774
                        • Opcode ID: c3159bef0de7d4f08a282d6b9ea73e8aa0d9f51b1f42eebc10042e0ad82f3f45
                        • Instruction ID: 5a8288af3c4387da78c4b4410457c312bf7dd511d272a92610292158d6279681
                        • Opcode Fuzzy Hash: c3159bef0de7d4f08a282d6b9ea73e8aa0d9f51b1f42eebc10042e0ad82f3f45
                        • Instruction Fuzzy Hash: 7601FEF5A8034477DB10F2A19D87FEE36198FD0748F0045A9B749750C2E6F569C445E5
                        APIs
                        • LoadLibraryA.KERNEL32(user32.dll,00000000,?,0086A18D,?,?,?,?,?,?,?), ref: 00868C82
                        • FreeLibrary.KERNEL32(00000000,?,0086A18D,?,?,?,?,?,?,?), ref: 00868CB4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Library$FreeLoad
                        • String ID: SetCursorPos$SetPhysicalCursorPos$user32.dll
                        • API String ID: 534179979-3185789386
                        • Opcode ID: b2ffb266e94ceeb41fc2737c8c1cf39b8ee3b9ad9c5cfb6bcb12079c005259aa
                        • Instruction ID: 559ec4446ab9a93db68b6dff27d98243dbe1edb4cd16ef961881af50b0531ad2
                        • Opcode Fuzzy Hash: b2ffb266e94ceeb41fc2737c8c1cf39b8ee3b9ad9c5cfb6bcb12079c005259aa
                        • Instruction Fuzzy Hash: 04F06D39252614AFA3119F6AEE01AEA77BCEED5B603010216F80DD3311DA70ED4146B5
                        APIs
                        • TlsGetValue.KERNEL32(00000000,0040DD3B,00000000,0041248E,00000000,00000000,00000314,?,?,?,00B31250,0040D33E,00B31250,Microsoft Visual C++ Runtime Library,00012010), ref: 0040DCD3
                        • TlsGetValue.KERNEL32(FFFFFFFF,?,?,?,00B31250,0040D33E,00B31250,Microsoft Visual C++ Runtime Library,00012010), ref: 0040DCEA
                        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00B31250,0040D33E,00B31250,Microsoft Visual C++ Runtime Library,00012010), ref: 0040DCFF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Value$HandleModule
                        • String ID: EncodePointer$KERNEL32.DLL
                        • API String ID: 1411318052-3682587211
                        • Opcode ID: a456102f84a47a39731071b67ac748eadca0aa6f14a828509ebdfa13acbaeb89
                        • Instruction ID: 434399d738bd7aa4dba4aa6888f30c46c2ed7975c2676c5a9f891c5abe56352f
                        • Opcode Fuzzy Hash: a456102f84a47a39731071b67ac748eadca0aa6f14a828509ebdfa13acbaeb89
                        • Instruction Fuzzy Hash: B5F0F634908112ABE6129BB5DC1496B7B90EF447547084132F81AF32F4CF38CC86DA55
                        APIs
                        • TlsGetValue.KERNEL32(00000000,0040DDED,?,?,00000000), ref: 0040DD4A
                        • TlsGetValue.KERNEL32(FFFFFFFF,?,?,00000000), ref: 0040DD61
                        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,00000000), ref: 0040DD76
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Value$HandleModule
                        • String ID: DecodePointer$KERNEL32.DLL
                        • API String ID: 1411318052-629428536
                        • Opcode ID: 904b21aa28d2fc5300c9b7d545dcf0eacfbf28e2f8273b249013c7e55aebd3f1
                        • Instruction ID: 566d65f9d451b7e893cdcebb274852982dd07808d00548ad222ad89bc833959f
                        • Opcode Fuzzy Hash: 904b21aa28d2fc5300c9b7d545dcf0eacfbf28e2f8273b249013c7e55aebd3f1
                        • Instruction Fuzzy Hash: DEF0F630904612AFD711ABB9EC14D2B3BA4AF407947084232F814F32F8DF38CC458A55
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00895D69
                        • __CxxThrowException@8.LIBCMT ref: 00895D9B
                          • Part of subcall function 0088B010: RaiseException.KERNEL32(?,?,0041D2F2,FFFFFFFD,?,?,?,?,0041D2F2,FFFFFFFD,00AAF724,?), ref: 0088B050
                          • Part of subcall function 0041CC02: GetModuleHandleA.KERNEL32(ntdll.dll,LdrUnloadDll,?,?,?,?,0041C7E5,kernel32.dll,WriteConsoleW,00B2EDB8,0041CE95), ref: 0041CC20
                          • Part of subcall function 0041CC02: InterlockedExchange.KERNEL32(?,?), ref: 0041CC9C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ExceptionException@8ExchangeH_prolog3HandleInterlockedModuleRaiseThrow
                        • String ID: SetWindowLongA$invalid string position$user32.dll
                        • API String ID: 3153310023-667581938
                        • Opcode ID: 9652e35b8688abf33166adaf26d9c509eab09e9e3cff42fd74a44960c75759de
                        • Instruction ID: 25b2f394e17b14ca1d343c3f863f8dde752f00ebdfe1b33f33f9ec2340f9aa8b
                        • Opcode Fuzzy Hash: 9652e35b8688abf33166adaf26d9c509eab09e9e3cff42fd74a44960c75759de
                        • Instruction Fuzzy Hash: F0F06571A91218BAC705EBD5CC43FCD7374FB44744F040825F514B60D1DBB85945CB2A
                        APIs
                          • Part of subcall function 00451BB0: LeaveCriticalSection.KERNEL32(00B33C5C,00000000), ref: 00451C02
                        • EnterCriticalSection.KERNEL32(00000000), ref: 00460DA0
                        • LeaveCriticalSection.KERNEL32(00000000), ref: 00460DCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$Leave$Enter
                        • String ID: %s$Logs/Profiling_File_SFileOpenFileEx.log$h
                        • API String ID: 2978645861-2322410074
                        • Opcode ID: f90cf01bbd8cae878ce84659fbac94e031eb72135a9d3ae34b6f6f5c2f8c6e61
                        • Instruction ID: e80eea02a275f67428ed0bb6f046acec631816eb920a9d7dcc4e99efc8de715b
                        • Opcode Fuzzy Hash: f90cf01bbd8cae878ce84659fbac94e031eb72135a9d3ae34b6f6f5c2f8c6e61
                        • Instruction Fuzzy Hash: BBF16FB1A00209AFDB14DBD5CC81FEFB7B9EF88704F004619F605AB285D778A945CBA5
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,00000000,00000001,00000000), ref: 0043858E
                          • Part of subcall function 00435C80: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00435D9B,?,00424775,00000000), ref: 00435CB5
                          • Part of subcall function 00435C80: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,00435D9B,?,00424775,00000000), ref: 00435CD1
                          • Part of subcall function 00428FF0: Sleep.KERNEL32(00000000,?,00438843,00451C2A,00000001,00424775,00000000), ref: 00429012
                          • Part of subcall function 00428FF0: GetTickCount.KERNEL32 ref: 00429024
                        • _fopen_s.LIBCMT ref: 004386ED
                        • _fopen_s.LIBCMT ref: 00438728
                        • _fprintf.LIBCMT ref: 00438776
                        • _fprintf.LIBCMT ref: 004387DE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CounterPerformanceQueryTime_fopen_s_fprintf$CountFileSleepSystemTick
                        • String ID:
                        • API String ID: 1026127594-0
                        • Opcode ID: be50d08b3c7d07b9e619448037c4a9bb88882e676f6c554816ea51cf2a228c8a
                        • Instruction ID: 974ce0ddee5cc9796bee7de0efcca3ea867cc127fe6f283548b60849f0c7eadf
                        • Opcode Fuzzy Hash: be50d08b3c7d07b9e619448037c4a9bb88882e676f6c554816ea51cf2a228c8a
                        • Instruction Fuzzy Hash: B1711270200209AFDB10DFBCEC95BAA77E5EB49308F24145EF444D7255EF79AA28CB90
                        APIs
                        • EnterCriticalSection.KERNEL32(00000000,?,p+@), ref: 00458759
                        • LeaveCriticalSection.KERNEL32(000000FF,?,?,?,?,p+@), ref: 004587DD
                        • LeaveCriticalSection.KERNEL32(000000FF,?,?,p+@), ref: 00458865
                        Strings
                        • p+@, xrefs: 0045874E
                        • SFileSetBasePath - SFILE_ERROR_BAD_PATHNAME, xrefs: 004587B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$Leave$Enter
                        • String ID: SFileSetBasePath - SFILE_ERROR_BAD_PATHNAME$p+@
                        • API String ID: 2978645861-1490879061
                        • Opcode ID: 8a36b3e3d6b3655a14090d57e4f84784f4c54e18e7552f6785aedb52f7ee7cf1
                        • Instruction ID: 708bef4ce89b2521eef159318abf8ae493362a2d74ff0fcc6641b81cb2f7c644
                        • Opcode Fuzzy Hash: 8a36b3e3d6b3655a14090d57e4f84784f4c54e18e7552f6785aedb52f7ee7cf1
                        • Instruction Fuzzy Hash: B63142759002409ACB20AF159C52BFE7B26EF45709F54015EEE5667383CF3B584EC28A
                        APIs
                        • __lock.LIBCMT ref: 00890B72
                          • Part of subcall function 004121F8: __mtinitlocknum.LIBCMT ref: 0041220C
                          • Part of subcall function 004121F8: __amsg_exit.LIBCMT ref: 00412218
                          • Part of subcall function 004121F8: EnterCriticalSection.KERNEL32(?,?,?,004169B9,00000004,00AAF558,0000000C,00411228,00000001,00000001,00000000,00000000,00000000,0040DF3F,00000001,00000214), ref: 00412220
                        • __mtinitlocknum.LIBCMT ref: 00890BB2
                        • __malloc_crt.LIBCMT ref: 00890BF3
                        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00890C18
                        • EnterCriticalSection.KERNEL32(?,00AB2A68,00000010,0088C0BA,00AB2808,0000000C,0088C171,00000000,00000000,00000080,00000000,00000001,0043872D,?,?,00000000), ref: 00890C42
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalEnterSection__mtinitlocknum$CountCritInitSpin___crt__amsg_exit__lock__malloc_crt
                        • String ID:
                        • API String ID: 1486408876-0
                        • Opcode ID: e670a3afed23183e86d860cbe26274b8393969e3cd135c823c75a86191568070
                        • Instruction ID: 20ac137ccf3417b3124b4233b449b09111d84534e39ad88cc5d6b36d740c23c3
                        • Opcode Fuzzy Hash: e670a3afed23183e86d860cbe26274b8393969e3cd135c823c75a86191568070
                        • Instruction Fuzzy Hash: 7A31C175504702EFCB21EF69D881A99B3F5FB08328B54452EF491D72A1CB78A841DF54
                        APIs
                        • EnterCriticalSection.KERNEL32(00B325C0,00000001,?,00444611,?,?,?,?,00000001), ref: 0042DE79
                        • LeaveCriticalSection.KERNEL32(00B325C0,?,00444611,?,?,?,?,00000001), ref: 0042DE8D
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042DEB6
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042DEC8
                        • LeaveCriticalSection.KERNEL32(00B325C0,?,?,?,?,?,?,?,?,00000000,00000000,?,00444611,?,?,?), ref: 0042DF58
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$LeaveUnothrow_t@std@@@__ehfuncinfo$??2@$Enter
                        • String ID:
                        • API String ID: 3556244870-0
                        • Opcode ID: 622dd9ec55b495f2fadff64aea313bf9df1b4995ebf70af2d629bcc0c262f971
                        • Instruction ID: 8c0aa52cad02a0575063ae1cacef1e00598a2e3128b899b0a16deb21b7a6d178
                        • Opcode Fuzzy Hash: 622dd9ec55b495f2fadff64aea313bf9df1b4995ebf70af2d629bcc0c262f971
                        • Instruction Fuzzy Hash: FA31B3727006159BCB28DFA9D9C196B77E6EF84350B86482EF84687750D634E840C768
                        APIs
                        • Sleep.KERNEL32(00000000,00000008,00000000,007744FD,00000000,00000000,?,00774DC7,00000001,00000002,005242B9,00000000,00B41670,?,00774E8D,00B41670), ref: 00774400
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID: 89k$IAllocEvent: too many %s event allocs$SUAREVTYPE$SUMREVTYPE
                        • API String ID: 3472027048-400269772
                        • Opcode ID: 9f2f835bd1d204bf7b3ca9efce068df2a081785e33cfd2c381d00a6916406c8c
                        • Instruction ID: 3c1fd15b517e9e8734417e0bf0ce7ac43cde6a417397949daf3185a218d94485
                        • Opcode Fuzzy Hash: 9f2f835bd1d204bf7b3ca9efce068df2a081785e33cfd2c381d00a6916406c8c
                        • Instruction Fuzzy Hash: 49012632A503310BDB168B3C9C007667388EB633A1B064635E54AD72A0FB28DC0286D1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: :"l$:"l
                        • API String ID: 4168288129-1656957039
                        • Opcode ID: c044f30e6f58b1f73409cc099bbc199a8b2e9361f1c16590d9dd84c2d0838c53
                        • Instruction ID: a58fc5834fbf4056b61310731a9be6b945f9b8471f711690414d32ea0f4fc879
                        • Opcode Fuzzy Hash: c044f30e6f58b1f73409cc099bbc199a8b2e9361f1c16590d9dd84c2d0838c53
                        • Instruction Fuzzy Hash: 1FE16B70A0420AEFDB019F50E984AFDBFB1FF46304F228598E88966295D7309A71DF94
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: $ $
                        • API String ID: 2102423945-3665324030
                        • Opcode ID: 4cea212ecd8638755d48e1ffe9f04223a6f17919820f11c7cfbe749d6f6d4836
                        • Instruction ID: 512600dce3a0b0e201ba1e9d0c99bc39a86f962028028ccadb4741d72180a579
                        • Opcode Fuzzy Hash: 4cea212ecd8638755d48e1ffe9f04223a6f17919820f11c7cfbe749d6f6d4836
                        • Instruction Fuzzy Hash: 3BF17BB1D00209CFDB20CFA9E8847ADBBF5FB48315F16466AC519AB392EB704985DF50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _sscanf
                        • String ID: %dx%d$.\GameUI.cpp$gxResolution
                        • API String ID: 1142741230-1200641619
                        • Opcode ID: 80aedd01d23861f880da703c22f542e3e9587007dd9886232137611e2287d8a4
                        • Instruction ID: 297bd5939e072e928df9b4e8e5da3c036a7fe1eb9a7bc8fd53cebefd8ca9e739
                        • Opcode Fuzzy Hash: 80aedd01d23861f880da703c22f542e3e9587007dd9886232137611e2287d8a4
                        • Instruction Fuzzy Hash: D1610671A00205AFDB24EFA8DC819FD7BB5FB88710B24856AF915D3391EF309D818B91
                        APIs
                        Strings
                        • d:\BuildServer\WoW\1\work\WoW-code\branches\wow-patch-3_3_5_A-BNet\WoW\Source\Object/ObjectClient/Player_C.h, xrefs: 005898D2
                        • .\LootFrame.cpp, xrefs: 005896D3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: .\LootFrame.cpp$d:\BuildServer\WoW\1\work\WoW-code\branches\wow-patch-3_3_5_A-BNet\WoW\Source\Object/ObjectClient/Player_C.h
                        • API String ID: 2102423945-96342430
                        • Opcode ID: b37991c6b532ccf0d0d639bdb2303d469694f19ca0560becc3039743559a7786
                        • Instruction ID: 3000c8ecf4a503fe6814b4ac2ab5ec360cfd6470130fd25ff8ff63b8588eb16a
                        • Opcode Fuzzy Hash: b37991c6b532ccf0d0d639bdb2303d469694f19ca0560becc3039743559a7786
                        • Instruction Fuzzy Hash: BD51D1F1A003046BE724BF64DC86B767BE5FB44344F18442DED09A7392DA75E881CBA6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: 7$tv$x
                        • API String ID: 2102423945-2895482302
                        • Opcode ID: e3a7faf18926c390b1d41e8e0189ee60969cfa281177b1227581a9c170454b94
                        • Instruction ID: 741ce77b03beb6a0cf2da874a1698c95200ca738074b1594d5c902c87a931bd5
                        • Opcode Fuzzy Hash: e3a7faf18926c390b1d41e8e0189ee60969cfa281177b1227581a9c170454b94
                        • Instruction Fuzzy Hash: 5F61E175E001059BCF30CF69C9846BEB7B2EF84314F258129ED27AB648D7799E81CB91
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 0088D1AD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ErrorHandling__start
                        • String ID: pow
                        • API String ID: 3213639722-2276729525
                        • Opcode ID: 9695c62587796f9816645137e5c8bcb2975015cc010390165eed9dfc260c4f93
                        • Instruction ID: de775dede6492c50883e14ba7591f891a60a9ccaff915836102c25276be833a5
                        • Opcode Fuzzy Hash: 9695c62587796f9816645137e5c8bcb2975015cc010390165eed9dfc260c4f93
                        • Instruction Fuzzy Hash: 1D517725A08306A6CF21BB18C9053AE7BE4FF50724F288D59E4D6C22E9EF34CCD49746
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000), ref: 004590C6
                          • Part of subcall function 00439ED0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,009C7533,000000FF), ref: 00439F63
                        Strings
                        • Failed to load transport manifest., xrefs: 00459212
                        • Transport::ReadIndirectFile - DownloadURL failed, xrefs: 004591DB
                        • Transport::ReadIndirectFile - DownloadURL failed - %s, xrefs: 004591F6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CreateEventObjectSingleWait
                        • String ID: Failed to load transport manifest.$Transport::ReadIndirectFile - DownloadURL failed$Transport::ReadIndirectFile - DownloadURL failed - %s
                        • API String ID: 2678385144-1622379634
                        • Opcode ID: a08f9ae266c30c0bf838d2646309a6cbf76805ce3f4a6145c8a2855575b5f0ae
                        • Instruction ID: e5c553d2e8b33d37f5f7258eae68824a7126afad9f130f10f1d966fba3eb7ce8
                        • Opcode Fuzzy Hash: a08f9ae266c30c0bf838d2646309a6cbf76805ce3f4a6145c8a2855575b5f0ae
                        • Instruction Fuzzy Hash: 20513670A00615EBEF10DF68CC85BAEB7B5EB45345F14455AE8059B3C3C3389D49CBA9
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000), ref: 00459476
                          • Part of subcall function 00439ED0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,009C7533,000000FF), ref: 00439F63
                        Strings
                        • SourceManifest::ReadIndirectFile - DownloadURL failed - %s, xrefs: 004595A6
                        • Failed to load source manifest., xrefs: 004595C2
                        • SourceManifest::ReadIndirectFile - DownloadURL failed, xrefs: 0045958B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CreateEventObjectSingleWait
                        • String ID: Failed to load source manifest.$SourceManifest::ReadIndirectFile - DownloadURL failed$SourceManifest::ReadIndirectFile - DownloadURL failed - %s
                        • API String ID: 2678385144-3707891725
                        • Opcode ID: 2e1c94acf1aa6769c7f900b55a8922a9b8759f9b4c0025bac61a9aef29b6ee13
                        • Instruction ID: f09ac071a370c161973d32a47efa0b8500afb5f67d8dfecfc175086c1b495b32
                        • Opcode Fuzzy Hash: 2e1c94acf1aa6769c7f900b55a8922a9b8759f9b4c0025bac61a9aef29b6ee13
                        • Instruction Fuzzy Hash: 5951F971A04204EBDF10DFA8C881BAEB7B5EB45305F14455AE8095B387D338DD4AC7A9
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000), ref: 004614A9
                          • Part of subcall function 00439ED0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,009C7533,000000FF), ref: 00439F63
                        Strings
                        • FileManifest::ReadIndirectFile - DownloadURL failed - %s, xrefs: 004615D9
                        • http://, xrefs: 0046144F
                        • FileManifest::ReadIndirectFile - DownloadURL failed with no error, xrefs: 004615BE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CreateEventObjectSingleWait
                        • String ID: FileManifest::ReadIndirectFile - DownloadURL failed - %s$FileManifest::ReadIndirectFile - DownloadURL failed with no error$http://
                        • API String ID: 2678385144-2727125132
                        • Opcode ID: 51904cafa972582a58dc7f061b82e3be7ba76916d3f4f1355dbb3c701005bf44
                        • Instruction ID: eefed08a9f4f9a9c50516bfc54e1ed6546780c80f6942bed9541368e35726e95
                        • Opcode Fuzzy Hash: 51904cafa972582a58dc7f061b82e3be7ba76916d3f4f1355dbb3c701005bf44
                        • Instruction Fuzzy Hash: 5851D670A00244ABDF14DF98C981BAEB7B5AB84344F18455EE4079B392E638DD41CBAA
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: .blp$BLP2$d
                        • API String ID: 2102423945-3486276427
                        • Opcode ID: 200f4a67f8b58c453e6275d773504d446e59a3475a67aacc435cafe7a28d62f7
                        • Instruction ID: c4606ca4167b27c01e08549e078011bfe4e4da4a563f8a213c96b1c5811c2f76
                        • Opcode Fuzzy Hash: 200f4a67f8b58c453e6275d773504d446e59a3475a67aacc435cafe7a28d62f7
                        • Instruction Fuzzy Hash: 6D51C4719046189BDB20DF14D854BEEB7B8BF44300F0482EAE909A7390D779DE84CFA9
                        APIs
                        • _memset.LIBCMT ref: 00770DEB
                          • Part of subcall function 0077C9E0: _memset.LIBCMT ref: 0077CA40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: .\SSignature.cpp$NGIS$delete
                        • API String ID: 2102423945-1724405800
                        • Opcode ID: 101fa356c3e9dea5920493f884c4b2fc7289554064b9c97896a2a0fad7e0bbf6
                        • Instruction ID: d5ae4040860127d23acd7348994ba91f4c0ce4d4efebaa0234fca188b77ffd42
                        • Opcode Fuzzy Hash: 101fa356c3e9dea5920493f884c4b2fc7289554064b9c97896a2a0fad7e0bbf6
                        • Instruction Fuzzy Hash: 1A412CB2200200EBDB20EF38CC81A6B77A5FF95354B188A6DF586D7281EA75ED00C790
                        APIs
                        • _memset.LIBCMT ref: 00689C45
                        • EnumDisplayDevicesA.USER32(00000000,00000000,?,00000000), ref: 00689C69
                        • EnumDisplayDevicesA.USER32(00000000,-00000001,000001A8,00000000), ref: 00689C8C
                        Strings
                        • CGxDevice::DeviceAdapterID(): RET: %d, VID: %x, DID: %x, DVER: %x.%x, xrefs: 00689D24
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: DevicesDisplayEnum$_memset
                        • String ID: CGxDevice::DeviceAdapterID(): RET: %d, VID: %x, DID: %x, DVER: %x.%x
                        • API String ID: 2555397210-2773471655
                        • Opcode ID: 56d24525e9a47b907e0e9f98fe279b564486ff8900de9375772d578929d07c1e
                        • Instruction ID: 5527525b7e982beaeefa37cd12e99d136ac7c69863632750e41fb7392e7f292d
                        • Opcode Fuzzy Hash: 56d24525e9a47b907e0e9f98fe279b564486ff8900de9375772d578929d07c1e
                        • Instruction Fuzzy Hash: 6D519D75A00219ABCB10EF55DC40AEAB7BAEF89304F148199EC489B350E731AE41CBA5
                        APIs
                        • std::_String_base::_Xlen.LIBCPMT ref: 00438F59
                        • std::_String_base::_Xlen.LIBCPMT ref: 00438F70
                        • _memcpy_s.LIBCMT ref: 00438FF1
                          • Part of subcall function 00895D62: __EH_prolog3.LIBCMT ref: 00895D69
                          • Part of subcall function 00895D62: __CxxThrowException@8.LIBCMT ref: 00895D9B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: String_base::_Xlenstd::_$Exception@8H_prolog3Throw_memcpy_s
                        • String ID: :(F
                        • API String ID: 1476421617-341832539
                        • Opcode ID: 1e3e449727ff0054894e8300ccde9832d19fa84ac8a03ec3cd6f5d75de5f48c8
                        • Instruction ID: fcc7ce81de01f18fc227798c28406257c99db2215a9d16c0a98d9a8135b55d7f
                        • Opcode Fuzzy Hash: 1e3e449727ff0054894e8300ccde9832d19fa84ac8a03ec3cd6f5d75de5f48c8
                        • Instruction Fuzzy Hash: 8831AD323006008BD724DE5CE580A6AF3E6EF99720B504A2FF556CB691DB78EC4087A9
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID: .\MapObjRead.cpp$.wmo$_%03d
                        • API String ID: 3213747228-1664218097
                        • Opcode ID: 35187a60497251016141d24703a20ef9606f2e29f31f4df43b6a2f7712129837
                        • Instruction ID: c4fe0ddfd47afe6a9c51967c13be8a2d4ba9835b3131702f1b35050116c1b719
                        • Opcode Fuzzy Hash: 35187a60497251016141d24703a20ef9606f2e29f31f4df43b6a2f7712129837
                        • Instruction Fuzzy Hash: EB311675500308AFC710DF28DC51FD67BE8BF48304F14855AF9498B382EA75AA54CBA5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: IdleInputWait_memset
                        • String ID: .\W32\SThread.cpp$D
                        • API String ID: 1576700169-2178225832
                        • Opcode ID: f3cf72f6fba3a6136c1d190bec7c26a5e500243d4188286ced7437d2af921b8a
                        • Instruction ID: 128f466bc8efd92782aa06f566b6cefa400578758b26ce0f7861896b1eec8d31
                        • Opcode Fuzzy Hash: f3cf72f6fba3a6136c1d190bec7c26a5e500243d4188286ced7437d2af921b8a
                        • Instruction Fuzzy Hash: 8A316B71A50218ABEB10DFA4CC45FEB77ACEB04710F108659BA19AB1C1D7B8A944C7E4
                        APIs
                        • _memset.LIBCMT ref: 00834CC5
                        • __floor_pentium4.LIBCMT ref: 00834CDD
                        • __floor_pentium4.LIBCMT ref: 00834D0F
                          • Part of subcall function 0076E540: _calloc.LIBCMT ref: 0076E557
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: __floor_pentium4$_calloc_memset
                        • String ID: .\M2Light.cpp
                        • API String ID: 3751944046-719800265
                        • Opcode ID: 46f3fe9033ef13b9eecda08984777d0d71e3ced9f5570132a08fea56827d4f0c
                        • Instruction ID: 48d5ebb4c435f1e0c638c4c49972b90dab49d33f05d81642bea55bad544134b7
                        • Opcode Fuzzy Hash: 46f3fe9033ef13b9eecda08984777d0d71e3ced9f5570132a08fea56827d4f0c
                        • Instruction Fuzzy Hash: 6931CE70900B09DFDB24EF59D442AAABBF0FF48704F2405ADE8859B3A0E775E854CB80
                        APIs
                        • _memset.LIBCMT ref: 0047C380
                          • Part of subcall function 00771870: SetLastError.KERNEL32(00CAE614,?,0076ED39,00000057,00000001,?,00771DCE,00CAE728,00CAE614,00000104,?,?,?,?,11111111), ref: 0077187C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ErrorLast_memset
                        • String ID: .?AUSTATUSENTRY@CStatus@@$.\Status.cpp$format
                        • API String ID: 533350023-2530760293
                        • Opcode ID: 8afdb302ce76a863bad27dcef15fa5929c7a08679a31754f62ea25945c7e702a
                        • Instruction ID: 1e0d1daf5a6837b916110e7d00b215141a860ea3befba5d6e853107a09fac609
                        • Opcode Fuzzy Hash: 8afdb302ce76a863bad27dcef15fa5929c7a08679a31754f62ea25945c7e702a
                        • Instruction Fuzzy Hash: CF31C471A40205AFD710CF28D8C1BA6B7A4FF49714F14C5AEE90C9B382E375EC458B91
                        APIs
                        • GetTickCount.KERNEL32 ref: 007749FB
                          • Part of subcall function 007701C0: LeaveCriticalSection.KERNEL32(?,00774C2D,00000000,?,?,00774A34,?,?,00000010,?,?,00774C2D,?), ref: 00770235
                          • Part of subcall function 0077E960: __vsnprintf.LIBCMT ref: 0077E981
                          • Part of subcall function 0077E960: OutputDebugStringA.KERNEL32(?,00CADBE0,00CAE4E8,00CAE3E0,00CADBE0,?,?,?,?,?,?,?,?,?,00CAE614,00000104), ref: 0077E990
                        Strings
                        • .\W32\SLock.cpp, xrefs: 00774A97
                        • %s(%u) : CDebugLock:%08x: entry has bad next %u, xrefs: 00774A9C
                        • %s(%u) : CDebugLock:%08x: tid:%03x %s %c %c t:%u, xrefs: 00774A75
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CountCriticalDebugLeaveOutputSectionStringTick__vsnprintf
                        • String ID: %s(%u) : CDebugLock:%08x: entry has bad next %u$%s(%u) : CDebugLock:%08x: tid:%03x %s %c %c t:%u$.\W32\SLock.cpp
                        • API String ID: 1654315683-2445072389
                        • Opcode ID: 2e69087aca5defaf622289a51bf164aed62228af89ec72e8499bd501af943c90
                        • Instruction ID: 068bd43072ba51633b5dc7bd5be7a84abb63a0cd2937e7965711cdcc37d234d2
                        • Opcode Fuzzy Hash: 2e69087aca5defaf622289a51bf164aed62228af89ec72e8499bd501af943c90
                        • Instruction Fuzzy Hash: C921F672B40619ABDB24CA98EC41F7B73ACEB84765F01CB6DF94ED3241E625A80146E1
                        APIs
                        • GetTickCount.KERNEL32 ref: 00774B2B
                          • Part of subcall function 007701C0: LeaveCriticalSection.KERNEL32(?,00774C2D,00000000,?,?,00774A34,?,?,00000010,?,?,00774C2D,?), ref: 00770235
                          • Part of subcall function 0077E960: __vsnprintf.LIBCMT ref: 0077E981
                          • Part of subcall function 0077E960: OutputDebugStringA.KERNEL32(?,00CADBE0,00CAE4E8,00CAE3E0,00CADBE0,?,?,?,?,?,?,?,?,?,00CAE614,00000104), ref: 0077E990
                        Strings
                        • .\W32\SLock.cpp, xrefs: 00774BC7
                        • %s(%u) : CDebugLock:%08x: entry has bad next %u, xrefs: 00774BCC
                        • %s(%u) : CDebugLock:%08x: tid:%03x %s %c %c t:%u, xrefs: 00774BA5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CountCriticalDebugLeaveOutputSectionStringTick__vsnprintf
                        • String ID: %s(%u) : CDebugLock:%08x: entry has bad next %u$%s(%u) : CDebugLock:%08x: tid:%03x %s %c %c t:%u$.\W32\SLock.cpp
                        • API String ID: 1654315683-2445072389
                        • Opcode ID: 3a6a3e020072a69feb9d451a1fb9dcc622297b2bc947a18f11d2c59153f019f4
                        • Instruction ID: f935c2d7280180b299603587aecfb364a474a31dd78b23fab9a70e03bc681c39
                        • Opcode Fuzzy Hash: 3a6a3e020072a69feb9d451a1fb9dcc622297b2bc947a18f11d2c59153f019f4
                        • Instruction Fuzzy Hash: B721F9B2700619ABDB248A69DC41F7B73A8EB84755F40876DF94DD3241D625EC0146A1
                        APIs
                        • SetLastError.KERNEL32(00000057,00000000,?,00422675,00000000,?,00000100,?,?,?,?,?,?,?,?,00000000), ref: 00771A9D
                        • LeaveCriticalSection.KERNEL32(00CAD808,00000000,00000000,00000100,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 00771B1C
                        • FormatMessageA.KERNEL32(-00001000,00000000,00000000,00000400,00000000,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00771B49
                        Strings
                        • Invalid or corrupt archive., xrefs: 00771B5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalErrorFormatLastLeaveMessageSection
                        • String ID: Invalid or corrupt archive.
                        • API String ID: 671719933-2975893597
                        • Opcode ID: 01f90e24305bd9a1a506202bf0cbc1854b64451610c08b8501b08d21dfb653ea
                        • Instruction ID: 21b48d2b86d8679a6783580df8cc6abebdd7fa75249abd9ddd709158ab1b2feb
                        • Opcode Fuzzy Hash: 01f90e24305bd9a1a506202bf0cbc1854b64451610c08b8501b08d21dfb653ea
                        • Instruction Fuzzy Hash: F2216472785200EFEF109B98FC46F6B3354EB51B68F058129F90E8B1C2D6A9A850C3E4
                        APIs
                        • _memset.LIBCMT ref: 0047C2AE
                          • Part of subcall function 00771870: SetLastError.KERNEL32(00CAE614,?,0076ED39,00000057,00000001,?,00771DCE,00CAE728,00CAE614,00000104,?,?,?,?,11111111), ref: 0077187C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ErrorLast_memset
                        • String ID: .?AUSTATUSENTRY@CStatus@@$.\Status.cpp$format
                        • API String ID: 533350023-2530760293
                        • Opcode ID: 58966f49165f89d3bdd102a5b6049849320d44d5f0c53f223c3c5479200e3964
                        • Instruction ID: b5e67a861bc5c937ae0aaf6045bb8db7779f20a95d10675c00b18c5f99d1514d
                        • Opcode Fuzzy Hash: 58966f49165f89d3bdd102a5b6049849320d44d5f0c53f223c3c5479200e3964
                        • Instruction Fuzzy Hash: 3F113671A40205BBEB20DF64DC46FE673A8AB04710F0485AAFD4DAB2C2E7F4A94487D5
                        APIs
                        • UnmapViewOfFile.KERNEL32(C35D5B5F,00000000,?,008E5132,00000000,?,?,?,?,?,?,0087C50A,?,?,?,008D146F), ref: 008E4D73
                        • CloseHandle.KERNEL32(5EC68BF6,?,00000000,?,008E5132,00000000,?,?,?,?,?,?,0087C50A), ref: 008E4D88
                        • CloseHandle.KERNEL32(5EC68BF6,?,00000000,?,008E5132,00000000,?,?,?,?,?,?,0087C50A), ref: 008E4D91
                        Strings
                        • ..\src\MeteredSection.cpp, xrefs: 008E4DA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CloseHandle$FileUnmapView
                        • String ID: ..\src\MeteredSection.cpp
                        • API String ID: 260491571-240632364
                        • Opcode ID: 17a5ac570c15625e9b3d8c30a5b332d2b389a99cebc3c98d649251ccd02241c7
                        • Instruction ID: d1971718e7d76639c64dd6c2d1e2e8e82ac4312a2ea51cb3f6140ebb5c47396c
                        • Opcode Fuzzy Hash: 17a5ac570c15625e9b3d8c30a5b332d2b389a99cebc3c98d649251ccd02241c7
                        • Instruction Fuzzy Hash: 1BF0A7357517106BEA20AF6ADC45F16B3DCFF46B10B05042AF909D7250CBB0FC008AA0
                        APIs
                        • LoadLibraryA.KERNEL32(user32.dll,00000000,?,0086A180,?,?,?,?,?), ref: 00868CF2
                        • FreeLibrary.KERNEL32(00000000,?,0086A180,?,?,?,?,?), ref: 00868D10
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Library$FreeLoad
                        • String ID: LogicalToPhysicalPoint$user32.dll
                        • API String ID: 534179979-3674601950
                        • Opcode ID: 51a06cab3ff54dd138e4f7937b924680ebf82e6169aba4d9bac43ffb08bbed3f
                        • Instruction ID: 7dd311206c3004968a30a7e665b1c8c60e4710d61acf7baafe2c81a6fbf7aff6
                        • Opcode Fuzzy Hash: 51a06cab3ff54dd138e4f7937b924680ebf82e6169aba4d9bac43ffb08bbed3f
                        • Instruction Fuzzy Hash: 04F0A73C6A13189B9310CF68EC55AE637B8FBD9B503014115F90ED3311DA30DC808BB1
                        APIs
                        • GetComputerNameA.KERNEL32(?,007710B0), ref: 0077CFF5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ComputerName
                        • String ID: %-10s%s$<unknown>$Computer:
                        • API String ID: 3545744682-1864749571
                        • Opcode ID: 15098a3ac0feeb91ac9feeb32752a1d9dd12495c4ba361e23e8928d4edd8f6d3
                        • Instruction ID: 7246d98b18488d833ead25321ed353f53c4cf7801d49b918275b9f43c010c41e
                        • Opcode Fuzzy Hash: 15098a3ac0feeb91ac9feeb32752a1d9dd12495c4ba361e23e8928d4edd8f6d3
                        • Instruction Fuzzy Hash: 81F0587091430DABCB00DF99D9859AFBBB8FF59745F008559F909A7300E3709B04DBA1
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetProcAddress), ref: 0041CDD7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID: GetProcAddress$kernel32.dll
                        • API String ID: 4139908857-1584408056
                        • Opcode ID: 82df0f66cb49398d12ee5a107666156939467f26045096ac875c11b701cb69e3
                        • Instruction ID: 936e8106817c6a2ca5b84b8536ccf36e61f2136e3f8c905bf7f585598981a972
                        • Opcode Fuzzy Hash: 82df0f66cb49398d12ee5a107666156939467f26045096ac875c11b701cb69e3
                        • Instruction Fuzzy Hash: 6CD02B325D8A86EA930023B27D1EF7737885B90314B044037F51AC6491C678DCD0D5AA
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.DLL,?,?,0077240E,00CADBE0), ref: 00771079
                        • FreeLibrary.KERNEL32(00000000), ref: 0077109A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Library$FreeLoad
                        • String ID: IsDebuggerPresent$KERNEL32.DLL
                        • API String ID: 534179979-2290871793
                        • Opcode ID: b47ea511ac9d6ab8451044e001bddd65728daff44842eec67a63dda839b51f4a
                        • Instruction ID: 56fd87e1b7ac6fbbffd9f3274f121da0d4cd3221de2e8f5929a19aad481cfd44
                        • Opcode Fuzzy Hash: b47ea511ac9d6ab8451044e001bddd65728daff44842eec67a63dda839b51f4a
                        • Instruction Fuzzy Hash: 8DD05B39746561271632173A7C1DE6F5B59EEC1B913494031F915D3214CE54CD82D2B1
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0077CED7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: FileModuleName
                        • String ID: %-10s%s$Exe:$l7k
                        • API String ID: 514040917-2338458150
                        • Opcode ID: cf5a0386febf41be1b1edcd2504309de64a348ef76c28b63e92485696f1ce104
                        • Instruction ID: c2aae8ebbf316a17db531d2ea868b19b2d2084928252fba42a8e25b263d4726c
                        • Opcode Fuzzy Hash: cf5a0386febf41be1b1edcd2504309de64a348ef76c28b63e92485696f1ce104
                        • Instruction Fuzzy Hash: FAE0C2B458420C7FEB00AB50CC87FE5332CEB00705F404184BF4C56181E7F06A948AE5
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,WideCharToMultiByte), ref: 0041CE74
                        • SetLastError.KERNEL32(0000007F,00000000), ref: 0041CE89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ErrorHandleLastModule
                        • String ID: WideCharToMultiByte$kernel32.dll
                        • API String ID: 4242514867-992036916
                        • Opcode ID: 11e8e3bd86dd19f530d1adb508593405df8a968970aa6a5dd5f881d700cff770
                        • Instruction ID: a360d6ff7693b3b8974f870dcca7722f60f9b1e585e3b50440400a12119c4827
                        • Opcode Fuzzy Hash: 11e8e3bd86dd19f530d1adb508593405df8a968970aa6a5dd5f881d700cff770
                        • Instruction Fuzzy Hash: F8D0A932AE8386AAA20023B2AC0EF3737888BD0711B080022B516C6082CA54DCA0C06A
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,MultiByteToWideChar), ref: 0041CE44
                        • SetLastError.KERNEL32(0000007F,00000000), ref: 0041CE59
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ErrorHandleLastModule
                        • String ID: MultiByteToWideChar$kernel32.dll
                        • API String ID: 4242514867-2998143648
                        • Opcode ID: 215f6d5f26c5590766743492b609c5ec7fdd49de436a1085a7b3c41527cc6d6c
                        • Instruction ID: 81e00b3b43279d982b1e94c2b3458905238874c3490baec5bfcb3e1fa8792fd0
                        • Opcode Fuzzy Hash: 215f6d5f26c5590766743492b609c5ec7fdd49de436a1085a7b3c41527cc6d6c
                        • Instruction Fuzzy Hash: 87D0A7325E83856A960023B27C1EF37378887807107040022B516C2081CA54D890D1A5
                        APIs
                        • InitializeCriticalSection.KERNEL32(00B33718,000000FF,00B38308,00000000,009C6F68,000000FF,?,004537F8,00B38308,00436070,?,000000FF,0045425D,?,00458953,00000006), ref: 0044CE25
                        • InitializeCriticalSection.KERNEL32(00B33930,?,004537F8,00B38308,00436070,?,000000FF,0045425D,?,00458953,00000006,00000000,00000004,?,GetArchivePtr - SFILE_ERROR_INVALID_HANDLE,?), ref: 0044CE2C
                          • Part of subcall function 00433760: TlsAlloc.KERNEL32(006B39C2,?,0044CDC1,00B3832C,00000000,?,0045384F,00B38308,00000000,004CBCFD), ref: 00433769
                          • Part of subcall function 00433760: EnterCriticalSection.KERNEL32(00B33718,?,0044CDC1,00B3832C,00000000,?,0045384F,00B38308,00000000,004CBCFD), ref: 0043378D
                          • Part of subcall function 00433760: LeaveCriticalSection.KERNEL32(00B33718,?,0044CDC1,00B3832C,00000000,?,0045384F,00B38308,00000000,004CBCFD), ref: 004337AC
                          • Part of subcall function 0044B6E0: _malloc.LIBCMT ref: 0044B6FB
                          • Part of subcall function 0044B6E0: _memset.LIBCMT ref: 0044B707
                        • EnterCriticalSection.KERNEL32(00B33718,00B38308,00000000,009C6F68,000000FF,?,004537F8,00B38308,00436070,?,000000FF,0045425D,?,00458953,00000006,00000000), ref: 0044CE5B
                        • LeaveCriticalSection.KERNEL32(00B33718,?), ref: 0044CE8A
                        • LeaveCriticalSection.KERNEL32(00B33718,?,004537F8,00B38308,00436070,?,000000FF,0045425D,?,00458953,00000006,00000000,00000004), ref: 0044CEA5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$Leave$EnterInitialize$Alloc_malloc_memset
                        • String ID:
                        • API String ID: 854415297-0
                        • Opcode ID: cafb45d281f8bdae0adf6311b60269932f0530de83098ff887c8d7b58b6c2408
                        • Instruction ID: 594db35fad4661abd6740b15f9e3118e60a2c62e7e50f33f4fb27d9dfe55e883
                        • Opcode Fuzzy Hash: cafb45d281f8bdae0adf6311b60269932f0530de83098ff887c8d7b58b6c2408
                        • Instruction Fuzzy Hash: 2D1104F5A84348FBDB10AF589C02B5A3BE4EB45F26F20429AF816133D1CBB81A408795
                        APIs
                        • MessageBeep.USER32(00000000), ref: 0086CA56
                        • GetForegroundWindow.USER32(?,00000000,00000000,?,0086CBBF,?,006B4B64,006B4B54,006B4B40,?,?,00869F85,?), ref: 0086CAA7
                        • GetKeyState.USER32(00000011), ref: 0086CAC3
                        • IsDialogMessageA.USER32(00000102,?,0086CBBF,?,006B4B64,006B4B54,006B4B40,?,?,00869F85,?,?,?,?,0048045A,00000000), ref: 0086CAEA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Message$BeepDialogForegroundStateWindow
                        • String ID:
                        • API String ID: 2485651341-0
                        • Opcode ID: 4e3db08b2ae8a68cabcac6bea4b9876eba2951df5944acc5090b9967679a5096
                        • Instruction ID: e8dc88be5dc954cbdd1b55c51180a7c49c4a433de845710cac012b693d127ca5
                        • Opcode Fuzzy Hash: 4e3db08b2ae8a68cabcac6bea4b9876eba2951df5944acc5090b9967679a5096
                        • Instruction Fuzzy Hash: 8631ADB12102198BDF34DFA8E884A7A77A9FF5435AF12843AE4C6CB681DB34DC80C751
                        APIs
                        • RegOpenKeyExA.ADVAPI32(00401546,00000000,00000000,00020019,?,?), ref: 007703C5
                        • RegQueryValueExA.ADVAPI32(?,00000104,00000000,?,00401546,?), ref: 007703E5
                        • RegCloseKey.ADVAPI32(?), ref: 007703F1
                        • RegCloseKey.ADVAPI32(?), ref: 00770476
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Close$OpenQueryValue
                        • String ID:
                        • API String ID: 1607946009-0
                        • Opcode ID: 44f5afdb9e737a7c428c4c343b8ca833b3d9181c2747a7a406f422b869b7097f
                        • Instruction ID: 743660301444138b4c5a06fa2eb7ad2435c8e504524798e5dd8b9b9cff4652e7
                        • Opcode Fuzzy Hash: 44f5afdb9e737a7c428c4c343b8ca833b3d9181c2747a7a406f422b869b7097f
                        • Instruction Fuzzy Hash: DF2183B5640318FFEB20DF94DC49FAA737CEB48754F108255BA18D7290D6B0AE409BA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Locale$UpdateUpdate::___fltin2__isctype_l_strlen
                        • String ID:
                        • API String ID: 2719974902-0
                        • Opcode ID: ec192051fc167f0ae4031e82a5528447872e0fa72a4fea50e8cdc1e44e379ef3
                        • Instruction ID: 41dfb7d9334cfdd773e23eaa6c13a71446d3b314675f3ade8fff6dddf070a027
                        • Opcode Fuzzy Hash: ec192051fc167f0ae4031e82a5528447872e0fa72a4fea50e8cdc1e44e379ef3
                        • Instruction Fuzzy Hash: 5511D672800359AFCB11FB99CC81DBE7BA8FF05335F0501A5E464EB0D2DA3499549BA4
                        APIs
                          • Part of subcall function 008E4F00: InterlockedExchange.KERNEL32(8B0010BE,00000001), ref: 008E4F17
                          • Part of subcall function 008E4F00: Sleep.KERNEL32(00000001,00000000,?,008E4FDD,008D94D2,00000000,?,008D204B,008D94D2,00000001,00000000,?,008E54B7,?,008D94D2), ref: 008E4F26
                          • Part of subcall function 008E4F00: InterlockedExchange.KERNEL32(8B0010BE,00000001), ref: 008E4F31
                        • SetEvent.KERNEL32(?,?,00000000,00000000,?,?,00000000,?), ref: 008E5031
                        • InterlockedExchange.KERNEL32(8B0010BE,00000000), ref: 008E5043
                        • InterlockedExchange.KERNEL32(8B0010BE,00000000), ref: 008E505A
                        • SetLastError.KERNEL32(00000057,?,?,00000000,?), ref: 008E5062
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: ExchangeInterlocked$ErrorEventLastSleep
                        • String ID:
                        • API String ID: 2947465999-0
                        • Opcode ID: 798c041bdca53477107e8fc405f2fefce661ff0c6ed77dbe0afb307a80a7b60f
                        • Instruction ID: e8a9817ea189ceea9b73041363ed490d12241b639229c2685d6ea25094117f98
                        • Opcode Fuzzy Hash: 798c041bdca53477107e8fc405f2fefce661ff0c6ed77dbe0afb307a80a7b60f
                        • Instruction Fuzzy Hash: 0D113A35240A419BD720CB6AD885B46B3A5FF49329F148569F55ECB252D732E882CB90
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00428F74
                        • SetThreadPriority.KERNEL32(00000000,?,00000000,?,0042E8E7,8B04C483,32C35DE5,?,00435C8F,?,?,00433816,00435C8F), ref: 00428F7B
                        • GetTickCount.KERNEL32 ref: 00428F7D
                        • QueryPerformanceCounter.KERNEL32(32C35DE5,?,00000000,?,0042E8E7,8B04C483,32C35DE5,?,00435C8F,?,?,00433816,00435C8F), ref: 00428F89
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Thread$CountCounterCurrentPerformancePriorityQueryTick
                        • String ID:
                        • API String ID: 2011286087-0
                        • Opcode ID: db4d979aabd9701f3f9ebb8ce3284e65377f710060734b7a8cbbd2f052501ab1
                        • Instruction ID: 1e40dce8f569783973286cfd7629253deb709461541d89404dfa441355f7b0b0
                        • Opcode Fuzzy Hash: db4d979aabd9701f3f9ebb8ce3284e65377f710060734b7a8cbbd2f052501ab1
                        • Instruction Fuzzy Hash: 3C11A575E05219EFCB00EF65E9898CDBBB5FF48711B52C5AAE90593320DB309D14DBA0
                        APIs
                        • GetLastError.KERNEL32(00000042,?,0040DF93,?,0040E729,00000000,0041030D,?,?,?,00000000), ref: 0040DF18
                          • Part of subcall function 0040DDCF: TlsGetValue.KERNEL32(?,0040DF2B,?,?,00000000), ref: 0040DDD6
                          • Part of subcall function 0040DDCF: TlsSetValue.KERNEL32(00000000,?,00000000), ref: 0040DDF7
                        • __calloc_crt.LIBCMT ref: 0040DF3A
                          • Part of subcall function 00411215: __calloc_impl.LIBCMT ref: 00411223
                          • Part of subcall function 00411215: Sleep.KERNEL32(00000000,?,?,00000000), ref: 0041123A
                          • Part of subcall function 0040DD3D: TlsGetValue.KERNEL32(00000000,0040DDED,?,?,00000000), ref: 0040DD4A
                          • Part of subcall function 0040DD3D: TlsGetValue.KERNEL32(FFFFFFFF,?,?,00000000), ref: 0040DD61
                          • Part of subcall function 0040DE57: GetModuleHandleA.KERNEL32(KERNEL32.DLL,00AAF2B0,0000000C,0040DF68,00000000,00000000,?,?,00000000), ref: 0040DE68
                          • Part of subcall function 0040DE57: InterlockedIncrement.KERNEL32(00AB6BD0), ref: 0040DECE
                          • Part of subcall function 0040DE57: __lock.LIBCMT ref: 0040DED6
                          • Part of subcall function 0040DE57: ___addlocaleref.LIBCMT ref: 0040DEF5
                        • GetCurrentThreadId.KERNEL32 ref: 0040DF6A
                        • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0040DF82
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Value$ErrorLast$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                        • String ID:
                        • API String ID: 1102134457-0
                        • Opcode ID: c698983cd848bc66bcc27c86096f50c879ffb3994f3c3e65aa8a2c7d892ee9f7
                        • Instruction ID: 6556c33dddb053578cf19314047c75b4c111f970385864d6e0f21e67808a9131
                        • Opcode Fuzzy Hash: c698983cd848bc66bcc27c86096f50c879ffb3994f3c3e65aa8a2c7d892ee9f7
                        • Instruction Fuzzy Hash: 17F0F43294972256CA213BF57C16A9A2B549F00760B14433BF526E61E1CF39888256E9
                        APIs
                        • QueryPerformanceCounter.KERNEL32(00000000,0087C50A,008D8FF5,00000000,00000000,?,008D146F,0087C50A,?,00000000,00000000,?), ref: 008D1DFA
                        • QueryPerformanceFrequency.KERNEL32(?,?,008D146F,0087C50A,?,00000000,00000000,?,?,?,?,?,?,0040AD44,0040150E,00000000), ref: 008D1E08
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008D1E2C
                        • timeGetTime.WINMM(?,008D146F,0087C50A,?,00000000,00000000,?,?,?,?,?,?,0040AD44,0040150E,00000000,?), ref: 008D1E3F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterFrequencyTimeUnothrow_t@std@@@__ehfuncinfo$??2@time
                        • String ID:
                        • API String ID: 1393835923-0
                        • Opcode ID: 0e303b63a825c5d78a9399920c8292634134d29b78feaf024f91d96dd6a1cd7e
                        • Instruction ID: b9ec7d7a165af37a9768551767e6661e7b211ac2a3121e5a9be1b80696cd5eb2
                        • Opcode Fuzzy Hash: 0e303b63a825c5d78a9399920c8292634134d29b78feaf024f91d96dd6a1cd7e
                        • Instruction Fuzzy Hash: 53F03C75A15208AFDB04DFB4DC469BEB7BDEF88300F5045A9B909D7250EA30EA408B90
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042D8A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                        • String ID: $E,C
                        • API String ID: 885266447-2282149087
                        • Opcode ID: f778c48ce9e8ca54e95c8d9ab9a1563096c116e124358a538ab6fb487958192a
                        • Instruction ID: 6f32195e2bb33cb7bb3a0f13fb6a11ba908b01b68865c32dd539eb32f215af0c
                        • Opcode Fuzzy Hash: f778c48ce9e8ca54e95c8d9ab9a1563096c116e124358a538ab6fb487958192a
                        • Instruction Fuzzy Hash: E7A1E4B1E0021ADFCB08CF69D9905AEBBB5FF48304B65856EE819E7301D331EA51CB95
                        APIs
                        Strings
                        • ** Loading table of contents %s, xrefs: 0081456E
                        • Couldn't open %s, xrefs: 008143D1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: ** Loading table of contents %s$Couldn't open %s
                        • API String ID: 2102423945-268983136
                        • Opcode ID: 56419469d8bb616570aacd161952faa1f3853ab2b93b3a7f57526f606d0eedc6
                        • Instruction ID: 103e2eb2645efe691f8404806f80939148e918fd0fe58577f7dc235acf448139
                        • Opcode Fuzzy Hash: 56419469d8bb616570aacd161952faa1f3853ab2b93b3a7f57526f606d0eedc6
                        • Instruction Fuzzy Hash: 1771C0B2D00208ABDB10DFA5DC85FEE77B9FF48310F148599E504E7281E774AA84CBA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID:
                        • String ID: %$(null)
                        • API String ID: 0-3027058318
                        • Opcode ID: e3e188a70c198f0f3f296ea493c38413484493bb452d987782e33b042a1d995b
                        • Instruction ID: 7f01f3b8df8e16c8c7ef83a572dc99d483a6f8ed7b0ac645738e7f8aefeb8ac5
                        • Opcode Fuzzy Hash: e3e188a70c198f0f3f296ea493c38413484493bb452d987782e33b042a1d995b
                        • Instruction Fuzzy Hash: 94715CB5900709AFDB10DF69C895AAEBBB0FF44318F14C159E85AA7341E734AA18CF91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: .\IGxuFontGlyph.cpp$:"l
                        • API String ID: 2102423945-4106326089
                        • Opcode ID: b953d74cfae4a36dc3a1658e5383f23c09c5d533d69f968bec6a371336383d11
                        • Instruction ID: 8cb6e71fdb03fa5d8f2ba6873c10e07f75cfcb35ec828879b1b293715d71d16d
                        • Opcode Fuzzy Hash: b953d74cfae4a36dc3a1658e5383f23c09c5d533d69f968bec6a371336383d11
                        • Instruction Fuzzy Hash: 5F516C71A00209AFDB24CF59D881BAAB7B5FF58314F1481AEE8059B351DB70ED55CB90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: Alliance$Horde
                        • API String ID: 2102423945-1311522820
                        • Opcode ID: b400f7d1408fb4650ccf5e237c088819da67c7dcf9c0c73c921efdc97b9a7e18
                        • Instruction ID: d2a1bbf59bfe74188af566f52a12f13c0eb8f2957ba1af9815164090419ee2c5
                        • Opcode Fuzzy Hash: b400f7d1408fb4650ccf5e237c088819da67c7dcf9c0c73c921efdc97b9a7e18
                        • Instruction Fuzzy Hash: 9F51F331E812859BCB10CF9ADC90DAEB7F1BF45305B14416FD816E73A0DB78AD418B89
                        APIs
                        Strings
                        • Sound_EnableErrorSpeech, xrefs: 008102DE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: Sound_EnableErrorSpeech
                        • API String ID: 2102423945-715853919
                        • Opcode ID: 90b4bd1242597272e7a36ff9f65717ab1204854a6541f4800c57e454ebc97732
                        • Instruction ID: 57ac9d5610c38357ffa9e7d2a6a9c9d1283e2b9752bd8b189b98f07ebd1d669f
                        • Opcode Fuzzy Hash: 90b4bd1242597272e7a36ff9f65717ab1204854a6541f4800c57e454ebc97732
                        • Instruction Fuzzy Hash: F6417FF07E132675F5E076915C2BFCB2D0ADB12FF8F000109B698742E295D6A190C6BE
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043070B
                        • __allrem.LIBCMT ref: 0043073E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID: =LC
                        • API String ID: 1992179935-1626062834
                        • Opcode ID: 9319dc008472d5577f713c04429c35e0522620de2385ccb0e52294f0a3412038
                        • Instruction ID: c6cd5163f68fadb48edb72e16ac36dbf45db5b722d6f213e03f5fce8e8ae750b
                        • Opcode Fuzzy Hash: 9319dc008472d5577f713c04429c35e0522620de2385ccb0e52294f0a3412038
                        • Instruction Fuzzy Hash: 33415AB15057849FC724CF29C5909ABBBF5FF88314B549A2EE89A87B41C774B800CF94
                        APIs
                        Strings
                        • .\CGxDeviceD3d9Ex\CGxDeviceD3d9Ex.cpp, xrefs: 0068C227
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset$_calloc
                        • String ID: .\CGxDeviceD3d9Ex\CGxDeviceD3d9Ex.cpp
                        • API String ID: 3941948672-3354525302
                        • Opcode ID: 6dee71d56485b30b041acce0a2692e8e63a57ff8596297ffda6dd264c944ed74
                        • Instruction ID: 909bab23fde86961bd855dfcc08349907f1db5469c496241e7eaa361cee35876
                        • Opcode Fuzzy Hash: 6dee71d56485b30b041acce0a2692e8e63a57ff8596297ffda6dd264c944ed74
                        • Instruction Fuzzy Hash: 3941C1B0A11B009BD322DF3A84516D7FAECFFA5704F00492FD5EAD6691DBB4A2448F15
                        APIs
                        Strings
                        • .\CGxDeviceD3d\CGxDeviceD3d.cpp, xrefs: 00689EF7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset$_calloc
                        • String ID: .\CGxDeviceD3d\CGxDeviceD3d.cpp
                        • API String ID: 3941948672-1923653921
                        • Opcode ID: 20cb715d8c263cf9d346f195b144e5055f39f8bb7fb4a7233b6813b0b84ef6a1
                        • Instruction ID: 325fa7bf8db3e9cd1c4251d914267319243f5d85c0957889e772951467a68c2c
                        • Opcode Fuzzy Hash: 20cb715d8c263cf9d346f195b144e5055f39f8bb7fb4a7233b6813b0b84ef6a1
                        • Instruction Fuzzy Hash: D631C2B0A15B009AD3329F3A84416D7FAECEFA5718F10091FE6EBC66A1D7B462408F45
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset$_calloc
                        • String ID: .\RaidInfo.cpp
                        • API String ID: 3941948672-1958866807
                        • Opcode ID: 27f127d0a84b766e951c8e16e03d5f7857aa5445e31309e965e916092e05dd5a
                        • Instruction ID: 40328786bf8a992157afa2f9db916be6ed0072524614cd25b0be6b5576ca4577
                        • Opcode Fuzzy Hash: 27f127d0a84b766e951c8e16e03d5f7857aa5445e31309e965e916092e05dd5a
                        • Instruction Fuzzy Hash: D61193B0A90380BAE5616B577C57F47BDACEBE1F64F00410EB6487A1F1DBE06280C66D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: Now filtering: %s$Now filtering: all messages
                        • API String ID: 2102423945-2612224667
                        • Opcode ID: 2423c3c9d4538384f5fbd95246f3209a399b0aab3d5830c708a3dec1f50856c4
                        • Instruction ID: ee67278c2c98c9e8d4399bce505db6232daac32d88a67341a1477d1d4eed9e23
                        • Opcode Fuzzy Hash: 2423c3c9d4538384f5fbd95246f3209a399b0aab3d5830c708a3dec1f50856c4
                        • Instruction Fuzzy Hash: EA012833A4011863D710B2E96C02BEFB32D5B91759F040236FE087A2D6FAF9680401E9
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,00424775,00000000,?,?,?,?,?,?,?,?,?,?,00424CAB), ref: 00435DA8
                          • Part of subcall function 00435C80: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00435D9B,?,00424775,00000000), ref: 00435CB5
                          • Part of subcall function 00435C80: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,00435D9B,?,00424775,00000000), ref: 00435CD1
                        • GetSystemTimeAsFileTime.KERNEL32(?,?,00424775,00000000,?,?,?,?,?,?,?,?,?,?,00424CAB), ref: 00435E06
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Time$CounterFilePerformanceQuerySystem
                        • String ID: uGB
                        • API String ID: 549518337-2324794071
                        • Opcode ID: 8e73d74f95a04d56581f861d492674f91acc4733c4a5d158848a616e74a7acc8
                        • Instruction ID: 7bdb085d97d9c2392367cddf2bf5b81c1d725519169d517e4456840cea84ea71
                        • Opcode Fuzzy Hash: 8e73d74f95a04d56581f861d492674f91acc4733c4a5d158848a616e74a7acc8
                        • Instruction Fuzzy Hash: D911A575D04608EBCB04DFA4EC56A9EBBF4EB48315F244389E80593364DF34AA54CB41
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: _sprintf_strrchr
                        • String ID: %04d-%02d.anim
                        • API String ID: 818094922-195601784
                        • Opcode ID: 6c70cb125c28e48655214959ab6b5f7d8091d5a5d6f43d0f49f937ff27eb02fe
                        • Instruction ID: fcfa64f4f4dc92c59556dc32817d2d75639161d1f0a10449320578fff5027dc5
                        • Opcode Fuzzy Hash: 6c70cb125c28e48655214959ab6b5f7d8091d5a5d6f43d0f49f937ff27eb02fe
                        • Instruction Fuzzy Hash: 1AF02472A002685BDB008E6CDC16BA73BD9AFDA614F188180FC88CB342E575E800C3E1
                        APIs
                        • GetModuleHandleA.KERNEL32(00000000,?,00000104,00000030,?), ref: 00435C4E
                        • GetModuleFileNameA.KERNEL32(00000000), ref: 00435C55
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Module$FileHandleName
                        • String ID: l7k
                        • API String ID: 4146042529-4109104050
                        • Opcode ID: be62c809c0e31d2d7af27cc4bade539bddd57bda3f7e476bc0476a2fc97edd3f
                        • Instruction ID: 046ad1ff1afd5c8efb62de5f11fa99b98ed1390bfd998449a78c7845f26af64c
                        • Opcode Fuzzy Hash: be62c809c0e31d2d7af27cc4bade539bddd57bda3f7e476bc0476a2fc97edd3f
                        • Instruction Fuzzy Hash: 76F09E738051186BCB209E58EC8ABEBB73CDB56724F0401CBFD4C9B240E1B0598587D0
                        APIs
                        • DeleteCriticalSection.KERNEL32(?,00B281A4,?,00921D0A,00000000), ref: 008D1F52
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalDeleteSection
                        • String ID: ..\src\fmod_os_misc.cpp$7k
                        • API String ID: 166494926-2919692387
                        • Opcode ID: d2793b9f4b7916c5ea3a4c487820fb695d785a9f6d6a7287ad0b7abc9221abb3
                        • Instruction ID: c4a72d1b3e081a4745ea70ce9b51bec0503041c4c4ac5462bac360cccdb56435
                        • Opcode Fuzzy Hash: d2793b9f4b7916c5ea3a4c487820fb695d785a9f6d6a7287ad0b7abc9221abb3
                        • Instruction Fuzzy Hash: E9E026326916247BDB20AB88EC4AFCAB79DFF01790F024127FA0DDB651CB50E90287C1
                        APIs
                        • InternetOpenA.WININET(Blizzard Web Client,?,?,?,10000000), ref: 00451436
                        • InternetSetStatusCallbackA.WININET(00000000,00451290), ref: 0045144B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: Internet$CallbackOpenStatus
                        • String ID: Blizzard Web Client
                        • API String ID: 3510591021-1199896512
                        • Opcode ID: 59104761197c0905a160a6f32791cb4061565419de5a8466f4026e51a3941294
                        • Instruction ID: 36f817ad6a738ccb00fe65c1a3098d550197e8aa02b2e76f2d596bdefef73e64
                        • Opcode Fuzzy Hash: 59104761197c0905a160a6f32791cb4061565419de5a8466f4026e51a3941294
                        • Instruction Fuzzy Hash: 14E08CB06103006EDB21CF36AD44F2A339CF700766B304A26F869D35B0DF24D948AA19
                        APIs
                        • EnterCriticalSection.KERNEL32(?,?,?,?,00775AA3,00000200,00000000,?,?,?,00775BC4,00000200,?,?,?,00877FDA), ref: 007751B6
                        • LeaveCriticalSection.KERNEL32(?,?,00775AA3,00000200,00000000,?,?,?,00775BC4,00000200,?,?,?,00877FDA,?,?), ref: 007751E7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave
                        • String ID:
                        • API String ID: 3168844106-0
                        • Opcode ID: a99189b1826cfbacb633c1de5b41451097ad2feab0c900b628fddf53b894f279
                        • Instruction ID: b7308182b812319659bd538af39a0ee9708c093b99877ed5baedbff72b7af1e9
                        • Opcode Fuzzy Hash: a99189b1826cfbacb633c1de5b41451097ad2feab0c900b628fddf53b894f279
                        • Instruction Fuzzy Hash: FC21F0711153089FDB108F28EC40AD57BE8EF49375F5183AAE9ADCB2A0D3B09880CB90
                        APIs
                        • CloseHandle.KERNEL32(?,00462E98,00000000,?,00451893,00000001,?,?,00000000,?,00462E98,009C7650), ref: 0042CD91
                        • CloseHandle.KERNEL32(?,?,00451893,00000001,?,?,00000000,?,00462E98,009C7650), ref: 0042CD97
                        • CloseHandle.KERNEL32(?,?,00451893,00000001,?,?,00000000,?,00462E98,009C7650), ref: 0042CD9D
                        • CloseHandle.KERNEL32(?,?,00451893,00000001,?,?,00000000,?,00462E98,009C7650), ref: 0042CDA3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2938389637.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2938374961.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938767233.00000000009DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938787446.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AB6000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000AEE000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2938856942.0000000000B1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2939018539.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_Wow.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 4fefc68a9f4a61966e7ed9d7fe9b725f0aaf2cb9e26fcf0c855a575c74d818f9
                        • Instruction ID: c2211667f1c9e91273ac1e1229bed0ed978b4de4438510f24c4d516a5f9482ba
                        • Opcode Fuzzy Hash: 4fefc68a9f4a61966e7ed9d7fe9b725f0aaf2cb9e26fcf0c855a575c74d818f9
                        • Instruction Fuzzy Hash: 63E0927320031867C220EBAEEC40D8BF3EC5FA9614705492FF645C3211C6B5F8418BA4