Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
app.exe

Overview

General Information

Sample name:app.exe
Analysis ID:1436386
MD5:75b9ef9142a78671d449c8d22ab6be14
SHA1:0461f1c46644acde8020bb59b53b1e34b65977ca
SHA256:e9bc44cf548a70e7285499209973faf44b7374dece1413dfcdc03bf25a6c599c
Tags:185213208245exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to infect the boot sector
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Queries memory information (via WMI often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • app.exe (PID: 5348 cmdline: "C:\Users\user\Desktop\app.exe" MD5: 75B9EF9142A78671D449C8D22AB6BE14)
    • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: app.exeVirustotal: Detection: 11%Perma Link
Source: app.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024404D0 TlsGetValue,TlsGetValue,TlsSetValue,BCryptGenRandom,TlsSetValue,HeapFree,TlsSetValue,0_2_024404D0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024404C0 TlsGetValue,TlsGetValue,TlsSetValue,BCryptGenRandom,0_2_024404C0
Source: app.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00427361 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,0_2_00427361
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0243A710 CloseHandle,FindFirstFileW,FindClose,HeapFree,HeapFree,HeapFree,0_2_0243A710
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02454B93 FindFirstFileExW,0_2_02454B93
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0243FEC0 HeapFree,HeapFree,HeapFree,HeapFree,FindFirstFileW,HeapFree,HeapFree,GetLastError,HeapFree,HeapFree,0_2_0243FEC0
Source: app.exe, 00000000.00000002.2022098881.0000000002300000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://POSTHTTP/1.1Content-Type:
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00424B38 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,0_2_00424B38

System Summary

barindex
Source: app.exeStatic PE information: section name: )m&
Source: app.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024302D0 GetStdHandle,GetLastError,GetConsoleMode,NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,CloseHandle,0_2_024302D0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024377D0 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_024377D0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02419E36 AcquireSRWLockExclusive,AcquireSRWLockExclusive,NtDeviceIoControlFile,RtlNtStatusToDosError,AcquireSRWLockExclusive,AcquireSRWLockExclusive,AcquireSRWLockExclusive,AcquireSRWLockExclusive,0_2_02419E36
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0040A44A: GetCurrentProcess,SetPriorityClass,CreateFileA,DeviceIoControl,CloseHandle,GetCurrentProcess,SetPriorityClass,0_2_0040A44A
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_004092DE0_2_004092DE
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_004043580_2_00404358
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0040941D0_2_0040941D
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0040964F0_2_0040964F
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0040A7700_2_0040A770
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_004077030_2_00407703
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_004077F60_2_004077F6
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00409A380_2_00409A38
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00412AC00_2_00412AC0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00425B560_2_00425B56
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00407DBE0_2_00407DBE
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00404E540_2_00404E54
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00418E0E0_2_00418E0E
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F01BB0_2_023F01BB
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024491D20_2_024491D2
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0242E5F70_2_0242E5F7
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0240AA160_2_0240AA16
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F3ABA0_2_023F3ABA
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024418620_2_02441862
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02401E400_2_02401E40
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0240BD080_2_0240BD08
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024102250_2_02410225
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024132240_2_02413224
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024432390_2_02443239
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024272C20_2_024272C2
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024342F50_2_024342F5
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0241628E0_2_0241628E
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0243F3400_2_0243F340
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D63200_2_023D6320
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0244430E0_2_0244430E
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0244632B0_2_0244632B
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0244D3C00_2_0244D3C0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245D3D00_2_0245D3D0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024153DD0_2_024153DD
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023FC38E0_2_023FC38E
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024533890_2_02453389
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024613BD0_2_024613BD
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023EA0200_2_023EA020
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024130010_2_02413001
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0242E0300_2_0242E030
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024420E30_2_024420E3
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023EB0900_2_023EB090
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D31300_2_023D3130
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245E16F0_2_0245E16F
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0241B13B0_2_0241B13B
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DA1B00_2_023DA1B0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F11A00_2_023F11A0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024211800_2_02421180
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DB1F00_2_023DB1F0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245E6050_2_0245E605
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D26700_2_023D2670
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023EB6950_2_023EB695
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024306900_2_02430690
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0241C6AE0_2_0241C6AE
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E771C0_2_023E771C
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E670C0_2_023E670C
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E77540_2_023E7754
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D37900_2_023D3790
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E47F30_2_023E47F3
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024164680_2_02416468
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D34000_2_023D3400
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F24490_2_023F2449
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245F4C20_2_0245F4C2
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024274D00_2_024274D0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024234D60_2_024234D6
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DE4900_2_023DE490
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DB4C00_2_023DB4C0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024145440_2_02414544
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0244352A0_2_0244352A
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024085C90_2_024085C9
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024485F40_2_024485F4
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02408A440_2_02408A44
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023FBAB00_2_023FBAB0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E3AF80_2_023E3AF8
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02414A880_2_02414A88
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02441B400_2_02441B40
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02412B5E0_2_02412B5E
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023FDB7B0_2_023FDB7B
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023FEB690_2_023FEB69
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02426B1B0_2_02426B1B
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245BB180_2_0245BB18
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F6B580_2_023F6B58
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D1B500_2_023D1B50
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DBB500_2_023DBB50
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DAB900_2_023DAB90
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245D8440_2_0245D844
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0240585F0_2_0240585F
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D48A00_2_023D48A0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DF8EC0_2_023DF8EC
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024438900_2_02443890
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024298A50_2_024298A5
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E39620_2_023E3962
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D99500_2_023D9950
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E799F0_2_023E799F
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02431E400_2_02431E40
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02460E400_2_02460E40
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023FAE370_2_023FAE37
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02427E740_2_02427E74
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02419E360_2_02419E36
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02426ECC0_2_02426ECC
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0241DEE00_2_0241DEE0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F7EF10_2_023F7EF1
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D6EC00_2_023D6EC0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02426F5B0_2_02426F5B
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E2F210_2_023E2F21
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0241CF7C0_2_0241CF7C
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F3C050_2_023F3C05
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02420C000_2_02420C00
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02407C090_2_02407C09
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023E2C6E0_2_023E2C6E
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F7C6F0_2_023F7C6F
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02426CC50_2_02426CC5
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02445CD30_2_02445CD3
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023F7CA30_2_023F7CA3
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245DCE60_2_0245DCE6
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023D2C900_2_023D2C90
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245FCA70_2_0245FCA7
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02412D420_2_02412D42
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02424D4A0_2_02424D4A
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02417D140_2_02417D14
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02418D250_2_02418D25
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02426DD20_2_02426DD2
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02434DD00_2_02434DD0
Source: C:\Users\user\Desktop\app.exeCode function: String function: 00416398 appears 132 times
Source: C:\Users\user\Desktop\app.exeCode function: String function: 0244DE90 appears 33 times
Source: C:\Users\user\Desktop\app.exeCode function: String function: 023D3D50 appears 96 times
Source: C:\Users\user\Desktop\app.exeCode function: String function: 00416EF8 appears 50 times
Source: C:\Users\user\Desktop\app.exeCode function: String function: 0245CAF0 appears 158 times
Source: C:\Users\user\Desktop\app.exeCode function: String function: 0245C9A0 appears 60 times
Source: app.exe, 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs app.exe
Source: app.exeBinary or memory string: OriginalFilename vs app.exe
Source: app.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: app.exeBinary string: Could not open \device\physicalmemory
Source: app.exeBinary string: Could not map view of %X length %XCould not open \device\physicalmemory\device\physicalmemoryRtlNtStatusToDosErrorNtMapViewOfSectionNtOpenSectionNtUnmapViewOfSectionntdll.dllRtlInitUnicodeString%c
Source: classification engineClassification label: mal76.evad.winEXE@2/0@0/0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02432A50 GetModuleHandleW,FormatMessageW,GetLastError,HeapFree,0_2_02432A50
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0040A130 GetVersionExA,CoCreateInstance,CoSetProxyBlanket,VariantInit,lstrlenW,lstrcpynA,WideCharToMultiByte,_strcat,0_2_0040A130
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00423119 EnableWindow,GetActiveWindow,SetActiveWindow,FreeResource,0_2_00423119
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
Source: C:\Users\user\Desktop\app.exeMutant created: \Sessions\1\BaseNamedObjects\hrzbaov
Source: app.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\app.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM Win32_Process
Source: C:\Users\user\Desktop\app.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: app.exeVirustotal: Detection: 11%
Source: unknownProcess created: C:\Users\user\Desktop\app.exe "C:\Users\user\Desktop\app.exe"
Source: C:\Users\user\Desktop\app.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\app.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\app.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: app.exeStatic file information: File size 1290240 > 1048576
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0042C59F VirtualAlloc,VirtualAlloc,LoadLibraryA,GetProcAddress,0_2_0042C59F
Source: app.exeStatic PE information: section name: )m&
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00416398 push eax; ret 0_2_004163B6
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00415460 push eax; ret 0_2_00415474
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00415460 push eax; ret 0_2_0041549C
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0047EC7F push FFFFFFA1h; retf 0_2_0047EC82
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00416F33 push ecx; ret 0_2_00416F43
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024623AD push es; iretd 0_2_02462454
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0245C6A1 push ecx; ret 0_2_0245C6B4
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02463881 push eax; ret 0_2_02463882
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0246691F push eax; ret 0_2_02466997

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\app.exeCode function: CreateFileA,CreateFileA,_strncpy,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,GetSystemDirectoryA,CopyFileA,CreateFileA,DeviceIoControl,CloseHandle,GetCurrentProcess,SetPriorityClass,GetCurrentDirectoryA,CreateFileA,FindResourceA,LoadResource,LockResource,SizeofResource,WriteFile,FreeResource,CloseHandle,CloseHandle,CreateFileA,DeleteFileA,DeviceIoControl,CloseHandle,CloseHandle, \\.\PhysicalDrive%d0_2_0040A770
Source: C:\Users\user\Desktop\app.exeCode function: CreateFileA,CreateFileA,_strncpy,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,GetSystemDirectoryA,CopyFileA,CreateFileA,DeviceIoControl,CloseHandle,GetCurrentProcess,SetPriorityClass,GetCurrentDirectoryA,CreateFileA,FindResourceA,LoadResource,LockResource,SizeofResource,WriteFile,FreeResource,CloseHandle,CloseHandle,CreateFileA,DeleteFileA,DeviceIoControl,CloseHandle,CloseHandle, \\.\PhysicalDrive%d0_2_0040A770
Source: C:\Users\user\Desktop\app.exeCode function: CreateFileA,DeviceIoControl,_strcat,_strcat,CloseHandle, \\.\PhysicalDrive%d0_2_00409F46

Boot Survival

barindex
Source: C:\Users\user\Desktop\app.exeCode function: CreateFileA,CreateFileA,_strncpy,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,GetSystemDirectoryA,CopyFileA,CreateFileA,DeviceIoControl,CloseHandle,GetCurrentProcess,SetPriorityClass,GetCurrentDirectoryA,CreateFileA,FindResourceA,LoadResource,LockResource,SizeofResource,WriteFile,FreeResource,CloseHandle,CloseHandle,CreateFileA,DeleteFileA,DeviceIoControl,CloseHandle,CloseHandle, \\.\PhysicalDrive%d0_2_0040A770
Source: C:\Users\user\Desktop\app.exeCode function: CreateFileA,CreateFileA,_strncpy,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,CloseHandle,CloseHandle,CreateFileA,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,GetSystemDirectoryA,CopyFileA,CreateFileA,DeviceIoControl,CloseHandle,GetCurrentProcess,SetPriorityClass,GetCurrentDirectoryA,CreateFileA,FindResourceA,LoadResource,LockResource,SizeofResource,WriteFile,FreeResource,CloseHandle,CloseHandle,CreateFileA,DeleteFileA,DeviceIoControl,CloseHandle,CloseHandle, \\.\PhysicalDrive%d0_2_0040A770
Source: C:\Users\user\Desktop\app.exeCode function: CreateFileA,DeviceIoControl,_strcat,_strcat,CloseHandle, \\.\PhysicalDrive%d0_2_00409F46
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00401660 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,0_2_00401660
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0040CFF1 IsIconic,GetWindowPlacement,GetWindowRect,0_2_0040CFF1
Source: C:\Users\user\Desktop\app.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\app.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM CIM_Memory
Source: app.exe, 00000000.00000003.1976771818.0000000000871000.00000004.00000020.00020000.00000000.sdmp, app.exe, 00000000.00000002.2021942238.0000000000867000.00000004.00000020.00020000.00000000.sdmp, app.exe, 00000000.00000003.2021386733.0000000000864000.00000004.00000020.00020000.00000000.sdmp, app.exe, 00000000.00000003.2021401793.0000000000866000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00408FF2 rdtsc 0_2_00408FF2
Source: C:\Users\user\Desktop\app.exeCode function: __EH_prolog,LoadLibraryA,FreeLibrary,GetAdaptersInfo,_strcat,GetAdaptersInfo,0_2_00402D69
Source: C:\Users\user\Desktop\app.exeAPI coverage: 1.8 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00427361 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,0_2_00427361
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0243A710 CloseHandle,FindFirstFileW,FindClose,HeapFree,HeapFree,HeapFree,0_2_0243A710
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_02454B93 FindFirstFileExW,0_2_02454B93
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0243FEC0 HeapFree,HeapFree,HeapFree,HeapFree,FindFirstFileW,HeapFree,HeapFree,GetLastError,HeapFree,HeapFree,0_2_0243FEC0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0041E91D VirtualQuery,GetSystemInfo,VirtualQuery,VirtualAlloc,VirtualProtect,0_2_0041E91D
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00408FF2 rdtsc 0_2_00408FF2
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024544E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_024544E2
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0042C59F VirtualAlloc,VirtualAlloc,LoadLibraryA,GetProcAddress,0_2_0042C59F
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0243D430 GetProcessHeap,RtlAllocateHeap,0_2_0243D430
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0041B198 SetUnhandledExceptionFilter,0_2_0041B198
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0041B1AC SetUnhandledExceptionFilter,0_2_0041B1AC
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_023DEAC0 RtlAddVectoredExceptionHandler,SetThreadStackGuarantee,GetLastError,HeapFree,HeapFree,0_2_023DEAC0
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0244E0C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0244E0C8
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_024544E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_024544E2
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0244DC6E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0244DC6E
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0244DDCA SetUnhandledExceptionFilter,0_2_0244DDCA
Source: C:\Users\user\Desktop\app.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00409127 cpuid 0_2_00409127
Source: C:\Users\user\Desktop\app.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,0_2_00401000
Source: C:\Users\user\Desktop\app.exeCode function: GetLocaleInfoA,0_2_0041E705
Source: C:\Users\user\Desktop\app.exeCode function: lstrcpyA,wsprintfA,LoadLibraryA,GetLocaleInfoA,0_2_00429E88
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_0041C882 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0041C882
Source: C:\Users\user\Desktop\app.exeCode function: 0_2_00415DDE EntryPoint,GetVersionExA,GetModuleHandleA,GetModuleHandleA,_fast_error_exit,_fast_error_exit,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,0_2_00415DDE
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
Windows Management Instrumentation
1
Bootkit
1
Process Injection
1
Disable or Modify Tools
1
Input Capture
1
System Time Discovery
Remote Services1
Input Capture
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory33
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Bootkit
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials25
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
app.exe11%ReversingLabs
app.exe11%VirustotalBrowse
app.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://POSTHTTP/1.1Content-Type:0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://POSTHTTP/1.1Content-Type:app.exe, 00000000.00000002.2022098881.0000000002300000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
low
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1436386
Start date and time:2024-05-05 00:18:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:app.exe
Detection:MAL
Classification:mal76.evad.winEXE@2/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 37
  • Number of non-executed functions: 221
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):7.441704402192102
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.83%
  • Windows Screen Saver (13104/52) 0.13%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:app.exe
File size:1'290'240 bytes
MD5:75b9ef9142a78671d449c8d22ab6be14
SHA1:0461f1c46644acde8020bb59b53b1e34b65977ca
SHA256:e9bc44cf548a70e7285499209973faf44b7374dece1413dfcdc03bf25a6c599c
SHA512:14ef889f580c02e319b6d9d899ddbd1bd523c1d8b493eab8b98da6d3d276d76efb9b5694759df7d68bb9d002a8ace8fc82d22121a7b4ea236d5f9cef38cc809c
SSDEEP:24576:CIFxe+AY3rqYsavMOQdbac5IQH97wiI3dzAr09UDZ5YUD8:1xeSNR0vbac5/d8P3diDZ6q
TLSH:8255CF05F3D2B8B1D15192772DC96161B6ED993048D83F0732D0EE5E1B3B9A6B40FE2A
File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........P(..>{..>{..>{?.c{..>{v..{..>{...{..>{f."{..>{e."{..>{F.'{..>{..?{..>{F.~{..>{F."{&.>{...{..>{..5{..>{..^{..>{F.#{..>{F.{{..>
Icon Hash:0f4ecda7ae5d1715
Entrypoint:0x415dde
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x500F9507 [Wed Jul 25 06:41:11 2012 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:26600adf486f72b556f917a64c8fd23f
Instruction
push 00000060h
push 0043A478h
call 00007FD5D0B6F503h
mov edi, 00000094h
mov eax, edi
call 00007FD5D0B6DA5Fh
mov dword ptr [ebp-18h], esp
mov esi, esp
mov dword ptr [esi], edi
push esi
call dword ptr [0042F2B4h]
mov ecx, dword ptr [esi+10h]
mov dword ptr [0044B190h], ecx
mov eax, dword ptr [esi+04h]
mov dword ptr [0044B19Ch], eax
mov edx, dword ptr [esi+08h]
mov dword ptr [0044B1A0h], edx
mov esi, dword ptr [esi+0Ch]
and esi, 00007FFFh
mov dword ptr [0044B194h], esi
cmp ecx, 02h
je 00007FD5D0B6E3FEh
or esi, 00008000h
mov dword ptr [0044B194h], esi
shl eax, 08h
add eax, edx
mov dword ptr [0044B198h], eax
xor esi, esi
push esi
mov edi, dword ptr [0042F20Ch]
call edi
cmp word ptr [eax], 5A4Dh
jne 00007FD5D0B6E411h
mov ecx, dword ptr [eax+3Ch]
add ecx, eax
cmp dword ptr [ecx], 00004550h
jne 00007FD5D0B6E404h
movzx eax, word ptr [ecx+18h]
cmp eax, 0000010Bh
je 00007FD5D0B6E411h
cmp eax, 0000020Bh
je 00007FD5D0B6E3F7h
mov dword ptr [ebp-1Ch], esi
jmp 00007FD5D0B6E419h
cmp dword ptr [ecx+00000084h], 0Eh
jbe 00007FD5D0B6E3E4h
xor eax, eax
cmp dword ptr [ecx+000000F8h], esi
jmp 00007FD5D0B6E400h
cmp dword ptr [ecx+74h], 0Eh
jbe 00007FD5D0B6E3D4h
xor eax, eax
cmp dword ptr [ecx+000000E8h], esi
setne al
mov dword ptr [ebp-1Ch], eax
Programming Language:
  • [ASM] VS2002 (.NET) build 9466
  • [ C ] VS2002 (.NET) build 9466
  • [C++] VS2003 (.NET) build 3077
  • [C++] VS2002 (.NET) build 9466
  • [RES] VS2002 (.NET) build 9466
  • [LNK] VS2002 (.NET) build 9466
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3f9240x118.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d0000x2f5f0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x2f0000x594.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x2db320x2e0007868e2f41e5b3ab908ac5a72a66f5953False0.6095076851222826data6.670624963209676IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x2f0000x126c60x13000efd458d4cde7206fd4c5482997a30ba9False0.4482421875data5.736665908168061IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x420000xa9f40x400007b79e131c84ddfb0842641915843ec1False0.4459228515625data5.072911159589167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x4d0000x2f5f00x300002686df77c23e2ca3144ababd1a5e1501False0.2823994954427083data4.484521144858898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
)m&0x7d0000xc50000xc5000acab40631ef6f655b384348be6aac2b9False0.841724996034264data7.775469163423906IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
JPG0x4f2b00x2b1e6PC bitmap, Windows 3.x format, 635 x 276 x 8, cbSize 176614, bits offset 1078ChineseChina0.27774128891254374
RT_CURSOR0x7a4980x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
RT_CURSOR0x7a5d00xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
RT_CURSOR0x7a6b00x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.36363636363636365
RT_CURSOR0x7a8000x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.35714285714285715
RT_CURSOR0x7a9500x134dataChineseChina0.37337662337662336
RT_CURSOR0x7aaa00x134dataChineseChina0.37662337662337664
RT_CURSOR0x7abf00x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseChina0.36688311688311687
RT_CURSOR0x7ad400x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
RT_CURSOR0x7ae900x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.36688311688311687
RT_CURSOR0x7afe00x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.38636363636363635
RT_CURSOR0x7b1300x134dataChineseChina0.44155844155844154
RT_CURSOR0x7b2800x134dataChineseChina0.4155844155844156
RT_CURSOR0x7b3d00x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.5422077922077922
RT_CURSOR0x7b5200x134dataChineseChina0.2662337662337662
RT_CURSOR0x7b6700x134dataChineseChina0.2824675324675325
RT_CURSOR0x7b7c00x134dataChineseChina0.3246753246753247
RT_BITMAP0x7b9f80xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
RT_BITMAP0x7bab00x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
RT_ICON0x4db700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.6042418772563177
RT_ICON0x4e4300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.6042418772563177
RT_DIALOG0x4ecf00x23edataChineseChina0.5174216027874564
RT_DIALOG0x4ef300x94dataChineseChina0.6959459459459459
RT_DIALOG0x7b9100xe2dataChineseChina0.6637168141592921
RT_STRING0x7bbf80x46dataChineseChina0.6857142857142857
RT_STRING0x7bc400x54dataChineseChina0.8571428571428571
RT_STRING0x7bc980x2cdataChineseChina0.5909090909090909
RT_STRING0x7bcc80x74dataChineseChina0.8448275862068966
RT_STRING0x7bd400x1d0dataChineseChina0.8060344827586207
RT_STRING0x7c0880x164dataChineseChina0.48314606741573035
RT_STRING0x7bf500x132dataChineseChina0.6405228758169934
RT_STRING0x7c5700x50dataChineseChina0.725
RT_STRING0x7bf100x40dataChineseChina0.65625
RT_STRING0x7c4d80x6adataChineseChina0.7452830188679245
RT_STRING0x7c1f00x1d6dataChineseChina0.6723404255319149
RT_STRING0x7c3c80x110dataChineseChina0.625
RT_STRING0x7c5480x24dataChineseChina0.4444444444444444
RT_STRING0x7c5c00x30dataChineseChina0.625
RT_GROUP_CURSOR0x7a6880x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
RT_GROUP_CURSOR0x7ae780x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7a7e80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7ad280x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7abd80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7b5080x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7aa880x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7b1180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7a9380x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7afc80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7b2680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7b3b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7b6580x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7b7a80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_CURSOR0x7b8f80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
RT_GROUP_ICON0x4e4180x14dataChineseChina1.15
RT_GROUP_ICON0x4ecd80x14dataChineseChina1.25
RT_VERSION0x4efc80x2e8dataChineseChina0.5631720430107527
DLLImport
KERNEL32.dllLockFile, UnlockFile, SetEndOfFile, DuplicateHandle, FindClose, FindFirstFileA, GetFullPathNameA, GetCPInfo, GetOEMCP, FileTimeToSystemTime, SetErrorMode, FileTimeToLocalFileTime, GetFileAttributesA, GetFileTime, GetTickCount, HeapAlloc, HeapFree, RtlUnwind, GetStartupInfoA, GetCommandLineA, RaiseException, GetSystemTimeAsFileTime, ExitProcess, TerminateProcess, HeapReAlloc, HeapSize, FlushFileBuffers, HeapCreate, VirtualFree, VirtualAlloc, IsBadWritePtr, GetStdHandle, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, GetCurrentProcessId, LCMapStringA, LCMapStringW, GetTimeZoneInformation, IsBadReadPtr, IsBadCodePtr, VirtualProtect, GetSystemInfo, VirtualQuery, SetStdHandle, SetEnvironmentVariableA, SetFilePointer, GlobalFlags, WritePrivateProfileStringA, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, TlsGetValue, EnterCriticalSection, GlobalHandle, GlobalReAlloc, LeaveCriticalSection, LocalAlloc, GlobalGetAtomNameA, GlobalFindAtomA, lstrcatA, lstrcmpW, GlobalAddAtomA, GetCurrentThread, GetCurrentThreadId, GlobalDeleteAtom, lstrcmpA, ConvertDefaultLocale, EnumResourceLanguagesA, lstrcpyA, SetLastError, GlobalFree, MulDiv, GlobalAlloc, GlobalLock, GlobalUnlock, GetModuleHandleA, GetProcAddress, FormatMessageA, LocalFree, CopyFileA, GetCurrentDirectoryA, FreeResource, OpenFile, GetCurrentProcess, SetPriorityClass, lstrcpynA, DeviceIoControl, ReadFile, GetFileSize, GetLastError, QueryPerformanceCounter, QueryPerformanceFrequency, GetSystemDirectoryA, CreateFileA, WriteFile, CloseHandle, DeleteFileA, GetModuleFileNameA, LoadLibraryA, FreeLibrary, GetVolumeInformationA, OutputDebugStringA, DebugBreak, InterlockedIncrement, InterlockedDecrement, FindResourceA, LoadResource, LockResource, SizeofResource, lstrlenA, lstrcmpiA, CompareStringW, lstrlenW, CompareStringA, GetVersion, WideCharToMultiByte, MultiByteToWideChar, GetVersionExA, GetThreadLocale, GetLocaleInfoA, GetACP, HeapDestroy, InterlockedExchange
USER32.dllInvalidateRgn, SetCapture, ReleaseCapture, GetNextDlgGroupItem, MessageBeep, RegisterClipboardFormatA, PostThreadMessageA, GetForegroundWindow, GetTopWindow, UnhookWindowsHookEx, GetMessagePos, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, GetSysColor, AdjustWindowRectEx, EqualRect, GetClassInfoA, RegisterClassA, UnregisterClassA, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, OffsetRect, IntersectRect, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, CopyRect, PtInRect, GetWindow, SetWindowContextHelpId, MapDialogRect, SetWindowPos, GetDesktopWindow, SetActiveWindow, EndPaint, DestroyWindow, IsWindow, InvalidateRect, GetNextDlgTabItem, EndDialog, SetMenuItemBitmaps, GetFocus, ModifyMenuA, EnableMenuItem, CheckMenuItem, GetMenuCheckMarkDimensions, LoadBitmapA, SetWindowsHookExA, CallNextHookEx, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, GetParent, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, SetCursor, PostMessageA, PostQuitMessage, wsprintfA, GetMenuState, GetMenuItemID, GetMenuItemCount, CharLowerA, CharUpperA, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, GetSubMenu, MessageBoxA, CharNextA, wvsprintfA, GetSystemMetrics, LoadIconA, EnableWindow, GetClientRect, IsIconic, GetSystemMenu, SendMessageA, AppendMenuA, CopyAcceleratorTableA, SetRect, IsRectEmpty, DrawIcon, LoadCursorA, GetDlgItem, GetSysColorBrush, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, DestroyMenu, ShowWindow, MoveWindow, SetWindowTextA, IsDialogMessageA, RegisterWindowMessageA, WinHelpA, GetCapture, CreateWindowExA, GetClassLongA, GetClassInfoExA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SendDlgItemMessageA, SetFocus, IsChild, GetWindowTextLengthA, CreateDialogIndirectParamA, GetWindowTextA, GetMessageTime
GDI32.dllSetMapMode, DeleteObject, GetViewportExtEx, GetWindowExtEx, PtVisible, RectVisible, TextOutA, Escape, SelectObject, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowExtEx, ScaleWindowExtEx, ExtSelectClipRgn, DeleteDC, GetStockObject, GetBkColor, GetTextColor, CreateRectRgnIndirect, GetRgnBox, GetMapMode, RestoreDC, SaveDC, ExtTextOutA, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap, GetDeviceCaps
comdlg32.dllGetFileTitleA
WINSPOOL.DRVClosePrinter, DocumentPropertiesA, OpenPrinterA
ADVAPI32.dllRegEnumKeyA, RegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegCloseKey, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegOpenKeyA
COMCTL32.dll
SHLWAPI.dllPathFindExtensionA, PathFindFileNameA, PathStripToRootA, PathIsUNCA
oledlg.dll
ole32.dllCreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CLSIDFromString, CLSIDFromProgID, CoTaskMemAlloc, OleInitialize, OleUninitialize, CoTaskMemFree, CoCreateInstance, CoSetProxyBlanket, CoInitialize, CoUninitialize, CoRevokeClassObject, OleIsCurrentClipboard, OleFlushClipboard, CoFreeUnusedLibraries, CoRegisterMessageFilter
OLEAUT32.dllVariantInit, SysAllocStringLen, VariantClear, VariantChangeType, SysStringLen, SysAllocStringByteLen, OleCreateFontIndirect, SystemTimeToVariantTime, SafeArrayDestroy, VariantCopy, SysAllocString, SysFreeString
iphlpapi.dllGetAdaptersInfo
OLEACC.dllLresultFromObject, CreateStdAccessibleObject
Language of compilation systemCountry where language is spokenMap
ChineseChina
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:00:18:52
Start date:05/05/2024
Path:C:\Users\user\Desktop\app.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\app.exe"
Imagebase:0x400000
File size:1'290'240 bytes
MD5 hash:75B9EF9142A78671D449C8D22AB6BE14
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:00:18:52
Start date:05/05/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:1.6%
    Dynamic/Decrypted Code Coverage:88.3%
    Signature Coverage:57%
    Total number of Nodes:1329
    Total number of Limit Nodes:29
    execution_graph 96662 23f3aba 96850 242e5f7 96662->96850 96664 23f3ae1 96665 23f6313 96664->96665 96879 24496a2 CoInitializeEx 96664->96879 96666 243d2e0 81 API calls 96665->96666 96668 23f44c0 96666->96668 96670 23f632e CloseHandle 96668->96670 96821 23f4759 96668->96821 96670->96821 96671 23f3b1b 96674 23f543f 96671->96674 96889 240aa16 96671->96889 96672 23f44a0 97078 23f008b 74 API calls 96672->97078 97115 243d2e0 96674->97115 96682 23f3b3c 97030 23fa6fc 97 API calls 96682->97030 96686 23f3b41 97031 23ea020 167 API calls __InternalCxxFrameHandler 96686->97031 96689 23f3b46 97032 244814c 96689->97032 96692 23f5552 96694 23f555f 96692->96694 96695 23f630e 96692->96695 97120 23fbab0 98 API calls 2 library calls 96694->97120 97124 23ecdfe 92 API calls __InternalCxxFrameHandler 96695->97124 96699 23f558b 96702 23f5593 96699->96702 96703 244814c 74 API calls 96699->96703 96700 23f53f7 96707 245cda0 74 API calls 96700->96707 96701 23f3bdc 97042 23d17d0 96701->97042 96706 23f6097 96702->96706 97121 23f172d 79 API calls 96702->97121 96703->96702 96704 23f551c HeapFree 96708 23f5306 96704->96708 96711 23f60bb 96706->96711 96712 23f60a7 HeapFree 96706->96712 96707->96695 96708->96692 96708->96694 96708->96700 96708->96704 96713 23f6512 96708->96713 97027 23d3d50 96708->97027 96709 23f3ff6 96714 23f4001 HeapFree 96709->96714 96722 23f4018 96709->96722 96715 23f60d8 96711->96715 96716 23f60c4 HeapFree 96711->96716 96712->96711 97125 2431a40 6 API calls 96713->97125 96714->96722 97122 23eb620 HeapFree HeapFree HeapFree 96715->97122 96716->96715 96719 23f651e 96721 23d23c0 74 API calls 96719->96721 96720 23f60e3 97123 23eccac 13 API calls 96720->97123 96724 23f653f 96721->96724 97057 24368a0 96722->97057 96727 23d23c0 74 API calls 96724->96727 96726 23f60ee 96726->96668 96729 23f60f7 HeapFree 96726->96729 96730 23f654e 96727->96730 96729->96668 96731 23d23c0 74 API calls 96730->96731 96733 23f655f 96731->96733 96732 23f40ac 97060 23d23c0 96732->97060 96734 244814c 74 API calls 96735 23f4146 96734->96735 96735->96732 96736 23f416f HeapFree 96735->96736 96736->96732 96738 23f4198 96739 23f419c HeapFree 96738->96739 96740 23f41ae __InternalCxxFrameHandler 96738->96740 96739->96740 97070 24485f4 96740->97070 96743 23f447c GetLastError 97077 23f00bf 74 API calls 96743->97077 96745 23f4491 96748 23f487b HeapFree 96745->96748 96838 23f4742 96745->96838 96746 23f4339 97076 23eb090 77 API calls __InternalCxxFrameHandler 96746->97076 96748->96838 96749 23f434e 96750 23f5414 96749->96750 96751 23f4361 96749->96751 97112 245cda0 96750->97112 96752 24485f4 76 API calls 96751->96752 96754 23f43b7 96752->96754 96757 23f44cc GetLastError 96754->96757 96760 23f43e6 96754->96760 96756 23f48f1 HeapFree 96756->96838 97079 23f00bf 74 API calls 96757->97079 96763 24485f4 76 API calls 96760->96763 96761 23f493e HeapFree 96761->96838 96762 23f44ed 96764 23f4865 96762->96764 96765 23f4853 HeapFree 96762->96765 96766 23f4415 96763->96766 97084 23eb620 HeapFree HeapFree HeapFree 96764->97084 96765->96764 96768 24485f4 76 API calls 96766->96768 96773 23f443e 96768->96773 96769 24368a0 91 API calls 96769->96838 96770 23f4765 GetLastError 97082 23f00bf 74 API calls 96770->97082 96773->96770 96782 23f453e 96773->96782 96774 23f4798 96775 23f4833 96774->96775 96776 23f4821 HeapFree 96774->96776 96775->96762 96778 23f483a HeapFree 96775->96778 96776->96775 96777 23f4a6d HeapFree 96777->96838 96778->96762 96779 23f4a9c HeapFree 96779->96838 96780 23f4acf HeapFree 96780->96838 96781 23f45c5 96784 244814c 74 API calls 96781->96784 96782->96781 96791 23f47a4 GetLastError 96782->96791 96783 2412af0 104 API calls 96783->96838 96786 23f45d6 96784->96786 96785 23f4afc HeapFree 96785->96838 96790 23f4615 96786->96790 96802 23f5374 GetLastError 96786->96802 97080 23d1570 75 API calls __InternalCxxFrameHandler 96790->97080 97083 23f00bf 74 API calls 96791->97083 96793 23f4b3a HeapFree 96793->96838 96794 23f4621 96795 244814c 74 API calls 96794->96795 96803 23f4633 __InternalCxxFrameHandler 96795->96803 96798 23f4b7a HeapFree 96798->96838 96799 23f53b9 96799->96774 96801 23f53c9 HeapFree 96799->96801 96801->96700 96801->96774 97111 23f00bf 74 API calls 96802->97111 96805 23f465f HeapFree 96803->96805 96812 23f4671 96803->96812 96805->96812 96806 23f46cc 96808 23f46e5 96806->96808 96809 23f46d3 HeapFree 96806->96809 96807 23f46b7 HeapFree 96807->96806 96813 23f46fe 96808->96813 96814 23f46ec HeapFree 96808->96814 96809->96808 96810 23f4bd9 HeapFree 96810->96838 96812->96806 96812->96807 96815 23f4717 96813->96815 96816 23f4705 HeapFree 96813->96816 96814->96813 97081 23eb620 HeapFree HeapFree HeapFree 96815->97081 96816->96815 96818 23f4c16 HeapFree 96818->96838 96819 23f4723 96820 23f472d HeapFree 96819->96820 96819->96838 96820->96838 96822 244814c 74 API calls 96822->96838 96823 23d23c0 74 API calls 96823->96838 96824 23f4d49 HeapFree 96824->96838 96825 23f4d78 HeapFree 96825->96838 96826 23f4dab HeapFree 96826->96838 96828 23f4dd8 HeapFree 96828->96838 96831 23f4ee1 HeapFree 96831->96838 96833 23f4ea9 HeapFree 96833->96838 96834 23f4f4e HeapFree 96834->96838 96835 23f4f66 HeapFree 96835->96838 96837 23d17d0 75 API calls 96837->96838 96838->96756 96838->96761 96838->96769 96838->96777 96838->96779 96838->96780 96838->96783 96838->96785 96838->96793 96838->96798 96838->96810 96838->96818 96838->96821 96838->96822 96838->96823 96838->96824 96838->96825 96838->96826 96838->96828 96838->96831 96838->96833 96838->96834 96838->96835 96838->96837 96840 23f50fb 96838->96840 96841 23f512c 96838->96841 97085 23eb669 HeapFree HeapFree 96838->97085 97086 24148dc 81 API calls 96838->97086 97087 243c1e0 95 API calls 96838->97087 97088 2414960 81 API calls 96838->97088 97089 24149e6 76 API calls 96838->97089 97090 2414a88 104 API calls 2 library calls 96838->97090 97091 2414544 88 API calls _unexpected 96838->97091 97092 243c4e0 89 API calls 96838->97092 97093 2415c70 75 API calls __InternalCxxFrameHandler 96838->97093 97094 23f222c HeapFree 96838->97094 97095 24150ce 75 API calls 96838->97095 96840->96841 96842 23f5104 HeapFree 96840->96842 97096 242a0ed 74 API calls 96841->97096 96842->96841 96844 23f5195 96844->96700 97097 23efb56 HeapFree HeapFree HeapFree HeapFree 96844->97097 96846 23f51bd 96847 244814c 74 API calls 96846->96847 96848 23f529f 96847->96848 97098 24066ee 96848->97098 96852 242e60f 96850->96852 96857 242e656 96852->96857 97126 243d430 96852->97126 96854 242e9df 97135 245c900 74 API calls 96854->97135 96856 242e9eb GetModuleHandleA 96858 242ea25 96856->96858 96859 242ea01 GetProcAddress 96856->96859 96863 242e8b4 96857->96863 97133 23dea05 76 API calls 96857->97133 96858->96664 96859->96858 96861 242ea13 GetProcAddress 96859->96861 96861->96858 96865 242e92c 96863->96865 96867 242e950 HeapFree 96863->96867 96868 242e905 HeapReAlloc 96863->96868 96864 242e966 CreateMutexW GetLastError 96870 242e97c 96864->96870 96876 242e981 96864->96876 96865->96864 96869 242e93c 96865->96869 96866 242e866 96866->96857 96866->96865 96873 242e89b 96866->96873 96867->96864 96868->96864 96872 242e920 96868->96872 96869->96664 96875 242e997 CloseHandle 96870->96875 96870->96876 96871 242e6e6 96871->96866 97131 2461823 76 API calls 96871->97131 97134 245c900 74 API calls 96872->97134 96873->96863 97132 23dea05 76 API calls 96873->97132 96875->96876 96876->96869 96877 242e9c8 HeapFree 96876->96877 96877->96869 96880 24496c5 CoInitializeSecurity 96879->96880 96881 244972e 96879->96881 96883 23f3b0e 96880->96883 96884 24496f1 96880->96884 97138 2448b49 86 API calls 96881->97138 96883->96671 96883->96672 97136 2448b49 86 API calls 96884->97136 96886 24496f8 96887 2449735 96886->96887 97137 24495b0 HeapFree 96886->97137 96887->96883 97139 2449760 CoCreateInstance 96889->97139 96892 240ac6c 97606 24495b0 HeapFree 96892->97606 96894 240aa49 96894->96894 97158 23f1c36 96894->97158 96895 240ac78 96900 244814c 74 API calls 96895->96900 96898 240ac7d 97607 24495b0 HeapFree 96898->97607 96904 240b56a 96900->96904 96901 240ac66 97185 240920c 96901->97185 96906 240b6bd 96904->96906 96917 240b5c0 96904->96917 97201 24067dd 96904->97201 96907 240b6c4 HeapFree 96906->96907 96908 240b6d6 96906->96908 96907->96908 97210 240bd08 96908->97210 96909 23d17d0 75 API calls 96909->96917 96911 23d23c0 74 API calls 96919 240ab14 96911->96919 96912 240b6db 96916 240b6e3 96912->96916 96935 240b79c __aulldiv __aullrem 96912->96935 96913 240acb5 __InternalCxxFrameHandler _unexpected 96921 244814c 74 API calls 96913->96921 96914 24485f4 76 API calls 96915 240b65b GetModuleHandleW 96914->96915 96915->96917 96918 240b66f HeapFree 96915->96918 97615 2436d30 84 API calls 96916->97615 96917->96904 96917->96909 96917->96914 96922 240b684 HeapFree 96917->96922 96926 240b69b 96917->96926 96918->96917 96919->96901 96919->96911 97604 23f37b6 76 API calls 96919->97604 97605 23e26a3 HeapFree HeapFree 96919->97605 96925 240ad56 __InternalCxxFrameHandler 96921->96925 96922->96917 96924 240b6f1 96927 240bac1 96924->96927 96928 240b6fe 96924->96928 96934 24066ee 78 API calls 96925->96934 96930 240b6a6 HeapFree 96926->96930 96926->96935 97618 243c8b0 74 API calls 96927->97618 97616 2406aa8 HeapFree HeapFree 96928->97616 96930->96935 96932 240b711 96932->96935 96949 240bcd9 96932->96949 96937 240ad9e 96934->96937 96941 240b90a 96935->96941 97617 241a869 76 API calls 96935->97617 96940 244814c 74 API calls 96937->96940 96944 240ade4 96940->96944 96945 240b930 HeapFree 96941->96945 96946 240b93f 96941->96946 96951 240ae04 96944->96951 97608 23f37b6 76 API calls 96944->97608 96945->96946 96948 23d17d0 75 API calls 96946->96948 96952 240b9ab 96948->96952 96953 23f3b37 96949->96953 96954 244814c 74 API calls 96951->96954 96955 23d17d0 75 API calls 96952->96955 97029 23fa578 6 API calls 2 library calls 96953->97029 96956 240ae7f 96954->96956 96957 240b9d9 96955->96957 96958 240aea6 96956->96958 97609 23f37b6 76 API calls 96956->97609 96959 24485f4 76 API calls 96957->96959 96964 244814c 74 API calls 96958->96964 96961 240ba03 96959->96961 96962 24485f4 76 API calls 96961->96962 96965 240ba35 MessageBoxW 96962->96965 96967 240af12 96964->96967 96968 240ba5c 96965->96968 96969 240ba4d HeapFree 96965->96969 96971 240af31 96967->96971 97610 23f37b6 76 API calls 96967->97610 96973 240ba63 HeapFree 96968->96973 96974 240ba75 96968->96974 96969->96968 96970 240bd01 96972 243d2e0 81 API calls 96970->96972 96978 244814c 74 API calls 96971->96978 96973->96974 96974->96970 96977 240ba87 96974->96977 96979 240baa0 96977->96979 96980 240ba8e HeapFree 96977->96980 96982 240afac 96978->96982 96979->96953 96983 240baa7 HeapFree 96979->96983 96980->96979 96985 240afd3 96982->96985 97611 23f37b6 76 API calls 96982->97611 96983->96953 96987 244814c 74 API calls 96985->96987 96988 240b04e 96987->96988 96989 240b075 96988->96989 97612 23f37b6 76 API calls 96988->97612 96991 244814c 74 API calls 96989->96991 96992 240b0dd 96991->96992 96994 240b0f9 96992->96994 97613 23f37b6 76 API calls 96992->97613 96994->96994 96995 244814c 74 API calls 96994->96995 96996 240b1d9 96995->96996 97023 240b209 96996->97023 97614 23f37b6 76 API calls 96996->97614 96997 240b44e 97191 24091b0 96997->97191 97001 240b41f 97003 240b728 HeapFree 97001->97003 97004 240b739 97001->97004 97003->97004 97006 24091b0 2 API calls 97004->97006 97009 240b745 97006->97009 97007 240b48c 97010 240b49a HeapFree 97007->97010 97011 240b4ac 97007->97011 97008 240b47d HeapFree 97008->97007 97012 241af4f HeapFree 97009->97012 97010->97011 97011->96895 97013 240b4b3 HeapFree 97011->97013 97014 240b754 97012->97014 97013->96895 97016 240b76a 97014->97016 97017 240b75b HeapFree 97014->97017 97015 240b42b HeapFree 97015->97023 97019 240b771 HeapFree 97016->97019 97020 240b783 97016->97020 97017->97016 97018 23d1b50 75 API calls 97018->97023 97019->97020 97020->96935 97022 240b78a HeapFree 97020->97022 97021 23d17d0 75 API calls 97021->97023 97022->96935 97023->96997 97023->97001 97023->97015 97023->97018 97023->97021 97024 240b3c4 HeapFree 97023->97024 97025 240b3e0 HeapFree 97023->97025 97026 240b3f9 HeapFree 97023->97026 97024->97023 97025->97023 97026->97023 97876 23d3d5e 97027->97876 97029->96682 97030->96686 97031->96689 97033 2448153 97032->97033 97035 23f3b5a 97032->97035 97034 2448183 97033->97034 97036 2448155 97033->97036 97895 23d10d0 74 API calls 97034->97895 97041 23fa769 88 API calls 97035->97041 97038 243d430 2 API calls 97036->97038 97039 244816c 97038->97039 97039->97035 97894 245c900 74 API calls 97039->97894 97041->96701 97043 23d18f6 97042->97043 97048 23d180d 97042->97048 97896 23d4040 97043->97896 97046 23d192d 97046->96709 97047 245cda0 74 API calls 97049 23d196e 97047->97049 97048->97043 97048->97049 97051 243d430 2 API calls 97048->97051 97903 23d10d0 74 API calls 97049->97903 97053 23d18df 97051->97053 97052 23d197f 97054 23d198d HeapFree 97052->97054 97055 23d199e 97052->97055 97053->97043 97902 245c900 74 API calls 97053->97902 97054->97055 97055->96709 97904 2435900 97057->97904 97061 23d23d0 97060->97061 97064 23d23f4 __InternalCxxFrameHandler 97060->97064 97062 23d2411 97061->97062 97063 23d23d2 97061->97063 97963 23d10d0 74 API calls 97062->97963 97066 243d430 2 API calls 97063->97066 97064->96738 97068 23d23e2 97066->97068 97067 23d2416 97068->97064 97962 245c900 74 API calls 97068->97962 97073 2448608 97070->97073 97071 23f430b 97071->96743 97071->96746 97073->97071 97964 244832f 76 API calls 97073->97964 97074 244873e 97074->97071 97965 2461847 76 API calls 97074->97965 97076->96749 97077->96745 97078->96668 97079->96762 97080->96794 97081->96819 97082->96774 97083->96774 97084->96745 97085->96838 97086->96838 97087->96838 97088->96838 97089->96838 97090->96838 97091->96838 97092->96838 97093->96838 97094->96838 97095->96838 97096->96844 97097->96846 97099 24067dd 76 API calls 97098->97099 97100 2406700 97099->97100 97101 243d430 2 API calls 97100->97101 97110 2406791 97100->97110 97102 2406721 97101->97102 97103 2406729 97102->97103 97104 24067ce 97102->97104 97106 24067dd 76 API calls 97103->97106 97967 245c900 74 API calls 97104->97967 97107 2406764 97106->97107 97108 24067dd 76 API calls 97107->97108 97107->97110 97966 2446f51 76 API calls 97107->97966 97108->97107 97110->96708 97111->96799 97968 245c9a0 74 API calls 97112->97968 97969 243d2f0 80 API calls 97115->97969 97117 243d2e8 97970 243d330 ExitProcess 97117->97970 97120->96699 97121->96706 97122->96720 97123->96726 97124->96665 97125->96719 97127 243d43f GetProcessHeap 97126->97127 97128 243d44e RtlAllocateHeap 97126->97128 97129 242e6de 97127->97129 97130 243d449 97127->97130 97128->97129 97129->96854 97129->96871 97130->97128 97131->96871 97132->96863 97133->96863 97134->96865 97135->96856 97136->96886 97138->96887 97140 244982f 97139->97140 97141 244978f 97139->97141 97644 2448b49 86 API calls 97140->97644 97142 240aa3a 97141->97142 97619 24491d2 97141->97619 97142->96892 97142->96894 97145 2449836 97145->97142 97147 24497dc 97150 24497e7 97147->97150 97151 2449860 97147->97151 97148 244984d 97645 2448b49 86 API calls 97148->97645 97154 24497f2 CoSetProxyBlanket 97150->97154 97155 24497eb SysFreeString 97150->97155 97151->97142 97153 2449864 SysFreeString 97151->97153 97152 2449854 97152->97151 97153->97142 97154->97142 97156 2449883 97154->97156 97155->97154 97646 2448b49 86 API calls 97156->97646 97159 24491d2 92 API calls 97158->97159 97160 23f1c5a 97159->97160 97161 24491d2 92 API calls 97160->97161 97162 23f1c66 97161->97162 97652 23f1ba7 97162->97652 97165 23f1c7f 97169 23f1c9c 97165->97169 97170 23f1c95 SysFreeString 97165->97170 97166 23f1cb9 97167 23f1cc8 97166->97167 97168 23f1cc1 SysFreeString 97166->97168 97171 23f1ccc SysFreeString 97167->97171 97172 23f1cd3 97167->97172 97168->97167 97173 23f1ca7 97169->97173 97174 23f1ca0 SysFreeString 97169->97174 97170->97169 97171->97172 97658 23f0194 97172->97658 97173->96898 97173->96919 97174->97173 97186 240922b 97185->97186 97187 240921b 97185->97187 97188 2409241 97186->97188 97189 2409231 HeapFree 97186->97189 97187->97186 97784 23e26a3 HeapFree HeapFree 97187->97784 97188->96913 97189->97188 97192 24091f1 97191->97192 97193 24091cb 97191->97193 97194 2409207 97192->97194 97195 24091f7 HeapFree 97192->97195 97193->97192 97196 24091df HeapFree 97193->97196 97197 241af4f 97194->97197 97195->97194 97196->97193 97198 241af53 97197->97198 97199 240b476 97197->97199 97198->97199 97200 241af69 HeapFree 97198->97200 97199->97007 97199->97008 97200->97198 97202 24067ee 97201->97202 97203 24067f3 97201->97203 97202->96904 97203->97202 97785 245ca90 74 API calls 97203->97785 97211 2449760 96 API calls 97210->97211 97212 240bd2c 97211->97212 97213 2410100 97212->97213 97215 243d430 2 API calls 97212->97215 97282 240c877 97213->97282 97871 24495b0 HeapFree 97213->97871 97216 240bd5a 97215->97216 97217 24101a0 97216->97217 97221 240bd69 97216->97221 97873 245c900 74 API calls 97217->97873 97219 24101af 97874 245ce20 74 API calls 97219->97874 97221->97221 97224 244814c 74 API calls 97221->97224 97222 24101b9 97875 245ce20 74 API calls 97222->97875 97227 240bdda 97224->97227 97225 24101c3 97226 245cda0 74 API calls 97225->97226 97228 24101e6 97226->97228 97227->97227 97229 244814c 74 API calls 97227->97229 97228->96912 97230 240be75 97229->97230 97231 244814c 74 API calls 97230->97231 97232 240bf1e 97231->97232 97233 244814c 74 API calls 97232->97233 97234 240bfc4 97233->97234 97235 244814c 74 API calls 97234->97235 97236 240c052 97235->97236 97237 244814c 74 API calls 97236->97237 97238 240c0f7 97237->97238 97239 244814c 74 API calls 97238->97239 97240 240c183 97239->97240 97241 244814c 74 API calls 97240->97241 97242 240c217 97241->97242 97243 244814c 74 API calls 97242->97243 97290 240c2a7 97243->97290 97244 240c6ae 97246 24091b0 2 API calls 97244->97246 97245 23d23c0 74 API calls 97245->97290 97248 240c6cf 97246->97248 97247 24491d2 92 API calls 97247->97290 97250 23f1c36 132 API calls 97248->97250 97249 23f1ba7 86 API calls 97249->97290 97251 240c75c 97250->97251 97253 240c823 97251->97253 97259 240c76b 97251->97259 97252 240c473 SysFreeString 97252->97290 97790 243c4e0 89 API calls 97253->97790 97254 240c456 SysFreeString 97254->97290 97256 240c491 SysFreeString 97256->97290 97257 240c870 97791 24495b0 HeapFree 97257->97791 97264 23f1c36 132 API calls 97259->97264 97428 240c794 97259->97428 97260 240c4a2 HeapFree 97260->97290 97262 23f0194 117 API calls 97262->97290 97263 240c7a2 97788 243c4e0 89 API calls 97263->97788 97267 240c9e5 97264->97267 97265 240c889 97268 23d23c0 74 API calls 97265->97268 97271 240e537 97267->97271 97285 240c9fe 97267->97285 97274 240c8b7 97268->97274 97269 23f1bfe HeapFree HeapFree HeapFree 97269->97290 97270 240c817 97789 24495b0 HeapFree 97270->97789 97824 243c4e0 89 API calls 97271->97824 97273 240e59c 97273->97282 97827 24495b0 HeapFree 97273->97827 97792 243c4e0 89 API calls 97274->97792 97279 240c690 HeapFree 97279->97290 97280 240e584 97825 24495b0 HeapFree 97280->97825 97281 240c81e 97288 240c924 HeapFree 97281->97288 97289 240c939 97281->97289 97282->96912 97283 240c8f5 97286 240c8fc HeapFree 97283->97286 97287 240c90e 97283->97287 97285->97285 97293 244814c 74 API calls 97285->97293 97286->97287 97793 23f1bfe HeapFree HeapFree HeapFree 97287->97793 97288->97289 97292 24091b0 2 API calls 97289->97292 97290->97244 97290->97245 97290->97247 97290->97249 97290->97252 97290->97254 97290->97256 97290->97260 97290->97262 97290->97263 97290->97265 97290->97269 97290->97279 97786 23f36d9 76 API calls 97290->97786 97787 245eb2c 83 API calls 97290->97787 97292->97282 97294 240caac 97293->97294 97297 240caec 97294->97297 97794 23f37b6 76 API calls 97294->97794 97297->97297 97298 244814c 74 API calls 97297->97298 97299 240cb88 97298->97299 97301 240cbc8 97299->97301 97795 23f37b6 76 API calls 97299->97795 97301->97301 97302 244814c 74 API calls 97301->97302 97303 240cc64 97302->97303 97305 240cca4 97303->97305 97796 23f37b6 76 API calls 97303->97796 97305->97305 97306 244814c 74 API calls 97305->97306 97307 240cd40 97306->97307 97309 240cd80 97307->97309 97797 23f37b6 76 API calls 97307->97797 97309->97309 97310 244814c 74 API calls 97309->97310 97311 240ce1c 97310->97311 97313 240ce5c 97311->97313 97798 23f37b6 76 API calls 97311->97798 97313->97313 97314 244814c 74 API calls 97313->97314 97315 240cef8 97314->97315 97317 240cf38 97315->97317 97799 23f37b6 76 API calls 97315->97799 97317->97317 97318 244814c 74 API calls 97317->97318 97319 240cfd4 97318->97319 97321 240d014 97319->97321 97800 23f37b6 76 API calls 97319->97800 97322 244814c 74 API calls 97321->97322 97323 240d0b0 97322->97323 97325 240d0f0 97323->97325 97801 23f37b6 76 API calls 97323->97801 97325->97325 97326 244814c 74 API calls 97325->97326 97327 240d18c 97326->97327 97329 240d1cc 97327->97329 97802 23f37b6 76 API calls 97327->97802 97329->97329 97330 244814c 74 API calls 97329->97330 97331 240d268 97330->97331 97333 240d2a8 97331->97333 97803 23f37b6 76 API calls 97331->97803 97333->97333 97334 244814c 74 API calls 97333->97334 97335 240d344 97334->97335 97337 240d384 97335->97337 97804 23f37b6 76 API calls 97335->97804 97337->97337 97338 244814c 74 API calls 97337->97338 97339 240d431 97338->97339 97341 240d471 97339->97341 97805 23f37b6 76 API calls 97339->97805 97341->97341 97342 244814c 74 API calls 97341->97342 97343 240d51e 97342->97343 97345 240d55e 97343->97345 97806 23f37b6 76 API calls 97343->97806 97345->97345 97346 244814c 74 API calls 97345->97346 97347 240d5fa 97346->97347 97349 240d63a 97347->97349 97807 23f37b6 76 API calls 97347->97807 97349->97349 97350 244814c 74 API calls 97349->97350 97351 240d6d6 97350->97351 97353 240d716 97351->97353 97808 23f37b6 76 API calls 97351->97808 97354 244814c 74 API calls 97353->97354 97355 240d7b2 97354->97355 97357 240d7f2 97355->97357 97809 23f37b6 76 API calls 97355->97809 97357->97357 97358 244814c 74 API calls 97357->97358 97359 240d88e 97358->97359 97361 240d8ce 97359->97361 97810 23f37b6 76 API calls 97359->97810 97361->97361 97362 244814c 74 API calls 97361->97362 97363 240d96a 97362->97363 97365 240d9aa 97363->97365 97811 23f37b6 76 API calls 97363->97811 97365->97365 97366 244814c 74 API calls 97365->97366 97367 240da46 97366->97367 97369 240da86 97367->97369 97812 23f37b6 76 API calls 97367->97812 97369->97369 97370 244814c 74 API calls 97369->97370 97371 240db22 97370->97371 97373 240db62 97371->97373 97813 23f37b6 76 API calls 97371->97813 97373->97373 97374 244814c 74 API calls 97373->97374 97375 240dbfe 97374->97375 97377 240dc3e 97375->97377 97814 23f37b6 76 API calls 97375->97814 97377->97377 97378 244814c 74 API calls 97377->97378 97379 240dcda 97378->97379 97381 240dd1a 97379->97381 97815 23f37b6 76 API calls 97379->97815 97381->97381 97382 244814c 74 API calls 97381->97382 97383 240ddb6 97382->97383 97385 240ddf6 97383->97385 97816 23f37b6 76 API calls 97383->97816 97386 244814c 74 API calls 97385->97386 97387 240de92 97386->97387 97389 240ded2 97387->97389 97817 23f37b6 76 API calls 97387->97817 97389->97389 97390 244814c 74 API calls 97389->97390 97391 240df6e 97390->97391 97393 240dfae 97391->97393 97818 23f37b6 76 API calls 97391->97818 97393->97393 97394 244814c 74 API calls 97393->97394 97395 240e04a 97394->97395 97397 240e08a 97395->97397 97819 23f37b6 76 API calls 97395->97819 97397->97397 97398 244814c 74 API calls 97397->97398 97399 240e126 97398->97399 97401 240e166 97399->97401 97820 23f37b6 76 API calls 97399->97820 97401->97401 97402 244814c 74 API calls 97401->97402 97403 240e202 97402->97403 97405 240e242 97403->97405 97821 23f37b6 76 API calls 97403->97821 97405->97405 97406 244814c 74 API calls 97405->97406 97407 240e2de 97406->97407 97409 240e31e 97407->97409 97822 23f37b6 76 API calls 97407->97822 97409->97409 97410 244814c 74 API calls 97409->97410 97411 240e3ba 97410->97411 97417 240e3fc 97411->97417 97823 23f37b6 76 API calls 97411->97823 97413 240e52e 97414 24091b0 2 API calls 97413->97414 97415 240e5ed 97414->97415 97415->97415 97416 24368a0 91 API calls 97415->97416 97418 240e67c 97416->97418 97417->97219 97417->97222 97417->97413 97420 2410130 97417->97420 97418->97225 97419 240e68b 97418->97419 97421 244814c 74 API calls 97419->97421 97422 24091b0 2 API calls 97420->97422 97423 240e6f2 97421->97423 97424 2410149 97422->97424 97425 240e712 97423->97425 97828 23f37b6 76 API calls 97423->97828 97872 23f1bfe HeapFree HeapFree HeapFree 97424->97872 97429 244814c 74 API calls 97425->97429 97826 23f1bfe HeapFree HeapFree HeapFree 97428->97826 97430 240e76d 97429->97430 97431 240e78e 97430->97431 97829 23f37b6 76 API calls 97430->97829 97433 244814c 74 API calls 97431->97433 97434 240e7df 97433->97434 97436 240e7fa 97434->97436 97830 23f37b6 76 API calls 97434->97830 97437 244814c 74 API calls 97436->97437 97438 240e87b 97437->97438 97439 240e8a5 97438->97439 97831 23f37b6 76 API calls 97438->97831 97441 244814c 74 API calls 97439->97441 97442 240e8f2 97441->97442 97444 240e90d 97442->97444 97832 23f37b6 76 API calls 97442->97832 97445 244814c 74 API calls 97444->97445 97446 240e99d 97445->97446 97448 240e9c9 97446->97448 97833 23f37b6 76 API calls 97446->97833 97449 244814c 74 API calls 97448->97449 97450 240ea78 97449->97450 97452 240ea9c 97450->97452 97834 23f37b6 76 API calls 97450->97834 97453 244814c 74 API calls 97452->97453 97454 240eb59 97453->97454 97456 240eb83 97454->97456 97835 23f37b6 76 API calls 97454->97835 97457 244814c 74 API calls 97456->97457 97458 240ec06 97457->97458 97459 240ec30 97458->97459 97836 23f37b6 76 API calls 97458->97836 97461 244814c 74 API calls 97459->97461 97462 240ec92 97461->97462 97463 240ecba 97462->97463 97837 23f37b6 76 API calls 97462->97837 97465 244814c 74 API calls 97463->97465 97466 240ed15 97465->97466 97468 240ed36 97466->97468 97838 23f37b6 76 API calls 97466->97838 97469 244814c 74 API calls 97468->97469 97470 240edbd 97469->97470 97472 240ede5 97470->97472 97839 23f37b6 76 API calls 97470->97839 97473 244814c 74 API calls 97472->97473 97474 240eea0 97473->97474 97475 240eecc 97474->97475 97840 23f37b6 76 API calls 97474->97840 97477 244814c 74 API calls 97475->97477 97478 240ef1f 97477->97478 97479 240ef3f 97478->97479 97841 23f37b6 76 API calls 97478->97841 97481 244814c 74 API calls 97479->97481 97482 240efa5 97481->97482 97483 240efcd 97482->97483 97842 23f37b6 76 API calls 97482->97842 97485 244814c 74 API calls 97483->97485 97486 240f033 97485->97486 97487 240f05b 97486->97487 97843 23f37b6 76 API calls 97486->97843 97489 244814c 74 API calls 97487->97489 97490 240f0b8 97489->97490 97492 240f0d9 97490->97492 97844 23f37b6 76 API calls 97490->97844 97493 244814c 74 API calls 97492->97493 97494 240f182 97493->97494 97496 240f1a2 97494->97496 97845 23f37b6 76 API calls 97494->97845 97497 244814c 74 API calls 97496->97497 97498 240f236 97497->97498 97500 240f262 97498->97500 97846 23f37b6 76 API calls 97498->97846 97501 244814c 74 API calls 97500->97501 97502 240f2f4 97501->97502 97504 240f320 97502->97504 97847 23f37b6 76 API calls 97502->97847 97505 244814c 74 API calls 97504->97505 97506 240f3b0 97505->97506 97507 240f3de 97506->97507 97848 23f37b6 76 API calls 97506->97848 97509 244814c 74 API calls 97507->97509 97510 240f431 97509->97510 97511 240f451 97510->97511 97849 23f37b6 76 API calls 97510->97849 97513 244814c 74 API calls 97511->97513 97514 240f4a2 97513->97514 97516 240f4bd 97514->97516 97850 23f37b6 76 API calls 97514->97850 97517 244814c 74 API calls 97516->97517 97518 240f53f 97517->97518 97520 240f56c 97518->97520 97851 23f37b6 76 API calls 97518->97851 97521 244814c 74 API calls 97520->97521 97522 240f5ee 97521->97522 97523 240f61b 97522->97523 97852 23f37b6 76 API calls 97522->97852 97525 244814c 74 API calls 97523->97525 97526 240f672 97525->97526 97527 240f693 97526->97527 97853 23f37b6 76 API calls 97526->97853 97529 244814c 74 API calls 97527->97529 97530 240f6ea 97529->97530 97531 240f70a 97530->97531 97854 23f37b6 76 API calls 97530->97854 97533 244814c 74 API calls 97531->97533 97534 240f770 97533->97534 97535 240f798 97534->97535 97855 23f37b6 76 API calls 97534->97855 97537 244814c 74 API calls 97535->97537 97538 240f7fe 97537->97538 97539 240f826 97538->97539 97856 23f37b6 76 API calls 97538->97856 97541 244814c 74 API calls 97539->97541 97542 240f883 97541->97542 97544 240f8a4 97542->97544 97857 23f37b6 76 API calls 97542->97857 97545 244814c 74 API calls 97544->97545 97546 240f972 97545->97546 97547 240f99c 97546->97547 97858 23f37b6 76 API calls 97546->97858 97549 244814c 74 API calls 97547->97549 97550 240f9ef 97549->97550 97551 240fa0f 97550->97551 97859 23f37b6 76 API calls 97550->97859 97553 244814c 74 API calls 97551->97553 97554 240fa7e 97553->97554 97556 240faad 97554->97556 97860 23f37b6 76 API calls 97554->97860 97557 244814c 74 API calls 97556->97557 97558 240fb5c 97557->97558 97560 240fb80 97558->97560 97861 23f37b6 76 API calls 97558->97861 97561 244814c 74 API calls 97560->97561 97562 240fc29 97561->97562 97563 240fc49 97562->97563 97862 23f37b6 76 API calls 97562->97862 97565 244814c 74 API calls 97563->97565 97566 240fcaf 97565->97566 97567 240fcd7 97566->97567 97863 23f37b6 76 API calls 97566->97863 97569 244814c 74 API calls 97567->97569 97570 240fd32 97569->97570 97571 240fd53 97570->97571 97864 23f37b6 76 API calls 97570->97864 97573 244814c 74 API calls 97571->97573 97574 240fdb0 97573->97574 97576 240fdd1 97574->97576 97865 23f37b6 76 API calls 97574->97865 97577 244814c 74 API calls 97576->97577 97578 240fe89 97577->97578 97580 240feb1 97578->97580 97866 23f37b6 76 API calls 97578->97866 97581 244814c 74 API calls 97580->97581 97582 240ff5a 97581->97582 97583 240ff7a 97582->97583 97867 23f37b6 76 API calls 97582->97867 97585 244814c 74 API calls 97583->97585 97586 240ffe0 97585->97586 97591 2410008 97586->97591 97868 23f37b6 76 API calls 97586->97868 97588 24100bb 97589 24091b0 2 API calls 97588->97589 97590 24100c9 97589->97590 97592 24100d3 HeapFree 97590->97592 97593 24100e8 97590->97593 97591->97588 97594 2410099 HeapFree 97591->97594 97597 241014b 97591->97597 97592->97593 97869 23f1bfe HeapFree HeapFree HeapFree 97593->97869 97594->97591 97596 24100f4 97870 23f1bfe HeapFree HeapFree HeapFree 97596->97870 97599 2410153 HeapFree 97597->97599 97600 2410162 97597->97600 97599->97600 97601 24091b0 2 API calls 97600->97601 97602 2410169 97601->97602 97602->97424 97603 2410173 HeapFree 97602->97603 97603->97424 97604->96919 97605->96919 97608->96951 97609->96958 97610->96971 97611->96985 97612->96989 97613->96994 97614->97023 97615->96924 97616->96932 97617->96935 97620 2449235 97619->97620 97622 24491dd 97619->97622 97620->97147 97620->97148 97621 2449460 97649 23d10d0 74 API calls 97621->97649 97622->97620 97622->97621 97623 24492cf 97622->97623 97625 243d430 2 API calls 97623->97625 97627 24492dd 97625->97627 97626 2449465 97650 245c900 74 API calls 97626->97650 97627->97626 97636 24492e5 97627->97636 97629 2449471 97651 2448b49 86 API calls 97629->97651 97631 244947b 97633 244947f 97631->97633 97632 2449405 97634 2449441 97632->97634 97635 2449411 SysAllocStringLen 97632->97635 97637 245cda0 74 API calls 97633->97637 97634->97620 97640 2449447 HeapFree 97634->97640 97635->97629 97639 244941d SysStringLen 97635->97639 97636->97632 97647 2461847 76 API calls 97636->97647 97639->97634 97641 244942a 97639->97641 97640->97620 97648 2448b49 86 API calls 97641->97648 97643 2449434 SysFreeString 97643->97633 97644->97145 97645->97152 97646->97145 97647->97636 97648->97643 97649->97626 97650->97629 97651->97631 97653 23f1bc8 97652->97653 97654 23f1bcc 97653->97654 97655 23f1bda 97653->97655 97654->97165 97654->97166 97660 2448b49 86 API calls 97655->97660 97657 23f1be1 97657->97654 97661 23f01bb 97658->97661 97660->97657 97662 23f01cf 97661->97662 97663 23f01fd 97662->97663 97664 23f01d3 97662->97664 97729 2448b49 86 API calls 97663->97729 97669 23f01f6 97664->97669 97728 24495b0 HeapFree 97664->97728 97666 23f0204 97666->97669 97668 23f0ce2 97669->97668 97670 23f0343 97669->97670 97674 23f033c 97669->97674 97676 23f027c 97669->97676 97731 2448b49 86 API calls 97670->97731 97673 23f034a 97673->97674 97674->97668 97770 23efc9c HeapFree 97674->97770 97675 23f0369 SafeArrayDestroy 97680 23f03dc 97675->97680 97726 23f0c62 97675->97726 97676->97675 97730 244caf8 76 API calls 97676->97730 97679 23f02c5 97682 23f0e75 97679->97682 97691 23f02e6 97679->97691 97680->97674 97733 24404d0 97680->97733 97773 2461900 81 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 97682->97773 97684 23f0c82 97689 23f0c9c 97684->97689 97690 23f0cc3 97684->97690 97685 23f0338 97732 244a581 HeapFree 97685->97732 97688 23f1043 97697 245cda0 74 API calls 97688->97697 97692 241af4f HeapFree 97689->97692 97769 24495b0 HeapFree 97690->97769 97691->97685 97693 23f102f 97691->97693 97698 23f0cab 97692->97698 97776 245caf0 74 API calls 97693->97776 97695 23f0d72 97703 241af4f HeapFree 97695->97703 97700 23f1087 97697->97700 97698->97673 97701 23f0cb2 HeapFree 97698->97701 97699 244814c 74 API calls 97716 23f040c __InternalCxxFrameHandler 97699->97716 97701->97673 97704 23f0f5f 97703->97704 97704->97674 97705 23f0f66 HeapFree 97704->97705 97705->97674 97706 23f0f1d HeapFree 97723 23f0e70 97706->97723 97709 23f0dc6 97771 2448b49 86 API calls 97709->97771 97711 23f0ddb 97774 2448e27 76 API calls 97711->97774 97712 23f0dcd 97712->97711 97721 23f0e38 97712->97721 97713 23f04f7 97713->97688 97713->97716 97763 2448e9f 86 API calls 97713->97763 97715 23f092e VariantClear 97715->97716 97717 23f0e02 97715->97717 97716->97688 97716->97695 97716->97699 97716->97709 97716->97711 97716->97713 97716->97715 97722 23f0e5d 97716->97722 97716->97723 97724 23f0c4d 97716->97724 97727 23f0b84 HeapFree 97716->97727 97764 244a5bc 75 API calls 97716->97764 97765 2448e27 76 API calls 97716->97765 97766 2406b04 76 API calls 97716->97766 97772 2448b49 86 API calls 97717->97772 97721->97722 97722->97706 97722->97723 97775 23e26a3 HeapFree HeapFree 97723->97775 97767 245d3d0 76 API calls 2 library calls 97724->97767 97768 2448b49 86 API calls 97726->97768 97727->97716 97729->97666 97730->97679 97731->97673 97732->97675 97734 24404e7 TlsGetValue 97733->97734 97735 24405b2 97733->97735 97738 24404f4 97734->97738 97778 2460970 74 API calls 97735->97778 97739 244057e 97738->97739 97740 244050e TlsGetValue 97738->97740 97779 2460970 74 API calls 97738->97779 97739->97716 97740->97739 97743 244051b 97740->97743 97744 2440564 BCryptGenRandom 97743->97744 97745 243d430 2 API calls 97743->97745 97744->97739 97746 2440588 97744->97746 97748 2440534 97745->97748 97777 243ce20 74 API calls 97746->97777 97749 24405dc 97748->97749 97750 244053c 97748->97750 97781 245c900 74 API calls 97749->97781 97752 244055b TlsSetValue 97750->97752 97780 2460970 74 API calls 97750->97780 97752->97744 97754 24405eb 97756 2440629 TlsSetValue HeapFree 97754->97756 97782 2460970 74 API calls 97754->97782 97759 2440665 97756->97759 97760 2440668 97756->97760 97761 244067a TlsSetValue 97759->97761 97783 2460970 74 API calls 97760->97783 97761->97716 97763->97713 97765->97716 97767->97726 97768->97684 97771->97712 97772->97712 97773->97711 97774->97722 97775->97695 97777->97739 97778->97734 97779->97740 97780->97752 97781->97754 97782->97756 97783->97761 97784->97187 97786->97290 97787->97290 97788->97270 97790->97257 97792->97283 97793->97281 97794->97297 97795->97301 97796->97305 97797->97309 97798->97313 97799->97317 97800->97321 97801->97325 97802->97329 97803->97333 97804->97337 97805->97341 97806->97345 97807->97349 97808->97353 97809->97357 97810->97361 97811->97365 97812->97369 97813->97373 97814->97377 97815->97381 97816->97385 97817->97389 97818->97393 97819->97397 97820->97401 97821->97405 97822->97409 97823->97417 97824->97280 97826->97273 97828->97425 97829->97431 97830->97436 97831->97439 97832->97444 97833->97448 97834->97452 97835->97456 97836->97459 97837->97463 97838->97468 97839->97472 97840->97475 97841->97479 97842->97483 97843->97487 97844->97492 97845->97496 97846->97500 97847->97504 97848->97507 97849->97511 97850->97516 97851->97520 97852->97523 97853->97527 97854->97531 97855->97535 97856->97539 97857->97544 97858->97547 97859->97551 97860->97556 97861->97560 97862->97563 97863->97567 97864->97571 97865->97576 97866->97580 97867->97583 97868->97591 97869->97596 97870->97213 97872->97428 97873->97219 97878 23d3d77 97876->97878 97880 243b6f0 97878->97880 97881 243b80f 97880->97881 97882 243b72f 97880->97882 97892 245cd00 74 API calls 97881->97892 97890 2431140 97882->97890 97893 2431162 74 API calls 97890->97893 97894->97035 97895->97034 97898 23d4181 97896->97898 97899 23d4083 97896->97899 97897 23d1926 97897->97046 97897->97047 97898->97897 97898->97899 97901 243b6f0 74 API calls 97898->97901 97899->97897 97900 243b6f0 74 API calls 97899->97900 97900->97897 97901->97898 97902->97043 97903->97052 97933 2431410 97904->97933 97906 2435942 97907 2435952 97906->97907 97912 2435968 97906->97912 97953 24316e0 HeapFree HeapFree 97907->97953 97909 2435a01 SetLastError GetEnvironmentVariableW 97911 2435a1a GetLastError 97909->97911 97909->97912 97911->97912 97913 2435b20 GetLastError 97911->97913 97912->97909 97914 2435a2c GetLastError 97912->97914 97917 2435a59 97912->97917 97954 2460bd0 76 API calls 97912->97954 97916 2435a8e HeapFree 97913->97916 97929 2435a9f 97913->97929 97914->97912 97915 2435b6c 97914->97915 97956 245caf0 74 API calls 97915->97956 97916->97929 97918 2435a6b 97917->97918 97919 2435b8c 97917->97919 97955 2433580 77 API calls 97918->97955 97957 245ca90 74 API calls 97919->97957 97923 2435ae4 97928 2435afb HeapFree 97923->97928 97931 23f409b 97923->97931 97925 2435a76 97925->97916 97925->97929 97928->97931 97929->97923 97930 2435b53 HeapFree 97929->97930 97932 2435b44 HeapFree 97929->97932 97930->97928 97930->97931 97931->96732 97931->96734 97932->97930 97934 2431450 97933->97934 97946 243147e 97933->97946 97935 2431691 97934->97935 97937 2431466 97934->97937 97960 23d10d0 74 API calls 97935->97960 97939 243d430 2 API calls 97937->97939 97938 2431696 97961 245c900 74 API calls 97938->97961 97941 2431476 97939->97941 97941->97938 97941->97946 97943 24316a2 97947 24316ce 97943->97947 97948 24316bd HeapFree 97943->97948 97944 24315ba 97945 2431620 97944->97945 97949 243164b 97944->97949 97950 2431661 97945->97950 97951 243163a HeapFree 97945->97951 97946->97944 97958 2460bd0 76 API calls 97946->97958 97947->97906 97948->97947 97949->97950 97959 2431830 76 API calls 97949->97959 97950->97906 97951->97950 97953->97931 97954->97912 97955->97925 97958->97946 97959->97950 97960->97938 97961->97943 97962->97064 97963->97067 97964->97074 97965->97074 97966->97107 97969->97117 97971 243121a 97975 2431186 97971->97975 97977 2431200 97971->97977 97972 24311ac 97972->97977 97978 24312a5 97972->97978 97983 24302d0 97972->97983 97974 243119b HeapFree 97974->97972 97975->97972 97975->97974 97976 243118c HeapFree 97975->97976 97976->97974 98022 245c9d0 74 API calls 97978->98022 97984 2430306 GetStdHandle 97983->97984 97986 243031e 97983->97986 97985 2430311 97984->97985 97984->97986 97987 2430346 GetConsoleMode 97985->97987 97988 2430316 GetLastError 97985->97988 97986->97972 97989 24303be NtWriteFile 97987->97989 97990 243035e 97987->97990 97988->97986 97992 2430403 97989->97992 97993 24303ec WaitForSingleObject 97989->97993 97991 2430370 97990->97991 98001 243040e 97990->98001 97994 243037b 97991->97994 97995 243057e 97991->97995 97992->97986 97997 243046f RtlNtStatusToDosError 97992->97997 97993->97992 97996 24305ae 97993->97996 97994->97986 98004 2430491 97994->98004 98005 2430604 97994->98005 98026 245c9a0 74 API calls 97995->98026 98027 242f050 74 API calls 97996->98027 97997->97986 98000 24305f6 98028 242f1b0 HeapFree HeapFree 98000->98028 98001->97986 98002 2430461 98001->98002 98006 243044b 98001->98006 98007 243061e 98001->98007 98023 2430690 74 API calls _unexpected 98002->98023 98004->97986 98012 24304fe 98004->98012 98029 245ca90 74 API calls 98005->98029 98006->98002 98011 243062c 98006->98011 98030 245ca90 74 API calls 98007->98030 98015 245cda0 67 API calls 98011->98015 98013 2430653 98012->98013 98014 243050f 98012->98014 98031 2460b10 74 API calls 98013->98031 98024 2430690 74 API calls _unexpected 98014->98024 98015->98013 98018 243051e 98018->97986 98020 24304ca 98018->98020 98025 2460b10 74 API calls 98018->98025 98020->97986 98023->98020 98024->98018 98027->98000 98028->98005 98032 426eb8 8 API calls 98033 42badf 98034 42bae9 __EH_prolog 98033->98034 98035 42bb0e 98034->98035 98040 42bb1f 98034->98040 98055 42b85c RaiseException TlsAlloc InitializeCriticalSection ctype 98034->98055 98044 42b64b EnterCriticalSection 98035->98044 98039 42bb2e 98041 42bb47 98039->98041 98042 42bb34 98039->98042 98056 42b758 TlsGetValue 98040->98056 98057 42b8f8 8 API calls 2 library calls 98042->98057 98045 42b66a 98044->98045 98046 42b722 ___initmbctable 98045->98046 98048 42b6b4 GlobalHandle GlobalUnlock GlobalReAlloc 98045->98048 98049 42b6a4 GlobalAlloc 98045->98049 98047 42b737 LeaveCriticalSection 98046->98047 98047->98040 98050 42b6d6 98048->98050 98049->98050 98051 42b704 GlobalLock 98050->98051 98052 42b6f5 LeaveCriticalSection 98050->98052 98053 42b6eb GlobalHandle GlobalLock 98050->98053 98051->98046 98058 421452 RaiseException ctype 98052->98058 98053->98052 98055->98035 98056->98039 98057->98041 98059 23ded80 98073 241afe0 98059->98073 98520 245caf0 74 API calls 98073->98520 98983 415dde 98984 415dea _fast_error_exit ___free_lc_time 98983->98984 98985 415df6 GetVersionExA 98984->98985 98986 415e32 98985->98986 98987 415e3e GetModuleHandleA 98985->98987 98986->98987 98989 415e5a 98987->98989 99026 418875 HeapCreate 98989->99026 98990 415eac 98991 415eb8 98990->98991 99120 415dba 36 API calls _fast_error_exit 98990->99120 99034 419d60 98991->99034 98994 415ebe 98995 415ec9 98994->98995 99121 415dba 36 API calls _fast_error_exit 98994->99121 99049 41aecc 98995->99049 98999 415ee3 GetCommandLineA 99066 41adaa 98999->99066 99002 415ee2 99002->98999 99005 415efd 99006 415f08 99005->99006 99123 415d95 36 API calls _fast_error_exit 99005->99123 99096 41aad5 99006->99096 99010 415f19 99108 41726c 99010->99108 99014 415f2d GetStartupInfoA 99112 41aa6c 99014->99112 99017 415f2c 99017->99014 99018 415f3f GetModuleHandleA 99116 42da58 99018->99116 99022 415f6f 99127 4173c6 36 API calls _fast_error_exit 99022->99127 99025 415f74 ___free_lc_time 99027 418895 99026->99027 99028 4188bf 99026->99028 99029 4188c2 99027->99029 99030 4188a4 99027->99030 99028->98990 99029->98990 99128 4188c6 HeapAlloc 99030->99128 99032 4188ae 99032->99029 99033 4188b3 HeapDestroy 99032->99033 99033->99028 99129 4186f8 GetModuleHandleA GetProcAddress __lock 99034->99129 99036 419d65 99037 419d79 99036->99037 99038 419d69 TlsAlloc 99036->99038 99130 419cd1 39 API calls __mtdeletelocks 99037->99130 99038->99037 99039 419d81 99038->99039 99131 41d4e0 36 API calls 4 library calls 99039->99131 99042 419d7e 99042->98994 99043 419d8e 99044 419dc6 99043->99044 99045 419d96 TlsSetValue 99043->99045 99132 419cd1 39 API calls __mtdeletelocks 99044->99132 99045->99044 99046 419da7 GetCurrentThreadId 99045->99046 99046->98994 99048 419dcb 99048->98994 99133 4153da 99049->99133 99051 415ed7 99051->98999 99122 415d95 36 API calls _fast_error_exit 99051->99122 99052 41af21 GetStartupInfoA 99054 41af3b 99052->99054 99055 41b024 99052->99055 99054->99055 99059 4153da __getbuf 36 API calls 99054->99059 99062 41afac 99054->99062 99056 41b0b4 SetHandleCount 99055->99056 99057 41b053 GetStdHandle 99055->99057 99065 41b078 99055->99065 99056->99051 99057->99055 99058 41b061 GetFileType 99057->99058 99058->99055 99059->99054 99060 41afd2 GetFileType 99061 41afdd 99060->99061 99060->99062 99061->99051 99061->99062 99136 41e3e2 GetModuleHandleA GetProcAddress ___free_lc_time 99061->99136 99062->99055 99062->99060 99062->99061 99065->99051 99065->99055 99137 41e3e2 GetModuleHandleA GetProcAddress ___free_lc_time 99065->99137 99067 41ade5 99066->99067 99068 41adc6 GetEnvironmentStringsW 99066->99068 99070 41adce 99067->99070 99071 41ae75 99067->99071 99069 41adda GetLastError 99068->99069 99068->99070 99069->99067 99073 41adfc GetEnvironmentStringsW 99070->99073 99075 41ae04 99070->99075 99072 41ae81 GetEnvironmentStrings 99071->99072 99078 415ef3 99071->99078 99072->99078 99079 41ae8d 99072->99079 99073->99075 99073->99078 99074 41ae19 WideCharToMultiByte 99076 41ae38 99074->99076 99077 41ae6a FreeEnvironmentStringsW 99074->99077 99075->99074 99075->99075 99080 4153da __getbuf 36 API calls 99076->99080 99077->99078 99089 41ad08 99078->99089 99079->99079 99081 4153da __getbuf 36 API calls 99079->99081 99082 41ae3e 99080->99082 99088 41aea6 std::runtime_error::~runtime_error 99081->99088 99082->99077 99083 41ae47 WideCharToMultiByte 99082->99083 99084 41ae61 99083->99084 99085 41ae58 99083->99085 99084->99077 99143 4153ec 36 API calls 2 library calls 99085->99143 99086 41aebc FreeEnvironmentStringsA 99086->99078 99088->99086 99090 41ad1a 99089->99090 99091 41ad1f GetModuleFileNameA 99089->99091 99144 41809a 65 API calls ___initmbctable 99090->99144 99093 41ad47 99091->99093 99094 4153da __getbuf 36 API calls 99093->99094 99095 41ad72 99094->99095 99095->99005 99097 41aae2 99096->99097 99098 41aae7 _strlen 99096->99098 99145 41809a 65 API calls ___initmbctable 99097->99145 99100 415f0e 99098->99100 99101 4153da __getbuf 36 API calls 99098->99101 99100->99010 99124 415d95 36 API calls _fast_error_exit 99100->99124 99106 41ab18 _strcat _strlen 99101->99106 99102 41ab61 99146 4153ec 36 API calls 2 library calls 99102->99146 99104 4153da __getbuf 36 API calls 99104->99106 99105 41ab86 99147 4153ec 36 API calls 2 library calls 99105->99147 99106->99100 99106->99102 99106->99104 99106->99105 99109 417275 99108->99109 99111 415f1f 99109->99111 99148 4159ea 40 API calls 99109->99148 99111->99014 99125 415d95 36 API calls _fast_error_exit 99111->99125 99113 41aa75 99112->99113 99115 41aa7a 99112->99115 99149 41809a 65 API calls ___initmbctable 99113->99149 99115->99018 99115->99115 99117 42daaa 99116->99117 99150 42c58f 99117->99150 99120->98991 99121->98995 99122->99002 99123->99006 99124->99010 99125->99017 99126 4173a4 36 API calls _fast_error_exit 99126->99022 99127->99025 99128->99032 99129->99036 99130->99042 99131->99043 99132->99048 99138 4153ae 99133->99138 99136->99061 99137->99065 99139 4153d7 99138->99139 99141 4153b5 __getbuf 99138->99141 99139->99051 99139->99052 99141->99139 99142 415333 36 API calls 3 library calls 99141->99142 99142->99141 99143->99084 99144->99091 99145->99098 99146->99100 99147->99100 99148->99111 99149->99115 99153 42c59f 99150->99153 99154 42c63c 99153->99154 99155 42c6b2 VirtualAlloc 99154->99155 99156 42c6f8 99155->99156 99156->99156 99157 42c720 VirtualAlloc 99156->99157 99158 415f5f 99157->99158 99160 42c74a 99157->99160 99158->99022 99158->99126 99159 42c8ac LoadLibraryA 99159->99158 99159->99160 99160->99158 99160->99159 99161 42c8ff 99160->99161 99162 42c8df GetProcAddress 99160->99162 99164 244d76d 99161->99164 99162->99160 99165 244d779 ___scrt_is_nonwritable_in_current_image 99164->99165 99190 244d97d 99165->99190 99167 244d780 99168 244d8d9 99167->99168 99178 244d7aa ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 99167->99178 99246 244dc6e IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _unexpected 99168->99246 99170 244d8e0 99247 24526f3 21 API calls _unexpected 99170->99247 99172 244d8e6 99248 24526b7 21 API calls _unexpected 99172->99248 99174 244d8ee 99175 244d7c9 99175->99158 99176 244d84a 99201 2452365 99176->99201 99178->99175 99178->99176 99242 24526cd 68 API calls 4 library calls 99178->99242 99180 244d850 99205 23deac0 RtlAddVectoredExceptionHandler 99180->99205 99182 244d867 99243 244dd88 GetModuleHandleW 99182->99243 99184 244d871 99184->99170 99185 244d875 99184->99185 99186 244d87e 99185->99186 99244 24526a8 21 API calls _unexpected 99185->99244 99245 244daee 75 API calls ___scrt_uninitialize_crt 99186->99245 99189 244d887 99189->99175 99191 244d986 99190->99191 99249 244deda IsProcessorFeaturePresent 99191->99249 99193 244d992 99250 245049e 10 API calls 2 library calls 99193->99250 99195 244d997 99196 244d99b 99195->99196 99251 2452ce6 99195->99251 99196->99167 99199 244d9b2 99199->99167 99202 245236e 99201->99202 99203 2452373 99201->99203 99304 24520bf 80 API calls 99202->99304 99203->99180 99206 23dec93 99205->99206 99207 23deb02 SetThreadStackGuarantee 99205->99207 99319 245c9a0 74 API calls 99206->99319 99209 23deb17 GetLastError 99207->99209 99210 23deb26 99207->99210 99209->99210 99212 23dece6 99209->99212 99305 242ee40 99210->99305 99211 23decd3 99216 23ded4b 99211->99216 99217 23ded31 99211->99217 99321 245c9a0 74 API calls 99212->99321 99222 23ded6c 99216->99222 99225 23ded5d HeapFree 99216->99225 99219 23ded35 HeapFree 99217->99219 99220 23ded46 99217->99220 99218 243d430 2 API calls 99221 23deb51 99218->99221 99219->99220 99220->99182 99223 23deb59 99221->99223 99224 23decd5 99221->99224 99222->99182 99227 23dec16 99223->99227 99229 23deb75 99223->99229 99320 245c900 74 API calls 99224->99320 99225->99222 99317 242f050 74 API calls 99227->99317 99314 23d1310 77 API calls 99229->99314 99230 23dec85 99318 242f1b0 HeapFree HeapFree 99230->99318 99233 23deb98 99234 242eec0 74 API calls 99233->99234 99235 23debb3 99234->99235 99315 242f2a0 74 API calls 99235->99315 99237 23debc1 99238 23debd5 99237->99238 99239 23dec03 99237->99239 99316 2460460 80 API calls 99238->99316 99239->99182 99241 23dec00 99241->99239 99242->99176 99243->99184 99244->99186 99245->99189 99246->99170 99247->99172 99248->99174 99249->99193 99250->99195 99255 24573b5 99251->99255 99254 24504bd 7 API calls 2 library calls 99254->99196 99256 24573c5 99255->99256 99257 244d9a4 99255->99257 99256->99257 99260 24565e2 99256->99260 99265 2456692 99256->99265 99257->99199 99257->99254 99261 24565e9 99260->99261 99262 245662c GetStdHandle 99261->99262 99263 245668e 99261->99263 99264 245663f GetFileType 99261->99264 99262->99261 99263->99256 99264->99261 99266 245669e ___scrt_is_nonwritable_in_current_image 99265->99266 99277 24561dc EnterCriticalSection 99266->99277 99268 24566a5 99278 2456337 99268->99278 99271 24566c3 99292 24566e9 LeaveCriticalSection _unexpected 99271->99292 99274 24566be 99276 24565e2 2 API calls 99274->99276 99275 24566d4 99275->99256 99276->99271 99277->99268 99279 2456343 ___scrt_is_nonwritable_in_current_image 99278->99279 99280 245636d 99279->99280 99281 245634c 99279->99281 99293 24561dc EnterCriticalSection 99280->99293 99301 24547bf 14 API calls __strnicoll 99281->99301 99284 2456351 99302 24546de 29 API calls __strnicoll 99284->99302 99286 24563a5 99303 24563cc LeaveCriticalSection _unexpected 99286->99303 99287 245635b 99287->99271 99291 245652c 32 API calls 99287->99291 99288 2456379 99288->99286 99294 2456287 99288->99294 99291->99274 99292->99275 99293->99288 99295 24547d2 __strnicoll 14 API calls 99294->99295 99296 2456299 99295->99296 99298 245720a 6 API calls 99296->99298 99300 24562a6 99296->99300 99297 245482f __freea 14 API calls 99299 24562fb 99297->99299 99298->99296 99299->99288 99300->99297 99301->99284 99302->99287 99303->99287 99304->99203 99306 242ee52 99305->99306 99307 2431410 78 API calls 99306->99307 99313 23deb3c 99306->99313 99308 242ee6c 99307->99308 99309 242ee86 GetCurrentThread SetThreadDescription 99308->99309 99310 242ee7b 99308->99310 99312 242ee9e HeapFree 99309->99312 99309->99313 99322 24316e0 HeapFree HeapFree 99310->99322 99312->99313 99313->99218 99314->99233 99315->99237 99316->99241 99317->99230 99318->99206 99320->99211 99322->99313
    APIs
    • CloseHandle.KERNEL32(?), ref: 023F632F
      • Part of subcall function 024496A2: CoInitializeEx.OLE32 ref: 024496B8
      • Part of subcall function 024496A2: CoInitializeSecurity.OLE32 ref: 024496E4
    • HeapFree.KERNEL32(00000000,?), ref: 023F552A
      • Part of subcall function 023FA578: __aulldiv.LIBCMT ref: 023FA5CC
      • Part of subcall function 023EA020: GetCommandLineW.KERNEL32 ref: 023EA05D
    • HeapFree.KERNEL32(00000000,?), ref: 023F400C
    • HeapFree.KERNEL32(00000000,?), ref: 023F41A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$Initialize$CloseCommandHandleLineSecurity__aulldiv
    • String ID: $Invalid$\index.crates.io-1cd66030c949c28d\base64-0.21.7\src\engine\general_purpose\decode.rs$`async fn` resumed after completion$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$hrzbaov$nown$ptth$ptth$rc\unicode\printable.rs
    • API String ID: 3225680405-759402994
    • Opcode ID: cf2f79979e9b9cab2d05666031ac4f76e71be918ff1f122560c9220efa4a443f
    • Instruction ID: 5ccf36ee9879d1d69d0f3cdc23ba12a6c1b0175bec0b198076be9a65e752ce1a
    • Opcode Fuzzy Hash: cf2f79979e9b9cab2d05666031ac4f76e71be918ff1f122560c9220efa4a443f
    • Instruction Fuzzy Hash: 57F2A030A04781DFD765CF24D444B9AFBE1FF99304F108A1EEA999B261DB70A855CF82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0243D430: GetProcessHeap.KERNEL32(00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?,?,023E161A,0244D2B0), ref: 0243D43F
      • Part of subcall function 0243D430: RtlAllocateHeap.NTDLL(007F0000,00000000,00000014,00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?), ref: 0243D451
    • HeapFree.KERNEL32(00000000,?), ref: 02401FCF
    • GetSystemInfo.KERNEL32(?), ref: 0240200A
    • HeapReAlloc.KERNEL32(00000000,?,00000000), ref: 024022D4
    • HeapFree.KERNEL32(00000000,00000001), ref: 02404FE3
      • Part of subcall function 02431BB0: QueryPerformanceCounter.KERNEL32(?), ref: 02431BF7
      • Part of subcall function 02431BB0: QueryPerformanceFrequency.KERNEL32(00000000), ref: 02431C38
      • Part of subcall function 02431BB0: __aulldiv.LIBCMT ref: 02431C71
      • Part of subcall function 02431BB0: __aulldiv.LIBCMT ref: 02431CAC
      • Part of subcall function 02431BB0: __aulldiv.LIBCMT ref: 02431CD7
      • Part of subcall function 0244632B: AcquireSRWLockExclusive.KERNEL32(?,00000001,00000000,?,?,02448053,00000000,024817FC,?,?,?,?,?,?,?,?), ref: 02446335
    • HeapReAlloc.KERNEL32(00000000,?,00000001), ref: 024024D1
    • HeapFree.KERNEL32(00000000,?), ref: 024024EE
    • HeapFree.KERNEL32(00000000,?), ref: 02403146
    • HeapFree.KERNEL32(00000000,?), ref: 0240559D
    • HeapFree.KERNEL32(00000000,?), ref: 024055AE
    Strings
    • Failed to `Enter::block_on`, xrefs: 024050D6
    • Failed building the Runtime, xrefs: 024051BA
    • thread name may not contain interior null bytes, xrefs: 02405224
    • Invalid, xrefs: 02404DE9, 02405039, 02405065, 024051F2, 02405275, 024052C3, 0240540B, 02405437, 024054A5, 024054D1, 024054FD
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 02405476, 0240551C
    • assertion failed: prev.ref_count() >= 1, xrefs: 02405092
    • failed to park thread, xrefs: 02405297
    • attempt to calculate the remainder with a divisor of zero/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\slice\sort.rs, xrefs: 02404E83
    • TOKIO_WORKER_THREADS/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\loom\std\mod.rs" cannot be set to 0, xrefs: 02401F5D
    • RUST_MIN_STACKfatal runtime error: assertion failed: thread_info.stack_guard.get().is_none() && thread_info.thread.get().is_none(), xrefs: 02402BEE
    • assertion failed: shared.shutdown_tx.is_some()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\blocking\pool.rs, xrefs: 024050F6
    • driver missing, xrefs: 02405553
    • assertion failed: self.tail.is_none(), xrefs: 0240514B
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Heap$Free$__aulldiv$AllocPerformanceQuery$AcquireAllocateCounterExclusiveFrequencyInfoLockProcessSystem
    • String ID: Failed building the Runtime$Failed to `Enter::block_on`$Invalid$RUST_MIN_STACKfatal runtime error: assertion failed: thread_info.stack_guard.get().is_none() && thread_info.thread.get().is_none()$TOKIO_WORKER_THREADS/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\loom\std\mod.rs" cannot be set to 0$assertion failed: prev.ref_count() >= 1$assertion failed: self.tail.is_none()$assertion failed: shared.shutdown_tx.is_some()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\blocking\pool.rs$attempt to calculate the remainder with a divisor of zero/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\slice\sort.rs$cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs$driver missing$failed to park thread$thread name may not contain interior null bytes
    • API String ID: 178985148-2573687003
    • Opcode ID: 597bf64f179f4f59bef4da3f5b4d78a56e40232bfb71557a13db063dd98fac6b
    • Instruction ID: 672f966ab2438a14669b6e1de55d9b164a3a5f4a0b567f8f1ccfa02299a700fd
    • Opcode Fuzzy Hash: 597bf64f179f4f59bef4da3f5b4d78a56e40232bfb71557a13db063dd98fac6b
    • Instruction Fuzzy Hash: 9A731A74600B018FD725DF29C494BA7BBE2BF88304F14896ED99A8B791DB71B885CF50
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 02449760: CoCreateInstance.OLE32(024837A4,00000000,00000001,02483788,?,?,0240AA3A,0000000A), ref: 02449781
      • Part of subcall function 02449760: SysFreeString.OLEAUT32(00000000), ref: 024497EC
      • Part of subcall function 02449760: CoSetProxyBlanket.OLE32 ref: 0244981A
    • HeapFree.KERNEL32(00000000,?), ref: 0240B3D3
    • HeapFree.KERNEL32(00000000,?), ref: 0240B3EC
    • HeapFree.KERNEL32(00000000,?), ref: 0240B405
    • HeapFree.KERNEL32(00000000), ref: 0240B436
    • HeapFree.KERNEL32(00000000,00000004), ref: 0240B486
    • HeapFree.KERNEL32(00000000,?), ref: 0240B4A6
    • HeapFree.KERNEL32(00000000,?), ref: 0240B4BF
    • GetModuleHandleW.KERNEL32(?), ref: 0240B660
    • HeapFree.KERNEL32(00000000,?), ref: 0240B678
    • HeapFree.KERNEL32(00000000,?), ref: 0240B68D
      • Part of subcall function 023E26A3: HeapFree.KERNEL32(00000000,?), ref: 023E2714
      • Part of subcall function 023E26A3: HeapFree.KERNEL32(00000000,?), ref: 023E275E
    • HeapFree.KERNEL32(00000000,?), ref: 0240B6B2
    • HeapFree.KERNEL32(00000000,?), ref: 0240B6D0
    • HeapFree.KERNEL32(00000000), ref: 0240B733
    • HeapFree.KERNEL32(00000000,00000004), ref: 0240B764
    • HeapFree.KERNEL32(00000000,?), ref: 0240B77D
    • HeapFree.KERNEL32(00000000,?), ref: 0240B796
    • __aulldiv.LIBCMT ref: 0240B845
    • __aullrem.LIBCMT ref: 0240B8BA
    • HeapFree.KERNEL32(00000000,?,?,?,00000006,00000000,?,019DB1DE,00989680,00000000,?), ref: 0240B939
    • MessageBoxW.USER32(00000000,02430AB0,023ECDE7,00000011), ref: 0240BA3F
    • HeapFree.KERNEL32(00000000,023ECDE7,?,?,00000006,00000000,?,019DB1DE,00989680,00000000,?), ref: 0240BA56
    • HeapFree.KERNEL32(00000000,?,?,?,00000006,00000000,?,019DB1DE,00989680,00000000,?), ref: 0240BA6F
    • HeapFree.KERNEL32(00000000,?,?,?,00000006,00000000,?,019DB1DE,00989680,00000000,?), ref: 0240BA9A
    • HeapFree.KERNEL32(00000000,?,?,?,00000006,00000000,?,019DB1DE,00989680,00000000,?), ref: 0240BAB3
    • HeapFree.KERNEL32(00000000,?), ref: 0240BCB0
    • HeapFree.KERNEL32(00000000,?), ref: 0240BCCA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Free$Heap$BlanketCreateHandleInstanceMessageModuleProxyString__aulldiv__aullrem
    • String ID: ROOT\CIMV2$hrono-0.4.38\src\format\mod.rs
    • API String ID: 773367832-823739010
    • Opcode ID: 5f62da0b5a4cc58079a6d3eca29c8f2d047f21a7587c1a379ec983bca2b5d3fb
    • Instruction ID: 4c23e2a1688a5247803a4ec432a015456d2d706afd7add5a6ba7e1f7554bea37
    • Opcode Fuzzy Hash: 5f62da0b5a4cc58079a6d3eca29c8f2d047f21a7587c1a379ec983bca2b5d3fb
    • Instruction Fuzzy Hash: C8C27E71A083519FD725DF18C484B9AB7E2FFC8304F05892EE98997390DB70A985CF86
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 02449760: CoCreateInstance.OLE32(024837A4,00000000,00000001,02483788,?,?,0240AA3A,0000000A), ref: 02449781
      • Part of subcall function 02449760: SysFreeString.OLEAUT32(00000000), ref: 024497EC
      • Part of subcall function 02449760: CoSetProxyBlanket.OLE32 ref: 0244981A
      • Part of subcall function 0243D430: GetProcessHeap.KERNEL32(00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?,?,023E161A,0244D2B0), ref: 0243D43F
      • Part of subcall function 0243D430: RtlAllocateHeap.NTDLL(007F0000,00000000,00000014,00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?), ref: 0243D451
    • SysFreeString.OLEAUT32(00000000), ref: 0240C457
    • SysFreeString.OLEAUT32(00000000), ref: 0240C474
    • SysFreeString.OLEAUT32(00000000), ref: 0240C492
    • HeapFree.KERNEL32(00000000,?), ref: 0240C4AE
    • HeapFree.KERNEL32(00000000,?), ref: 0240C69F
    • HeapFree.KERNEL32(00000000,?), ref: 0240C908
    • HeapFree.KERNEL32(00000000,?), ref: 0240C933
    • HeapFree.KERNEL32(00000000,?), ref: 0241015C
      • Part of subcall function 023F1BFE: HeapFree.KERNEL32(00000000,?,?,?,00000000,?,023F1E0B), ref: 023F1C2B
      • Part of subcall function 0243C4E0: AcquireSRWLockExclusive.KERNEL32(02490B74), ref: 0243C566
      • Part of subcall function 0243C4E0: ReleaseSRWLockExclusive.KERNEL32(02490B74), ref: 0243C63D
    • HeapFree.KERNEL32(00000000,?), ref: 024100A2
    • HeapFree.KERNEL32(00000000,?), ref: 024100E2
    • HeapFree.KERNEL32(00000000,?), ref: 02410182
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Free$Heap$String$ExclusiveLock$AcquireAllocateBlanketCreateInstanceProcessProxyRelease
    • String ID: 66030c949c28d\base64-0.21.7\src\encode.rs$ROOT\CIMV2$WQL$called `Result::unwrap()` on an `Err` value$d to index str up to maximum usize$sing field `$wr%
    • API String ID: 3721730025-2485361945
    • Opcode ID: eedf47f81a16766c857456b2bc0cd9bd6abe784c370c446df950d435adf51dec
    • Instruction ID: a685820d199bf98065a5d223faa4016567995c3a44db63d8e712c3b03afba78c
    • Opcode Fuzzy Hash: eedf47f81a16766c857456b2bc0cd9bd6abe784c370c446df950d435adf51dec
    • Instruction Fuzzy Hash: EFA32C749087818BD325DF28C480AAAF7F1FFD9304F158A5EDAC947361DB359986CB82
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2724 242e5f7-242e60d 2725 242e617-242e623 2724->2725 2726 242e60f-242e612 2724->2726 2730 242e664-242e66e 2725->2730 2731 242e625-242e633 2725->2731 2727 242e6a5-242e6a7 2726->2727 2729 242e6a9-242e6e0 call 243d430 2727->2729 2738 242e6e6-242e70f 2729->2738 2739 242e9df-242e9ff call 245c900 GetModuleHandleA 2729->2739 2730->2727 2733 242e670-242e675 2731->2733 2734 242e635-242e654 2731->2734 2737 242e67a-242e680 2733->2737 2736 242e656-242e65f 2734->2736 2734->2737 2740 242e8bf-242e8c7 2736->2740 2737->2727 2741 242e682-242e6a3 2737->2741 2743 242e714-242e71a 2738->2743 2750 242ea30-242ea32 2739->2750 2751 242ea01-242ea11 GetProcAddress 2739->2751 2744 242e8cb-242e8cf 2740->2744 2741->2729 2746 242e720-242e726 2743->2746 2747 242e7c4 2743->2747 2748 242e8d1-242e8e1 call 23dea05 2744->2748 2749 242e8e4 2744->2749 2752 242e86a-242e874 2746->2752 2753 242e72c-242e73c 2746->2753 2756 242e7c6-242e7ca 2747->2756 2748->2749 2755 242e8e7-242e8f9 2749->2755 2751->2750 2759 242ea13-242ea23 GetProcAddress 2751->2759 2752->2740 2763 242e876-242e878 2752->2763 2760 242e744-242e75b 2753->2760 2761 242e73e-242e742 2753->2761 2764 242e8fd-242e8ff 2755->2764 2757 242e7df-242e81c call 2461823 2756->2757 2758 242e7cc-242e7da 2756->2758 2757->2758 2758->2743 2759->2750 2766 242ea25-242ea2b 2759->2766 2768 242e7b5-242e7be 2760->2768 2769 242e75d-242e77b 2760->2769 2767 242e7c0 2761->2767 2770 242e87a-242e87f 2763->2770 2771 242e901-242e903 2764->2771 2772 242e92c-242e92e 2764->2772 2766->2750 2767->2747 2768->2767 2775 242e781-242e7aa 2769->2775 2776 242e81e-242e824 2769->2776 2777 242e930-242e935 2770->2777 2778 242e885-242e889 2770->2778 2779 242e950-242e961 HeapFree 2771->2779 2780 242e905-242e91e HeapReAlloc 2771->2780 2773 242e966-242e97a CreateMutexW GetLastError 2772->2773 2784 242e981-242e98e 2773->2784 2785 242e97c-242e97f 2773->2785 2786 242e7b0-242e7b3 2775->2786 2787 242e866 2775->2787 2783 242e826-242e833 2776->2783 2781 242e937-242e93a 2777->2781 2782 242e93c-242e94b 2777->2782 2778->2770 2788 242e88b-242e899 2778->2788 2779->2773 2780->2773 2789 242e920-242e927 call 245c900 2780->2789 2781->2773 2790 242e9d7-242e9de 2782->2790 2791 242e835-242e858 2783->2791 2792 242e85d-242e861 2783->2792 2794 242e9bf-242e9c6 2784->2794 2785->2784 2793 242e990-242e995 2785->2793 2786->2783 2787->2752 2788->2744 2795 242e89b-242e8a3 2788->2795 2789->2772 2791->2756 2792->2747 2797 242e997-242e9a9 CloseHandle 2793->2797 2798 242e9ab-242e9b6 2793->2798 2794->2790 2799 242e9c8-242e9d1 HeapFree 2794->2799 2795->2764 2800 242e8a5-242e8a7 2795->2800 2803 242e9b9 2797->2803 2798->2803 2799->2790 2801 242e8ba-242e8bd 2800->2801 2802 242e8a9-242e8b7 call 23dea05 2800->2802 2801->2755 2802->2801 2803->2794
    APIs
    • HeapReAlloc.KERNEL32(00000000,?,00000000), ref: 0242E914
    • HeapFree.KERNEL32(00000000,?), ref: 0242E95B
    • CreateMutexW.KERNEL32(00000000,00000000,?), ref: 0242E96B
    • GetLastError.KERNEL32(00000000,00000000,?), ref: 0242E972
    • HeapFree.KERNEL32(00000000,?), ref: 0242E9D1
      • Part of subcall function 0243D430: GetProcessHeap.KERNEL32(00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?,?,023E161A,0244D2B0), ref: 0243D43F
      • Part of subcall function 0243D430: RtlAllocateHeap.NTDLL(007F0000,00000000,00000014,00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?), ref: 0243D451
    • CloseHandle.KERNEL32(00000000), ref: 0242E998
    • GetModuleHandleA.KERNEL32(api-ms-win-core-synch-l1-2-0,00000000,00000002), ref: 0242E9F7
    • GetProcAddress.KERNEL32(00000000,WaitOnAddress), ref: 0242EA09
    • GetProcAddress.KERNEL32(00000000,WakeByAddressSingle), ref: 0242EA1B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Heap$AddressFreeHandleProc$AllocAllocateCloseCreateErrorLastModuleMutexProcess
    • String ID: VUUU$WaitOnAddress$WakeByAddressSingle$api-ms-win-core-synch-l1-2-0
    • API String ID: 4042372245-3834393415
    • Opcode ID: 9c5037684733e14ddebf7a4889dda5e362516e5d721fc19d3532283e15edc99a
    • Instruction ID: d17800698ce51b2ced6a43e3a85813f64415c56e5f2109b28cc693192e02a213
    • Opcode Fuzzy Hash: 9c5037684733e14ddebf7a4889dda5e362516e5d721fc19d3532283e15edc99a
    • Instruction Fuzzy Hash: 2CC1B272E083219FD718DF1AC44472ABBE1AF84704F55892FE99997391E770E84ACB81
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2806 42c59f-42c638 2807 42c63c 2806->2807 2808 42c63e-42c648 2807->2808 2808->2808 2809 42c64a-42c64b 2808->2809 2809->2807 2810 42c64d-42c654 2809->2810 2811 42c683 2810->2811 2812 42c656-42c661 call 42c955 2810->2812 2814 42c686-42c6f5 call 42c9f5 * 3 VirtualAlloc 2811->2814 2817 42c663-42c672 call 42c973 2812->2817 2828 42c6f8-42c71e 2814->2828 2823 42c674-42c678 2817->2823 2824 42c67e-42c681 2817->2824 2823->2817 2827 42c67a-42c67c 2823->2827 2824->2814 2827->2814 2828->2828 2829 42c720-42c744 VirtualAlloc 2828->2829 2830 42c74a-42c76a 2829->2830 2831 42c94c 2829->2831 2832 42c783-42c7b7 2830->2832 2833 42c76c-42c772 2830->2833 2834 42c94e-42c954 2831->2834 2832->2831 2836 42c7bd-42c7c0 2832->2836 2835 42c774-42c77b 2833->2835 2835->2835 2837 42c77d-42c780 2835->2837 2838 42c7c2-42c7c7 2836->2838 2837->2832 2839 42c7d9-42c7dc 2838->2839 2840 42c7c9-42c7d1 2838->2840 2842 42c7ee-42c802 2839->2842 2843 42c7de-42c7e6 2839->2843 2840->2839 2841 42c7d3-42c7d6 2840->2841 2841->2839 2844 42c804-42c809 2842->2844 2845 42c81a-42c82a 2842->2845 2843->2842 2846 42c7e8-42c7eb 2843->2846 2847 42c80b-42c812 2844->2847 2845->2838 2848 42c82c-42c831 2845->2848 2846->2842 2847->2847 2849 42c814-42c817 2847->2849 2848->2831 2850 42c837-42c83c 2848->2850 2849->2845 2851 42c893-42c89b 2850->2851 2852 42c83e 2850->2852 2851->2831 2854 42c8a1-42c8aa 2851->2854 2853 42c841-42c859 2852->2853 2857 42c88b-42c88e 2853->2857 2858 42c85b 2853->2858 2855 42c902-42c90d 2854->2855 2856 42c8ac-42c8b9 LoadLibraryA 2854->2856 2861 42c938-42c942 call 244d76d 2855->2861 2862 42c90f-42c920 2855->2862 2856->2831 2859 42c8bf-42c8ca 2856->2859 2857->2853 2863 42c890 2857->2863 2860 42c85d-42c86f 2858->2860 2864 42c8f4-42c8fd 2859->2864 2865 42c8cc 2859->2865 2866 42c871-42c883 2860->2866 2867 42c885-42c889 2860->2867 2869 42c944-42c94a 2861->2869 2862->2861 2868 42c922 2862->2868 2863->2851 2864->2856 2871 42c8ff 2864->2871 2870 42c8cf-42c8d3 2865->2870 2866->2867 2867->2857 2867->2860 2872 42c925-42c933 2868->2872 2869->2834 2873 42c8d5-42c8d8 2870->2873 2874 42c8da-42c8dd 2870->2874 2871->2855 2878 42c935 2872->2878 2875 42c8df-42c8ec GetProcAddress 2873->2875 2874->2875 2875->2870 2877 42c8ee-42c8f1 2875->2877 2877->2864 2878->2861
    APIs
    • VirtualAlloc.KERNELBASE(00000000,000C4E00,00003000,00000004), ref: 0042C6C3
    • VirtualAlloc.KERNELBASE(00000000,?,00003000,?,0000001B), ref: 0042C73A
    • LoadLibraryA.KERNELBASE(?), ref: 0042C8B1
    • GetProcAddress.KERNELBASE(?,-00000002), ref: 0042C8E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AllocVirtual$AddressLibraryLoadProc
    • String ID: 6$9+Di$Gs$M4U5$O$pfx8$s<O?(Su(
    • API String ID: 2938105391-2690861754
    • Opcode ID: 916608cc3e3ec2ceff47aa40f93238c1188128ce52c19099b677353d2d13b359
    • Instruction ID: d8249402ebe6bdfeba434c09cdb94f051b8725f3fd3e4fd9d669bd8fa7343339
    • Opcode Fuzzy Hash: 916608cc3e3ec2ceff47aa40f93238c1188128ce52c19099b677353d2d13b359
    • Instruction Fuzzy Hash: B3D16B71F012699FDB24CFA8D9807ADBBB1FF49700F6480AAD845EB341E7749941CB58
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2958 24302d0-2430304 2959 2430306-243030f GetStdHandle 2958->2959 2960 243031e-2430328 2958->2960 2961 2430311-2430314 2959->2961 2962 243032a 2959->2962 2963 2430335-2430345 2960->2963 2965 2430346-243035c GetConsoleMode 2961->2965 2966 2430316-243031c GetLastError 2961->2966 2964 243032f-2430332 2962->2964 2964->2963 2967 24303be-24303ea NtWriteFile 2965->2967 2968 243035e-243036a 2965->2968 2966->2964 2971 2430403-2430405 2967->2971 2972 24303ec-24303fd WaitForSingleObject 2967->2972 2969 2430370-2430375 2968->2969 2970 243040e-243042f call 23d7a90 2968->2970 2973 243037b-2430386 2969->2973 2974 243057e-24305a9 call 245c9a0 2969->2974 2989 2430435-243043a 2970->2989 2990 24304b8-24304bb 2970->2990 2976 2430407-243040c 2971->2976 2977 243046f-2430472 RtlNtStatusToDosError 2971->2977 2972->2971 2975 24305ae-243060b call 242f050 call 242f1b0 2972->2975 2980 2430469-243046d 2973->2980 2981 243038c-24303a9 2973->2981 2974->2975 2995 243060d-2430619 call 245ca90 2975->2995 2982 2430478-2430480 2976->2982 2977->2982 2986 24304a9-24304b3 2980->2986 2987 2430485-243048b 2981->2987 2988 24303af-24303b9 2981->2988 2982->2963 2986->2963 2994 2430491-24304a7 call 23d7a90 2987->2994 2987->2995 2988->2963 2991 24304d2-24304e2 2989->2991 2992 2430440-2430445 2989->2992 2996 24304be-24304cd call 2430690 2990->2996 2999 2430552-243055d 2991->2999 3000 24304e4-24304e6 2991->3000 2997 243044b-243045b call 23d7a90 2992->2997 2998 243061e-2430627 call 245ca90 2992->2998 2994->2986 3012 24304fe-2430509 2994->3012 2995->2998 2996->2963 3011 243062c-243064e call 245cda0 2997->3011 3013 2430461-2430467 2997->3013 2998->3011 2999->2963 3000->2999 3007 24304e8-24304f9 3000->3007 3007->2963 3014 2430653-2430684 call 2460b10 CloseHandle 3011->3014 3012->3014 3015 243050f-2430527 call 2430690 3012->3015 3013->2996 3021 2430562-2430579 3015->3021 3022 2430529-2430534 3015->3022 3021->2963 3022->2988 3023 243053a-243054d call 2460b10 3022->3023 3023->2999
    APIs
    • GetStdHandle.KERNEL32 ref: 02430307
    • GetLastError.KERNEL32 ref: 02430316
    • GetConsoleMode.KERNEL32(00000000,?), ref: 02430354
    • NtWriteFile.NTDLL ref: 024303DF
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 024303EF
    • RtlNtStatusToDosError.NTDLL ref: 02430472
    • CloseHandle.KERNEL32(00000000), ref: 0243067A
    Strings
    • called `Result::unwrap()` on an `Err` value, xrefs: 02430634
    • Invalid, xrefs: 0243059B
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: ErrorHandle$CloseConsoleFileLastModeObjectSingleStatusWaitWrite
    • String ID: Invalid$called `Result::unwrap()` on an `Err` value
    • API String ID: 3090192319-3400594596
    • Opcode ID: 21b6ac57a7dbe0b56643a6bd830121a939c2d500312978c2ecb83a7ce9d4a563
    • Instruction ID: 531e1d395e7ef60b7bb8dcf5170edd62ffaab09686ed660d24e7fe0d21a11b39
    • Opcode Fuzzy Hash: 21b6ac57a7dbe0b56643a6bd830121a939c2d500312978c2ecb83a7ce9d4a563
    • Instruction Fuzzy Hash: 0AB101B0D04248DFDB11CFA4C8847EEBFB5AF48714F14951AE492AB381D7749989CF61
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SafeArrayDestroy.OLEAUT32(?), ref: 023F03CE
    • HeapFree.KERNEL32(00000000,?), ref: 023F0CBB
      • Part of subcall function 024404D0: TlsGetValue.KERNEL32(00000000), ref: 024404E9
      • Part of subcall function 024404D0: TlsGetValue.KERNEL32(00000000), ref: 02440510
      • Part of subcall function 024404D0: TlsSetValue.KERNEL32(00000000,00000000), ref: 0244055E
      • Part of subcall function 024404D0: BCryptGenRandom.BCRYPT(00000000,?,00000010,00000002), ref: 02440574
      • Part of subcall function 02448E9F: GetProcessHeap.KERNEL32(?,Invalid,?,02448DD0,?,?,?,?,023F0204,?,000000FF,00000001,?,?), ref: 02448EAD
      • Part of subcall function 02448E9F: HeapAlloc.KERNEL32(00000000,00000000,?,?,Invalid,?,02448DD0,?,?,?,?,023F0204,?,000000FF,00000001,?), ref: 02448EB7
    • HeapFree.KERNEL32(00000000,?), ref: 023F0F29
    • HeapFree.KERNEL32(00000000,?), ref: 023F0F6F
    Strings
    • called `Result::unwrap()` on an `Err` value, xrefs: 023F1053
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 023F1069
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Heap$FreeValue$AllocArrayCryptDestroyProcessRandomSafe
    • String ID: called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs
    • API String ID: 3513538077-3781368868
    • Opcode ID: dacc8e7bcc022349212659c266941f6c97fb58fce3ca4c184982a167013b3d38
    • Instruction ID: f98c6cdfd73a494c5d8cb042abbac962d237f89de67063183bbe92b2769a1aa5
    • Opcode Fuzzy Hash: dacc8e7bcc022349212659c266941f6c97fb58fce3ca4c184982a167013b3d38
    • Instruction Fuzzy Hash: 8B8247B1A083818FD364CF29D480B9AFBE1BFC9300F14896EE99997356E770D945CB52
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3242 23deac0-23deafc RtlAddVectoredExceptionHandler 3243 23dec9c-23decd3 call 245c9a0 3242->3243 3244 23deb02-23deb15 SetThreadStackGuarantee 3242->3244 3251 23ded1d-23ded2f 3243->3251 3246 23deb17-23deb20 GetLastError 3244->3246 3247 23deb26-23deb37 call 242ee40 3244->3247 3246->3247 3249 23dece6-23ded18 call 245c9a0 3246->3249 3253 23deb3c-23deb53 call 243d430 3247->3253 3249->3251 3254 23ded4b-23ded4f 3251->3254 3255 23ded31-23ded33 3251->3255 3262 23deb59-23deb5f 3253->3262 3263 23decd5-23dece4 call 245c900 3253->3263 3260 23ded71-23ded75 3254->3260 3261 23ded51-23ded5b 3254->3261 3257 23ded35-23ded40 HeapFree 3255->3257 3258 23ded46-23ded4a 3255->3258 3257->3258 3264 23ded5d-23ded66 HeapFree 3261->3264 3265 23ded6c-23ded70 3261->3265 3266 23deb60-23deb69 3262->3266 3263->3251 3264->3265 3268 23deb6f-23deb73 3266->3268 3269 23dec16-23dec9a call 242f050 call 242f1b0 3266->3269 3268->3266 3272 23deb75-23debd3 call 23d1310 call 242eec0 call 242f2a0 call 23dedff 3268->3272 3269->3243 3284 23debd5-23dec00 call 2460460 3272->3284 3285 23dec03-23dec15 3272->3285 3284->3285
    APIs
    • RtlAddVectoredExceptionHandler.NTDLL(00000000,0242EC80), ref: 023DEAF4
    • SetThreadStackGuarantee.KERNELBASE(00005000), ref: 023DEB0D
    • GetLastError.KERNEL32 ref: 023DEB17
    • HeapFree.KERNEL32(00000000,?), ref: 023DED40
    • HeapFree.KERNEL32(00000000,?), ref: 023DED66
      • Part of subcall function 0242F1B0: HeapFree.KERNEL32(00000000,00000000), ref: 0242F223
      • Part of subcall function 0242F1B0: HeapFree.KERNEL32(00000000,?), ref: 0242F232
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$ErrorExceptionGuaranteeHandlerLastStackThreadVectored
    • String ID: Invalid$main
    • API String ID: 679289583-3302030394
    • Opcode ID: 95b645fe399edcd7b986a1d2de9c75681708f5afaf42de3854f787d6fd2f7fac
    • Instruction ID: 1c9dfee96a74237bee5aefd74bda5476110ef01b05daf616160ddf98e124a72a
    • Opcode Fuzzy Hash: 95b645fe399edcd7b986a1d2de9c75681708f5afaf42de3854f787d6fd2f7fac
    • Instruction Fuzzy Hash: 9D7143B1E002589FEB14DFE5E8887EEBFB5BF40318F14052AE815AB280DBB55548CF91
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3307 24404d0-24404e1 3308 24404e7 3307->3308 3309 24405b2-24405bc call 2460970 3307->3309 3310 24404e8-24404f2 TlsGetValue 3308->3310 3309->3310 3312 24404f4-24404fb 3310->3312 3313 2440501-2440508 3310->3313 3312->3313 3315 24405a7 3312->3315 3316 24405c1-24405cb call 2460970 3313->3316 3317 244050e 3313->3317 3318 24405aa-24405b1 3315->3318 3319 244050f-2440519 TlsGetValue 3316->3319 3317->3319 3321 2440584-2440586 3319->3321 3322 244051b-244051f 3319->3322 3321->3318 3324 2440564-244057c BCryptGenRandom 3322->3324 3325 2440521-2440536 call 243d430 3322->3325 3327 244057e-2440582 3324->3327 3328 2440588-2440591 call 243ce20 3324->3328 3333 24405dc-2440627 call 245c900 3325->3333 3334 244053c-2440559 3325->3334 3329 2440596-24405a3 3327->3329 3328->3329 3329->3315 3342 244062c-2440644 call 2460970 3333->3342 3343 2440629-244062a 3333->3343 3336 24405d0-24405da call 2460970 3334->3336 3337 244055b 3334->3337 3340 244055c-244055e TlsSetValue 3336->3340 3337->3340 3340->3324 3344 2440647-2440663 TlsSetValue HeapFree 3342->3344 3343->3344 3347 2440665-2440666 3344->3347 3348 2440668-2440675 call 2460970 3344->3348 3349 244067a-2440693 TlsSetValue 3347->3349 3348->3349
    APIs
    • TlsGetValue.KERNEL32(00000000), ref: 024404E9
    • TlsGetValue.KERNEL32(00000000), ref: 02440510
    • TlsSetValue.KERNEL32(00000000,00000000), ref: 0244055E
    • BCryptGenRandom.BCRYPT(00000000,?,00000010,00000002), ref: 02440574
      • Part of subcall function 02460970: InitOnceBeginInitialize.KERNEL32(0249005C,00000000,00000000,00000000), ref: 02460993
      • Part of subcall function 02460970: TlsAlloc.KERNEL32 ref: 024609A8
      • Part of subcall function 02460970: InitOnceComplete.KERNEL32(0249005C,00000000,00000000), ref: 024609D9
      • Part of subcall function 0243CE20: SystemFunction036.ADVAPI32(?,00000010), ref: 0243CE64
      • Part of subcall function 02460970: TlsAlloc.KERNEL32 ref: 024609E1
      • Part of subcall function 02460970: InitOnceComplete.KERNEL32(0249005C,00000004,00000000), ref: 02460A30
    • TlsSetValue.KERNEL32(00000000,00000001), ref: 0244064A
    • HeapFree.KERNEL32(00000000,?), ref: 02440659
    • TlsSetValue.KERNEL32(00000000,00000000), ref: 0244067D
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Value$InitOnce$AllocComplete$BeginCryptFreeFunction036HeapInitializeRandomSystem
    • String ID:
    • API String ID: 3346809877-0
    • Opcode ID: 2fdce0655c0e9760fb35475aed2ff1df7f635b5ff00cfd354d74270f8378956e
    • Instruction ID: 19f315f0915d1ebc692f250c91e92343cd527c25b3ab6917138dda2356f96c8e
    • Opcode Fuzzy Hash: 2fdce0655c0e9760fb35475aed2ff1df7f635b5ff00cfd354d74270f8378956e
    • Instruction Fuzzy Hash: 0541E431A00205DBEB18DF65D808B6BBBA5FF44314F00591AEA55A7280DB70E9A0CFA1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3351 415dde-415e30 call 416ef8 call 415460 GetVersionExA 3356 415e32-415e38 3351->3356 3357 415e3e-415e58 GetModuleHandleA 3351->3357 3356->3357 3358 415e79-415e7c 3357->3358 3359 415e5a-415e65 3357->3359 3361 415ea5-415eaf call 418875 3358->3361 3359->3358 3360 415e67-415e70 3359->3360 3363 415e91-415e95 3360->3363 3364 415e72-415e77 3360->3364 3369 415eb1-415eb8 call 415dba 3361->3369 3370 415eb9-415ec0 call 419d60 3361->3370 3363->3358 3365 415e97-415e99 3363->3365 3364->3358 3367 415e7e-415e85 3364->3367 3368 415e9f-415ea2 3365->3368 3367->3358 3371 415e87-415e8f 3367->3371 3368->3361 3369->3370 3376 415ec2-415ec9 call 415dba 3370->3376 3377 415eca-415ed9 call 41b0ca call 41aecc 3370->3377 3371->3368 3376->3377 3384 415ee3-415eff GetCommandLineA call 41adaa call 41ad08 3377->3384 3385 415edb-415ee2 call 415d95 3377->3385 3392 415f01-415f08 call 415d95 3384->3392 3393 415f09-415f10 call 41aad5 3384->3393 3385->3384 3392->3393 3398 415f12-415f19 call 415d95 3393->3398 3399 415f1a-415f24 call 41726c 3393->3399 3398->3399 3404 415f26-415f2c call 415d95 3399->3404 3405 415f2d-415f46 GetStartupInfoA call 41aa6c 3399->3405 3404->3405 3410 415f48-415f4c 3405->3410 3411 415f4e-415f50 3405->3411 3412 415f51-415f5a GetModuleHandleA call 42da58 3410->3412 3411->3412 3414 415f5f-415f67 3412->3414 3415 415f69-415f6a call 4173a4 3414->3415 3416 415f6f-415faf call 4173c6 call 416f33 3414->3416 3415->3416
    APIs
    • GetVersionExA.KERNEL32(?,0043A478,00000060), ref: 00415DFE
    • GetModuleHandleA.KERNEL32(00000000,?,0043A478,00000060), ref: 00415E51
    • _fast_error_exit.LIBCMT ref: 00415EB3
    • _fast_error_exit.LIBCMT ref: 00415EC4
    • GetCommandLineA.KERNEL32(?,0043A478,00000060), ref: 00415EE3
    • GetStartupInfoA.KERNEL32(?), ref: 00415F34
    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00415F57
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: HandleModule_fast_error_exit$CommandInfoLineStartupVersion
    • String ID:
    • API String ID: 295806912-0
    • Opcode ID: 7580fc86ef3703e129c93f81ffe4cb78bab1cb0c9785aa81ad774adae03db122
    • Instruction ID: 4de3da79c62a0b75e44d7bd2c56d04160538a993b3b658ad46e0b3fd54b52aaf
    • Opcode Fuzzy Hash: 7580fc86ef3703e129c93f81ffe4cb78bab1cb0c9785aa81ad774adae03db122
    • Instruction Fuzzy Hash: 8D417D71D00B14CADB20AB76A8466EE37B1AF85714F24443FE5589A291DB3C89C2CB9D
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3476 24491d2-24491db 3477 2449235-2449237 3476->3477 3478 24491dd-24491e6 3476->3478 3481 2449456-244945f 3477->3481 3479 24491f5-2449202 3478->3479 3480 24491e8-24491f0 3478->3480 3483 2449204-2449213 3479->3483 3484 244923c-244924b 3479->3484 3482 244928d-244928f 3480->3482 3485 2449291-24492ba 3482->3485 3486 2449215-2449233 3483->3486 3487 244924d-2449255 3483->3487 3484->3482 3488 2449460 call 23d10d0 3485->3488 3489 24492c0-24492c9 3485->3489 3486->3477 3490 2449257 3486->3490 3491 244925a-2449262 3487->3491 3497 2449465-244946c call 245c900 3488->3497 3489->3488 3492 24492cf-24492df call 243d430 3489->3492 3490->3491 3494 2449264-2449286 3491->3494 3495 2449288-244928b 3491->3495 3492->3497 3500 24492e5-2449308 3492->3500 3494->3485 3495->3482 3501 2449471-244947d call 2448b49 3497->3501 3502 2449309-244930c 3500->3502 3510 244947f-24494a0 call 245cda0 3501->3510 3504 2449312-2449314 3502->3504 3505 24493ba 3502->3505 3508 2449405-244940f 3504->3508 3509 244931a-2449322 3504->3509 3507 24493bc-24493c0 3505->3507 3511 24493d2-2449403 call 2461847 3507->3511 3512 24493c2-24493cd 3507->3512 3513 2449441 3508->3513 3514 2449411-244941b SysAllocStringLen 3508->3514 3515 2449324-2449325 3509->3515 3516 244932a-2449337 3509->3516 3511->3512 3512->3502 3518 2449443-2449445 3513->3518 3514->3501 3520 244941d-2449428 SysStringLen 3514->3520 3515->3505 3521 2449377-244937f 3516->3521 3522 2449339-2449348 3516->3522 3518->3481 3523 2449447-2449450 HeapFree 3518->3523 3520->3518 3525 244942a-244943f call 2448b49 SysFreeString 3520->3525 3521->3505 3526 2449381-2449389 3522->3526 3527 244934a-244936c 3522->3527 3523->3481 3525->3510 3528 244938d-2449393 3526->3528 3527->3508 3530 2449372-2449375 3527->3530 3528->3505 3531 2449395-24493b8 3528->3531 3530->3528 3531->3507
    APIs
    • SysAllocStringLen.OLEAUT32(?,?), ref: 02449413
    • SysStringLen.OLEAUT32(00000000), ref: 02449420
    • SysFreeString.OLEAUT32(00000000), ref: 02449439
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,023F1C5A), ref: 02449450
    Strings
    • called `Result::unwrap()` on an `Err` value, xrefs: 02449487
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: String$Free$AllocHeap
    • String ID: called `Result::unwrap()` on an `Err` value
    • API String ID: 1317130057-2333694755
    • Opcode ID: b18bdf5f5548581ba5e022e45201484b6cceb910e5822841528cb087eeaba1a3
    • Instruction ID: f3dc69ea84619a28cff7185f685d21062ff6dcd42a1b838eb7fefd34894b283c
    • Opcode Fuzzy Hash: b18bdf5f5548581ba5e022e45201484b6cceb910e5822841528cb087eeaba1a3
    • Instruction Fuzzy Hash: 57714B73E087545BE3188E59C89063BBBD2ABC5348F0A853FE89A8B381DE70DC06D741
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • TlsGetValue.KERNEL32(00000000), ref: 024404E9
    • TlsGetValue.KERNEL32(00000000), ref: 02440510
    • TlsSetValue.KERNEL32(00000000,00000000), ref: 0244055E
    • BCryptGenRandom.BCRYPT(00000000,?,00000010,00000002), ref: 02440574
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Value$CryptRandom
    • String ID:
    • API String ID: 658332386-0
    • Opcode ID: ac3144caca293ccef4845c484dc6e76176d86bf7ee383b8958fb5a780b395254
    • Instruction ID: e7e69a6f5673e6b5a4dedd8aee9166bc457a07d9669742f278a8eaa3f25b1c9d
    • Opcode Fuzzy Hash: ac3144caca293ccef4845c484dc6e76176d86bf7ee383b8958fb5a780b395254
    • Instruction Fuzzy Hash: F1219030B506049BF728DB399809B6777E8EF05348F446915EE58DB290EB70E9B0CB91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.KERNEL32(00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?,?,023E161A,0244D2B0), ref: 0243D43F
    • RtlAllocateHeap.NTDLL(007F0000,00000000,00000014,00000000,?,0245FBF2,?,?,0242AA2A,?,?,?,?,0242A70C,?,?), ref: 0243D451
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Heap$AllocateProcess
    • String ID:
    • API String ID: 1357844191-0
    • Opcode ID: a80cc2b5be382724021e7c8cd2cb3170cc9f113f9f259504f89ad099ec23534b
    • Instruction ID: 16873b8c320c5b991cdb268ac0a08a6704de2b5bc18eacdf01973a4900d2e471
    • Opcode Fuzzy Hash: a80cc2b5be382724021e7c8cd2cb3170cc9f113f9f259504f89ad099ec23534b
    • Instruction Fuzzy Hash: 02D05B31F44111E7476D4A79BC0CD932AACEBE92753040836E805C2204EB60D451C7B1
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 02441B26
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Value$CryptRandom
    • String ID: cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs
    • API String ID: 658332386-682668089
    • Opcode ID: dbaa85bbc87b9d4447b04d3eea70b567c1544c4928a7c0e888748a5b8c602f53
    • Instruction ID: 657c4e54eae9d5a3994723bd085a5523847d60748ffccb736a020f2dfc178180
    • Opcode Fuzzy Hash: dbaa85bbc87b9d4447b04d3eea70b567c1544c4928a7c0e888748a5b8c602f53
    • Instruction Fuzzy Hash: 86D14A71A087109FD358DF69C88035BF7E2EBC8310F1AC93EE99AD7251DA74E8459B81
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2880 42c5ff-42c600 2881 42c602-42c626 2880->2881 2882 42c62a-42c62e 2880->2882 2881->2882 2883 42c5c0-42c5fb 2882->2883 2884 42c630-42c638 2882->2884 2883->2880 2885 42c63c 2884->2885 2886 42c63e-42c648 2885->2886 2886->2886 2887 42c64a-42c64b 2886->2887 2887->2885 2888 42c64d-42c654 2887->2888 2889 42c683 2888->2889 2890 42c656-42c661 call 42c955 2888->2890 2892 42c686-42c6f5 call 42c9f5 * 3 VirtualAlloc 2889->2892 2895 42c663-42c672 call 42c973 2890->2895 2906 42c6f8-42c71e 2892->2906 2901 42c674-42c678 2895->2901 2902 42c67e-42c681 2895->2902 2901->2895 2905 42c67a-42c67c 2901->2905 2902->2892 2905->2892 2906->2906 2907 42c720-42c744 VirtualAlloc 2906->2907 2908 42c74a-42c76a 2907->2908 2909 42c94c 2907->2909 2910 42c783-42c7b7 2908->2910 2911 42c76c-42c772 2908->2911 2912 42c94e-42c954 2909->2912 2910->2909 2914 42c7bd-42c7c0 2910->2914 2913 42c774-42c77b 2911->2913 2913->2913 2915 42c77d-42c780 2913->2915 2916 42c7c2-42c7c7 2914->2916 2915->2910 2917 42c7d9-42c7dc 2916->2917 2918 42c7c9-42c7d1 2916->2918 2920 42c7ee-42c802 2917->2920 2921 42c7de-42c7e6 2917->2921 2918->2917 2919 42c7d3-42c7d6 2918->2919 2919->2917 2922 42c804-42c809 2920->2922 2923 42c81a-42c82a 2920->2923 2921->2920 2924 42c7e8-42c7eb 2921->2924 2925 42c80b-42c812 2922->2925 2923->2916 2926 42c82c-42c831 2923->2926 2924->2920 2925->2925 2927 42c814-42c817 2925->2927 2926->2909 2928 42c837-42c83c 2926->2928 2927->2923 2929 42c893-42c89b 2928->2929 2930 42c83e 2928->2930 2929->2909 2932 42c8a1-42c8aa 2929->2932 2931 42c841-42c859 2930->2931 2935 42c88b-42c88e 2931->2935 2936 42c85b 2931->2936 2933 42c902-42c90d 2932->2933 2934 42c8ac-42c8b9 LoadLibraryA 2932->2934 2939 42c938-42c94a call 244d76d 2933->2939 2940 42c90f-42c920 2933->2940 2934->2909 2937 42c8bf-42c8ca 2934->2937 2935->2931 2941 42c890 2935->2941 2938 42c85d-42c86f 2936->2938 2942 42c8f4-42c8fd 2937->2942 2943 42c8cc 2937->2943 2944 42c871-42c883 2938->2944 2945 42c885-42c889 2938->2945 2939->2912 2940->2939 2946 42c922 2940->2946 2941->2929 2942->2934 2949 42c8ff 2942->2949 2948 42c8cf-42c8d3 2943->2948 2944->2945 2945->2935 2945->2938 2950 42c925-42c933 2946->2950 2951 42c8d5-42c8d8 2948->2951 2952 42c8da-42c8dd 2948->2952 2949->2933 2956 42c935 2950->2956 2953 42c8df-42c8ec GetProcAddress 2951->2953 2952->2953 2953->2948 2955 42c8ee-42c8f1 2953->2955 2955->2942 2956->2939
    APIs
    • VirtualAlloc.KERNELBASE(00000000,000C4E00,00003000,00000004), ref: 0042C6C3
    • VirtualAlloc.KERNELBASE(00000000,?,00003000,?,0000001B), ref: 0042C73A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID: 6$9+Di$Gs$M4U5$O$pfx8$s<O?(Su(
    • API String ID: 4275171209-2690861754
    • Opcode ID: 5771f0e1f234e3279db517ca23c00010e8d1b9e8e672e5662b23c37979f35266
    • Instruction ID: cd5d1eeb5dad64a7cc3f15a6d20144d3d4e45bed201563ddaa11bfec4b45d5f5
    • Opcode Fuzzy Hash: 5771f0e1f234e3279db517ca23c00010e8d1b9e8e672e5662b23c37979f35266
    • Instruction Fuzzy Hash: C8C14771F012699FCB24CFA8D9807ADBBB1FF49304F6881AAD845EB341E7749941CB58
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3025 42b64b-42b668 EnterCriticalSection 3026 42b677-42b67c 3025->3026 3027 42b66a-42b671 3025->3027 3029 42b699-42b6a2 3026->3029 3030 42b67e-42b681 3026->3030 3027->3026 3028 42b72c-42b72f 3027->3028 3031 42b731-42b734 3028->3031 3032 42b737-42b757 LeaveCriticalSection 3028->3032 3034 42b6b4-42b6d0 GlobalHandle GlobalUnlock GlobalReAlloc 3029->3034 3035 42b6a4-42b6b2 GlobalAlloc 3029->3035 3033 42b684-42b687 3030->3033 3031->3032 3037 42b691-42b693 3033->3037 3038 42b689-42b68f 3033->3038 3036 42b6d6-42b6e2 3034->3036 3035->3036 3039 42b704-42b72b GlobalLock call 416700 3036->3039 3040 42b6e4-42b6e9 3036->3040 3037->3028 3037->3029 3038->3033 3038->3037 3039->3028 3041 42b6f5-42b6ff LeaveCriticalSection call 421452 3040->3041 3042 42b6eb-42b6f3 GlobalHandle GlobalLock 3040->3042 3041->3039 3042->3041
    APIs
    • EnterCriticalSection.KERNEL32(0044AEF4,?,?,?,0044AED8,0044AED8,0042BB1F,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B65A
    • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,0044AED8,0044AED8,0042BB1F,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B6AC
    • GlobalHandle.KERNEL32(00801ED0), ref: 0042B6B5
    • GlobalUnlock.KERNEL32(00000000,?,?,?,0044AED8,0044AED8,0042BB1F,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B6BE
    • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 0042B6D0
    • GlobalHandle.KERNEL32(00801ED0), ref: 0042B6EC
    • GlobalLock.KERNEL32(00000000,?,?,?,0044AED8,0044AED8,0042BB1F,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B6F3
    • LeaveCriticalSection.KERNEL32(00429E06,?,?,?,0044AED8,0044AED8,0042BB1F,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B6F9
    • GlobalLock.KERNEL32(0040C70D,?,?,?,0044AED8,0044AED8,0042BB1F,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B708
    • LeaveCriticalSection.KERNEL32(?), ref: 0042B74A
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
    • String ID:
    • API String ID: 2667261700-0
    • Opcode ID: 78356631f8aaed9052733949075a33ef6c867759e15218fc8afabd321056c18c
    • Instruction ID: 222caff267ab2058375ee3363c8eab48129623bed3694301ddaedbbb3d00f7f7
    • Opcode Fuzzy Hash: 78356631f8aaed9052733949075a33ef6c867759e15218fc8afabd321056c18c
    • Instruction Fuzzy Hash: 0F3178B23007059FD720DF68EC88A26B7F8FB84300B84493EE892C3650D735EC198B69
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3288 243ccc0-243cd00 SetThreadStackGuarantee 3289 243cd02-243cd0b GetLastError 3288->3289 3290 243cd0d-243cd30 3288->3290 3289->3290 3291 243cd78-243cdde call 245c9a0 call 245cf10 3289->3291 3295 243cd52-243cd75 HeapFree 3290->3295 3296 243cd32-243cd36 3290->3296 3302 243ce03-243ce18 HeapFree 3291->3302 3303 243cde0-243cde7 3291->3303 3298 243cd38-243cd3b 3296->3298 3299 243cd3d-243cd40 3296->3299 3301 243cd43-243cd4c HeapFree 3298->3301 3299->3301 3301->3295 3304 243cdf2-243cdfd HeapFree 3303->3304 3305 243cde9-243cdef 3303->3305 3304->3302 3305->3304
    APIs
    • SetThreadStackGuarantee.KERNELBASE(?), ref: 0243CCF8
    • GetLastError.KERNEL32 ref: 0243CD02
    • HeapFree.KERNEL32(00000000,00000000), ref: 0243CD4C
    • HeapFree.KERNEL32(00000000,?), ref: 0243CD5D
    • HeapFree.KERNEL32(00000000,?), ref: 0243CDFD
    • HeapFree.KERNEL32(00000000,?), ref: 0243CE0E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$ErrorGuaranteeLastStackThread
    • String ID: Invalid
    • API String ID: 3680998240-874791708
    • Opcode ID: 019257b1edde4a3b546b8d0f6bd48e675abc06889d5389d5e13697d4d45514a5
    • Instruction ID: 75a934353a417ac4d9dd1707ccdf8072e0ca1f63d4ee4fff44b7e7b9bd9481e8
    • Opcode Fuzzy Hash: 019257b1edde4a3b546b8d0f6bd48e675abc06889d5389d5e13697d4d45514a5
    • Instruction Fuzzy Hash: 73413A75D40208EFDB05DF94D988BAEBBB5FF08304F10446AF904AB2A0D7759954CF95
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 00426EC5
    • GetSystemMetrics.USER32(0000000C), ref: 00426ECC
    • GetSystemMetrics.USER32(00000002), ref: 00426ED3
    • GetSystemMetrics.USER32(00000003), ref: 00426EDD
    • GetDC.USER32(00000000), ref: 00426EE7
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00426EF8
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00426F00
    • ReleaseDC.USER32(00000000,00000000), ref: 00426F08
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
    • String ID:
    • API String ID: 1031845853-0
    • Opcode ID: ed2417dc9456594cdf0b31a88eb29372da527a16b3c658b083092e7c9424d573
    • Instruction ID: b3796cda6346f1d9b14e489dd3367e8f14833ca86dd78446ae7436d4847d6f55
    • Opcode Fuzzy Hash: ed2417dc9456594cdf0b31a88eb29372da527a16b3c658b083092e7c9424d573
    • Instruction Fuzzy Hash: 23F09071A80700AEE3307F729C49F277BB8EBE1B51F51443AE6418B2D0CAF598068F54
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3423 42c6b6-42c6f5 VirtualAlloc 3424 42c6f8-42c71e 3423->3424 3424->3424 3425 42c720-42c744 VirtualAlloc 3424->3425 3426 42c74a-42c76a 3425->3426 3427 42c94c 3425->3427 3428 42c783-42c7b7 3426->3428 3429 42c76c-42c772 3426->3429 3430 42c94e-42c954 3427->3430 3428->3427 3432 42c7bd-42c7c0 3428->3432 3431 42c774-42c77b 3429->3431 3431->3431 3433 42c77d-42c780 3431->3433 3434 42c7c2-42c7c7 3432->3434 3433->3428 3435 42c7d9-42c7dc 3434->3435 3436 42c7c9-42c7d1 3434->3436 3438 42c7ee-42c802 3435->3438 3439 42c7de-42c7e6 3435->3439 3436->3435 3437 42c7d3-42c7d6 3436->3437 3437->3435 3440 42c804-42c809 3438->3440 3441 42c81a-42c82a 3438->3441 3439->3438 3442 42c7e8-42c7eb 3439->3442 3443 42c80b-42c812 3440->3443 3441->3434 3444 42c82c-42c831 3441->3444 3442->3438 3443->3443 3445 42c814-42c817 3443->3445 3444->3427 3446 42c837-42c83c 3444->3446 3445->3441 3447 42c893-42c89b 3446->3447 3448 42c83e 3446->3448 3447->3427 3450 42c8a1-42c8aa 3447->3450 3449 42c841-42c859 3448->3449 3453 42c88b-42c88e 3449->3453 3454 42c85b 3449->3454 3451 42c902-42c90d 3450->3451 3452 42c8ac-42c8b9 LoadLibraryA 3450->3452 3457 42c938-42c94a call 244d76d 3451->3457 3458 42c90f-42c920 3451->3458 3452->3427 3455 42c8bf-42c8ca 3452->3455 3453->3449 3459 42c890 3453->3459 3456 42c85d-42c86f 3454->3456 3460 42c8f4-42c8fd 3455->3460 3461 42c8cc 3455->3461 3462 42c871-42c883 3456->3462 3463 42c885-42c889 3456->3463 3457->3430 3458->3457 3464 42c922 3458->3464 3459->3447 3460->3452 3467 42c8ff 3460->3467 3466 42c8cf-42c8d3 3461->3466 3462->3463 3463->3453 3463->3456 3468 42c925-42c933 3464->3468 3469 42c8d5-42c8d8 3466->3469 3470 42c8da-42c8dd 3466->3470 3467->3451 3474 42c935 3468->3474 3471 42c8df-42c8ec GetProcAddress 3469->3471 3470->3471 3471->3466 3473 42c8ee-42c8f1 3471->3473 3473->3460 3474->3457
    APIs
    • VirtualAlloc.KERNELBASE(00000000,000C4E00,00003000,00000004), ref: 0042C6C3
    • VirtualAlloc.KERNELBASE(00000000,?,00003000,?,0000001B), ref: 0042C73A
    • LoadLibraryA.KERNELBASE(?), ref: 0042C8B1
    • GetProcAddress.KERNELBASE(?,-00000002), ref: 0042C8E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AllocVirtual$AddressLibraryLoadProc
    • String ID: s<O?(Su(
    • API String ID: 2938105391-2579506083
    • Opcode ID: b3fac43b6f37ce7f2159d76fdb1eea15d15c32a495f9fe60442fcf7cf701a851
    • Instruction ID: 98f8efe1d1dce6292f322ff0c0b8de9db3192ba101f6e8a77763a19099652570
    • Opcode Fuzzy Hash: b3fac43b6f37ce7f2159d76fdb1eea15d15c32a495f9fe60442fcf7cf701a851
    • Instruction Fuzzy Hash: 39A12471E012299FCB14CFA8D980BADBBF1BF49305F6881AAD845EB341D778A941CB54
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3533 242e597-242e5a4 3534 242e5a6 3533->3534 3535 242e5a8 3533->3535 3534->3535 3536 242e623 3535->3536 3537 242e5a9 3535->3537 3540 242e664-242e66e 3536->3540 3541 242e625-242e633 3536->3541 3538 242e5aa-242e5ac 3537->3538 3539 242e5ad-242e5ae 3537->3539 3538->3539 3542 242e5b0-242e5b2 3539->3542 3543 242e576 3539->3543 3546 242e6a5-242e6a7 3540->3546 3544 242e670-242e675 3541->3544 3545 242e635-242e654 3541->3545 3548 242e5c3-242e5f5 3542->3548 3549 242e5b4 3542->3549 3543->3533 3551 242e67a-242e680 3544->3551 3550 242e656-242e65f 3545->3550 3545->3551 3547 242e6a9-242e6e0 call 243d430 3546->3547 3562 242e6e6-242e70f 3547->3562 3563 242e9df-242e9ff call 245c900 GetModuleHandleA 3547->3563 3554 242e5f7-242e60d 3548->3554 3555 242e5ba-242e5c1 3548->3555 3553 242e5b6 3549->3553 3556 242e8bf-242e8c7 3550->3556 3551->3546 3557 242e682-242e6a3 3551->3557 3553->3555 3559 242e617-242e621 3554->3559 3560 242e60f-242e612 3554->3560 3555->3548 3555->3553 3561 242e8cb-242e8cf 3556->3561 3557->3547 3559->3536 3560->3546 3564 242e8d1-242e8e1 call 23dea05 3561->3564 3565 242e8e4 3561->3565 3567 242e714-242e71a 3562->3567 3575 242ea30-242ea32 3563->3575 3576 242ea01-242ea11 GetProcAddress 3563->3576 3564->3565 3569 242e8e7-242e8f9 3565->3569 3571 242e720-242e726 3567->3571 3572 242e7c4 3567->3572 3574 242e8fd-242e8ff 3569->3574 3577 242e86a-242e874 3571->3577 3578 242e72c-242e73c 3571->3578 3581 242e7c6-242e7ca 3572->3581 3579 242e901-242e903 3574->3579 3580 242e92c-242e92e 3574->3580 3576->3575 3585 242ea13-242ea23 GetProcAddress 3576->3585 3577->3556 3588 242e876-242e878 3577->3588 3586 242e744-242e75b 3578->3586 3587 242e73e-242e742 3578->3587 3589 242e950-242e961 HeapFree 3579->3589 3590 242e905-242e91e HeapReAlloc 3579->3590 3584 242e966-242e97a CreateMutexW GetLastError 3580->3584 3582 242e7df-242e81c call 2461823 3581->3582 3583 242e7cc-242e7da 3581->3583 3582->3583 3583->3567 3593 242e981-242e98e 3584->3593 3594 242e97c-242e97f 3584->3594 3585->3575 3592 242ea25-242ea2b 3585->3592 3596 242e7b5-242e7be 3586->3596 3597 242e75d-242e77b 3586->3597 3595 242e7c0 3587->3595 3598 242e87a-242e87f 3588->3598 3589->3584 3590->3584 3599 242e920-242e927 call 245c900 3590->3599 3592->3575 3602 242e9bf-242e9c6 3593->3602 3594->3593 3601 242e990-242e995 3594->3601 3595->3572 3596->3595 3603 242e781-242e7aa 3597->3603 3604 242e81e-242e824 3597->3604 3605 242e930-242e935 3598->3605 3606 242e885-242e889 3598->3606 3599->3580 3611 242e997-242e9a9 CloseHandle 3601->3611 3612 242e9ab-242e9b6 3601->3612 3615 242e9d7-242e9de 3602->3615 3616 242e9c8-242e9d1 HeapFree 3602->3616 3613 242e7b0-242e7b3 3603->3613 3614 242e866 3603->3614 3610 242e826-242e833 3604->3610 3608 242e937-242e93a 3605->3608 3609 242e93c-242e94b 3605->3609 3606->3598 3617 242e88b-242e899 3606->3617 3608->3584 3609->3615 3618 242e835-242e858 3610->3618 3619 242e85d-242e861 3610->3619 3620 242e9b9 3611->3620 3612->3620 3613->3610 3614->3577 3616->3615 3617->3561 3621 242e89b-242e8a3 3617->3621 3618->3581 3619->3572 3620->3602 3621->3574 3622 242e8a5-242e8a7 3621->3622 3623 242e8ba-242e8bd 3622->3623 3624 242e8a9-242e8b7 call 23dea05 3622->3624 3623->3569 3624->3623
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: VUUU
    • API String ID: 0-2040033107
    • Opcode ID: 7c992500194f379d7f60f829b34f1635b0ac9aa85b7c31bcd951610091f9b514
    • Instruction ID: 2e0cc6999f2bb34bff7e07ab698124aa396cd3f101e117e527c1e599298963ab
    • Opcode Fuzzy Hash: 7c992500194f379d7f60f829b34f1635b0ac9aa85b7c31bcd951610091f9b514
    • Instruction Fuzzy Hash: CD51E672B042224BD7188F2AC840327BBD6EFC4654F55857FD9999B391F731E84ACB81
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3627 23f1c36-23f1c7d call 24491d2 * 2 call 23f1ba7 3634 23f1c7f-23f1c89 3627->3634 3635 23f1cb9-23f1cbf 3627->3635 3638 23f1c8b-23f1c8d 3634->3638 3639 23f1c91-23f1c93 3634->3639 3636 23f1cc8-23f1cca 3635->3636 3637 23f1cc1-23f1cc2 SysFreeString 3635->3637 3642 23f1ccc-23f1ccd SysFreeString 3636->3642 3643 23f1cd3-23f1ce6 call 23f0194 3636->3643 3637->3636 3638->3639 3640 23f1c9c-23f1c9e 3639->3640 3641 23f1c95-23f1c96 SysFreeString 3639->3641 3644 23f1ca7-23f1cb4 3640->3644 3645 23f1ca0-23f1ca1 SysFreeString 3640->3645 3641->3640 3642->3643 3648 23f1ceb-23f1cf1 3643->3648 3647 23f1e0b-23f1e12 3644->3647 3645->3644 3649 23f1cf7-23f1d3c call 23f36d9 call 23f0194 3648->3649 3650 23f1db6-23f1dca 3648->3650 3659 23f1d3e-23f1d41 3649->3659 3660 23f1d96-23f1db4 3649->3660 3652 23f1dce-23f1dd6 3650->3652 3654 23f1dd8-23f1df4 3652->3654 3655 23f1df6-23f1e06 call 23f1bfe 3652->3655 3654->3647 3655->3647 3661 23f1d46-23f1d4a 3659->3661 3660->3652 3662 23f1d4c-23f1d81 call 23f0194 3661->3662 3663 23f1d85-23f1d94 call 245eb2c 3661->3663 3662->3661 3669 23f1d83 3662->3669 3663->3662 3669->3660
    APIs
    • SysFreeString.OLEAUT32(00000000), ref: 023F1C96
    • SysFreeString.OLEAUT32(00000000), ref: 023F1CA1
      • Part of subcall function 023F1BFE: HeapFree.KERNEL32(00000000,?,?,?,00000000,?,023F1E0B), ref: 023F1C2B
    • SysFreeString.OLEAUT32(00000000), ref: 023F1CC2
    • SysFreeString.OLEAUT32(00000000), ref: 023F1CCD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Free$String$Heap
    • String ID: WQL
    • API String ID: 4134718113-1249411209
    • Opcode ID: b118baeb9626d3527c00936fc924f716e30074d116249e73f1c77be10e5157a7
    • Instruction ID: 5aedaa2b70575df17a89d1bf0c38e97edb727bf4f64d6fccb244e1b501cbff58
    • Opcode Fuzzy Hash: b118baeb9626d3527c00936fc924f716e30074d116249e73f1c77be10e5157a7
    • Instruction Fuzzy Hash: D3519C71908341DBD350CF24E44466BB7F5AF89354F148A1DF9CA57222E770EA85CB82
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3670 41aecc-41aede call 4153da 3673 41aee0-41aee3 3670->3673 3674 41aee8-41aefd 3670->3674 3675 41b0c5-41b0c9 3673->3675 3676 41af1d-41af1f 3674->3676 3677 41af21-41af35 GetStartupInfoA 3676->3677 3678 41aeff-41af17 3676->3678 3679 41b024 3677->3679 3680 41af3b-41af41 3677->3680 3678->3676 3682 41b026-41b035 3679->3682 3680->3679 3681 41af47-41af5a 3680->3681 3683 41af5c 3681->3683 3684 41af5e-41af64 3681->3684 3685 41b037-41b03d 3682->3685 3686 41b0a6 3682->3686 3683->3684 3687 41afb4-41afb8 3684->3687 3688 41af66 3684->3688 3690 41b049-41b050 3685->3690 3691 41b03f-41b042 3685->3691 3689 41b0aa-41b0ae 3686->3689 3687->3679 3692 41afba-41afc3 3687->3692 3693 41af6b-41af74 call 4153da 3688->3693 3689->3682 3694 41b0b4-41b0c0 SetHandleCount 3689->3694 3695 41b053-41b05f GetStdHandle 3690->3695 3691->3695 3698 41afc5-41afcb 3692->3698 3699 41b019-41b022 3692->3699 3709 41af76-41af85 3693->3709 3710 41afae 3693->3710 3701 41b0c2-41b0c4 3694->3701 3696 41b061-41b06a GetFileType 3695->3696 3697 41b0a0-41b0a4 3695->3697 3696->3697 3702 41b06c-41b076 3696->3702 3697->3689 3698->3699 3703 41afcd-41afd0 3698->3703 3699->3679 3699->3692 3701->3675 3705 41b078-41b07c 3702->3705 3706 41b07e-41b081 3702->3706 3707 41afd2-41afdb GetFileType 3703->3707 3708 41afdd-41b014 call 41e3e2 3703->3708 3711 41b087-41b099 call 41e3e2 3705->3711 3706->3711 3712 41b083 3706->3712 3707->3699 3707->3708 3720 41b044-41b047 3708->3720 3721 41b016 3708->3721 3714 41af9d-41af9f 3709->3714 3710->3687 3711->3720 3723 41b09b-41b09e 3711->3723 3712->3711 3717 41afa1-41afaa 3714->3717 3718 41af87-41af9b 3714->3718 3717->3693 3722 41afac 3717->3722 3718->3714 3720->3701 3721->3699 3722->3687 3723->3689
    APIs
    • GetStartupInfoA.KERNEL32(?), ref: 0041AF29
    • GetFileType.KERNEL32(?), ref: 0041AFD3
    • GetStdHandle.KERNEL32(-000000F6), ref: 0041B054
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FileHandleInfoStartupType
    • String ID:
    • API String ID: 2461013171-0
    • Opcode ID: 2d49ff2e1dac1d461a9ba017d4f7fce9fd659b37ad6f8575f489bd24d7f4b863
    • Instruction ID: cad9638fdaf26c8eb5ebf78c6630cc0ebb1e4dd1610fc6893beeae660980b453
    • Opcode Fuzzy Hash: 2d49ff2e1dac1d461a9ba017d4f7fce9fd659b37ad6f8575f489bd24d7f4b863
    • Instruction Fuzzy Hash: AE51E4712057418FC720CF28C8847A77BE0EB15324F298A7EE5A6C72E1D738D89AC759
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualAlloc.KERNELBASE(00000000,?,00003000,?,0000001B), ref: 0042C73A
    • LoadLibraryA.KERNELBASE(?), ref: 0042C8B1
    • GetProcAddress.KERNELBASE(?,-00000002), ref: 0042C8E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AddressAllocLibraryLoadProcVirtual
    • String ID: s<O?(Su(
    • API String ID: 4074058790-2579506083
    • Opcode ID: f2fd0d41c120b0acc762afd2b1f5d72efe51c0065ea40216067eb6c2da04019b
    • Instruction ID: 4dfecaa40277070d29589cf71415a5a9c46b68c125777a1cbeafcd6e7af7fa96
    • Opcode Fuzzy Hash: f2fd0d41c120b0acc762afd2b1f5d72efe51c0065ea40216067eb6c2da04019b
    • Instruction Fuzzy Hash: 63912471E01229DFCB24CFA8D980BADBBF1BF49305F6881AAD845EB341D734A941CB54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CoCreateInstance.OLE32(024837A4,00000000,00000001,02483788,?,?,0240AA3A,0000000A), ref: 02449781
    • SysFreeString.OLEAUT32(00000000), ref: 024497EC
    • CoSetProxyBlanket.OLE32 ref: 0244981A
    • SysFreeString.OLEAUT32(00000000), ref: 02449865
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeString$BlanketCreateInstanceProxy
    • String ID:
    • API String ID: 459372342-0
    • Opcode ID: dee61d46d37487c468ddb621c66c1b6b12a3281aaa3d47e3617b6b25c3a3e687
    • Instruction ID: 47b49e56dada9439571df3f56bdaa1d030ea31dc313a5b4bc9680d55c4d238b8
    • Opcode Fuzzy Hash: dee61d46d37487c468ddb621c66c1b6b12a3281aaa3d47e3617b6b25c3a3e687
    • Instruction Fuzzy Hash: 27414170A047429FE314DF6AC88861BFBF5BFC4704F14896EE9898B210EB70D981DB52
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 02431195
    • HeapFree.KERNEL32(00000000,?), ref: 024311A6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: #
    • API String ID: 3298025750-1885708031
    • Opcode ID: 2c19034265216c147f399371fafc8e8e4aec0fb1481e570d60fee72cb7af9f2b
    • Instruction ID: 92e57c355ce44c29d800d19b874300ec41b8142b22e22a97f89ac0e408b132a1
    • Opcode Fuzzy Hash: 2c19034265216c147f399371fafc8e8e4aec0fb1481e570d60fee72cb7af9f2b
    • Instruction Fuzzy Hash: C0210A75E00108ABEF16CFA8D844BEEBBB1BB4D324F14451AE919BB390D7319851CF54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentThread.KERNEL32 ref: 0242EE8A
    • SetThreadDescription.KERNELBASE(00000000,?,?,?,?,?,?,?,?,023DEB3C), ref: 0242EE98
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,023DEB3C), ref: 0242EEA7
      • Part of subcall function 024316E0: HeapFree.KERNEL32(00000000,?), ref: 02431778
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeapThread$CurrentDescription
    • String ID:
    • API String ID: 2762239883-0
    • Opcode ID: 45cd936dd1552f634fb7c8f1b83663f80dfa30545f49f772099bae3a9063713c
    • Instruction ID: 5bebb4a7110f5f50710a06dd085861b64bee082fcd139c4712b5c296dcf7f4d1
    • Opcode Fuzzy Hash: 45cd936dd1552f634fb7c8f1b83663f80dfa30545f49f772099bae3a9063713c
    • Instruction Fuzzy Hash: 5AF0AF72A04211ABC718AA59EC08B2F7776ABD1314F80892DE84947254DB30A855CB82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 0245662E
    • GetFileType.KERNELBASE(00000000), ref: 02456640
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FileHandleType
    • String ID:
    • API String ID: 3000768030-0
    • Opcode ID: b8855dba3f962044aa2ca36a95385fa9f13b8cdffc9a6424d07f105d23de9cb8
    • Instruction ID: 963d0e86c698c3d8dc47f56c5474ee87469832dc487fd573cee4eaa1ae97c3d5
    • Opcode Fuzzy Hash: b8855dba3f962044aa2ca36a95385fa9f13b8cdffc9a6424d07f105d23de9cb8
    • Instruction Fuzzy Hash: 9C11B1715047624ACB348E3E9C98623BED9A766534B6B071BDDFAC62E3C330D5C6C641
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CoInitializeEx.OLE32 ref: 024496B8
    • CoInitializeSecurity.OLE32 ref: 024496E4
      • Part of subcall function 02448B49: GetErrorInfo.OLEAUT32(00000000,?,?,023F0204,?,000000FF,00000001,?,?), ref: 02448B5C
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Initialize$ErrorInfoSecurity
    • String ID:
    • API String ID: 3572798514-0
    • Opcode ID: 3fbd3eed6099f8554aeaef8887db9e69d3aad1177ff249ce5f95809eb999457b
    • Instruction ID: a8cfdcefd21b55505aff85eec72b05b9a8ac917fe773befd00fcca394801b128
    • Opcode Fuzzy Hash: 3fbd3eed6099f8554aeaef8887db9e69d3aad1177ff249ce5f95809eb999457b
    • Instruction Fuzzy Hash: C211AE75908B41CBE704AF7AD50966ABBE0AF84214F048A2ED98997221FF70E1D4CB42
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FreeConsole.KERNEL32 ref: 023DEDC1
      • Part of subcall function 02401E40: HeapFree.KERNEL32(00000000,?), ref: 02401FCF
    • HeapFree.KERNEL32(00000000,00000000), ref: 023DEDF6
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Free$Heap$Console
    • String ID:
    • API String ID: 2715786339-0
    • Opcode ID: 0eda215a2be00be7b2e824fc3b0de6c4f4a085f5cbc957b4daf3ab8771fe5a43
    • Instruction ID: 042641f8c1e42abbd5e15e9048ff4ebc93a6f27e2a835de70808a80b7953b043
    • Opcode Fuzzy Hash: 0eda215a2be00be7b2e824fc3b0de6c4f4a085f5cbc957b4daf3ab8771fe5a43
    • Instruction Fuzzy Hash: 9601F9B3D811156FC724BB75BC0DB4E7B39AF50354F054436E91856244EB346229CFD6
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,00415EAC,00000001,?,0043A478,00000060), ref: 00418886
      • Part of subcall function 004188C6: HeapAlloc.KERNEL32(00000000,00000140,004188AE,000003F8,?,0043A478,00000060), ref: 004188D3
    • HeapDestroy.KERNEL32(?,0043A478,00000060), ref: 004188B9
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Heap$AllocCreateDestroy
    • String ID:
    • API String ID: 2236781399-0
    • Opcode ID: 081eba9be5826635cbb7a29082c7bc61fc15faa81be005bd4fff385f22785363
    • Instruction ID: 558faf22d0d10c49c59805d7195a1265b1ee3e9db6c9b0bb3573a997b10f9ed6
    • Opcode Fuzzy Hash: 081eba9be5826635cbb7a29082c7bc61fc15faa81be005bd4fff385f22785363
    • Instruction Fuzzy Hash: C3E09A78B113029AEF507B70AC057AA3BE4EB64746FC4883EB404C50A8EF2888849A0C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,00000000), ref: 0243B7D6
    • HeapFree.KERNEL32(00000000,?), ref: 0243B7E7
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 6aaecb653f882aaf6d9152fbbb73d1f4606e05828fe231f0d512342a10cc2417
    • Instruction ID: cd9ec6b4ea70636ba66f8768362f85334db7b4f081df9e0eb934e4e969e5fdb4
    • Opcode Fuzzy Hash: 6aaecb653f882aaf6d9152fbbb73d1f4606e05828fe231f0d512342a10cc2417
    • Instruction Fuzzy Hash: 75410774D00608DFDB05CF98D985BEEBBB1FB48328F04855AE919AB351D334A951CFA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 024302D0: GetStdHandle.KERNEL32 ref: 02430307
      • Part of subcall function 024302D0: GetLastError.KERNEL32 ref: 02430316
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 024312ED
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 024312FE
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$ErrorHandleLast
    • String ID:
    • API String ID: 642181330-0
    • Opcode ID: 053c36bc2c6ce888c3bda982fbf064ecfa42f94771b111da12dd8118fba897d3
    • Instruction ID: cc9e182165b47ddb0a3b1f801b8328cab5e3c3fa06af657d3b820561aa27f397
    • Opcode Fuzzy Hash: 053c36bc2c6ce888c3bda982fbf064ecfa42f94771b111da12dd8118fba897d3
    • Instruction Fuzzy Hash: DA319E75E40208DFDB068F98E944FAEBBB2BB4D314F18416AE91DAB391D7318950CF54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 02431195
    • HeapFree.KERNEL32(00000000,?), ref: 024311A6
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 8ff6c7324c4e23bc267910931ca61e3ef6c287c64d0daac2e0b4329483066ba0
    • Instruction ID: bd5b797e70fcd1a144c1a75917c0245ae693e9b475dfec47d7129668e981abb6
    • Opcode Fuzzy Hash: 8ff6c7324c4e23bc267910931ca61e3ef6c287c64d0daac2e0b4329483066ba0
    • Instruction Fuzzy Hash: 1D211975E00208ABDF16CF98D884BEEBBB1BB4D324F14861AE919BB390D7319851CF54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 02431195
    • HeapFree.KERNEL32(00000000,?), ref: 024311A6
      • Part of subcall function 024302D0: GetStdHandle.KERNEL32 ref: 02430307
      • Part of subcall function 024302D0: GetLastError.KERNEL32 ref: 02430316
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 024312ED
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 024312FE
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$ErrorHandleLast
    • String ID:
    • API String ID: 642181330-0
    • Opcode ID: 53458cd329890ad28d011baebb01fbcb1e9085e7b3451f692ddd0c402ec42665
    • Instruction ID: ddc2c6a88b379650a4694bcc5f057e26f57cf402c96a8725cb8ee70b09a9aa28
    • Opcode Fuzzy Hash: 53458cd329890ad28d011baebb01fbcb1e9085e7b3451f692ddd0c402ec42665
    • Instruction Fuzzy Hash: EAF09035E00108ABEF1A8AA4DC48FAE7B72BB5C364F144619F529FA2D0D7308810CF14
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RtlAllocateHeap.NTDLL(00000008,?,?,?,0245436C,00000001,00000364,?,00000007,000000FF,?,024547C4,0245BE32,?,0245A8CB,?), ref: 02454813
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: facefe7c126732e6863c7b437d4302aa08dab0da352a4bbaa734518b710985f1
    • Instruction ID: 9307e3339b00c0d7ac63aa70808d005c21002988ed06daa983ff3f65aa1a091a
    • Opcode Fuzzy Hash: facefe7c126732e6863c7b437d4302aa08dab0da352a4bbaa734518b710985f1
    • Instruction Fuzzy Hash: 63F05939A045B0679B219E729C04F5B3759AF42BB0B048023ED98DE286CF24D4808AF0
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: ExitProcess
    • String ID:
    • API String ID: 621844428-0
    • Opcode ID: 73504f4458b8c453c3d01216f3bccfeb81ecf47016fcd3bd1cc3e39ab8c5c46f
    • Instruction ID: 38d132b1274e6986ca2bbb4e36003bd2237054e0f059543939a88bda7b13698e
    • Opcode Fuzzy Hash: 73504f4458b8c453c3d01216f3bccfeb81ecf47016fcd3bd1cc3e39ab8c5c46f
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040A740: GetVersionExA.KERNEL32(00000000), ref: 0040A753
    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000,00000000,?,?), ref: 0040A7CC
    • _strncpy.LIBCMT ref: 0040A825
    • DeviceIoControl.KERNEL32(00000000,0004D008,?,0000003C,?,0000022D,?,00000000), ref: 0040A86E
    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,SCSIDISK,00000008), ref: 0040A8BA
    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 0040A9B2
    • DeviceIoControl.KERNEL32 ref: 0040A9E9
    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,?,00000018,?,00000000), ref: 0040AA7B
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040ADB1
    • CopyFileA.KERNEL32(?,?,00000000), ref: 0040AEE7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: File$CloseControlCreateDeviceHandle$CopyDirectorySystemVersion_strncpy
    • String ID: DISKSERIAL$DiskSerial$DiskSerial.VXD$IOSUBSYS\SMARTVSD.VXD$L$SCSIDISK$SMARTVSD.VXD$\$\$\DiskSerial.VXD$\IOSUBSYS\SMARTVSD.VXD$\SMARTVSD.VXD$\\.\DiskSerial.vxd$\\.\PhysicalDrive%d$\\.\SMARTVSD$\\.\Scsi%d:
    • API String ID: 3337007040-3280731534
    • Opcode ID: 5381b5551287e4adfd786a5f55f6f4a67c4bd9771a8bb3c3fab6e6aed8b98872
    • Instruction ID: 93a60672a8556de03baec2beb5f329e244e6174530f919b371a39b0e8372696b
    • Opcode Fuzzy Hash: 5381b5551287e4adfd786a5f55f6f4a67c4bd9771a8bb3c3fab6e6aed8b98872
    • Instruction Fuzzy Hash: FA7246723003045BE328DA389C46BEB77D5EBC4310F544A3EFA5A9B2C0DEB99909C759
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,023ECDE7), ref: 02410462
    • HeapFree.KERNEL32(00000000,?), ref: 0241047B
    • HeapFree.KERNEL32(00000000,?), ref: 0241060C
      • Part of subcall function 023EFB9E: HeapFree.KERNEL32(00000000,?), ref: 023EFBD0
      • Part of subcall function 023EFB9E: HeapFree.KERNEL32(00000000,00000000), ref: 023EFBDF
    • HeapFree.KERNEL32(00000000,023ECDE7), ref: 024106B0
    • HeapFree.KERNEL32(00000000,?), ref: 024106C9
    • HeapFree.KERNEL32(00000000,?), ref: 024107AF
    • HeapFree.KERNEL32(00000000,?), ref: 02410C60
      • Part of subcall function 0243FEC0: HeapFree.KERNEL32(00000000,?), ref: 02440037
      • Part of subcall function 0243FEC0: HeapFree.KERNEL32(00000000,?), ref: 0244004C
    • HeapFree.KERNEL32(00000000,?), ref: 02410CE0
    • HeapFree.KERNEL32(00000000,?), ref: 02410F10
    • CloseHandle.KERNEL32(?), ref: 02410F85
    • HeapFree.KERNEL32(00000000,?), ref: 02410FE5
    • HeapFree.KERNEL32(00000000,?), ref: 024110A7
    • HeapFree.KERNEL32(00000000,?), ref: 024110F1
    • HeapFree.KERNEL32(00000000,?), ref: 024113F9
      • Part of subcall function 023F172D: HeapFree.KERNEL32(00000000,?,?,?,?,?,0242C142), ref: 023F1775
    • HeapFree.KERNEL32(00000000,00000000), ref: 0241111E
    • HeapFree.KERNEL32(00000000,?), ref: 024112D1
    • HeapFree.KERNEL32(00000000,?), ref: 024114FC
    • HeapFree.KERNEL32(00000000,?), ref: 02411592
    • HeapFree.KERNEL32(00000000,?), ref: 02411695
    • HeapFree.KERNEL32(00000000,?), ref: 02411700
    • HeapFree.KERNEL32(00000000,?), ref: 02411724
    • HeapFree.KERNEL32(00000000,?), ref: 024117A8
    • HeapFree.KERNEL32(00000000,00000004), ref: 024117E8
    • HeapFree.KERNEL32(00000000,?), ref: 02411807
    • HeapFree.KERNEL32(00000000,?), ref: 02411827
    • HeapFree.KERNEL32(00000000,?), ref: 02411840
    • HeapFree.KERNEL32(00000000,?), ref: 02411A0F
    • HeapFree.KERNEL32(00000000,?), ref: 02411AA5
    • HeapFree.KERNEL32(00000000,-0000000C), ref: 02411B12
    • HeapFree.KERNEL32(00000000,?), ref: 0241254D
      • Part of subcall function 023D17D0: HeapFree.KERNEL32(00000000,?), ref: 023D1998
    • HeapFree.KERNEL32(00000000,?), ref: 024123D7
    • HeapFree.KERNEL32(00000000,?), ref: 02412413
    • HeapFree.KERNEL32(00000000,?), ref: 02412432
    • HeapFree.KERNEL32(00000000,?), ref: 0241244B
    • HeapFree.KERNEL32(00000000,?), ref: 0241246A
    • HeapFree.KERNEL32(00000000,?), ref: 02412483
    • HeapFree.KERNEL32(00000000,?), ref: 024124C5
    • CloseHandle.KERNEL32(?), ref: 024124D3
    • HeapFree.KERNEL32(00000000,?), ref: 02412504
    • HeapFree.KERNEL32(00000000,?), ref: 02412572
    • HeapFree.KERNEL32(00000000,?), ref: 02412591
    • HeapFree.KERNEL32(00000000,?), ref: 024125AA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID: APPDATA$Invalid$e$l$q$s
    • API String ID: 1910495013-1432503283
    • Opcode ID: 876b53d110ec965a5c703659f052b95ae99ae8bb2ddf78a2c72434441d537579
    • Instruction ID: ba01950573d49ea821d70238758fa2008c12c54843412ee34c17acef19dd4384
    • Opcode Fuzzy Hash: 876b53d110ec965a5c703659f052b95ae99ae8bb2ddf78a2c72434441d537579
    • Instruction Fuzzy Hash: 522324749083819FD735CF18C484B9BBBE1BF99304F14891EE98997390D7B1A985CF82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 023FC4D3
    • HeapFree.KERNEL32(00000000,?), ref: 023FC4F2
    • HeapFree.KERNEL32(00000000,?), ref: 023FC866
    • HeapFree.KERNEL32(00000000,?), ref: 023FC988
    • HeapFree.KERNEL32(00000000,?), ref: 023FCAAA
    • HeapFree.KERNEL32(00000000,?), ref: 023FCAD6
    • HeapFree.KERNEL32(00000000,?), ref: 023FCAF6
    • HeapFree.KERNEL32(00000000,?), ref: 023FCBE7
    • HeapFree.KERNEL32(00000000,?), ref: 023FCC06
    • HeapFree.KERNEL32(00000000,?), ref: 023FCC21
    • HeapFree.KERNEL32(00000000,?), ref: 023FCC36
    • HeapFree.KERNEL32(00000000,?), ref: 023FCC4B
    • HeapFree.KERNEL32(00000000,?), ref: 023FCC60
    • HeapFree.KERNEL32(00000000,?), ref: 023FCCB2
    • HeapFree.KERNEL32(00000000,?), ref: 023FCCD1
    • HeapFree.KERNEL32(00000000), ref: 023FCD82
    • HeapFree.KERNEL32(00000000,?), ref: 023FCDA0
    • HeapFree.KERNEL32(00000000,?), ref: 023FD092
    • HeapFree.KERNEL32(00000000,?), ref: 023FD3DB
    • HeapFree.KERNEL32(00000000,?), ref: 023FD46F
    • HeapFree.KERNEL32(00000000,?), ref: 023FD488
      • Part of subcall function 023EFB9E: HeapFree.KERNEL32(00000000,?), ref: 023EFBD0
      • Part of subcall function 023EFB9E: HeapFree.KERNEL32(00000000,00000000), ref: 023EFBDF
    • HeapFree.KERNEL32(00000000,?), ref: 023FD713
    • HeapFree.KERNEL32(00000000,?), ref: 023FCE30
      • Part of subcall function 02406AA8: HeapFree.KERNEL32(00000000,?), ref: 02406AD5
      • Part of subcall function 02406AA8: HeapFree.KERNEL32(00000000,00000001), ref: 02406AE4
    • HeapFree.KERNEL32(00000000,?), ref: 023FCE49
    • HeapFree.KERNEL32(00000000,023ECDE7), ref: 023FD126
    • HeapFree.KERNEL32(00000000,?), ref: 023FD13F
    • HeapFree.KERNEL32(00000000,?), ref: 023FD232
    • HeapFree.KERNEL32(00000000,?), ref: 023FD24B
    • HeapFree.KERNEL32(00000000,?), ref: 023FD268
      • Part of subcall function 0243A3F0: HeapFree.KERNEL32(00000000,00000000), ref: 0243A5D0
      • Part of subcall function 0243A3F0: HeapFree.KERNEL32(00000000,?), ref: 0243A5E1
    • HeapFree.KERNEL32(00000000,?), ref: 023FD77E
      • Part of subcall function 023D17D0: HeapFree.KERNEL32(00000000,?), ref: 023D1998
      • Part of subcall function 0243A3F0: HeapFree.KERNEL32(00000000,00000000), ref: 0243A615
      • Part of subcall function 0243A3F0: HeapFree.KERNEL32(00000000,?), ref: 0243A626
    • HeapFree.KERNEL32(00000000,?), ref: 023FD7EE
    • HeapFree.KERNEL32(00000000,?), ref: 023FD80B
    • HeapFree.KERNEL32(00000000,?), ref: 023FD82A
    • HeapFree.KERNEL32(00000000,00000000), ref: 023FD8F5
    • HeapFree.KERNEL32(00000000,?), ref: 023FD987
    • HeapFree.KERNEL32(00000000,?), ref: 023FD9A4
    • HeapFree.KERNEL32(00000000,?), ref: 023FD9C2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: !$)$APPDATA$C:\Program Files (x86)\SteamC:\Program Files (x86)\Steam\config\Telegram Desktop\tdata$Invalid$a Display implementation returned an error unexpectedly$c\winscp.rs$grBH
    • API String ID: 3298025750-3594040642
    • Opcode ID: 76e1fb0ce228c24b5848c0afe4cb1eb88394998525f8f0a706f069ac52e29524
    • Instruction ID: 07f4eb642592847335c0fd083d1c5372681d3173b892094ea02e376be4d7dc75
    • Opcode Fuzzy Hash: 76e1fb0ce228c24b5848c0afe4cb1eb88394998525f8f0a706f069ac52e29524
    • Instruction Fuzzy Hash: A8D259719083459FD765CF14D884B9BFBE2FF88304F10892EE99997261D770A899CF82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 0242726C
    • HeapFree.KERNEL32(00000000,?), ref: 024283FC
    • HeapFree.KERNEL32(00000000,?), ref: 02428BF6
    • HeapFree.KERNEL32(00000000,?), ref: 02429082
    • HeapFree.KERNEL32(00000000,?), ref: 02429147
    Strings
    • called `Result::unwrap()` on an `Err` value, xrefs: 02429412
    • Invalid, xrefs: 024292CA, 02429389
    • assertion failed: step != 0, xrefs: 024293BC
    • assertion failed: output_position <= output.len(), xrefs: 02429316
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: Invalid$assertion failed: output_position <= output.len()$assertion failed: step != 0$called `Result::unwrap()` on an `Err` value
    • API String ID: 3298025750-1422663253
    • Opcode ID: c61d06380fce59854c11afcc47c2f7b2fc2553889c9ec89186aedafeaf8fbec5
    • Instruction ID: aa1a6d92e8c5e41bfa975ba474e25a1b2bab9eced2afc41d7bcfde90eddd01f8
    • Opcode Fuzzy Hash: c61d06380fce59854c11afcc47c2f7b2fc2553889c9ec89186aedafeaf8fbec5
    • Instruction Fuzzy Hash: 5852E171A083609FD325DF26C880B9BBBE2BFC8704F54891FE98957351D770A849CB96
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCommandLineW.KERNEL32 ref: 023EA05D
    • HeapFree.KERNEL32(00000000,00000000), ref: 023EA5C3
    • HeapFree.KERNEL32(00000000,?), ref: 023EA5D4
    • HeapFree.KERNEL32(00000000,?), ref: 023EA687
    • HeapFree.KERNEL32(00000000,?), ref: 023EA6A1
    • HeapFree.KERNEL32(00000000), ref: 023EA86C
      • Part of subcall function 023DA9F0: __aulldiv.LIBCMT ref: 023DAA2E
    • HeapFree.KERNEL32(00000000), ref: 023EABDE
    • HeapFree.KERNEL32(00000000,?), ref: 023EAC68
    • HeapFree.KERNEL32(00000000,?), ref: 023EAC7F
    • HeapFree.KERNEL32(00000000,?), ref: 023EAC99
    • HeapFree.KERNEL32(00000000), ref: 023EAD27
    • HeapFree.KERNEL32(00000000,?), ref: 023EAD94
    • HeapFree.KERNEL32(00000000,?), ref: 023EADAE
    • HeapFree.KERNEL32(00000000,?), ref: 023EADC9
    • HeapFree.KERNEL32(00000000,?), ref: 023EADE0
    • HeapFree.KERNEL32(00000000,?), ref: 023EAE03
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,0246F438,0247D02C), ref: 023EAEF1
    Strings
    • a Display implementation returned an error unexpectedly, xrefs: 023EAE3C
    • Invalid, xrefs: 023EA811
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CommandLine__aulldiv
    • String ID: Invalid$a Display implementation returned an error unexpectedly
    • API String ID: 2559509083-4203860457
    • Opcode ID: ff9a20dbe039c71a15df9e9cdc1cb1a14943a6979f92e1f62d36dc7007b24830
    • Instruction ID: 0a9a55766facab156ea63cf069e3ac9efcd9a4f2c5b4f3e91221bb1458ebb9d2
    • Opcode Fuzzy Hash: ff9a20dbe039c71a15df9e9cdc1cb1a14943a6979f92e1f62d36dc7007b24830
    • Instruction Fuzzy Hash: 3BB20775A00B018FD725CF29C584B66F7E2BF98304F14892DD99B87A91EB70B899CB40
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetVersionExA.KERNEL32(?,00000000,00446FF0,?), ref: 0040A15F
    • CoCreateInstance.OLE32(00437030,00000000,00000001,00437040,?), ref: 0040A183
    • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000006,00000003,00000000,00000020), ref: 0040A1BF
    Strings
    • SerialNumber, xrefs: 0040A26B
    • WQL, xrefs: 0040A213
    • SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE2', xrefs: 0040A1F6
    • SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE1', xrefs: 0040A1E3
    • SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE3', xrefs: 0040A209
    • SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE0', xrefs: 0040A1D0
    • ROOT\CIMV2, xrefs: 0040A1A0
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: BlanketCreateInstanceProxyVersion
    • String ID: ROOT\CIMV2$SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE0'$SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE1'$SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE2'$SELECT SerialNumber FROM Win32_PhysicalMedia WHERE TAG='\\\\.\\PHYSICALDRIVE3'$SerialNumber$WQL
    • API String ID: 4052488553-668480656
    • Opcode ID: 2f43b8abd95bdce89a6337ee62f48717bf7de744291fe96b5a40e21d1573a07e
    • Instruction ID: f8abb40f569aaa07a23fa9f41c399833c975962cf1a17763c5e18912e3785d52
    • Opcode Fuzzy Hash: 2f43b8abd95bdce89a6337ee62f48717bf7de744291fe96b5a40e21d1573a07e
    • Instruction Fuzzy Hash: 00718C71640318ABCB20DF95CC48EEE3BB9FF49B54F20056AF919D7290C3799845CBA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00402D6E
    • LoadLibraryA.KERNEL32(iphlpapi.dll,00000000,?,?,00403AB3,00000000,00000000,00000000,00000032), ref: 00402D7B
    • FreeLibrary.KERNEL32(00000000,?,?,00403AB3,00000000,00000000,00000000,00000032), ref: 00402D90
    • GetAdaptersInfo.IPHLPAPI(?), ref: 00402DB3
    • _strcat.LIBCMT ref: 00402E11
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Library$AdaptersFreeH_prologInfoLoad_strcat
    • String ID: %02X-%02X-%02X-%02X-%02X-%02X$(1D$iphlpapi.dll
    • API String ID: 75280304-1156694461
    • Opcode ID: 667fbff6e5fb93a3dbdba40f8899a0c99632f19625a976099da760c66a306bb6
    • Instruction ID: 0f46a71ea7f385b85266391789cee45fc69f055f165f50e350831578ad950e10
    • Opcode Fuzzy Hash: 667fbff6e5fb93a3dbdba40f8899a0c99632f19625a976099da760c66a306bb6
    • Instruction Fuzzy Hash: 092127B1910160AECB169BA4DD58DFE7BB8AF09704F1006BFF015F21E1C7BC89008769
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00427366
    • GetFullPathNameA.KERNEL32(?,00000104,?,?,?), ref: 0042738F
    • lstrcpynA.KERNEL32(?,?,00000104), ref: 0042739E
    • PathIsUNCA.SHLWAPI(?,?,?), ref: 004273D1
    • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 004273E9
    • CharUpperA.USER32(?), ref: 004273FA
    • FindFirstFileA.KERNEL32(?,?), ref: 00427410
    • FindClose.KERNEL32(00000000), ref: 0042741C
    • lstrcpyA.KERNEL32(?,?), ref: 0042742C
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FindPath$CharCloseFileFirstFullH_prologInformationNameUpperVolumelstrcpylstrcpyn
    • String ID:
    • API String ID: 349063797-0
    • Opcode ID: d785ae596bc36cb49a6f511f2bb699120d703fbd36700d512b5beef6b0218590
    • Instruction ID: ccc9f5d38c50f98e637bc9214232b1860236d421002e11859fbdac53a034a38f
    • Opcode Fuzzy Hash: d785ae596bc36cb49a6f511f2bb699120d703fbd36700d512b5beef6b0218590
    • Instruction Fuzzy Hash: 48316171600128ABCB10EF61EC48AEFBF78FF49354F908576F909D6151D7349A45CBA8
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    • ;rn, xrefs: 02413F92
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 02414515
    • top\Local Storage\, xrefs: 0241330E
    • nown, xrefs: 0241435E
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs$nown$top\Local Storage\$;rn
    • API String ID: 0-1636215252
    • Opcode ID: 33bc8f142f39778312f7d2781f9cfb695cf9ba47c0874047972eeda084b89b08
    • Instruction ID: b023ae78e9005a80f82d8d4ea601df49c4069092c7b27036b109e5f60b3fa44e
    • Opcode Fuzzy Hash: 33bc8f142f39778312f7d2781f9cfb695cf9ba47c0874047972eeda084b89b08
    • Instruction Fuzzy Hash: 8A6239719083918FD725CF29C48079AFBE1BFC9304F158A6EE89D97351DB70A949CB82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 02430C80: TlsGetValue.KERNEL32(00000000,?,0243F3A0), ref: 02430C90
    • AcquireSRWLockShared.KERNEL32(02490AF4), ref: 0243F3FE
    • ReleaseSRWLockShared.KERNEL32(02490AF4), ref: 0243F5A2
    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0243F7F0
      • Part of subcall function 0242F580: HeapFree.KERNEL32(00000000,00000000,?,0243F991), ref: 0242F59C
      • Part of subcall function 0242F580: HeapFree.KERNEL32(00000000,?,?,0243F991), ref: 0242F5B6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Lock$FreeHeapReleaseShared$AcquireExclusiveValue
    • String ID: Box<dyn Any><unnamed>$Invalid$cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs
    • API String ID: 1439667220-2178555723
    • Opcode ID: 6ac31aa2ffddbb12900b7977c0946cbced5bbba42b4298b5310a0c5bedec2b4d
    • Instruction ID: 10875853942f6a046567d8bc931f3e172acc69efc27282f3949f971c28a6ebca
    • Opcode Fuzzy Hash: 6ac31aa2ffddbb12900b7977c0946cbced5bbba42b4298b5310a0c5bedec2b4d
    • Instruction Fuzzy Hash: 760246B0904B408FE335CF25C444793BBE1AF59308F15895ED8AA87B82D7B5F449CBA1
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: assertion failed: d.mant + d.plus < (1 << 61)$assertion failed: d.mant > 0$assertion failed: d.mant.checked_add(d.plus).is_some()$assertion failed: d.mant.checked_sub(d.minus).is_some()$assertion failed: d.minus > 0$assertion failed: d.plus > 0$assertion failed: edelta >= 0library\core\src\num\diy_float.rs$attempt to divide by zero
    • API String ID: 0-4042176451
    • Opcode ID: e87d4c877d3f651e9598b5d7784ffa9fb4730d09d53b7ae9f39a8f00e78cf3f4
    • Instruction ID: b5a4e366997da0e604ae48f23b79bb34fd4b0250d8634cba531890b5426a6076
    • Opcode Fuzzy Hash: e87d4c877d3f651e9598b5d7784ffa9fb4730d09d53b7ae9f39a8f00e78cf3f4
    • Instruction Fuzzy Hash: 6C723772A083519FC708CF29D48061AFBE6BFC8754F158A2EF89997355D770EC498B82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreateFileA.KERNEL32(?,00000000,00000003,00000000,00000003,00000000,00000000), ref: 00409F80
    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00002710,?,00000000), ref: 00409FD6
      • Part of subcall function 00409E1B: _strlen.LIBCMT ref: 00409E23
      • Part of subcall function 00409E1B: _strcat.LIBCMT ref: 00409E36
    • _strcat.LIBCMT ref: 00409FFC
    • _strcat.LIBCMT ref: 0040A03C
    • CloseHandle.KERNEL32(00000000), ref: 0040A044
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strcat$CloseControlCreateDeviceFileHandle_strlen
    • String ID: \\.\PhysicalDrive%d
    • API String ID: 3463324093-2935326385
    • Opcode ID: 612e0084ea0f5b9f7467d435850855356c6e55c0f1ce1109650d98a2500b2ad0
    • Instruction ID: 827c4b2f77838a6cf85fa88315384c3a64bdadd1ed3bfbc8410d8de3e49c6994
    • Opcode Fuzzy Hash: 612e0084ea0f5b9f7467d435850855356c6e55c0f1ce1109650d98a2500b2ad0
    • Instruction Fuzzy Hash: 1F21ACB290421DAEE711EBA59C85EFF737CEB45318F0404BBF515E2081E67C9E844B69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentProcess.KERNEL32(00000100), ref: 0040A465
    • SetPriorityClass.KERNEL32(00000000), ref: 0040A46C
    • CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,04000000,00000000), ref: 0040A4A0
    • DeviceIoControl.KERNEL32(00000000,00000001,00000000,00000000,?,00000004,?,00000000), ref: 0040A4C5
    • CloseHandle.KERNEL32(00000000), ref: 0040A4CC
    • GetCurrentProcess.KERNEL32(00000020), ref: 0040A52C
    • SetPriorityClass.KERNEL32(00000000), ref: 0040A533
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ClassCurrentPriorityProcess$CloseControlCreateDeviceFileHandle
    • String ID:
    • API String ID: 2852580560-0
    • Opcode ID: 65ca535f78cc64cf9aea046d4da315f8869e2603256f29e9bdf8a66fe15ff912
    • Instruction ID: 09672a527c137082c86a82ddad234cb0f4bb7b68b2f76d9faa745a067a63ae63
    • Opcode Fuzzy Hash: 65ca535f78cc64cf9aea046d4da315f8869e2603256f29e9bdf8a66fe15ff912
    • Instruction Fuzzy Hash: 932108B6A00218BFE7109BA49C88AEE776CEB45748F5040B5F501E31D0D7789D868B7A
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    • assertion failed: next.is_notified()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\task\state.rs, xrefs: 02445208
    • attempt to divide by zero, xrefs: 0244521C
    • assertion failed: self.ref_count() > 0, xrefs: 02445230
    • attempt to calculate the remainder with a divisor of zero/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\slice\sort.rs, xrefs: 024451D6, 024451EA
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 02445325
    • Invalid, xrefs: 0244528D
    • [internal exception] blocking task ran twice./registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\blocking\task.rs, xrefs: 024452C9
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Value$FreeHeap
    • String ID: Invalid$[internal exception] blocking task ran twice./registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\blocking\task.rs$assertion failed: next.is_notified()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\task\state.rs$assertion failed: self.ref_count() > 0$attempt to calculate the remainder with a divisor of zero/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\slice\sort.rs$attempt to divide by zero$cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs
    • API String ID: 911738859-2440271640
    • Opcode ID: bbefeed5805db6c15f69ca858a2f74a5f2bd3a854cf4dbecf92e8e8b831cd7dc
    • Instruction ID: de3af5efd02f2ee42c940a6465341a6269c60fa41c69aa711f5adc3889252f70
    • Opcode Fuzzy Hash: bbefeed5805db6c15f69ca858a2f74a5f2bd3a854cf4dbecf92e8e8b831cd7dc
    • Instruction Fuzzy Hash: 33B28F756043418FEB14DF25C480B6AB7E2BF88314F198A6EE8899B355DF70E846CF91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 02413E4D
    • HeapFree.KERNEL32(00000000,?), ref: 02414331
    • HeapFree.KERNEL32(00000000,?), ref: 024143AC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: nown$nown
    • API String ID: 3298025750-102062727
    • Opcode ID: c90a9edce3fd5bdf1a7f07d0abe19cc4a82e3c43e0bb43f84a541038db6317fb
    • Instruction ID: 744fb92eb2b424b76c307c2fd67a7fa9c41769389889dd1baca75b01bbe0be7d
    • Opcode Fuzzy Hash: c90a9edce3fd5bdf1a7f07d0abe19cc4a82e3c43e0bb43f84a541038db6317fb
    • Instruction Fuzzy Hash: 34C15A71908781CFD725CF28C444B6AFBE1BFC8304F148A5EE99957390D774A985CB82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IsIconic.USER32(?), ref: 0040166A
      • Part of subcall function 004289E6: __EH_prolog.LIBCMT ref: 004289EB
      • Part of subcall function 004289E6: BeginPaint.USER32(?,?,?,?,0042292D), ref: 00428A19
    • SendMessageA.USER32(?,00000027,?,00000000), ref: 00401691
    • GetSystemMetrics.USER32(0000000B), ref: 0040169F
    • GetSystemMetrics.USER32(0000000C), ref: 004016A5
    • GetClientRect.USER32(?,?), ref: 004016B2
    • DrawIcon.USER32(?,?,?,?), ref: 004016EA
      • Part of subcall function 00428A41: __EH_prolog.LIBCMT ref: 00428A46
      • Part of subcall function 00428A41: EndPaint.USER32(?,?,?,?,00422953,?), ref: 00428A63
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prologMetricsPaintSystem$BeginClientDrawIconIconicMessageRectSend
    • String ID:
    • API String ID: 1530917984-0
    • Opcode ID: 9409bb8eba40420717aaa7fd0813d9b11a5f1be16e6c6ee5dd2cc23651046658
    • Instruction ID: afd92d8a271adbd764b9b009a381ddf531eb1141bad508cde5b1c4dc8f1a29e6
    • Opcode Fuzzy Hash: 9409bb8eba40420717aaa7fd0813d9b11a5f1be16e6c6ee5dd2cc23651046658
    • Instruction Fuzzy Hash: 081160B53043019FC224EF78DD89E5B77A9ABD8214F844A3DF586C3290DA74E80ACA55
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • lstrcpyA.KERNEL32(00000800,LOC), ref: 00429EAE
    • wsprintfA.USER32 ref: 00429EC2
    • LoadLibraryA.KERNEL32(?), ref: 00429ED2
    • GetLocaleInfoA.KERNEL32(00000800,00000003,00000800,00000004), ref: 00429EED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: InfoLibraryLoadLocalelstrcpywsprintf
    • String ID: LOC
    • API String ID: 2301429115-519433814
    • Opcode ID: 55c4f7f6bd3d83fe0638668a92045e554d39542dee11adfa9b5a70be7e0f19cc
    • Instruction ID: ba9a9e911526f724f6bd684c18380571f0978ced8412fde1539fc42cd5b17a32
    • Opcode Fuzzy Hash: 55c4f7f6bd3d83fe0638668a92045e554d39542dee11adfa9b5a70be7e0f19cc
    • Instruction Fuzzy Hash: 4001FB7060020DEBCF10DF60ED4AEDA77B9AB04318F808071B915D6190DB749A4A9B94
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 023EB173
    • HeapFree.KERNEL32(00000000,?), ref: 023EB50E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: ://$ptth$qtth
    • API String ID: 3298025750-2468130592
    • Opcode ID: 8267f6e86bbc15c4bfa6233240ae9a70bfd0d4dbf5b2b84b0bb8d00557c9620e
    • Instruction ID: 40283e7963c645cb552dd0e8f0805a63668c61a264403f8fe47ae3f8a8f6ad78
    • Opcode Fuzzy Hash: 8267f6e86bbc15c4bfa6233240ae9a70bfd0d4dbf5b2b84b0bb8d00557c9620e
    • Instruction Fuzzy Hash: C8F17071A083219BDB168F15C48062AFBE2BFC4718F158A2EE49A973D1D770DD49CF82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0041E937
    • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0041E948
    • VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C), ref: 0041E98E
    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,0000001C), ref: 0041E9BD
    • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,0000001C), ref: 0041E9E0
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Virtual$Query$AllocInfoProtectSystem
    • String ID:
    • API String ID: 4136887677-0
    • Opcode ID: ff6dd850e0057acba23b8827cf18eb4f3ead2c0418c749c99c268d3db089d540
    • Instruction ID: 32a2ad3af116692e63516f6cd1c830bccfaa7a2d380c1cd808f7f1f6e83c7fb5
    • Opcode Fuzzy Hash: ff6dd850e0057acba23b8827cf18eb4f3ead2c0418c749c99c268d3db089d540
    • Instruction Fuzzy Hash: 0A21E7B6B10209EBDB20CBB5DC45FFE77B8EB08345F540076EA02E3281D6789D858798
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0041C88D
    • GetCurrentProcessId.KERNEL32 ref: 0041C899
    • GetCurrentThreadId.KERNEL32 ref: 0041C8A1
    • GetTickCount.KERNEL32 ref: 0041C8A9
    • QueryPerformanceCounter.KERNEL32(?), ref: 0041C8B5
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: b41a0e1cd665821b5796c0b158887a0f5ecc602c8a934c1cc93d59222d264265
    • Instruction ID: 5f89f51c378ddf9a993613850ddd4fdb9b59cca54c9a044c803801dbacbd09c9
    • Opcode Fuzzy Hash: b41a0e1cd665821b5796c0b158887a0f5ecc602c8a934c1cc93d59222d264265
    • Instruction Fuzzy Hash: 3DF07A76D00128DBCB20ABF4EC4859EB7B8FF49255BC24571E801E7160DB74A9558B98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: __aulldiv
    • String ID: 0000$attempt to divide by zero
    • API String ID: 3732870572-2494717124
    • Opcode ID: c6011a84d6468aee211b4a55f20b6516d6e7e53f07f2e9708d10119dc2cd1599
    • Instruction ID: 5a57b58546cff82b465992b731ea012ddf6a8b49c7144277c76065219d1a503c
    • Opcode Fuzzy Hash: c6011a84d6468aee211b4a55f20b6516d6e7e53f07f2e9708d10119dc2cd1599
    • Instruction Fuzzy Hash: 0CF148B66083419FC708CF19D5A066ABBE2EFC8354F54C92EF48A8B351D730D945CB86
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 0241585A
    • HeapFree.KERNEL32(00000000,?), ref: 0241588B
    Strings
    • assertion failed: secondary_table_len <= 0x7ff, xrefs: 02415C5C
    • Invalid, xrefs: 02415C48
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: Invalid$assertion failed: secondary_table_len <= 0x7ff
    • API String ID: 3298025750-1198909562
    • Opcode ID: 75f59ae54d2037e8a6b3d3eba405fc6317c5f43a31f1045ce872d26a927590e9
    • Instruction ID: 0ca2cad5a73b5cf834691fbe4d4dced99e6a94080db2bcbc8014fd441dd44787
    • Opcode Fuzzy Hash: 75f59ae54d2037e8a6b3d3eba405fc6317c5f43a31f1045ce872d26a927590e9
    • Instruction Fuzzy Hash: F9321771A147914BE3249F28C8807FAB3E2FFC8300F558A2EE9D597382D7749895CB85
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: E$G$_$_${invalid syntax}{recursion limit reached}?'for<> , ::{closureshim# as mut const ; dyn + unsafe extern "
    • API String ID: 0-1976165044
    • Opcode ID: 7232590c3976261a92876bad61e185d334d6cc698e87c5efc8f6c0070ec1271d
    • Instruction ID: 5dc2b09c99a66704d34d830d6102dfc033c306f83a1ed39deb520c60f91e5c0b
    • Opcode Fuzzy Hash: 7232590c3976261a92876bad61e185d334d6cc698e87c5efc8f6c0070ec1271d
    • Instruction Fuzzy Hash: AF8114707003204BEB288E67D59072773D3AF81308F95893FD99E8BB93D761984E8A52
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023E2678: HeapFree.KERNEL32(00000000,?,023F12D5), ref: 023E269A
    • HeapFree.KERNEL32(00000000,?), ref: 023F1587
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,0242C142), ref: 023F1775
    Strings
    • assertion failed: prev/registry\src\index.crates.io-1cd66030c949c28d\futures-util-0.3.30\src\stream\futures_unordered\mod.rs, xrefs: 023F16D1
    • `async fn` resumed after completion, xrefs: 023F16EA, 023F16FE
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: `async fn` resumed after completion$assertion failed: prev/registry\src\index.crates.io-1cd66030c949c28d\futures-util-0.3.30\src\stream\futures_unordered\mod.rs
    • API String ID: 3298025750-1060740151
    • Opcode ID: 0b74f811f31d105b543c700671e64416e2f206bac8868ee609bbc5b39bac2838
    • Instruction ID: 7e27c85fb898f0fd58c08fac53e255325aceb381ac2fdb6441d552bb2d2676e6
    • Opcode Fuzzy Hash: 0b74f811f31d105b543c700671e64416e2f206bac8868ee609bbc5b39bac2838
    • Instruction Fuzzy Hash: 1B129B30604345CFC754CF19E490A6AB7E2BF88318F19856DEA9E9B752DB31E885CF81
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0042663C: GetWindowLongA.USER32(?,000000F0), ref: 00426648
    • GetKeyState.USER32(00000010), ref: 00424B5C
    • GetKeyState.USER32(00000011), ref: 00424B65
    • GetKeyState.USER32(00000012), ref: 00424B6E
    • SendMessageA.USER32(?,00000111,0000E146,00000000), ref: 00424B84
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: State$LongMessageSendWindow
    • String ID:
    • API String ID: 1063413437-0
    • Opcode ID: 6dc76eaeebcb73aca116473ecfa999c7a0d89d7e04904cc6fc94326bd96b1de0
    • Instruction ID: f4eab9a2a9dbeb830affcc38af44a6143a2cea5949d8d34eabc04b707fed75f8
    • Opcode Fuzzy Hash: 6dc76eaeebcb73aca116473ecfa999c7a0d89d7e04904cc6fc94326bd96b1de0
    • Instruction Fuzzy Hash: D2F0E93634036A55D52032B96C05FB65528CFC0BB4FC1063AB703EA1D6C998D807057C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • EnableWindow.USER32(00000000,00000001), ref: 0042312C
    • GetActiveWindow.USER32 ref: 00423137
    • SetActiveWindow.USER32(00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00423145
    • FreeResource.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00423161
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$Active$EnableFreeResource
    • String ID:
    • API String ID: 3751187028-0
    • Opcode ID: cf1dc8f164079878ce4882cf31a04c95128d9af479deed743c0b8a2d04076335
    • Instruction ID: ca44568af34e6e7f10c41bee158ea285ab5cab5ae77f8efcc955b62aa56a5184
    • Opcode Fuzzy Hash: cf1dc8f164079878ce4882cf31a04c95128d9af479deed743c0b8a2d04076335
    • Instruction Fuzzy Hash: C2F0AF35B00655CFCF20EFA4E9455AEBBB1FF08712F90457AE142B22A0C7795E06CE08
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0241BCBE: TlsGetValue.KERNEL32(00000000), ref: 0241BCD2
      • Part of subcall function 0241BCBE: TlsGetValue.KERNEL32(00000000), ref: 0241BCF4
      • Part of subcall function 0241BCBE: TlsSetValue.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0245F933,00000000), ref: 0241BD35
    • __aulldiv.LIBCMT ref: 0241B533
      • Part of subcall function 02431BB0: QueryPerformanceCounter.KERNEL32(?), ref: 02431BF7
      • Part of subcall function 02431BB0: QueryPerformanceFrequency.KERNEL32(00000000), ref: 02431C38
      • Part of subcall function 02431BB0: __aulldiv.LIBCMT ref: 02431C71
      • Part of subcall function 02431BB0: __aulldiv.LIBCMT ref: 02431CAC
      • Part of subcall function 02431BB0: __aulldiv.LIBCMT ref: 02431CD7
    • __aulldiv.LIBCMT ref: 0241B6ED
    Strings
    • attempted to use a condition variable with more than one mutex/registry\src\index.crates.io-1cd66030c949c28d\parking_lot-0.12.1\src\condvar.rs, xrefs: 0241B81B
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: __aulldiv$Value$PerformanceQuery$CounterFrequency
    • String ID: attempted to use a condition variable with more than one mutex/registry\src\index.crates.io-1cd66030c949c28d\parking_lot-0.12.1\src\condvar.rs
    • API String ID: 3520724558-1284212713
    • Opcode ID: 684becbb55f92e8c21b8012aebdbd666437fee1aad98cd7118e19d827a89b9ad
    • Instruction ID: ca73b0b834e102a648a829ac626ceb2be8d7e996116fb562095821977cacc777
    • Opcode Fuzzy Hash: 684becbb55f92e8c21b8012aebdbd666437fee1aad98cd7118e19d827a89b9ad
    • Instruction Fuzzy Hash: 9F127E717087119FD719DF29C89062BB7E2EF88358F15892EE89ACB350DB34D845CB92
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 150943dc08c0167bc979cefcd71375d35153985db1d35b0f95c289b28cd95639
    • Instruction ID: 9fb67a88a75419fde22a6fe78b171526936af48b614b9b5a9a44be6ca3831610
    • Opcode Fuzzy Hash: 150943dc08c0167bc979cefcd71375d35153985db1d35b0f95c289b28cd95639
    • Instruction Fuzzy Hash: C6F03631900149ABDF116FA1CD4496F3B79AF05348F848036FD19A50A0D739D61FDB59
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: 4
    • API String ID: 3519838083-4088798008
    • Opcode ID: 105ff6f28f0176ece59784b586960affd2c75ef0e9dd6e2caeb7df49e7281d12
    • Instruction ID: ce7be91b107c05d89f27200de5f74fd8ff5e1e004aeb1bf758a9aa92edd98eb5
    • Opcode Fuzzy Hash: 105ff6f28f0176ece59784b586960affd2c75ef0e9dd6e2caeb7df49e7281d12
    • Instruction Fuzzy Hash: EC129D71D00209AFCF15DF94D940AEEBBB1FF48314F24819AE815AB291C7B9DE52CB64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • AcquireSRWLockExclusive.KERNEL32(?,00000001,00000000,?,?,02448053,00000000,024817FC,?,?,?,?,?,?,?,?), ref: 02446335
    Strings
    • RNG seed generator is internally corrupt/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\util\rand\rt.rs, xrefs: 024463B3
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: AcquireExclusiveLock
    • String ID: RNG seed generator is internally corrupt/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\util\rand\rt.rs
    • API String ID: 4021432409-4259227343
    • Opcode ID: 3ddc65d2a136a6c16d4c987e87135050b3921647e686c703fdc9d1cc4422483e
    • Instruction ID: 2b391a555a7613d8e7ce7c133b8feeaa17b594fed23ce0ab5a46531e50d5d6cf
    • Opcode Fuzzy Hash: 3ddc65d2a136a6c16d4c987e87135050b3921647e686c703fdc9d1cc4422483e
    • Instruction Fuzzy Hash: B11144723047011BA31CAEABAC4542BB7CBDBC5224324C63FDD6A83780CAB0A807D780
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 0245D82B
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: a6ccff16918f8c6716c150f85a32bf7b13ed69c882f81b0f72e29ab484b85e15
    • Instruction ID: 682fa500f4d5d29c468e94ed3798d4561d9504c1d1036a8a153365bdb0eb0c88
    • Opcode Fuzzy Hash: a6ccff16918f8c6716c150f85a32bf7b13ed69c882f81b0f72e29ab484b85e15
    • Instruction Fuzzy Hash: 7D22C171E087558BD719CF2CC48056ABBE2BFC8604F148A2EEDD997352EB30D955CB81
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetThreadLocale.KERNEL32 ref: 00401006
    • GetLocaleInfoA.KERNEL32(00000000,00001004,00000007,00000007), ref: 00401019
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Locale$InfoThread
    • String ID:
    • API String ID: 4232894706-0
    • Opcode ID: 1bfd077805e0b76a4cd0a89f1b1b1ebcb8d6ab1a177264c64a3ab03ef4350e1d
    • Instruction ID: dbec01051d8a6e41623a92cbe54c504c300f99dd774cbdae9b06207f921894f7
    • Opcode Fuzzy Hash: 1bfd077805e0b76a4cd0a89f1b1b1ebcb8d6ab1a177264c64a3ab03ef4350e1d
    • Instruction Fuzzy Hash: 29F0E93660536097CA218F14DC407E737246F01B81F8001BDEDC5A72A1E639584F86B9
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 6e12085c91d98f2496f3240a5fa84f917683bfd7915eecf5a36aaaec95f5d5b0
    • Instruction ID: 8f72e5d40509f8cecb0b844fc2ba54b400947ee985e677df0f2cd9a9c27687f1
    • Opcode Fuzzy Hash: 6e12085c91d98f2496f3240a5fa84f917683bfd7915eecf5a36aaaec95f5d5b0
    • Instruction Fuzzy Hash: CBF27471E102099FCF08DFA5C992AEEB7F2FF88308F18446AD516B7241D738AA51DB54
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 023D297D, 023D2995, 023D29C7
    • Invalid, xrefs: 023D2A18
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$Invalid
    • API String ID: 0-3863875730
    • Opcode ID: 56670e679307213e04122865cf4034e7c8c57aa18e6afa6e83007b05dc17e54b
    • Instruction ID: 6a989a6a35451dadbbc208ad24454aae4df89c043742a85c164d9c909bbaa057
    • Opcode Fuzzy Hash: 56670e679307213e04122865cf4034e7c8c57aa18e6afa6e83007b05dc17e54b
    • Instruction Fuzzy Hash: 65A13432B083158BD318DE2DD89076ABBD6EFC4704F19863EE89A8B3D2D6759C05C781
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: b497888ff59478dcbc58287f06f310b8c6890e4d9cc07b4980c569479dfc9433
    • Instruction ID: 647ce0f78b06017cf660a0f23f26868c8a6fa8cab28443e38f1770b9ff9b5a24
    • Opcode Fuzzy Hash: b497888ff59478dcbc58287f06f310b8c6890e4d9cc07b4980c569479dfc9433
    • Instruction Fuzzy Hash: CCE1AC70700625EBDB14DF15E880ABE77A9EF48304F91801BF816DB252DB3DDA01EB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 0245E5EC
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: ce5e309db71ef053397ebe4df87875b77818261036f3badc26554eca35d956a4
    • Instruction ID: f212fe14201b90d9e54e299d4543fbda0a74cd49181aedaddd55e2468fe27322
    • Opcode Fuzzy Hash: ce5e309db71ef053397ebe4df87875b77818261036f3badc26554eca35d956a4
    • Instruction Fuzzy Hash: 1DD1F571A083558FDB19CF6CC48066ABBE2BFC5300F088A6EE8D597346EB70DA45CB41
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 0245EA73
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: f0e13a8e6d06e963cba7d407a95c66ebdbb7b7db6260441c3fcc01449043e019
    • Instruction ID: 7164cd77a68c6fc490dd4119b2df39dc6ba5fb21f2e285f6dc63159fa65769ad
    • Opcode Fuzzy Hash: f0e13a8e6d06e963cba7d407a95c66ebdbb7b7db6260441c3fcc01449043e019
    • Instruction Fuzzy Hash: 41E1D335A087518BDB19CF2CC48056AFBE2BFC9304F088A6EE9D597352EB31DA45CB41
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,023D2930), ref: 0246180A
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 287bd6f94e841d7c69efb6774dd7e14c0aa3630083a6ee08dd130fd1b941d71d
    • Instruction ID: 12619adaf29060b72e003163387ffbf3bd5886b78f6adb5420ed3b18cb01f4ea
    • Opcode Fuzzy Hash: 287bd6f94e841d7c69efb6774dd7e14c0aa3630083a6ee08dd130fd1b941d71d
    • Instruction Fuzzy Hash: 49D1D071A087428FD715CF2CC49493AFBE1AFC9214F088A2EE99A97351EB70D845CB42
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLocaleInfoA.KERNEL32(?,00001004,00000100,00000006,00000100,?,00000000), ref: 0041E728
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: aec6594c86302d122d4f71fb4d9b161a13d7bbfc32bbdc78518e23443962e317
    • Instruction ID: e85e805a3fba895054420c9dab990c78e1ee1b5e14cd5d478966e3f2ece6382d
    • Opcode Fuzzy Hash: aec6594c86302d122d4f71fb4d9b161a13d7bbfc32bbdc78518e23443962e317
    • Instruction Fuzzy Hash: 30F03035A04208EBDB00DB71D946BDE77B9AF04318F504176F921DA1D0DB74EA459708
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0001B152), ref: 0041B19D
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 90184e0bf99737bad7b3f49374a4ba74c04221f632f12a436ad7bc65f60bf99e
    • Instruction ID: 44c96ef74a1c1fbbfd07129883de79b675f03fbc3a68b556817faf6bab53d9ec
    • Opcode Fuzzy Hash: 90184e0bf99737bad7b3f49374a4ba74c04221f632f12a436ad7bc65f60bf99e
    • Instruction Fuzzy Hash: 05A012753012008747108F709C091403665E2016453814435A000C1311DB3040145589
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetUnhandledExceptionFilter.KERNEL32 ref: 0041B1B1
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: abca96f171b0050d79f7799da41200dda6ac2e8c85e9cb135c27efb12445af08
    • Instruction ID: 1845281a5277d0a3e631376a96d3cbc5c82ed2965258bf50e72ab3e51ac72b24
    • Opcode Fuzzy Hash: abca96f171b0050d79f7799da41200dda6ac2e8c85e9cb135c27efb12445af08
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: Invalid
    • API String ID: 0-874791708
    • Opcode ID: ceb51756aec0cca20838634a0d67935ffcaabf15fbeb3347255ce4742049cd83
    • Instruction ID: f813c1e847a9d2f0980aa041fa22ed1b7a2891f81c7e7656e56adf771b3bb71b
    • Opcode Fuzzy Hash: ceb51756aec0cca20838634a0d67935ffcaabf15fbeb3347255ce4742049cd83
    • Instruction Fuzzy Hash: D3915371B043018FD718DF29C49066ABBE6AFC8714F24C66EE45ADB791DB31E846CB81
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 49ea5447d0855135be658535b3d383872752d319a27ff9739b2d70c6a8c7ad55
    • Instruction ID: 1f32112f5d1d97fa5f5208333258e9b5d7bed76fe60824153b00f1bbb4c0fe1f
    • Opcode Fuzzy Hash: 49ea5447d0855135be658535b3d383872752d319a27ff9739b2d70c6a8c7ad55
    • Instruction Fuzzy Hash: B9529F36B4060A9BEB0CCE9ACCD15DCB7A3ABC835471DC23CD915D7745DAB8A907CA90
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 06cbcc225892c12bac393f3f83809d1ad5add3db824f62974e8dc918c23c3c9f
    • Instruction ID: 69448e5d13c8e03b9e96a52f169eb6835273e0e5700fcbca8617d292f8a4578e
    • Opcode Fuzzy Hash: 06cbcc225892c12bac393f3f83809d1ad5add3db824f62974e8dc918c23c3c9f
    • Instruction Fuzzy Hash: 4B324621D79F114DD7279934D82233AA688AFB72C4F15DB2BFC1AB5E96EB29C4C34100
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b172e2b0bcc3e4b70a5f746494a3de25a59c6e33974ff90734639386dca649a6
    • Instruction ID: 38452df248bf53abee5655b8306aeabdc0ec6d6b7da8aebdf4c000082fc220b6
    • Opcode Fuzzy Hash: b172e2b0bcc3e4b70a5f746494a3de25a59c6e33974ff90734639386dca649a6
    • Instruction Fuzzy Hash: 3A916562F443143AF631A9B74D4FF6B6D9CCB86B94F01093EB648BA1C3E4F99D0481A5
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 27dae6e5d347201161d1f48871aa2031abd2871c2aef02778c7b687a45e2e89a
    • Instruction ID: a1f7bea0ffaadcb8f3824f538276a98eba8f0a45ecf2b62f4da3ac04e49eb4c1
    • Opcode Fuzzy Hash: 27dae6e5d347201161d1f48871aa2031abd2871c2aef02778c7b687a45e2e89a
    • Instruction Fuzzy Hash: FDD1057160C3818FD7268F24D1A47EBBFE2AF9A214F49485FE5C547382D775898ACB02
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 91f3f4f3f91e0a299479e9d33da5dc594ee6be22d33c7d9bf62cc4125c6458ae
    • Instruction ID: 5c7cc5257db7e28197463b5b007f55a3a2c3327ed1ee0db37ffcae841957f125
    • Opcode Fuzzy Hash: 91f3f4f3f91e0a299479e9d33da5dc594ee6be22d33c7d9bf62cc4125c6458ae
    • Instruction Fuzzy Hash: 11719F32F187614BD71A463E9C112B67A969FE6185F45D73BFC88BB781FB3498024244
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3e3bdc5cb01f0384dd9a402c98660f9e2c8c7a44b0abf8fad3ac0e47564171e4
    • Instruction ID: 03831d3d43ac36ebc31d8acea66d62db31a5562e3cc9f4767db367288cedcd15
    • Opcode Fuzzy Hash: 3e3bdc5cb01f0384dd9a402c98660f9e2c8c7a44b0abf8fad3ac0e47564171e4
    • Instruction Fuzzy Hash: A671C2337183158BD708CE2DCC9132EB6D6ABC8764F1A862DE8A9C73D1D674DD058B81
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bb6238e08bbc7c977b868ba4e7edb95d29e3eb53f8d5529b3a271579b4cb53a7
    • Instruction ID: b68176595adfae18e444fe684b535e3b1c4f89ed67688f78b7c2f0ce10c608af
    • Opcode Fuzzy Hash: bb6238e08bbc7c977b868ba4e7edb95d29e3eb53f8d5529b3a271579b4cb53a7
    • Instruction Fuzzy Hash: 22812432B043559FD718CF58D4A036AB7D2ABC5314F1982ADD99A5B386DF309C09CB82
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 998677bf26be223f5bce6a2b86f89a1f9df7ccf45b26c7b66d4fc4a99f3cffc7
    • Instruction ID: e6ca0ff7ee17061f193253442d8836db43d505256236eb5091f5a146ff36181a
    • Opcode Fuzzy Hash: 998677bf26be223f5bce6a2b86f89a1f9df7ccf45b26c7b66d4fc4a99f3cffc7
    • Instruction Fuzzy Hash: D9912C72A087019FD318CF6AC88035BF7E2AFC8710F1AC93EA599D7754DA74A8519B81
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: Heap$AllocateProcess
    • String ID:
    • API String ID: 1357844191-0
    • Opcode ID: 598ce0ca1441d7efcde6be279de89b3a1d4a545b8d0407afb86f90a24f7ee830
    • Instruction ID: 896b64c4825de9011dd21e82a63407a31bd01a51de25a262a0e5f6b6fafbe15b
    • Opcode Fuzzy Hash: 598ce0ca1441d7efcde6be279de89b3a1d4a545b8d0407afb86f90a24f7ee830
    • Instruction Fuzzy Hash: 78412371F047811BE3089A79D852366B7D6FBD8308F04963EEAC9C6781FB74D8A18B51
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 30bc2c7a4d68d0212d6293902854fcbefbd6b1e392bebafcbc4498d0f6901e01
    • Instruction ID: 16b1ffe6904467bb76c4f94a5d9be491e8c56437dfc3a7d5ed9a65479a5f3b46
    • Opcode Fuzzy Hash: 30bc2c7a4d68d0212d6293902854fcbefbd6b1e392bebafcbc4498d0f6901e01
    • Instruction Fuzzy Hash: B9415A76A187159FD708DE29C89025FFBE2AFC8350F15CA2DE999D7351DA30D805CB82
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fa6128884ea52e64c76ff3e3364ef09faa5366da33f3e04718ef87ad060ba4cb
    • Instruction ID: bea78ab49d568d8cc68ab5b9c56c3e372d34a610e398940364b997e8bf37097f
    • Opcode Fuzzy Hash: fa6128884ea52e64c76ff3e3364ef09faa5366da33f3e04718ef87ad060ba4cb
    • Instruction Fuzzy Hash: E331B873F5A3859EC305CA6884401D97F619B7A208B6CC6EED4445F383C2B79A07C766
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f8f59f7a406eb4b85d93dfd7fae9637fb6621cf33be82f32cec578064e2cccf9
    • Instruction ID: 5f762f80975287f2da4cc5c3f4db9215d90f79417d5e070c4ca66a264b4d2add
    • Opcode Fuzzy Hash: f8f59f7a406eb4b85d93dfd7fae9637fb6621cf33be82f32cec578064e2cccf9
    • Instruction Fuzzy Hash: 14313C35624B545FD750EE7688C0D3B77E9BB88B243400C2EE943D3691DABAF8014A65
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ae75250db23d3f65a106ccb7db6d0b7db7673aad107e272ec9e65786d8c8dc3a
    • Instruction ID: a28aa33132646e52dc6174b08334311de5fd8f37993466fb3b074f5a633b62d4
    • Opcode Fuzzy Hash: ae75250db23d3f65a106ccb7db6d0b7db7673aad107e272ec9e65786d8c8dc3a
    • Instruction Fuzzy Hash: 74313C35624B545FD750EE7688C0D3B77E9BB88B243400C2EE943D3691DABAF8014A55
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 80dc16c4b31a12e895f4eb3d02c2bf18cd06df24083ebb6c5dcc11986d386e4b
    • Instruction ID: 9fae89fed201fb87603fd6b142b5de75446cc31e3fa449c8e06de045bb1d32cf
    • Opcode Fuzzy Hash: 80dc16c4b31a12e895f4eb3d02c2bf18cd06df24083ebb6c5dcc11986d386e4b
    • Instruction Fuzzy Hash: D4214AB1D04609AEEB24CF5AD8405AEFBF4FF84360F20462FE455B7291D7395A02CB68
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 471361ffd1135b2c1fce0387e3c50f122f3eba086dcd4d0d050b43a0f3504bdb
    • Instruction ID: 2a7c390b1601eb7402f742876ed82ff69b70e3e7b876b19d7b158a76fac5e0c4
    • Opcode Fuzzy Hash: 471361ffd1135b2c1fce0387e3c50f122f3eba086dcd4d0d050b43a0f3504bdb
    • Instruction Fuzzy Hash: 09212D72B146489FC740CF69C48079ABBF1AF8A358B6985AAC454AF383D276D907CF50
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 329905633bc8b0a94ac0c240274939d2d8898a23d6a58f63f4b797b9910009b9
    • Instruction ID: 47aef34c857a658a6300e4a75fbe3735692d0a3d265a10cf1240a7a73e3e61bd
    • Opcode Fuzzy Hash: 329905633bc8b0a94ac0c240274939d2d8898a23d6a58f63f4b797b9910009b9
    • Instruction Fuzzy Hash: 6B1151156092C82FDF094A6C84B62EE7FA18FA7250F48D1DDADD997383C06C860ED764
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 028772365812209ae3b034f4d7fb155149baea42fefa9e56ea01cf4f30ab10be
    • Instruction ID: 9134e66de6b4e5ea04456834c8a1a991d62c2b8f5af9fc7be7d8a5352cf769b0
    • Opcode Fuzzy Hash: 028772365812209ae3b034f4d7fb155149baea42fefa9e56ea01cf4f30ab10be
    • Instruction Fuzzy Hash: F41196162451886FDF0D496D84F73DE2FA1CBA7240F48919A989987783C02D811FE764
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 69f6bb77fbef33ec5531855511c1a3eb96a541a6779409ec123430190a6b4409
    • Instruction ID: 45a5f8739c1aa389b1f2b86d6161cac0944a6aa1e8b0d199d8837934870e1e0a
    • Opcode Fuzzy Hash: 69f6bb77fbef33ec5531855511c1a3eb96a541a6779409ec123430190a6b4409
    • Instruction Fuzzy Hash: 41F06272E102289BCF14DFA9CD416CDFBF1AF88724F25821AE514B3291CA7959049B68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00403B07
    • GetModuleFileNameA.KERNEL32(00400000,?,00000104,?), ref: 00403B29
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00402FCE: __EH_prolog.LIBCMT ref: 00402FD3
    • CharLowerA.USER32(?,?,00000004,?), ref: 00403B60
      • Part of subcall function 004033FA: __EH_prolog.LIBCMT ref: 004033FF
    • _strcat.LIBCMT ref: 00403C80
    • CoInitialize.OLE32(00000000), ref: 00403C90
    • CoUninitialize.OLE32 ref: 00403CAD
    • _strcat.LIBCMT ref: 00403CBF
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403D01
    • CreateFileA.KERNEL32(C0000000,00000003,00000000,00000002,00000090,00000000), ref: 00403D3C
    • WriteFile.KERNEL32(00000000,0042FA48,00001270,?,00000000), ref: 00403D60
    • CloseHandle.KERNEL32(00000000), ref: 00403D6A
    • DeleteFileA.KERNEL32(00447800), ref: 00403DE2
      • Part of subcall function 0040251B: CharNextA.USER32(?,?,00000000,00000000,00402825,?,?,?,00000000,?), ref: 00402548
    • _strcat.LIBCMT ref: 00403F8B
    • DeleteFileA.KERNEL32(00446BF0), ref: 00403F98
      • Part of subcall function 00402C6D: __EH_prolog.LIBCMT ref: 00402C72
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402C97
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402CBA
      • Part of subcall function 00402C6D: MessageBoxA.USER32(00000000,?,00000000,00000030), ref: 00402D19
      • Part of subcall function 0040A0A4: _strcat.LIBCMT ref: 0040A0BD
      • Part of subcall function 0040A0A4: GetVersionExA.KERNEL32(?), ref: 0040A0E9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strcat$File$H_prolog$CharDelete$CloseCreateDirectoryHandleInitializeLowerMessageModuleNameNextSystemUninitializeVersionWritelstrlen
    • String ID: %s%s$%s%s%s$.dll$\\.\$temp0921.vxd
    • API String ID: 1494161966-1906822863
    • Opcode ID: 0d65bbf1805183a64baca0f02ee02aa9a5489940a6456a861ec73bf611a059c0
    • Instruction ID: 408f333712ebdddcccb1fd84654ab834d5505da6427f59c8e72a8d2f52c591c3
    • Opcode Fuzzy Hash: 0d65bbf1805183a64baca0f02ee02aa9a5489940a6456a861ec73bf611a059c0
    • Instruction Fuzzy Hash: D5C1D331904209AADB15AFA1DC86EEE7B38EF11319F20407FF401B10E1DB799E45CA6D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RegisterClipboardFormatA.USER32(Native), ref: 0042C028
    • RegisterClipboardFormatA.USER32(OwnerLink), ref: 0042C031
    • RegisterClipboardFormatA.USER32(ObjectLink), ref: 0042C03B
    • RegisterClipboardFormatA.USER32(Embedded Object), ref: 0042C045
    • RegisterClipboardFormatA.USER32(Embed Source), ref: 0042C04F
    • RegisterClipboardFormatA.USER32(Link Source), ref: 0042C059
    • RegisterClipboardFormatA.USER32(Object Descriptor), ref: 0042C063
    • RegisterClipboardFormatA.USER32(Link Source Descriptor), ref: 0042C06D
    • RegisterClipboardFormatA.USER32(FileName), ref: 0042C077
    • RegisterClipboardFormatA.USER32(FileNameW), ref: 0042C081
    • RegisterClipboardFormatA.USER32(Rich Text Format), ref: 0042C08B
    • RegisterClipboardFormatA.USER32(RichEdit Text and Objects), ref: 0042C095
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ClipboardFormatRegister
    • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
    • API String ID: 1228543026-2889995556
    • Opcode ID: 6b5a084f798606625df073df63a90125f29f45b26c0b684456c2d3012832e5f7
    • Instruction ID: 353324ec1318cbb582c5df8b14f60fd4019d8d1e18631fe9f1ac3c0909de5a58
    • Opcode Fuzzy Hash: 6b5a084f798606625df073df63a90125f29f45b26c0b684456c2d3012832e5f7
    • Instruction Fuzzy Hash: 7B013571A407446A8B30BF769C0AD4BBAE4EEC9B107625D2FE09597650DAF89841CF88
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00429F31
    • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 00429F3C
    • ConvertDefaultLocale.KERNEL32(?), ref: 00429F6D
    • ConvertDefaultLocale.KERNEL32(?), ref: 00429F75
    • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 00429F82
    • ConvertDefaultLocale.KERNEL32(?), ref: 00429F9C
    • ConvertDefaultLocale.KERNEL32(000003FF), ref: 00429FA2
    • GetVersion.KERNEL32 ref: 00429FB0
    • RegOpenKeyExA.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,00020019,?), ref: 00429FD5
    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,?), ref: 00429FFB
    • ConvertDefaultLocale.KERNEL32(?), ref: 0042A047
    • ConvertDefaultLocale.KERNEL32(75920A60), ref: 0042A04D
    • RegCloseKey.ADVAPI32(?), ref: 0042A058
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ConvertDefaultLocale$AddressProc$CloseHandleModuleOpenQueryValueVersion
    • String ID: Control Panel\Desktop\ResourceLocale$GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
    • API String ID: 780041395-483790700
    • Opcode ID: 203f824ac1d43bbac6753af98df5ecf5df3a10049759535824241b98e85e0784
    • Instruction ID: b78f76d465d7b8429b50d250dff1f3f1b8a90edccc9fbb2a61dff07a2d830dcb
    • Opcode Fuzzy Hash: 203f824ac1d43bbac6753af98df5ecf5df3a10049759535824241b98e85e0784
    • Instruction Fuzzy Hash: 155195B1F00228AFDB20DFE5DC85AAFBBB8FB08314F90447BE901E3140D67899449B55
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0042BADF: __EH_prolog.LIBCMT ref: 0042BAE4
    • CallNextHookEx.USER32(?,00000003,?,?), ref: 004257ED
    • GetClassLongA.USER32(?,000000E6), ref: 00425832
    • GlobalGetAtomNameA.KERNEL32(?,00000000,00000005), ref: 0042585E
    • lstrcmpiA.KERNEL32(?,ime), ref: 0042586D
    • SetWindowLongA.USER32(?,000000FC,Function_00024DF1), ref: 004258A7
    • CallNextHookEx.USER32(?,00000003,?,?), ref: 004259A2
    • UnhookWindowsHookEx.USER32(?), ref: 004259B3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Hook$CallLongNext$AtomClassGlobalH_prologNameUnhookWindowWindowslstrcmpi
    • String ID: #32768$AfxOldWndProc423$ime
    • API String ID: 3204395069-4034971020
    • Opcode ID: 07b41bb835b3f37ab2ea62d7d951dc66333286f1985a8da89310b5e237e0c8ee
    • Instruction ID: 57621b77eae36dfeccc30f2fe0fb6956200ccb49a91ce200666df048497e576e
    • Opcode Fuzzy Hash: 07b41bb835b3f37ab2ea62d7d951dc66333286f1985a8da89310b5e237e0c8ee
    • Instruction Fuzzy Hash: 8D519F71600225EBCF21AF50EC08B9A3B75EF09325F904136F814962A0CB79C951CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(USER32,?,?,?,0040CFFC), ref: 0040CED4
    • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 0040CEF0
    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0040CF01
    • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 0040CF12
    • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 0040CF23
    • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 0040CF34
    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0040CF45
    • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesA), ref: 0040CF56
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AddressProc$HandleModule
    • String ID: EnumDisplayDevicesA$EnumDisplayMonitors$GetMonitorInfoA$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
    • API String ID: 667068680-68207542
    • Opcode ID: 4079817142a34cec938b4e8f1ad559f573af29b2feabc9793cceecdad33a04ac
    • Instruction ID: d1c05c8d3ab6442c21aa33543c3d481af1cb9795c094473826c90fb8c1184408
    • Opcode Fuzzy Hash: 4079817142a34cec938b4e8f1ad559f573af29b2feabc9793cceecdad33a04ac
    • Instruction Fuzzy Hash: 7A214FB8A84641DBC3019F65ACC092ABAE2F64EB41750097FE214E26E0CB3860569B1F
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(ntdll.dll,RtlInitUnicodeString,?,?,?,0040B8FD), ref: 0040B60D
    • GetProcAddress.KERNEL32(00000000), ref: 0040B616
    • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,0040B8FD), ref: 0040B62B
    • GetProcAddress.KERNEL32(00000000), ref: 0040B62E
    • GetModuleHandleA.KERNEL32(ntdll.dll,NtOpenSection,?,?,?,0040B8FD), ref: 0040B63F
    • GetProcAddress.KERNEL32(00000000), ref: 0040B642
    • GetModuleHandleA.KERNEL32(ntdll.dll,NtMapViewOfSection,?,?,?,0040B8FD), ref: 0040B653
    • GetProcAddress.KERNEL32(00000000), ref: 0040B656
    • GetModuleHandleA.KERNEL32(ntdll.dll,RtlNtStatusToDosError,?,?,?,0040B8FD), ref: 0040B667
    • GetProcAddress.KERNEL32(00000000), ref: 0040B66A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: NtMapViewOfSection$NtOpenSection$NtUnmapViewOfSection$RtlInitUnicodeString$RtlNtStatusToDosError$ntdll.dll
    • API String ID: 1646373207-1987783197
    • Opcode ID: 03ece5295bc5d19dd18cc425d4baeeadd3cb99d471744734dea2df15ba55ecb3
    • Instruction ID: 970ede4e035025aba40728b845774641aeb06da0a28e5589127ba931f0dc7916
    • Opcode Fuzzy Hash: 03ece5295bc5d19dd18cc425d4baeeadd3cb99d471744734dea2df15ba55ecb3
    • Instruction Fuzzy Hash: 5CF062E6A4431576DB306B795C85E572EDCE9497907102C73A804E3191DB7DC801EABC
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000000,00000000), ref: 0041A7D1
    • _strcat.LIBCMT ref: 0041A7E7
    • _strlen.LIBCMT ref: 0041A7FB
    • _strlen.LIBCMT ref: 0041A80E
    • _strncpy.LIBCMT ref: 0041A828
    • _strlen.LIBCMT ref: 0041A831
    • _strlen.LIBCMT ref: 0041A83E
    • _strcat.LIBCMT ref: 0041A85C
    • _strlen.LIBCMT ref: 0041A8A1
    • GetStdHandle.KERNEL32(000000F4,0043A928,00000000,?,00000000,00000000,00000000,00000000), ref: 0041A8AC
    • WriteFile.KERNEL32(00000000), ref: 0041A8B3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strlen$File_strcat$HandleModuleNameWrite_strncpy
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
    • API String ID: 3601721357-4022980321
    • Opcode ID: 5eb8b9adc66271577908d0f2b30b26b3f93ca16067fc2b3402f50ca97e530117
    • Instruction ID: 873bd3f0479595d816e6d3d2c3c66433944047767b5fc083997a35eeea225ff6
    • Opcode Fuzzy Hash: 5eb8b9adc66271577908d0f2b30b26b3f93ca16067fc2b3402f50ca97e530117
    • Instruction Fuzzy Hash: 51314572540204ABD720EB70CC82FEA33B89F4A314F11492BF566E2182DA3CE9D1CA5D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CharNextA.USER32(?,?,00000000,004462BC,?,004462BC,%s%s%s,?,00430E68,temp0921.vxd), ref: 0040224A
    • CharNextA.USER32(00000000,?,004462BC,%s%s%s,?,00430E68,temp0921.vxd), ref: 0040228E
    • CharNextA.USER32(00000000,?,004462BC,%s%s%s,?,00430E68,temp0921.vxd), ref: 004022BB
    • CharNextA.USER32(00000000), ref: 004022D0
    • CharNextA.USER32(00000000), ref: 004022E4
    • CharNextA.USER32(00000000), ref: 00402305
    • CharNextA.USER32(00000000), ref: 00402361
    • lstrlenA.KERNEL32(-00010073), ref: 00402438
    • OutputDebugStringA.KERNEL32(Floating point (%%e, %%f, %%g, and %%G) is not supported by the WTL::CMyString class.), ref: 0040246B
    • DebugBreak.KERNEL32 ref: 00402471
    • CharNextA.USER32(?,?,00000000,004462BC,?,004462BC,%s%s%s,?,00430E68,temp0921.vxd), ref: 004024BD
    • CharNextA.USER32(?,?,004462BC,%s%s%s,?,00430E68,temp0921.vxd), ref: 004024C6
    • wvsprintfA.USER32(?,?,?), ref: 004024ED
    Strings
    • Floating point (%%e, %%f, %%g, and %%G) is not supported by the WTL::CMyString class., xrefs: 00402466
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CharNext$Debug$BreakOutputStringlstrlenwvsprintf
    • String ID: Floating point (%%e, %%f, %%g, and %%G) is not supported by the WTL::CMyString class.
    • API String ID: 3364312739-4257885759
    • Opcode ID: a824a2b543f5762c82e423326e6c2dab26c1ef602594b2f11e18d853935b28d7
    • Instruction ID: 0eedb994684fcdbb03af904bb600abb34cd9bd0cefedc73d8d84e7d0e4219dbe
    • Opcode Fuzzy Hash: a824a2b543f5762c82e423326e6c2dab26c1ef602594b2f11e18d853935b28d7
    • Instruction Fuzzy Hash: 0081E1715082425ADB319E388F4C23BBBD4AB55354F58057FE8C0F22D5D6FCCA8A865E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Focus$Message$ParentStateWindow$BeepDialogH_prologSend
    • String ID:
    • API String ID: 2408959702-0
    • Opcode ID: 29edca6921028beb0b146ee492515b4863a2a01fbf38321ee019951345c7bbf6
    • Instruction ID: b7f21489c7d6d74e7554cfe8760b2d28968a599f813f330fded3cbbafc593dd2
    • Opcode Fuzzy Hash: 29edca6921028beb0b146ee492515b4863a2a01fbf38321ee019951345c7bbf6
    • Instruction Fuzzy Hash: FDC1BF35A00215AADF20AF65D844AFFBBB5EFC4758F55402BE811A7250DB3C9CC2CA9D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,0043B1D8,00000118,004177DE,00000001,00000000,0043A508,00000008,0041A8CA,00000000,00000000,00000000), ref: 0041C956
    • _strcat.LIBCMT ref: 0041C96C
    • _strlen.LIBCMT ref: 0041C980
    • _strlen.LIBCMT ref: 0041C995
    • _strncpy.LIBCMT ref: 0041C9AF
    • _strlen.LIBCMT ref: 0041C9B8
    • _strcat.LIBCMT ref: 0041C9D4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strlen$_strcat$FileModuleName_strncpy
    • String ID: ...$<program name unknown>$Buffer overrun detected!$Microsoft Visual C++ Runtime Library$Program: $Unknown security failure detected!
    • API String ID: 3058806289-1673886896
    • Opcode ID: afbd14b618276193030e3c0af5201b55a9026821446303c7d5f8591930f4bbdf
    • Instruction ID: f9b76a29898f58c7373b8753ea105286733a2ff1b2e8d5243023788ac5f4ec33
    • Opcode Fuzzy Hash: afbd14b618276193030e3c0af5201b55a9026821446303c7d5f8591930f4bbdf
    • Instruction Fuzzy Hash: CA31B7719412186BCB11EB61CC82FDE37789F09368F11415FF118B6182DB7CDA918BAD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • LoadLibraryA.KERNEL32(user32.dll,0043A978,0000000C,?), ref: 0041E5E2
    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0041E5FE
    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0041E60F
    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0041E61C
    • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 0041E632
    • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0041E643
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad
    • String ID: $GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$user32.dll
    • API String ID: 2238633743-752805172
    • Opcode ID: 3d8efab7ff49af663c91057f34e0c8ce06715d0f196f9146fd83b2926ff60567
    • Instruction ID: a1566a43e676663f77566d211b6d4cd8a5d02c20358371a1fa29f3d6f93bbe0d
    • Opcode Fuzzy Hash: 3d8efab7ff49af663c91057f34e0c8ce06715d0f196f9146fd83b2926ff60567
    • Instruction Fuzzy Hash: 7F219938B00305FADB119FB69C45FAB7AA8EB55784F84013ABD05D1150EB78C881DFAD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0042663C: GetWindowLongA.USER32(?,000000F0), ref: 00426648
    • GetParent.USER32(?), ref: 0042405C
    • SendMessageA.USER32(00000000,0000036B,00000000,00000000), ref: 0042407F
    • GetWindowRect.USER32(?,?), ref: 00424098
    • GetWindowLongA.USER32(00000000,000000F0), ref: 004240AB
    • CopyRect.USER32(?,?), ref: 004240F8
    • CopyRect.USER32(?,?), ref: 00424102
    • GetWindowRect.USER32(00000000,?), ref: 0042410B
    • CopyRect.USER32(?,?), ref: 00424127
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Rect$Window$Copy$Long$MessageParentSend
    • String ID:
    • API String ID: 808654186-0
    • Opcode ID: 5c1e3401e94f9ddfb7b0304fefac56a9f4397806790fe2ce614e2b01d900ef57
    • Instruction ID: 208623173516fe0c4c79c90a83d200c0856f8fa8b1e61f7fada478de943c47ba
    • Opcode Fuzzy Hash: 5c1e3401e94f9ddfb7b0304fefac56a9f4397806790fe2ce614e2b01d900ef57
    • Instruction Fuzzy Hash: 31518771A00229ABDB10DBA8DC85EEF77B9EF84314F554125F601F3280D774A9468B58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • lstrlenA.KERNEL32(?,00439AF0), ref: 0042D37B
    • SysAllocString.OLEAUT32(?), ref: 0042D3A1
    • lstrlenA.KERNEL32(?,00439AF0), ref: 0042D3B9
    • SysAllocString.OLEAUT32(00000000), ref: 0042D3DD
    • lstrlenA.KERNEL32(?,0000F108,?,00000100,d}C,00439AF0), ref: 0042D42E
    • SysAllocString.OLEAUT32(00000000), ref: 0042D454
    • lstrlenA.KERNEL32(?), ref: 0042D474
    • SysAllocString.OLEAUT32(00000000), ref: 0042D498
    • lstrlenA.KERNEL32(?), ref: 0042D4C1
    • SysAllocString.OLEAUT32(00000000), ref: 0042D4E2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AllocStringlstrlen
    • String ID: d}C
    • API String ID: 98960487-3319508351
    • Opcode ID: 66b24d67ede51495c4957cf5ca69243bc8b93e62e85c6dcf95a10c59674b6767
    • Instruction ID: 185ff175cf529db1f2f1588e15c7f847109819f6a9f20bd73b9045780a2bba21
    • Opcode Fuzzy Hash: 66b24d67ede51495c4957cf5ca69243bc8b93e62e85c6dcf95a10c59674b6767
    • Instruction Fuzzy Hash: 7451A376A00219ABCB10EF75DD45A9ABBB8EF05314F508527F815D7241D738E990CFA4
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    • assertion failed: next.is_notified()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\task\state.rs, xrefs: 02445208
    • attempt to divide by zero, xrefs: 0244521C
    • assertion failed: self.ref_count() > 0, xrefs: 02445230
    • assertion failed: curr.is_join_waker_set(), xrefs: 024454B4
    • n failed: prev.ref_count() >= 2, xrefs: 024457BF
    • assertion failed: snapshot.is_complete()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\task\harness.rs, xrefs: 024454F2
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 02445325
    • Invalid, xrefs: 0244528D, 024454DE
    • [internal exception] blocking task ran twice./registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\blocking\task.rs, xrefs: 024452C9
    • assertion failed: prev.ref_count() >= 1, xrefs: 02445582, 024455B5, 0244561A
    • assertion failed: curr.is_join_interested(), xrefs: 024454A0, 0244556E
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: Invalid$[internal exception] blocking task ran twice./registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\blocking\task.rs$assertion failed: curr.is_join_interested()$assertion failed: curr.is_join_waker_set()$assertion failed: next.is_notified()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\task\state.rs$assertion failed: prev.ref_count() >= 1$assertion failed: self.ref_count() > 0$assertion failed: snapshot.is_complete()/registry\src\index.crates.io-1cd66030c949c28d\tokio-1.37.0\src\runtime\task\harness.rs$attempt to divide by zero$cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs$n failed: prev.ref_count() >= 2
    • API String ID: 0-2035208961
    • Opcode ID: 65cb96d1c78d92a81dad463c925b7a7438302cb44d87c85a8bf3d341dd9ea1fd
    • Instruction ID: 3b9cf43a97d6100b9063ddd46997b4135e0e93f822d9514b2ef1db4dcc757455
    • Opcode Fuzzy Hash: 65cb96d1c78d92a81dad463c925b7a7438302cb44d87c85a8bf3d341dd9ea1fd
    • Instruction Fuzzy Hash: 9DD104706102418BEB14EF28C84076FB7E2EF95318F64855FE89A9B391DBB1DC42CB91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prologlstrlen
    • String ID: `)u
    • API String ID: 2133942097-4279031584
    • Opcode ID: ac1b358337dca50b234fc3dc3a64ea0e40d9c39c4fce7a5d9b49bc41b1c3f848
    • Instruction ID: 47f9f9a9bf0d79d52291fec9dc3460f5edb29a58d4097f6a8864e100f0027ea6
    • Opcode Fuzzy Hash: ac1b358337dca50b234fc3dc3a64ea0e40d9c39c4fce7a5d9b49bc41b1c3f848
    • Instruction Fuzzy Hash: 2191A371E00219DFDF20EFA4D844BEEBBB4FF04314F94452AE551A7290D7789946CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ClearVariant$AllocStringlstrlen
    • String ID: `)u
    • API String ID: 3271446295-4279031584
    • Opcode ID: 6282ef1ab9a2c62f5340b2b8bd7b05e750a85b2b0af811c20b1538a789a0357b
    • Instruction ID: cdccc334731853226970ff56d724ea0fd08195d0ec7bcfd3a5b41d5743917be6
    • Opcode Fuzzy Hash: 6282ef1ab9a2c62f5340b2b8bd7b05e750a85b2b0af811c20b1538a789a0357b
    • Instruction Fuzzy Hash: 90617E71E00219EFCF10EFA4DC85AEEBBB5BF04300F94452AF555A7250D7789985CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0243FEC0: HeapFree.KERNEL32(00000000,?), ref: 02440037
      • Part of subcall function 0243FEC0: HeapFree.KERNEL32(00000000,?), ref: 0244004C
    • HeapFree.KERNEL32(00000000,?), ref: 0240A574
    • HeapFree.KERNEL32(00000000,?), ref: 0240A58F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: Invalid
    • API String ID: 3298025750-874791708
    • Opcode ID: 782edc6403cb8378555677b73cbbbda5e5a899c9173173948703f5e7d7b3d86f
    • Instruction ID: db57fdf6435308d82b6c0bf22e6f953a3b995a00cfce941db4ae1d6138e37734
    • Opcode Fuzzy Hash: 782edc6403cb8378555677b73cbbbda5e5a899c9173173948703f5e7d7b3d86f
    • Instruction Fuzzy Hash: D5D16F71A083509BD725DF25D884B6FBBE2BFC8304F10482EE69997390DB359986CF42
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • LCMapStringW.KERNEL32(00000000,00000100,0043A9D4,00000001,00000000,00000000,0043B208,00000038,00417C80,00000100,00000020,00000100,?,00000100,00000000,00000001), ref: 0041D695
    • GetLastError.KERNEL32 ref: 0041D6A7
    • MultiByteToWideChar.KERNEL32(?,00000000,00417F33,?,00000000,00000000,0043B208,00000038,00417C80,00000100,00000020,00000100,?,00000100,00000000,00000001), ref: 0041D72E
    • MultiByteToWideChar.KERNEL32(?,00000001,00417F33,?,?,00000000), ref: 0041D7AF
    • LCMapStringW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 0041D7C9
    • LCMapStringW.KERNEL32(00000000,00000000,?,00000000,?,?), ref: 0041D804
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: String$ByteCharMultiWide$ErrorLast
    • String ID:
    • API String ID: 1775797328-0
    • Opcode ID: 4e68df62db2da08941074baaceedf4420aa6fcb3e7720cbc62ad2245d21ccbe8
    • Instruction ID: f05e7c59ad7515b7832d4e1e93c16c6c87d040a29f1d2ebd5c0f6427fa4a6e31
    • Opcode Fuzzy Hash: 4e68df62db2da08941074baaceedf4420aa6fcb3e7720cbc62ad2245d21ccbe8
    • Instruction Fuzzy Hash: C0B139B2D00219EFCF21AFA4DC859EE7B75FF08354F14412AF925A2260D7398DA1DB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00423001
    • FindResourceA.KERNEL32(?,00000000,00000005), ref: 00423039
    • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00423041
      • Part of subcall function 004247EA: UnhookWindowsHookEx.USER32(?), ref: 0042480F
    • LockResource.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00423053
    • GetDesktopWindow.USER32 ref: 00423080
    • IsWindowEnabled.USER32(00000000), ref: 0042308E
    • EnableWindow.USER32(00000000,00000000), ref: 0042309D
    • EnableWindow.USER32(00000000,00000001), ref: 0042312C
    • GetActiveWindow.USER32 ref: 00423137
    • SetActiveWindow.USER32(00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00423145
    • FreeResource.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00423161
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$Resource$ActiveEnable$DesktopEnabledFindFreeH_prologHookLoadLockUnhookWindows
    • String ID:
    • API String ID: 833315621-0
    • Opcode ID: 23e7f65befa7440df8e79eeea8a432c85f5a5959caccd24c17b927ce82f2994f
    • Instruction ID: 44036482665cc7e11abf287e92ecc354a93a460278f6ee91648675104effe8f1
    • Opcode Fuzzy Hash: 23e7f65befa7440df8e79eeea8a432c85f5a5959caccd24c17b927ce82f2994f
    • Instruction Fuzzy Hash: F241A531700625DBCB21AFA5E94977FBBB4EF44716F90003FE501A22A1C7BC5E45CA69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0243BCE0: AcquireSRWLockExclusive.KERNEL32(00000008), ref: 0243BD39
      • Part of subcall function 0243BCE0: HeapFree.KERNEL32(00000000,00000000), ref: 0243BDE9
      • Part of subcall function 0243BCE0: HeapFree.KERNEL32(00000000,?), ref: 0243BDFA
      • Part of subcall function 0243BCE0: ReleaseSRWLockExclusive.KERNEL32(?), ref: 0243BE0C
      • Part of subcall function 0242FE20: TlsGetValue.KERNEL32(00000000,00000000,0243C23F), ref: 0242FE2C
      • Part of subcall function 0242FE20: TlsGetValue.KERNEL32(00000000), ref: 0242FE4A
      • Part of subcall function 0242FE20: TlsSetValue.KERNEL32(00000000,00000000), ref: 0242FE8A
    • AcquireSRWLockExclusive.KERNEL32(00000000), ref: 0243C276
    • HeapFree.KERNEL32(00000000,?), ref: 0243C328
    • HeapFree.KERNEL32(00000000,00000004), ref: 0243C339
    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0243C352
    • HeapFree.KERNEL32(00000000,00000003), ref: 0243C41D
    • HeapFree.KERNEL32(00000000,?), ref: 0243C42E
    Strings
    • lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs, xrefs: 0243C25B
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 0243C37B
    • stdoutstderrlibrary\std\src\io\mod.rs, xrefs: 0243C211
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$ExclusiveLock$Value$AcquireRelease
    • String ID: cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs$stdoutstderrlibrary\std\src\io\mod.rs
    • API String ID: 3691851813-1631872077
    • Opcode ID: bc1b89cbef2241430fc01a15de2b9c8a6f79bade4cdc7707e2d4242d672118e3
    • Instruction ID: 5649fa014906793884eddd0de70283e8d8368fd477438606d2f0b0a9a9352823
    • Opcode Fuzzy Hash: bc1b89cbef2241430fc01a15de2b9c8a6f79bade4cdc7707e2d4242d672118e3
    • Instruction Fuzzy Hash: 986152B1E00208DFDB15DF94D888BAEBBB2FB18314F00442AE905BB391D7B59859CF95
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SysAllocString.OLEAUT32 ref: 0042D74B
    • VariantClear.OLEAUT32(?), ref: 0042D8B2
    • VariantClear.OLEAUT32(?), ref: 0042D8D9
    • SysFreeString.OLEAUT32(?), ref: 0042D93D
    • SysFreeString.OLEAUT32(?), ref: 0042D952
    • SysFreeString.OLEAUT32(?), ref: 0042D967
    • VariantChangeType.OLEAUT32(?,?,00000000,?), ref: 0042D9A2
    • VariantClear.OLEAUT32(?), ref: 0042D9B2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: StringVariant$ClearFree$AllocChangeType
    • String ID: `)u
    • API String ID: 984216764-4279031584
    • Opcode ID: f945ae4cef94d89ca0ab2fcfcb01154a0f7e82251910b561d33c7f77115089c5
    • Instruction ID: 88606afa4f30e9e75de13378e47aca7ec09a9b99aa19c6302e81d3cbef9f0d5a
    • Opcode Fuzzy Hash: f945ae4cef94d89ca0ab2fcfcb01154a0f7e82251910b561d33c7f77115089c5
    • Instruction Fuzzy Hash: 89517E71E00319EFDF20EFA4E884AEEBBB9BF04300F90452AF555A7151D7789A45CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00425662
    • GetPropA.USER32(?,AfxOldWndProc423), ref: 0042567A
    • CallWindowProcA.USER32(?,?,00000110,?,00000000), ref: 004256D8
      • Part of subcall function 00424C8B: GetWindowRect.USER32(?,00424DAD), ref: 00424CB0
      • Part of subcall function 00424C8B: GetWindow.USER32(?,00000004), ref: 00424CCD
    • SetWindowLongA.USER32(?,000000FC,?), ref: 00425708
    • RemovePropA.USER32(?,AfxOldWndProc423), ref: 00425710
    • GlobalFindAtomA.KERNEL32(AfxOldWndProc423), ref: 00425717
    • GlobalDeleteAtom.KERNEL32(00000000), ref: 0042571E
      • Part of subcall function 00423DB0: GetWindowRect.USER32(?,?), ref: 00423DBC
    • CallWindowProcA.USER32(?,?,?,?,00000000), ref: 00425772
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prologLongRemove
    • String ID: AfxOldWndProc423
    • API String ID: 2397448395-1060338832
    • Opcode ID: 10d2a5aec3b997577270dab6d298fc0b9cd5d1bcd177ddbbb5c5fac6d3cc76f4
    • Instruction ID: c58938d15ef85ceb471def29655ae59a85cb9400ae0611950666c80f8e2187a5
    • Opcode Fuzzy Hash: 10d2a5aec3b997577270dab6d298fc0b9cd5d1bcd177ddbbb5c5fac6d3cc76f4
    • Instruction Fuzzy Hash: E1318332A0012AEBCB11AFA5ED49DBF7B78FF89310F80012AF511A2150D7789911DB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 004030A3
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00401F77: InterlockedDecrement.KERNEL32(?), ref: 00401F8B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: DecrementH_prologInterlockedlstrlen
    • String ID: (1D
    • API String ID: 2818505249-2129874033
    • Opcode ID: bd28ca77c038792ffbe5868c204803e66c6c098a52fe2d6f0d143d211d85f30c
    • Instruction ID: 858d2aefe05a656e08fe5f4863ded23aa7559c905939fa8f8aa05e635d827225
    • Opcode Fuzzy Hash: bd28ca77c038792ffbe5868c204803e66c6c098a52fe2d6f0d143d211d85f30c
    • Instruction Fuzzy Hash: AEB14871C00119AEDB01EBE5CD86EEEBBB8AF19304F50416EF501B31D2DB785A09DBA5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 0040C9FE
    • MapDialogRect.USER32(?,?), ref: 0040CA8F
    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 0040CAB0
    • CLSIDFromString.OLE32(?,?), ref: 0040CBAE
    • CLSIDFromProgID.OLE32(?,?), ref: 0040CBB6
    • SetWindowPos.USER32(00000004,?,00000000,00000000,00000000,00000000,00000013,00000001,00000000,?,00000000,?,?,?,0000FC84,00000000), ref: 0040CC52
    • SysFreeString.OLEAUT32(?), ref: 0040CCA5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: String$From$AllocDialogFreeH_prologProgRectWindow
    • String ID: `)u
    • API String ID: 493809305-4279031584
    • Opcode ID: b6569829184fb42d57513ac240686ddfc2199f8f1beda4693de8370a87d1c167
    • Instruction ID: b945ffafd8d0b2f29bc3912b9e04def262169b811155d546c73b7a037650a840
    • Opcode Fuzzy Hash: b6569829184fb42d57513ac240686ddfc2199f8f1beda4693de8370a87d1c167
    • Instruction Fuzzy Hash: 85B1397190021ADFCB04DFA5D884AEEB7B4FF08304F10463AE819A7391D778A955CFA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strcat$___shr_12
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$?
    • API String ID: 1152255961-4131533671
    • Opcode ID: 5aa3ecb09af4b3a94d3f2d9835869e186dd5ee770025c3904ead7b432b13b458
    • Instruction ID: 16df6c63b7a150186b903f00fb97da5ef5e8eb5c8611f92a14905fa3948d0dbe
    • Opcode Fuzzy Hash: 5aa3ecb09af4b3a94d3f2d9835869e186dd5ee770025c3904ead7b432b13b458
    • Instruction Fuzzy Hash: 85814531A002AA9ACF11DF68D4447EF7BF4AF15314F84849BD940DB283D37C9686C7A9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00422DF4
    • GetSystemMetrics.USER32(0000002A), ref: 00422EB8
    • GlobalLock.KERNEL32(00000000,?,?,?,?), ref: 00422F23
    • CreateDialogIndirectParamA.USER32(?,?,?,Function_0002288B,00000000), ref: 00422F52
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CreateDialogGlobalH_prologIndirectLockMetricsParamSystem
    • String ID: MS Shell Dlg
    • API String ID: 2364537584-76309092
    • Opcode ID: 152948b375090ba3bf973604bc07184c04cab0d5ef470bd3cd5d12d947ef66b1
    • Instruction ID: ca2fc6de147dc94a796e69e52f3573e941c4428df88ff4a11067891bc5981fc6
    • Opcode Fuzzy Hash: 152948b375090ba3bf973604bc07184c04cab0d5ef470bd3cd5d12d947ef66b1
    • Instruction Fuzzy Hash: CE51F131B00225EFCB11EF64EA459EEBBB0EF44314F95066AF801E7251D7B88940DB99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: c99945b730b1963bc2476f908b4b7e966ae24083794790fc4a804f60559a5f7f
    • Instruction ID: deba55917dce0b94424f7e82dae8a9b9b47db0b8bf94c504a8a5c0270682857a
    • Opcode Fuzzy Hash: c99945b730b1963bc2476f908b4b7e966ae24083794790fc4a804f60559a5f7f
    • Instruction Fuzzy Hash: 2C519072D00319EFDF21EFA4D884AEEBBB5BF04310F90452AF511A7150D774A945CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: 21f38ccec4fa0e8b30d552f577ba58be143ccf844956009ce64557762c5bc80d
    • Instruction ID: 03b0e499ed1856b55c8dcbea2a45d420b7c6c419c53f8268e212c6394d836cd7
    • Opcode Fuzzy Hash: 21f38ccec4fa0e8b30d552f577ba58be143ccf844956009ce64557762c5bc80d
    • Instruction Fuzzy Hash: 22516D71E00319EFDF20EFA4E884AEEBBB5BF08300F90452AF555A7251D7789945CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: 0f93b15981eb83b0008622cebca6e7edd8fc0778c5b73fd08b63520a5e626df8
    • Instruction ID: 6e50089abeb2bdf91b19714a5c651368d8dc676127325ce66d1f1f29e3b16f1f
    • Opcode Fuzzy Hash: 0f93b15981eb83b0008622cebca6e7edd8fc0778c5b73fd08b63520a5e626df8
    • Instruction Fuzzy Hash: 69517D71E00319EFDF24EFA4E884AEEBBB9BF04300F90452AF551A7250D7789945CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: 827ef1f6ee7b75c145e33e34f9742a54bc848cad72a190445feeb5b0033f898c
    • Instruction ID: f237654dfe9b0de4e7d9c7904e21352c824fde659a4a83de7e0f8eff9bac242a
    • Opcode Fuzzy Hash: 827ef1f6ee7b75c145e33e34f9742a54bc848cad72a190445feeb5b0033f898c
    • Instruction Fuzzy Hash: D3516F71E00319EFDF20EFA4D884ADEBBB9BF08300F90452AF555A7250D7749945CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: 4a061ed6ea16155ebb7b5c787c568175eb317ebc6f7b48173005574961f5fb9e
    • Instruction ID: 58d113b5c7ff70747419b4c64d9a6ceb5b586f213f15031ce77f902832e347a1
    • Opcode Fuzzy Hash: 4a061ed6ea16155ebb7b5c787c568175eb317ebc6f7b48173005574961f5fb9e
    • Instruction Fuzzy Hash: 11518F71E00319EFDF20EFA4E884AEEBBB9BF04300F90452AF555A7151D7789A45CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: 4a58fbb225a2fce4e96c6b3d3fef4f7e5c10f5cde4fd159727c4ed86734b3cd6
    • Instruction ID: d151c50cc6bd0b404945a1303f62b0d198eee01f47ec1073862221912eaef73a
    • Opcode Fuzzy Hash: 4a58fbb225a2fce4e96c6b3d3fef4f7e5c10f5cde4fd159727c4ed86734b3cd6
    • Instruction Fuzzy Hash: 2F515D71E00319EFDF20EFA4E884AEEBBB9BF08300F90452AF555A7150D7789955CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: f8144347606935d44715553dcabef8512d41d4be27142094d4e387c2cc9881f5
    • Instruction ID: 53aae2873ea59daa80941dbbe4e8aa903fbf7bb4d0a1552b06bc64d0b7892529
    • Opcode Fuzzy Hash: f8144347606935d44715553dcabef8512d41d4be27142094d4e387c2cc9881f5
    • Instruction Fuzzy Hash: 8D515D71E00319EFDF20EFA4E884AEEBBB9BF08300F90452AF555A7150D7789955CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: 7face730e7ea03213b5efd70eacd7ec68c2f0d51a1f73f596c044cdcc9c12fd8
    • Instruction ID: 78637e40a941fc69885a3deb517414403bef0f341df32ec1c30b1b6a81e673a2
    • Opcode Fuzzy Hash: 7face730e7ea03213b5efd70eacd7ec68c2f0d51a1f73f596c044cdcc9c12fd8
    • Instruction Fuzzy Hash: A2517F71E00319EFDF20EFA4E884AEEBBB9BF04300F90452AF555A7150D7749A45CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: 84b6905a04f3cbe8a5a89647b25fc7c97e8888fb23e746bbd921fa75cfd3bebd
    • Instruction ID: ac7c056ca3fef7ea1f7cd9142080b8837a63ee409403f1a6f7d78ffac25b1746
    • Opcode Fuzzy Hash: 84b6905a04f3cbe8a5a89647b25fc7c97e8888fb23e746bbd921fa75cfd3bebd
    • Instruction Fuzzy Hash: 4A519F71E00319EFCF20EFA4E884AEEBBB9BF04300F90452AF551A7151D7789945CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetStockObject.GDI32(00000011), ref: 00427B53
    • GetStockObject.GDI32(0000000D), ref: 00427B5B
    • GetObjectA.GDI32(00000000,0000003C,?), ref: 00427B68
    • GetDC.USER32(00000000), ref: 00427B77
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00427B8B
    • MulDiv.KERNEL32(00000000,00000048,00000000), ref: 00427B97
    • ReleaseDC.USER32(00000000,00000000), ref: 00427BA2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Object$Stock$CapsDeviceRelease
    • String ID: System
    • API String ID: 46613423-3470857405
    • Opcode ID: 3618959336a5d2387a8584dc03d5aa96b6a4e2ba3ebebbc47e731d6b0f56e9d2
    • Instruction ID: 7761e190ee946e44623cd7a4fdd5fc82f47dd554012855bd1365dda4637adce3
    • Opcode Fuzzy Hash: 3618959336a5d2387a8584dc03d5aa96b6a4e2ba3ebebbc47e731d6b0f56e9d2
    • Instruction Fuzzy Hash: F5115471B00218EBDB10EBA0ED45F9E3B74EF14745F904035F605AA190D7B4AD46CB68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(COMCTL32.DLL,00008000,00000000,00000400,00424635,?,00040000), ref: 00423CC1
    • LoadLibraryA.KERNEL32(COMCTL32.DLL), ref: 00423CCA
    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00423CDE
    • #17.COMCTL32 ref: 00423CF9
    • #17.COMCTL32 ref: 00423D15
    • FreeLibrary.KERNEL32(00000000), ref: 00423D22
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Library$AddressFreeHandleLoadModuleProc
    • String ID: COMCTL32.DLL$InitCommonControlsEx
    • API String ID: 1437655972-4218389149
    • Opcode ID: bf34ed095592dcafb683c73bd76fb3753a0aa3a0d8d12ebda3a1314fc7045279
    • Instruction ID: d616edb962f15808b37bc422b71edd0b26b380362643589d42d25bf3a016dfe7
    • Opcode Fuzzy Hash: bf34ed095592dcafb683c73bd76fb3753a0aa3a0d8d12ebda3a1314fc7045279
    • Instruction Fuzzy Hash: 72F0F936B143229797219FE0BC4891BB6B8AF95722B814436F801E3211CF2CCD0B467D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0243FEC0: HeapFree.KERNEL32(00000000,?), ref: 02440037
      • Part of subcall function 0243FEC0: HeapFree.KERNEL32(00000000,?), ref: 0244004C
    • HeapFree.KERNEL32(00000000,?), ref: 023EF462
    • HeapFree.KERNEL32(00000000,?), ref: 023EF481
    Strings
    • , xrefs: 023EF608
    • a Display implementation returned an error unexpectedly, xrefs: 023EF6F1
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: $a Display implementation returned an error unexpectedly
    • API String ID: 3298025750-229198390
    • Opcode ID: 4a989ce1d8dce06fcdaf41c967ec7213b86f68a563cd465c162be1f405d4bd94
    • Instruction ID: 414625c5c3d1399458f8c89da763baf47f40f36e75fea8c771f5cbffe84e1d8f
    • Opcode Fuzzy Hash: 4a989ce1d8dce06fcdaf41c967ec7213b86f68a563cd465c162be1f405d4bd94
    • Instruction Fuzzy Hash: F0F19171A08350ABDB25DF25D884B6BB7E2BFC8304F50492EF98997291DB719909CF43
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 024404D0: TlsGetValue.KERNEL32(00000000), ref: 024404E9
      • Part of subcall function 024404D0: TlsGetValue.KERNEL32(00000000), ref: 02440510
      • Part of subcall function 024404D0: TlsSetValue.KERNEL32(00000000,00000000), ref: 0244055E
      • Part of subcall function 024404D0: BCryptGenRandom.BCRYPT(00000000,?,00000010,00000002), ref: 02440574
    • HeapFree.KERNEL32(00000000,?), ref: 023EC4B0
    • HeapFree.KERNEL32(00000000,?), ref: 023EC64B
    • HeapFree.KERNEL32(00000000,?), ref: 023EC6DF
    • HeapFree.KERNEL32(00000000,?), ref: 023EC71B
    Strings
    • path*fatal runtime error: I/O error: operation failed to complete synchronously, xrefs: 023EC3CD
    • cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs, xrefs: 023EC744
    • Invalid, xrefs: 023EC6C0
    • nametitlebodystruct RecvSfilemaster_keyprofileslocal_statelogin_datacookieshistorycreditcardslocalstate_cachelogins_master_keyextensionsFailed building the Runtime, xrefs: 023EC3A0
    • APPDATA, xrefs: 023EC521
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$Value$CryptRandom
    • String ID: APPDATA$Invalid$cannot access a Thread Local Storage value during or after destruction/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\std\src\thread\local.rs$nametitlebodystruct RecvSfilemaster_keyprofileslocal_statelogin_datacookieshistorycreditcardslocalstate_cachelogins_master_keyextensionsFailed building the Runtime$path*fatal runtime error: I/O error: operation failed to complete synchronously
    • API String ID: 740635937-1962946080
    • Opcode ID: bbd61a22c7b981d7e19bc2c1bd071b76b30ae9db0207ab81e83c3df0b9f282c0
    • Instruction ID: 1b05087313058ca5069b1b75cd19e9d0c43e086d7020d250b943a53ccb92dcc2
    • Opcode Fuzzy Hash: bbd61a22c7b981d7e19bc2c1bd071b76b30ae9db0207ab81e83c3df0b9f282c0
    • Instruction Fuzzy Hash: 73C12A75A083509FD714DF25C880A5FB7E2BFC8314F04892EE99997291EB74D909CF82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CompareStringW.KERNEL32(00000000,00000000,0043A9D4,00000001,0043A9D4,00000001,0043B4A8,00000040,00420655,?,00000001,?,00000000,?,00000000,?), ref: 00420A50
    • GetLastError.KERNEL32(?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007,?,?,00000000,00000006,00000006), ref: 00420A62
    • GetCPInfo.KERNEL32(00000000,0041509C,0043B4A8,00000040,00420655,?,00000001,?,00000000,?,00000000,?,?,0041FB6C,00000000,00000000), ref: 00420B0C
    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000004,00000000,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007), ref: 00420B9A
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000004,00000064,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007), ref: 00420C13
    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,004151C7,00000000,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007), ref: 00420C30
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,004151C7,?,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007), ref: 00420CA6
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ByteCharMultiWide$CompareErrorInfoLastString
    • String ID:
    • API String ID: 1773772771-0
    • Opcode ID: edf37570b9a6133125698eafa9279b85b7ab7cef9f5632037470c00f62594779
    • Instruction ID: 81078ee3ce04f899a7a6ce9267cfb065c325f8bad144afdf8676d079718d4fdb
    • Opcode Fuzzy Hash: edf37570b9a6133125698eafa9279b85b7ab7cef9f5632037470c00f62594779
    • Instruction Fuzzy Hash: 33B19C71A00229EBCF21CF95EC81AEF7BF5EF45314FA4012BF810A6262D7799851CB59
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __allrem.LIBCMT ref: 00418352
    • __allrem.LIBCMT ref: 0041836A
    • __allrem.LIBCMT ref: 00418386
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004183C1
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004183DD
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004183F4
      • Part of subcall function 0041E2CF: __lock.LIBCMT ref: 0041E2DA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@$__lock
    • String ID: E
    • API String ID: 4106114094-3568589458
    • Opcode ID: 40e9ca99cd16e90638289c3b0e916505e15a49d27cb8c4a42bceb70da9c6c163
    • Instruction ID: b1dc9613c2a7d863b46b9fc589b77863b1e0655e39923395906f12520c05418b
    • Opcode Fuzzy Hash: 40e9ca99cd16e90638289c3b0e916505e15a49d27cb8c4a42bceb70da9c6c163
    • Instruction Fuzzy Hash: 7F718071E00619BFDB14DFA9CC81BDEB7B6EB44314F14816EE514E7281EB789A808B58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00414116
    • VariantClear.OLEAUT32(?), ref: 004141BB
    • SysFreeString.OLEAUT32(?), ref: 00414238
    • SysFreeString.OLEAUT32(?), ref: 00414246
    • SysFreeString.OLEAUT32(?), ref: 00414254
    • VariantClear.OLEAUT32(?), ref: 00414269
      • Part of subcall function 00413BE3: __EH_prolog.LIBCMT ref: 00413BE8
      • Part of subcall function 00413BE3: VariantClear.OLEAUT32(?), ref: 00413C4D
      • Part of subcall function 004150C1: VariantCopy.OLEAUT32(?,?), ref: 004150C9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Variant$ClearFreeString$H_prolog$Copy
    • String ID: `)u
    • API String ID: 3098219910-4279031584
    • Opcode ID: 07ac1883145407bfd2158c196e3fcb000a03d1c9a0b2083fd5ca9be8544c246f
    • Instruction ID: 42ef2da4cf5b7abc8d447338bc900a50df6f05a4ba720132606da66aa4bd1274
    • Opcode Fuzzy Hash: 07ac1883145407bfd2158c196e3fcb000a03d1c9a0b2083fd5ca9be8544c246f
    • Instruction Fuzzy Hash: E65107B190020AEFCB14CFE4C9849EEBBB9FF88304F64456EE516A7251D734A985CB54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 0042BEA5
    • PathFindExtensionA.SHLWAPI(?), ref: 0042BEB2
      • Part of subcall function 0042BE3A: PathFindFileNameA.SHLWAPI(?,00427185,?,?,?), ref: 0042BE3E
      • Part of subcall function 0042BE3A: lstrlenA.KERNEL32(00000000), ref: 0042BE4C
    • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 0042BF3D
    • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 0042BF6A
      • Part of subcall function 00417838: _strlen.LIBCMT ref: 00417842
      • Part of subcall function 00417838: _strcat.LIBCMT ref: 00417856
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FileFindNamePath$ExtensionModule_strcat_strlenlstrcatlstrcpylstrlen
    • String ID: .CHM$.HLP$.INI
    • API String ID: 4056043433-4017452060
    • Opcode ID: 5208ab65a18fcb4c340f3c54e1a250997058e9b9430b917999dc72298521812a
    • Instruction ID: f23bd32b8940e093c85a1fee808d6a361bb9d4e487b19eb4f682e07407b9da65
    • Opcode Fuzzy Hash: 5208ab65a18fcb4c340f3c54e1a250997058e9b9430b917999dc72298521812a
    • Instruction Fuzzy Hash: 76314D71A447289FCB21DB65ED44ADAB7F8FB18304F9048ABE586D7240D7B8E980CF54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00402C72
    • _strcat.LIBCMT ref: 00402C97
    • _strcat.LIBCMT ref: 00402CBA
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00402B19: __EH_prolog.LIBCMT ref: 00402B1E
      • Part of subcall function 00402B19: _strcat.LIBCMT ref: 00402C03
      • Part of subcall function 00402B19: _strcat.LIBCMT ref: 00402C32
    • MessageBoxA.USER32(00000000,?,00000000,00000030), ref: 00402D19
      • Part of subcall function 00401F77: InterlockedDecrement.KERNEL32(?), ref: 00401F8B
    Strings
    • 7096E8DFB9895410E31C2B9366BC3029, xrefs: 00402C91
    • 20000921, xrefs: 00402CC2
    • F7046D1D86401363B3A65AD1DF955C613B5580562C80305B0E0429C491B9426B72F255A74DBED86AE98221EB993227B1317D2C85EE62773CE31C2B9366BC3029, xrefs: 00402CB2
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strcat$H_prolog$DecrementInterlockedMessagelstrlen
    • String ID: 20000921$7096E8DFB9895410E31C2B9366BC3029$F7046D1D86401363B3A65AD1DF955C613B5580562C80305B0E0429C491B9426B72F255A74DBED86AE98221EB993227B1317D2C85EE62773CE31C2B9366BC3029
    • API String ID: 1506073452-3646279038
    • Opcode ID: f1907d0cb0e8ebf3db968acc4532da3dd8ba0aae87a28045fc38d5a49be86aa8
    • Instruction ID: be63b5ce1a2537a5fc28513cc38743cb582c7cc1474271a0e0f7679b016a2b72
    • Opcode Fuzzy Hash: f1907d0cb0e8ebf3db968acc4532da3dd8ba0aae87a28045fc38d5a49be86aa8
    • Instruction Fuzzy Hash: 51219231E4022976DB157BE29D47EEF7A3CBF4574CF40012AB110710E2CABD8511C6A9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 004109FD
      • Part of subcall function 0040F320: CoGetClassObject.OLE32(?,?,00000000,0043B5B0,?), ref: 0040F340
      • Part of subcall function 0042909A: __EH_prolog.LIBCMT ref: 0042909F
      • Part of subcall function 0042917F: __EH_prolog.LIBCMT ref: 00429184
    • CreateILockBytesOnHGlobal.OLE32(00000000,00000001,?), ref: 00410B86
    • StgCreateDocfileOnILockBytes.OLE32(?,00001012,00000000,?), ref: 00410BA7
    • GlobalAlloc.KERNEL32(00000000,00000000), ref: 00410BFA
    • GlobalLock.KERNEL32(00000000), ref: 00410C08
    • GlobalUnlock.KERNEL32(?), ref: 00410C20
    • CreateILockBytesOnHGlobal.OLE32(?,00000001,?), ref: 00410C43
    • StgOpenStorageOnILockBytes.OLE32(?,00000000,00000012,00000000,00000000,?), ref: 00410C5F
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: GlobalLock$Bytes$CreateH_prolog$AllocClassDocfileObjectOpenStorageUnlock
    • String ID:
    • API String ID: 645133905-0
    • Opcode ID: b2b2bea8cbad52ffde94552cb1eeef876acfceeb8123a82e964a875202a98a95
    • Instruction ID: afee7d1c3fb3890a556bcd0f298f766d1f0dc21064698dd4bbe6f21a1270b98b
    • Opcode Fuzzy Hash: b2b2bea8cbad52ffde94552cb1eeef876acfceeb8123a82e964a875202a98a95
    • Instruction Fuzzy Hash: 92C11C70A00209EFCB14DF55C988AAFBBB9FF89704B20455AF811DB250D7B5D981CFA5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000), ref: 023F58DF
    • HeapFree.KERNEL32(00000000,?), ref: 023F5969
    • HeapFree.KERNEL32(00000000,?,02470458,024703AC,02470574), ref: 023F60B5
    • HeapFree.KERNEL32(00000000,?,02470458,024703AC,02470574), ref: 023F60D2
    • HeapFree.KERNEL32(00000000,?,02470458,024703AC,02470574), ref: 023F6105
    • CloseHandle.KERNEL32(?), ref: 023F632F
    Strings
    • nullfalsetrue\"\\\b\f\n\r\t0123456789abcdef[],{ ,, xrefs: 023F563C
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID: nullfalsetrue\"\\\b\f\n\r\t0123456789abcdef[],{ ,
    • API String ID: 1910495013-2124985433
    • Opcode ID: 213e072e91dfbc19a7160789e1a5c2c9518edb55bdc86bbf031dea40a92bcd53
    • Instruction ID: 7aad55eeb7b9d74892f852fd875dde128042270181ec50cff2d15b3cf423887e
    • Opcode Fuzzy Hash: 213e072e91dfbc19a7160789e1a5c2c9518edb55bdc86bbf031dea40a92bcd53
    • Instruction Fuzzy Hash: E4819F34608341EFDB69CF20D484BDABBE2BF99304F04496DDA994B3A1C771A895CF42
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCPInfo.KERNEL32(00000000,?,0043B308,00000038,0041B383,?,00000000,00000000,00417F33,00000000,00000000,0043A9D8,0000001C,00417C5C,00000001,00000020), ref: 0041E78F
    • GetCPInfo.KERNEL32(00000000,00000001), ref: 0041E7A2
    • _strlen.LIBCMT ref: 0041E7C6
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00417F33,?,00000000,00000000), ref: 0041E7E7
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Info$ByteCharMultiWide_strlen
    • String ID:
    • API String ID: 1335377746-0
    • Opcode ID: d74cba8254ec2bfd0c144a8bf9bd115fbbb8afc32ca4826cef1f7a671004a385
    • Instruction ID: fc1a395a9e190c6ff5981a5420c4fd796a0b1c48162dbb2f99a844a39120510b
    • Opcode Fuzzy Hash: d74cba8254ec2bfd0c144a8bf9bd115fbbb8afc32ca4826cef1f7a671004a385
    • Instruction Fuzzy Hash: 5D516B75900218EBCF219F56CC449DFBBB8EF89764F24412AF825A6290D7399C81CB68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetEnvironmentStringsW.KERNEL32(75920A60,00000000,?,?,?,?,00415EF3,?,0043A478,00000060), ref: 0041ADC6
    • GetLastError.KERNEL32(?,?,?,?,00415EF3,?,0043A478,00000060), ref: 0041ADDA
    • GetEnvironmentStringsW.KERNEL32(75920A60,00000000,?,?,?,?,00415EF3,?,0043A478,00000060), ref: 0041ADFC
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,75920A60,00000000,?,?,?,?,00415EF3), ref: 0041AE30
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,00415EF3,?,0043A478,00000060), ref: 0041AE52
    • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,00415EF3,?,0043A478,00000060), ref: 0041AE6B
    • GetEnvironmentStrings.KERNEL32(75920A60,00000000,?,?,?,?,00415EF3,?,0043A478,00000060), ref: 0041AE81
    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0041AEBD
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: EnvironmentStrings$ByteCharFreeMultiWide$ErrorLast
    • String ID:
    • API String ID: 883850110-0
    • Opcode ID: 5d9af8b0ec94a11fde1199224c6a39cf95f31cea720f82314cb6ac7f0f98ace0
    • Instruction ID: 7296914fd50a4553077de3f83afbd56d29e7c3b49a51b8de6ea79e60193acd72
    • Opcode Fuzzy Hash: 5d9af8b0ec94a11fde1199224c6a39cf95f31cea720f82314cb6ac7f0f98ace0
    • Instruction Fuzzy Hash: 60315772646318AFDB306F759C848BBB6ACEB55358B55083FF441C3301D7698CE682AB
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00423414
    • GetClassInfoA.USER32(?,?,?), ref: 0042342F
    • RegisterClassA.USER32(00000004), ref: 00423442
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Class$H_prologInfoRegister
    • String ID:
    • API String ID: 3715460918-0
    • Opcode ID: ae984635e655e5db520392ed793df418be20265cf8730173f5c4cd27a1fe2e35
    • Instruction ID: 0db0b4e4c4e337a484aff126d2be670c2f0469505d5c1c4381f3c1d533b8c960
    • Opcode Fuzzy Hash: ae984635e655e5db520392ed793df418be20265cf8730173f5c4cd27a1fe2e35
    • Instruction Fuzzy Hash: 8A21D831600214EFCB11EF61DD44BAE7BF8EF44715F80456AF84692150C738E606DB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GlobalLock.KERNEL32(?), ref: 00421C98
    • lstrcmpA.KERNEL32(?,?), ref: 00421CA4
    • OpenPrinterA.WINSPOOL.DRV(?,?,00000000), ref: 00421CB6
    • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00421CD6
    • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00421CDE
    • GlobalLock.KERNEL32(00000000), ref: 00421CE8
    • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 00421CF5
    • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 00421D0D
      • Part of subcall function 00428D39: GlobalFlags.KERNEL32(?), ref: 00428D43
      • Part of subcall function 00428D39: GlobalUnlock.KERNEL32(?,00000000,?,00421D07,?,00000000,?,?,00000000,00000000,00000002), ref: 00428D54
      • Part of subcall function 00428D39: GlobalFree.KERNEL32(?), ref: 00428D5F
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
    • String ID:
    • API String ID: 168474834-0
    • Opcode ID: 7520906973776876a09beb12d5341ab987b3d81d92ef3fb3478fec3813e9e38f
    • Instruction ID: ec8fd795588025b9ef10f7e2b5649213c33d9538cf3f0e4b05607c2785a29bd5
    • Opcode Fuzzy Hash: 7520906973776876a09beb12d5341ab987b3d81d92ef3fb3478fec3813e9e38f
    • Instruction Fuzzy Hash: F3119176300114FEDB216F66EC45D6FBABCEB95744B90442EBA01D2221D639DD41EB38
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    • a Display implementation returned an error unexpectedly, xrefs: 023EC303
    • path*fatal runtime error: I/O error: operation failed to complete synchronously, xrefs: 023EC3CD
    • nametitlebodystruct RecvSfilemaster_keyprofileslocal_statelogin_datacookieshistorycreditcardslocalstate_cachelogins_master_keyextensionsFailed building the Runtime, xrefs: 023EC3A0
    • APPDATA, xrefs: 023EC521
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: APPDATA$a Display implementation returned an error unexpectedly$nametitlebodystruct RecvSfilemaster_keyprofileslocal_statelogin_datacookieshistorycreditcardslocalstate_cachelogins_master_keyextensionsFailed building the Runtime$path*fatal runtime error: I/O error: operation failed to complete synchronously
    • API String ID: 0-422089487
    • Opcode ID: a2a214908cc5acbe45a39a0f7ebe55ba1d50722805ec73687bf0249711f25dfd
    • Instruction ID: ba9bfeeaf3e4ef2416528a9b8e12dae614cc88b378d20b19b8b4643a325354f6
    • Opcode Fuzzy Hash: a2a214908cc5acbe45a39a0f7ebe55ba1d50722805ec73687bf0249711f25dfd
    • Instruction Fuzzy Hash: 09C15BB1A083519FD714DF19C480A5AF7E2BFC8314F04892EE99997391EB70D949CF82
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 0042CFDF
    • lstrlenA.KERNEL32(?,?,00000000), ref: 0042D00A
    • VariantClear.OLEAUT32(0000000C), ref: 0042D122
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ClearH_prologVariantlstrlen
    • String ID: `)u
    • API String ID: 2416264355-4279031584
    • Opcode ID: efe1f8e2d027bb539b6952ef50c248406a08c1723eab44b7f766eecb89339f4a
    • Instruction ID: f3a95c8978b032038e64618ba00bdc82d4aaf35a1c96e633dbad15f413149c7c
    • Opcode Fuzzy Hash: efe1f8e2d027bb539b6952ef50c248406a08c1723eab44b7f766eecb89339f4a
    • Instruction Fuzzy Hash: D6711531E0062AEBCB10DFA5F8856AEBBB0FF04310F90855BF81597240D738D951DBA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreateFileW.KERNEL32(?,00120114,000000EF,E8F289D9,?,00000000,00000000), ref: 0243747B
    • GetLastError.KERNEL32 ref: 02437498
    • SetFileInformationByHandle.KERNEL32(00000000,00000006,00000000,00000008), ref: 024374C3
    • GetLastError.KERNEL32 ref: 024374E1
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0243A785,?), ref: 02437501
    • GetLastError.KERNEL32 ref: 0243750C
    • CloseHandle.KERNEL32(00000000), ref: 02437519
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: ErrorLast$FileHandle$CloseCreateFreeHeapInformation
    • String ID:
    • API String ID: 4103088332-0
    • Opcode ID: 8bbdf7f1ffe66e20568519836f744a1aace010d2cc9e0da640b9fad22ebf7b86
    • Instruction ID: 65b9b44db5af6d8ed83bd6ff14bf5e946a998d082677f809394db6bb9f309cf0
    • Opcode Fuzzy Hash: 8bbdf7f1ffe66e20568519836f744a1aace010d2cc9e0da640b9fad22ebf7b86
    • Instruction Fuzzy Hash: 815192B0948340AFEB26CF24C48476BBBE1AF89314F14895EEDD94B386D3B4D455CB52
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _ValidateLocalCookies.LIBCMT ref: 02450377
    • ___except_validate_context_record.LIBVCRUNTIME ref: 0245037F
    • _ValidateLocalCookies.LIBCMT ref: 02450408
    • __IsNonwritableInCurrentImage.LIBCMT ref: 02450433
    • _ValidateLocalCookies.LIBCMT ref: 02450488
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
    • String ID: csm
    • API String ID: 1170836740-1018135373
    • Opcode ID: 0c56793029708be8824af12130febfc077099aaa37c45b8c95daaa3983a67d38
    • Instruction ID: e336628c473c398a678b9a76be0190dac008de3a45946b7a388a6e534f821772
    • Opcode Fuzzy Hash: 0c56793029708be8824af12130febfc077099aaa37c45b8c95daaa3983a67d38
    • Instruction Fuzzy Hash: 1841A538A00228ABCF10DF69C884A9EBFB5AF49318F14819BEC599B353D771D915CF91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 0040E502
    • GetObjectA.GDI32(0040D840,0000003C,?), ref: 0040E574
    • lstrlenA.KERNEL32(?), ref: 0040E585
    • GetDeviceCaps.GDI32(?,0000005A), ref: 0040E5F9
    • OleCreateFontIndirect.OLEAUT32(00000020,0043B660,?), ref: 0040E625
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CapsCreateDeviceFontH_prologIndirectObjectlstrlen
    • String ID:
    • API String ID: 4082312370-3916222277
    • Opcode ID: 9d852aacc324d793c307b9bc4f5cb1ae80cc7621a4b1ed0e7d4aaa0040eccceb
    • Instruction ID: 28e09a9122b547e86938a5d239e18cad7ca67ec09992f0ac5eed7e9960d5d504
    • Opcode Fuzzy Hash: 9d852aacc324d793c307b9bc4f5cb1ae80cc7621a4b1ed0e7d4aaa0040eccceb
    • Instruction Fuzzy Hash: 32417A71E00219EFCB20DFA6D885AEEBBB4BF18308F50452EE415E3291E7789A45CF54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetParent.USER32(?), ref: 00424214
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0042423B
    • UpdateWindow.USER32(?), ref: 00424255
    • SendMessageA.USER32(?,00000121,00000000,?), ref: 00424279
    • SendMessageA.USER32(?,0000036A,00000000,00000004), ref: 00424293
    • UpdateWindow.USER32(?), ref: 004242D9
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0042430D
      • Part of subcall function 0042663C: GetWindowLongA.USER32(?,000000F0), ref: 00426648
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Message$Window$PeekSendUpdate$LongParent
    • String ID:
    • API String ID: 2853195852-0
    • Opcode ID: 443e82fd054304042dfa914eb5858c3173381fb830609d78dbd8dc54ea1c93a7
    • Instruction ID: 89365fabb3662f47a8456e8abc8f74eacdd1bee40569780c245ffab03503297d
    • Opcode Fuzzy Hash: 443e82fd054304042dfa914eb5858c3173381fb830609d78dbd8dc54ea1c93a7
    • Instruction Fuzzy Hash: 5941E430304360DFD721DF22EC44A2BBAF4FFD1B98F90097EF481921A1C7699849C62A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 0042A65F
    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 0042A71B
    • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 0042A735
    • RegCloseKey.ADVAPI32(?,?,?,?,Software\), ref: 0042A74F
    • RegQueryValueA.ADVAPI32(80000001,?,?,?), ref: 0042A765
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CloseEnumH_prologOpenQueryValue
    • String ID: Software\
    • API String ID: 2161548231-964853688
    • Opcode ID: 9845bd2fcb0797600897e3fcf3e96c38015a830924c55a3160526b0b273f9273
    • Instruction ID: 60a233a4efbdb4d877ad5cbd16216c248d17419bcb0c5f4008330a88f52c4ae4
    • Opcode Fuzzy Hash: 9845bd2fcb0797600897e3fcf3e96c38015a830924c55a3160526b0b273f9273
    • Instruction Fuzzy Hash: 3341A031A00119ABCF11DBA0DC85EEFB7B9FF88304F50012AF511B3291DB389A15CB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 004040E8
    • GetModuleFileNameA.KERNEL32(00400000,?,00000104,?), ref: 0040410A
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00402FCE: __EH_prolog.LIBCMT ref: 00402FD3
    • CharLowerA.USER32(?,?,00000004,?), ref: 00404141
      • Part of subcall function 004033FA: __EH_prolog.LIBCMT ref: 004033FF
    • _strcat.LIBCMT ref: 004041D4
      • Part of subcall function 00402C6D: __EH_prolog.LIBCMT ref: 00402C72
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402C97
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402CBA
      • Part of subcall function 00402C6D: MessageBoxA.USER32(00000000,?,00000000,00000030), ref: 00402D19
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog$_strcat$CharFileLowerMessageModuleNamelstrlen
    • String ID: (1D$.dll
    • API String ID: 1009733722-1666350075
    • Opcode ID: 5e346a47d57f0f3e063833318336f299f633875872b39283794376379ce5ba2e
    • Instruction ID: 03a9ba815adcd8ec93f3d37bde2f3f8c5eec0943ace6b228f8ee0bf5dcf52d0d
    • Opcode Fuzzy Hash: 5e346a47d57f0f3e063833318336f299f633875872b39283794376379ce5ba2e
    • Instruction Fuzzy Hash: EB31A171904249AEDB01EFA1CD46EEEBB78AF24308F10007EF155B21D2DB785B48CB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemMenu.USER32(?,00000000,?,?,?,?,?,0042DD38,000000FF), ref: 00401A16
    • AppendMenuA.USER32(?,00000800,00000000,00000000), ref: 00401A7D
    • AppendMenuA.USER32(?,00000000,00000010,00000010), ref: 00401A88
      • Part of subcall function 00401820: FindResourceA.KERNEL32(?,?,00000006), ref: 0040183A
    • SendMessageA.USER32(?,00000080,00000001,?), ref: 00401AC5
    • SendMessageA.USER32(?,00000080,00000000,?), ref: 00401AD9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Menu$AppendMessageSend$FindResourceSystem
    • String ID: user-12345678
    • API String ID: 858472958-2755188220
    • Opcode ID: c756d84365dae25f8462fd63b73cac35b8282b64e018d40d228abaed280fe13c
    • Instruction ID: 3b30e15d64c7f474da2be64c65720a04101d9d6b3a2cd516c52670f7795c8fad
    • Opcode Fuzzy Hash: c756d84365dae25f8462fd63b73cac35b8282b64e018d40d228abaed280fe13c
    • Instruction Fuzzy Hash: 84317E71340701AFD320EF65CC45F17B3A8EF88710F508A2AF5519B2D1CBB8E8058B68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindow.USER32(?,00000002), ref: 004145E0
    • GetParent.USER32(?), ref: 004145F1
    • GetWindow.USER32(?,00000002), ref: 00414614
    • GetWindow.USER32(?,00000002), ref: 00414626
    • GetWindowLongA.USER32(?,000000EC), ref: 00414635
    • IsWindowVisible.USER32(?), ref: 0041464F
    • GetTopWindow.USER32(?), ref: 00414675
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$LongParentVisible
    • String ID:
    • API String ID: 506644340-0
    • Opcode ID: 45eadc8b458de43bde7c9e092fd1932caba4420e0a9f48f5c06109cc70392342
    • Instruction ID: ebd6f0984fa48f2bf8ba37bc0dad7d39dec8952187d8cbd4be4ea4dd5bc4bcd7
    • Opcode Fuzzy Hash: 45eadc8b458de43bde7c9e092fd1932caba4420e0a9f48f5c06109cc70392342
    • Instruction Fuzzy Hash: 6121F5317007216BC7306B659C09FAB77ACEFC2798F45053ABA41DB251C72CDC4686AC
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RegOpenKeyExA.ADVAPI32(80000001,software,00000000,0002001F,?,?,00000000), ref: 0042BC36
    • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 0042BC59
    • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 0042BC75
    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0042BC85
    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0042BC8F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CloseCreate$Open
    • String ID: software
    • API String ID: 1740278721-2010147023
    • Opcode ID: a07ef03d32e418125c98845893222a59e1d7b78c696368899b11d02bf983a4c5
    • Instruction ID: 64b97b5fe25ac38e929414c9c763e2fcce4b8d3dd38ef5aad07515420139dc36
    • Opcode Fuzzy Hash: a07ef03d32e418125c98845893222a59e1d7b78c696368899b11d02bf983a4c5
    • Instruction Fuzzy Hash: 0411CB76A00258FB9B21DF9ADD84CDFBFBCEF85700B5000BAA504A2111D7719A45DBA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040D09A
    • GetSystemMetrics.USER32(00000000), ref: 0040D0B2
    • GetSystemMetrics.USER32(00000001), ref: 0040D0B9
    • lstrcpyA.KERNEL32(?,DISPLAY), ref: 0040D0DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: System$Metrics$InfoParameterslstrcpy
    • String ID: B$DISPLAY
    • API String ID: 1409579217-3316187204
    • Opcode ID: aa875fb899d8b8cdc6035337f91c3cfdfa7e814ee4d75c511dac12003764187e
    • Instruction ID: 7d79b360eed3925eabdee55bcf9e6e46b2a378b8c0ece8e258d689888b9aa654
    • Opcode Fuzzy Hash: aa875fb899d8b8cdc6035337f91c3cfdfa7e814ee4d75c511dac12003764187e
    • Instruction Fuzzy Hash: 3211C671A00224DBCF219FA4DC8095BBBB8EF05744F408077FD09BA141C274D916CBE9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetErrorMode.KERNEL32(00000000,00000000,004282FD,?,?,?,?), ref: 0042BF99
    • SetErrorMode.KERNEL32(00000000), ref: 0042BFA1
    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042BFEC
    • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 0042BFFC
      • Part of subcall function 0042BE69: GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 0042BEA5
      • Part of subcall function 0042BE69: PathFindExtensionA.SHLWAPI(?), ref: 0042BEB2
      • Part of subcall function 0042BE69: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 0042BF3D
      • Part of subcall function 0042BE69: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 0042BF6A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ErrorModeModule$AddressExtensionFileFindHandleNamePathProclstrcatlstrcpy
    • String ID: NotifyWinEvent$user32.dll
    • API String ID: 4004864024-597752486
    • Opcode ID: c693ce6a2e765cc9099c900ab09abb04ea83f55a69a3113b2ed044f042921076
    • Instruction ID: 8050f7acd3555061b9cb0811210370212b3dde1f57db23d13128c8b76d78117c
    • Opcode Fuzzy Hash: c693ce6a2e765cc9099c900ab09abb04ea83f55a69a3113b2ed044f042921076
    • Instruction Fuzzy Hash: 89016D75B40260DFC720EF65E904A5A3BA4EF04700F8684AFF944D7362DB78D840CBAA
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSysColor.USER32(0000000F), ref: 00426E80
    • GetSysColor.USER32(00000010), ref: 00426E87
    • GetSysColor.USER32(00000014), ref: 00426E8E
    • GetSysColor.USER32(00000012), ref: 00426E95
    • GetSysColor.USER32(00000006), ref: 00426E9C
    • GetSysColorBrush.USER32(0000000F), ref: 00426EA9
    • GetSysColorBrush.USER32(00000006), ref: 00426EB0
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Color$Brush
    • String ID:
    • API String ID: 2798902688-0
    • Opcode ID: 217f39869b888a1c3749961ae9e7e8c44d1ab5d44a913a51842b180abdde359a
    • Instruction ID: 849f2a7d79a27e67f6fb90856910374a9d4c7919ec4fb8f2b3bca5a51304e481
    • Opcode Fuzzy Hash: 217f39869b888a1c3749961ae9e7e8c44d1ab5d44a913a51842b180abdde359a
    • Instruction Fuzzy Hash: D6F0F871A407489BD730BB729D09B47BAE1FFC4B10F42093EE2818BA90E6B6E0419F44
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00413BE8
    • VariantClear.OLEAUT32(?), ref: 00413C4D
    • VariantClear.OLEAUT32(00000007), ref: 00413F7B
    • VariantClear.OLEAUT32(?), ref: 004140F0
      • Part of subcall function 004150C1: VariantCopy.OLEAUT32(?,?), ref: 004150C9
      • Part of subcall function 0041068B: SystemTimeToVariantTime.OLEAUT32(?), ref: 004106D9
    • VariantClear.OLEAUT32(?), ref: 004140D0
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Variant$Clear$Time$CopyH_prologSystem
    • String ID:
    • API String ID: 2075586698-0
    • Opcode ID: 5fca67dab6d645ae0528530928cc235c45b69b13cbb83de34b48013661cf2efe
    • Instruction ID: e55dc214bb347d680c00c7b0307744ac7d9360fc785a26e3059a799186a01771
    • Opcode Fuzzy Hash: 5fca67dab6d645ae0528530928cc235c45b69b13cbb83de34b48013661cf2efe
    • Instruction Fuzzy Hash: 94E16F7090011CEACF15DBA5C890AFEBBB9FF48304F14809BE855A7291DB385A89DB65
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 02437530: GetFileInformationByHandle.KERNEL32(?,?), ref: 02437559
      • Part of subcall function 02437530: GetFileInformationByHandleEx.KERNEL32(?,00000009,?,00000008), ref: 0243758C
    • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001), ref: 0243825E
    • HeapFree.KERNEL32(00000000,00000000), ref: 024382DF
    • HeapFree.KERNEL32(00000000,?), ref: 024382F0
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: File$FreeHandleHeapInformation$Pointer
    • String ID:
    • API String ID: 1293978381-0
    • Opcode ID: 57a04430a03d45499c31ec2d176c1c24efa1bab72bef6d5882bf7c2dfaf04d01
    • Instruction ID: 176b6d1b2aa94fc6fa432c7dd8508b7628c94099bc27611184ad89b00467bc9b
    • Opcode Fuzzy Hash: 57a04430a03d45499c31ec2d176c1c24efa1bab72bef6d5882bf7c2dfaf04d01
    • Instruction Fuzzy Hash: 06F1E175600B008FD725CF29C584B66FBF2BB48314F148A2EE99A8BBA1D771F845CB40
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0041DAF6: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041DB68
      • Part of subcall function 0041E2FD: __lock.LIBCMT ref: 0041E300
    • __allrem.LIBCMT ref: 004185FC
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041861C
    • __allrem.LIBCMT ref: 00418638
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041865B
    • __allrem.LIBCMT ref: 00418678
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041869D
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$__allrem$__lock
    • String ID:
    • API String ID: 1282128132-0
    • Opcode ID: 0fb219234647b93d8b01825728a114d084ae9b401ab119cd8ae1faaea6db2d43
    • Instruction ID: f419132dcab6dfd70cd12f22c7f43fc679e4fc93515c74a5e268615851bf5e5b
    • Opcode Fuzzy Hash: 0fb219234647b93d8b01825728a114d084ae9b401ab119cd8ae1faaea6db2d43
    • Instruction Fuzzy Hash: A16190B1A01605AFDB24CF6ACD81BAEB7F5EF44324F14812EE555D3291EB389D818B48
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetStringTypeW.KERNEL32(00000001,0043A9D4,00000001,?,0043B460,00000024,0041C7B7,00000001,00000100,00000001,00000000,00000000,?,?,?,004175A9), ref: 0041F7B1
    • GetLastError.KERNEL32(?,?,004175A9,?,00000000,00000008), ref: 0041F7C3
    • GetStringTypeW.KERNEL32(?,00000100,?,?,0043B460,00000024,0041C7B7,00000001,00000100,00000001,00000000,00000000,?,?,?,004175A9), ref: 0041F7ED
    • WideCharToMultiByte.KERNEL32(?,00000000,00000100,?,00000000,00000000,00000000,00000000,0043B460,00000024,0041C7B7,00000001,00000100,00000001,00000000,00000000), ref: 0041F845
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000100,00000000,?,00000000,00000000,00000000), ref: 0041F8C8
    • GetStringTypeA.KERNEL32(?,?,?,00000000,?), ref: 0041F95A
      • Part of subcall function 0041D4E0: __lock.LIBCMT ref: 0041D524
      • Part of subcall function 0041D4E0: HeapAlloc.KERNEL32(00000008,?,0043B1F8,00000010,00419D17,00000001,00000088,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C), ref: 0041D562
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast__lock
    • String ID:
    • API String ID: 892864237-0
    • Opcode ID: b1f97acda3f09c8697856c99fe5127e31a16a89ed682065aa7c50ce2c0f9515f
    • Instruction ID: a57df6695b7da8b7aa1c592e969f3bb102772f76e478128afaf792e3acbf193c
    • Opcode Fuzzy Hash: b1f97acda3f09c8697856c99fe5127e31a16a89ed682065aa7c50ce2c0f9515f
    • Instruction Fuzzy Hash: 40517F71910219EBCF21AFA5DC45AEE7BB4FF05764B60413BF814A2260C3388996DB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetStringTypeW.KERNEL32(00000001,0043A9D4,00000001,?,0043A9D8,0000001C,00417C5C,00000001,00000020,00000100,?,00000000), ref: 0041B224
    • GetLastError.KERNEL32 ref: 0041B236
    • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00417F33,00000000,00000000,0043A9D8,0000001C,00417C5C,00000001,00000020,00000100,?,00000000), ref: 0041B298
    • MultiByteToWideChar.KERNEL32(?,00000001,00000000,00417F33,?,00000000), ref: 0041B316
    • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,00000000), ref: 0041B328
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ByteCharMultiStringTypeWide$ErrorLast
    • String ID:
    • API String ID: 3581945363-0
    • Opcode ID: 9575601df985ec698041be843986eb33e77f2bc8172fa7f9b26e48780cd960a8
    • Instruction ID: 9f9fa65cc8421391b8d21a05cfa14ba1f88a212ef66fffe92425adc452bd7f2d
    • Opcode Fuzzy Hash: 9575601df985ec698041be843986eb33e77f2bc8172fa7f9b26e48780cd960a8
    • Instruction Fuzzy Hash: 7C419271900618EBCB218F55DC45AEF3B75FF49760F15012AFC20A62A0C739C9A1CBE9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • TlsGetValue.KERNEL32(0044AED8,00000000,?,00000000,0042BB47,?,00000000,?,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B8FF
    • EnterCriticalSection.KERNEL32(0044AEF4,00000010,?,00000000,0042BB47,?,00000000,?,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B948
    • LeaveCriticalSection.KERNEL32(0044AEF4,?,00000000,0042BB47,?,00000000,?,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B95B
    • LocalAlloc.KERNEL32(00000000,00000003,?,00000000,0042BB47,?,00000000,?,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B972
    • LocalReAlloc.KERNEL32(?,00000003,00000002,?,00000000,0042BB47,?,00000000,?,?,?,?,0042B380,00429E06,0040C70D), ref: 0042B984
    • TlsSetValue.KERNEL32(0044AED8,00000000), ref: 0042B9BB
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AllocCriticalLocalSectionValue$EnterLeave
    • String ID:
    • API String ID: 4117633390-0
    • Opcode ID: 425f8b4d3ef0bcdaa6e9ca825a8bff2006c201a408e1851a73cd36e6840e37b7
    • Instruction ID: a6b77f6463ff9e4dcbf2f81cc0fabf44c3931403c77961276365c9ec7d0f809c
    • Opcode Fuzzy Hash: 425f8b4d3ef0bcdaa6e9ca825a8bff2006c201a408e1851a73cd36e6840e37b7
    • Instruction Fuzzy Hash: E2215CB1600622EFC324DF65E884C26B7E8FF48310790893EE55AC3610D734EC95CBA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowLongA.USER32(?,000000F0), ref: 0042930D
    • GetParent.USER32(?), ref: 0042931B
    • GetParent.USER32(?), ref: 0042932E
    • GetLastActivePopup.USER32(?), ref: 0042933D
    • IsWindowEnabled.USER32(?), ref: 00429352
    • EnableWindow.USER32(?,00000000), ref: 00429365
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
    • String ID:
    • API String ID: 670545878-0
    • Opcode ID: 1a1af78537e06c800fa254dbed7e3f0734006fd546e1ad9da5c44e88e9679358
    • Instruction ID: 80255c199b8a0bdecbbc8602bee05c6d705c4b7d3c7af4284fa55a0f5ebffd36
    • Opcode Fuzzy Hash: 1a1af78537e06c800fa254dbed7e3f0734006fd546e1ad9da5c44e88e9679358
    • Instruction Fuzzy Hash: B011A332B0123157C631AA6A7C44B6BB2AC9F6DB60FD50177ED04D3391DB68CC02469D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ClientToScreen.USER32(?,?), ref: 00428DC9
    • GetDlgCtrlID.USER32(00000000), ref: 00428DDD
    • GetWindowLongA.USER32(00000000,000000F0), ref: 00428DEB
    • GetWindowRect.USER32(00000000,?), ref: 00428DFD
    • PtInRect.USER32(?,?,?), ref: 00428E0D
    • GetWindow.USER32(?,00000005), ref: 00428E1A
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$Rect$ClientCtrlLongScreen
    • String ID:
    • API String ID: 1315500227-0
    • Opcode ID: bddc417178efcb5005f3e382842a7ec5c5d359559d9cbc29fe9ccca2d6545a96
    • Instruction ID: 86bcff5dc365ccf3970e8e5ad6cd2e1a487aebd333d05296c5cf9a855bdfcbb6
    • Opcode Fuzzy Hash: bddc417178efcb5005f3e382842a7ec5c5d359559d9cbc29fe9ccca2d6545a96
    • Instruction Fuzzy Hash: 46014F36301229ABDB21AF54AC08EAF3B78AF55B51FC14039FD11D6164DB3499168A98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 004130C6
    • CoTaskMemAlloc.OLE32(?,?,?,00000000), ref: 004131DF
    • CoTaskMemFree.OLE32(?,?,00000000), ref: 004133C4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Task$AllocFreeH_prolog
    • String ID: $(
    • API String ID: 1522537378-55695022
    • Opcode ID: a16237aa7a8ee13bba94a7bacb18d3f117483b94c8521d500b5fd6c296647487
    • Instruction ID: 7e24ac4c9d61eba3cdab13b1e29302fb200f62294913ba54403eba2bb913f085
    • Opcode Fuzzy Hash: a16237aa7a8ee13bba94a7bacb18d3f117483b94c8521d500b5fd6c296647487
    • Instruction Fuzzy Hash: 7BB14D70A003099FCB14DFA9C884AAEB7F5FF88704F24495EE416EB351DB74A985CB64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SendMessageA.USER32(00000000,00000405,00000000,?), ref: 0042493D
    • GetWindowLongA.USER32(?,000000FC), ref: 0042494F
    • GetWindowLongA.USER32(?,000000FC), ref: 00424960
    • SetWindowLongA.USER32(?,000000FC,?), ref: 0042497C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: LongWindow$MessageSend
    • String ID: (
    • API String ID: 2178440468-3887548279
    • Opcode ID: e0b753035cb70a9a5eef04e921d7a8f31782a4019434a00ab1b1827a1127cb12
    • Instruction ID: 3707caef856736254b48c76daa378133d04f0dbce0ae591b3731a783b4f3e6c9
    • Opcode Fuzzy Hash: e0b753035cb70a9a5eef04e921d7a8f31782a4019434a00ab1b1827a1127cb12
    • Instruction Fuzzy Hash: A531D2747006209FCB20BF79E884A6BB7B4FF84314F94062EE54197791DB78E845CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: `)u
    • API String ID: 3349467263-4279031584
    • Opcode ID: d9906cbb21440189adeb46f65e4d7491ee8ad9fd862cf020c2635eacfbbe87dd
    • Instruction ID: 33bf42000e96db952560971249c255832eb346404390c0d155027bceb8e5320a
    • Opcode Fuzzy Hash: d9906cbb21440189adeb46f65e4d7491ee8ad9fd862cf020c2635eacfbbe87dd
    • Instruction Fuzzy Hash: FB313C71A11219FFDB10DFA5C884ADEBBB8FF08714F10812BFA15A6250D774A984CBA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00403FD4
    • GetModuleFileNameA.KERNEL32(00400000,?,00000104,?), ref: 00403FF6
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00402FCE: __EH_prolog.LIBCMT ref: 00402FD3
    • CharLowerA.USER32(?,?,00000004,?), ref: 0040402F
      • Part of subcall function 004033FA: __EH_prolog.LIBCMT ref: 004033FF
    • _strcat.LIBCMT ref: 00404096
      • Part of subcall function 00402C6D: __EH_prolog.LIBCMT ref: 00402C72
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402C97
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402CBA
      • Part of subcall function 00402C6D: MessageBoxA.USER32(00000000,?,00000000,00000030), ref: 00402D19
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog$_strcat$CharFileLowerMessageModuleNamelstrlen
    • String ID: .dll
    • API String ID: 1009733722-2738580789
    • Opcode ID: 7ee78063d823e0c6d8b8f1480ed479fa6a1540bc085ae308c9012322817352e7
    • Instruction ID: e6b5aef0d27c6589e7d05cc20d88ea959a984bc3c2dd37e4e74a46bfd1a24eba
    • Opcode Fuzzy Hash: 7ee78063d823e0c6d8b8f1480ed479fa6a1540bc085ae308c9012322817352e7
    • Instruction Fuzzy Hash: DC31A2B1900109ABDB11EBE1D942AEEB778EF15319F10403FF215F21D1EB784A08CB69
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    • C:\Users\user\Desktop\app.exe, xrefs: 02455135
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID:
    • String ID: C:\Users\user\Desktop\app.exe
    • API String ID: 0-886552919
    • Opcode ID: 7c01ad36a9aa9e960dfb344aad36173a23e37e2c4c4eb63aa145beb64ed7efdf
    • Instruction ID: 7765748ef32f953cd3ba879f85d68af2871f773c670c70959fc3ae041dd2bc2d
    • Opcode Fuzzy Hash: 7c01ad36a9aa9e960dfb344aad36173a23e37e2c4c4eb63aa145beb64ed7efdf
    • Instruction Fuzzy Hash: 3B219271A00225BF9B22AF62CC40A7B7BAAAF41364750451BEDA5DB642E730E851CF90
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00403A0F
    • GetModuleFileNameA.KERNEL32(00400000,?,00000104,?), ref: 00403A31
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00402FCE: __EH_prolog.LIBCMT ref: 00402FD3
    • CharLowerA.USER32(?,?,00000004,?), ref: 00403A67
      • Part of subcall function 004033FA: __EH_prolog.LIBCMT ref: 004033FF
    • _strcat.LIBCMT ref: 00403AE9
      • Part of subcall function 00402C6D: __EH_prolog.LIBCMT ref: 00402C72
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402C97
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402CBA
      • Part of subcall function 00402C6D: MessageBoxA.USER32(00000000,?,00000000,00000030), ref: 00402D19
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog$_strcat$CharFileLowerMessageModuleNamelstrlen
    • String ID: .dll
    • API String ID: 1009733722-2738580789
    • Opcode ID: bb160a83ece6b52ad72d685bd7d2f3ba3769fc739be267bbfaec33bc36789f92
    • Instruction ID: 1cad220353df42b9fe3cb840776f885c9a0654f48a55dcbb27447a2c56b74ffd
    • Opcode Fuzzy Hash: bb160a83ece6b52ad72d685bd7d2f3ba3769fc739be267bbfaec33bc36789f92
    • Instruction Fuzzy Hash: 7A219231A00119AADB15FBA1DD47BEEBB68AF11709F10013BF501B10E2DBB95B058AA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(kernel32), ref: 0243D3E5
    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0243D3F5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: GetSystemTimePreciseAsFileTime$Invalid$kernel32
    • API String ID: 1646373207-2690871627
    • Opcode ID: 26d222e3857e9fcc337dd8c9e94f4dad00813671a282671d421dbddebe2e1eda
    • Instruction ID: e2192c2e89da6f8e0b8e0a8812839b865c0c12e2fb4663098920789b974f310c
    • Opcode Fuzzy Hash: 26d222e3857e9fcc337dd8c9e94f4dad00813671a282671d421dbddebe2e1eda
    • Instruction Fuzzy Hash: C011C4B1F443009BD30D9E19DD4831A77E6AB88394F4AD92EE84EDB344D3759C44CB92
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ArrayDestroyFreeSafeTask
    • String ID: `)u
    • API String ID: 3253174383-4279031584
    • Opcode ID: 5c80eacd3d21a3520f2eedc2b141da2997b8ba1f6184b55e1f1dc4efe2ab2cb9
    • Instruction ID: 92880c54d83cef890ef01a83bb49db2f2e97ba72a390528555b3e8eed935738a
    • Opcode Fuzzy Hash: 5c80eacd3d21a3520f2eedc2b141da2997b8ba1f6184b55e1f1dc4efe2ab2cb9
    • Instruction Fuzzy Hash: 9E118130300206BBCB24DF24DE88BE677A4BF01350F54442BFE85D6260D7B9D9A1CA18
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowLongA.USER32(?,000000F0), ref: 00422A4C
    • GetDlgItem.USER32(?,00000002), ref: 00422A6B
    • IsWindowEnabled.USER32(00000000), ref: 00422A76
    • SendMessageA.USER32(?,00000111,00000002,00000000), ref: 00422A8C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$EnabledItemLongMessageSend
    • String ID: Edit
    • API String ID: 3499652902-554135844
    • Opcode ID: 66f3ca61536d6a4b5c74c82b61e0e054e33ba564fb4b2e00f887f035e959c592
    • Instruction ID: 6ee10451ae2c8e78b307aaf30a1710947c025f2baedac84a9ff3f14969e02c54
    • Opcode Fuzzy Hash: 66f3ca61536d6a4b5c74c82b61e0e054e33ba564fb4b2e00f887f035e959c592
    • Instruction Fuzzy Hash: 18018E303003327AEA306A66AE05F6BAAA49B54714FD4493BA441D2AA0DFE8DC42C56C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,71AAEBF7,?,?,00000000,0246197B,000000FF,?,024525E4,024526C8,?,024525B8,00000000), ref: 0245263D
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0245264F
    • FreeLibrary.KERNEL32(00000000,?,?,00000000,0246197B,000000FF,?,024525E4,024526C8,?,024525B8,00000000), ref: 02452671
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: df5a577e1ff92f6254b382a7e70710acb5764547e1ecd3c9e352576966873383
    • Instruction ID: dd54422631482a06da65a0d756644d6e34bc06bd3224b4aa3de2bc208069d730
    • Opcode Fuzzy Hash: df5a577e1ff92f6254b382a7e70710acb5764547e1ecd3c9e352576966873383
    • Instruction Fuzzy Hash: 14016731954665BBDB16DB50DC09FAE77F8FB04B15F004526FC12A2290DBB59904CA51
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 0042A21C
    • PathFindExtensionA.SHLWAPI(?), ref: 0042A229
    • lstrcpyA.KERNEL32(?,00000000), ref: 0042A23F
    • lstrcpyA.KERNEL32(00000000,%s.dll), ref: 0042A247
      • Part of subcall function 00429F0B: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00429F31
      • Part of subcall function 00429F0B: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 00429F3C
      • Part of subcall function 00429F0B: ConvertDefaultLocale.KERNEL32(?), ref: 00429F6D
      • Part of subcall function 00429F0B: ConvertDefaultLocale.KERNEL32(?), ref: 00429F75
      • Part of subcall function 00429F0B: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 00429F82
      • Part of subcall function 00429F0B: ConvertDefaultLocale.KERNEL32(?), ref: 00429F9C
      • Part of subcall function 00429F0B: ConvertDefaultLocale.KERNEL32(000003FF), ref: 00429FA2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ConvertDefaultLocale$AddressModuleProclstrcpy$ExtensionFileFindHandleNamePath
    • String ID: %s.dll
    • API String ID: 2054749690-3668843792
    • Opcode ID: 82a8751b84f09603ba11f481d45c7ea045fa609579e678804dedf504626bede6
    • Instruction ID: 7c4c11a2dddb72ba6e02242f47b30f39fdadc108ab8537c06b584eb29b98c2af
    • Opcode Fuzzy Hash: 82a8751b84f09603ba11f481d45c7ea045fa609579e678804dedf504626bede6
    • Instruction Fuzzy Hash: E4F04FB9900218EBCB10EBA0ED49DDE7BBCEB48744F5000B6F945D7150DA74AE46CF54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0042BD48: EnterCriticalSection.KERNEL32(0044AF54,?,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BD76
      • Part of subcall function 0042BD48: InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BD88
      • Part of subcall function 0042BD48: LeaveCriticalSection.KERNEL32(0044AF54,?,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BD91
      • Part of subcall function 0042BD48: EnterCriticalSection.KERNEL32(00000000,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BDA3
      • Part of subcall function 0042B794: __EH_prolog.LIBCMT ref: 0042B799
    • LoadLibraryA.KERNEL32(hhctrl.ocx,0042AFC8,0000000C), ref: 00425209
    • GetProcAddress.KERNEL32(00000000,HtmlHelpA), ref: 0042521C
    • FreeLibrary.KERNEL32(?), ref: 0042522C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CriticalSection$EnterLibrary$AddressFreeH_prologInitializeLeaveLoadProc
    • String ID: HtmlHelpA$hhctrl.ocx
    • API String ID: 813623328-63838506
    • Opcode ID: 3235c455f9abb7d201993a8a1dfe31dcfc0dd767c571edfdb62f33c42e434520
    • Instruction ID: 01c63ba424afe4957a6b3b467abc3637d649f32ce2fea976250ac632f5fbc3be
    • Opcode Fuzzy Hash: 3235c455f9abb7d201993a8a1dfe31dcfc0dd767c571edfdb62f33c42e434520
    • Instruction Fuzzy Hash: 90F08130744721EBD7209F61E90AB07B7E1AF54B06F80883EF046A20A0C73998148B2A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(mscoree.dll,004173A1,?,?,004173C2,?,00000001,00000000,0041CA21,00000003), ref: 0041722F
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0041723F
    • ExitProcess.KERNEL32 ref: 00417253
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AddressExitHandleModuleProcProcess
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 75539706-1276376045
    • Opcode ID: 646f169376bb85f1c7a0c0c6dfab7f1782379c0f79f95e05adf5e4d60cba3fd9
    • Instruction ID: 6d5ffb320b5c84a2b93882608c5028e86e814d1ab6817c3f9ce84d69c9d90742
    • Opcode Fuzzy Hash: 646f169376bb85f1c7a0c0c6dfab7f1782379c0f79f95e05adf5e4d60cba3fd9
    • Instruction Fuzzy Hash: 96D0C7303C4200EBD6201B71DD0DE1B3A74AE61F01B84D479B851D1161CB75DC15992D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00419CEF: GetLastError.KERNEL32(?,76EAFC30,0041821A,004187D7,75920A60,?,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764), ref: 00419CF1
      • Part of subcall function 00419CEF: TlsGetValue.KERNEL32(?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764,75920A60,?,00419CD6,00419D7E,00415EBE), ref: 00419CFF
      • Part of subcall function 00419CEF: TlsSetValue.KERNEL32(00000000,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764,75920A60,?,00419CD6,00419D7E,00415EBE), ref: 00419D26
      • Part of subcall function 00419CEF: GetCurrentThreadId.KERNEL32 ref: 00419D3E
      • Part of subcall function 00419CEF: SetLastError.KERNEL32(00000000,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764,75920A60,?,00419CD6,00419D7E,00415EBE), ref: 00419D55
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041DB68
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041DC65
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041DCBE
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041DCDB
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041DCFE
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$ErrorLastValue$CurrentThread
    • String ID:
    • API String ID: 223281555-0
    • Opcode ID: 05e8b8897f4b181438ff9bc0053149d3a265bc6d3251127156bf3e4e24a99172
    • Instruction ID: 58033983c75ecd830641dd42448beea8d89667ef0108bf7b7aa9bdb8a646cbba
    • Opcode Fuzzy Hash: 05e8b8897f4b181438ff9bc0053149d3a265bc6d3251127156bf3e4e24a99172
    • Instruction Fuzzy Hash: 2561F5B6E00305AFDB14DF99CC41BEAB3B6EB84314F25452FF51197281E7B9A980CB58
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8c779fbf1088b840c6c03c0dc0acbad526ece5f4033377c3f113236f91995333
    • Instruction ID: eea7fb83b8746fab3f457500bfe6ffd8c160dddb31b64f3f28a7c8d6f048db1b
    • Opcode Fuzzy Hash: 8c779fbf1088b840c6c03c0dc0acbad526ece5f4033377c3f113236f91995333
    • Instruction Fuzzy Hash: 6C41B0B1D081269BCF20AF669C848EFBA74EF057A8710413FF925A6251D73C4EC1CA9D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindResourceA.KERNEL32(?,?,000000F0), ref: 0040C719
    • LoadResource.KERNEL32(?,00000000), ref: 0040C725
    • LockResource.KERNEL32(00000000), ref: 0040C73A
    • FreeResource.KERNEL32(00000000), ref: 0040C76C
    • GetDlgItem.USER32(?,00000001), ref: 0040C810
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Resource$FindFreeItemLoadLock
    • String ID:
    • API String ID: 996205394-0
    • Opcode ID: 933fe36362147815a0cb829be6fd4c4082cb2c7b05a93c302a9bad478cfa2e61
    • Instruction ID: 9a54128b345b6d8dc0d7652822505e1427a01eb8725f7af53416f086ccaa2b8d
    • Opcode Fuzzy Hash: 933fe36362147815a0cb829be6fd4c4082cb2c7b05a93c302a9bad478cfa2e61
    • Instruction Fuzzy Hash: C6511835A0020AEFCB10DF59C484A9EBBB1FF48311F54857AE815AB391D774DA51CF98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 0040EBD0
    • SendMessageA.USER32(?,00000138,?,?), ref: 0040EC54
    • GetBkColor.GDI32(?), ref: 0040EC5D
    • GetTextColor.GDI32(?), ref: 0040EC69
    • GetThreadLocale.KERNEL32(0000F1C0), ref: 0040ECFB
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Color$H_prologLocaleMessageSendTextThread
    • String ID:
    • API String ID: 741590120-0
    • Opcode ID: 484771c05116640de967fef7a7e48f7ab1b85b90a13ca1846e652b4cbef55775
    • Instruction ID: 0dba9dad94b3284ecc1784028ad6a283dd36c6a39298d9c5ccd4b4294a9626ec
    • Opcode Fuzzy Hash: 484771c05116640de967fef7a7e48f7ab1b85b90a13ca1846e652b4cbef55775
    • Instruction Fuzzy Hash: 1C51C074600716CFCB10DF26C4449AEB3B0FF04314F10896EE892AB3A1E778E855DB5A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?,02470458,024703AC,02470574), ref: 023F60B5
    • HeapFree.KERNEL32(00000000,?,02470458,024703AC,02470574), ref: 023F60D2
    • HeapFree.KERNEL32(00000000,?,02470458,024703AC,02470574), ref: 023F6105
    • CloseHandle.KERNEL32(?), ref: 023F632F
      • Part of subcall function 0242B345: __aulldiv.LIBCMT ref: 0242B383
    Strings
    • nullfalsetrue\"\\\b\f\n\r\t0123456789abcdef[],{ ,, xrefs: 023F563C
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle__aulldiv
    • String ID: nullfalsetrue\"\\\b\f\n\r\t0123456789abcdef[],{ ,
    • API String ID: 2268332173-2124985433
    • Opcode ID: 46942d692adc7f1de910be34ddbe49004717958fff8c07d2b5d21ad0f8aef44e
    • Instruction ID: cfd6bd4d09efabc8773a227ac59a84d02b71d7e60fcf9d5b5395a2278e816a62
    • Opcode Fuzzy Hash: 46942d692adc7f1de910be34ddbe49004717958fff8c07d2b5d21ad0f8aef44e
    • Instruction Fuzzy Hash: B8410431A04200DFDF65DF20E884BDA7BA6FF94304F184969DE994F296DB319846CF92
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 004292DB: GetParent.USER32(?), ref: 0042932E
      • Part of subcall function 004292DB: GetLastActivePopup.USER32(?), ref: 0042933D
      • Part of subcall function 004292DB: IsWindowEnabled.USER32(?), ref: 00429352
      • Part of subcall function 004292DB: EnableWindow.USER32(?,00000000), ref: 00429365
    • EnableWindow.USER32(?,00000001), ref: 004293B2
    • SendMessageA.USER32(?,00000376,00000000,00000000), ref: 004293C6
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,?,00000000), ref: 00429437
    • MessageBoxA.USER32(?,?,?,?), ref: 00429445
    • EnableWindow.USER32(00000000,00000001), ref: 00429461
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$Enable$Message$ActiveEnabledFileLastModuleNameParentPopupSend
    • String ID:
    • API String ID: 489645344-0
    • Opcode ID: e5219f551e2044f1e9824b379428219b61050e8523d1673e1e04a8c83f224b8f
    • Instruction ID: b24da1c36bf129903a3f53721541c8c3187d1228906e7f3a5e596f08f38fdc97
    • Opcode Fuzzy Hash: e5219f551e2044f1e9824b379428219b61050e8523d1673e1e04a8c83f224b8f
    • Instruction Fuzzy Hash: 5D318771B00128ABCB20EFA5EC85EEFB7B5EF48700F94456AE551E7280C7759D41CB64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?,?,02425E00), ref: 0241C2D6
    • HeapFree.KERNEL32(00000000,?,?,02425E00), ref: 0241C2F1
    • HeapFree.KERNEL32(00000000,?,?,02425E00), ref: 0241C2FD
    • HeapFree.KERNEL32(00000000,?,?,02425E00), ref: 0241C309
    • HeapFree.KERNEL32(00000000,?,?,02425E00), ref: 0241C313
    • HeapFree.KERNEL32(00000000,?,?,02425E00), ref: 0241C325
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 8c1840e74e9ed29f21e3420353721e0e6ff53c76a136968d9343fb36fb41b006
    • Instruction ID: 3adfe82fcdb9811cd279489284fc3a5cc42fc0c482cd5a5abd19271812cba669
    • Opcode Fuzzy Hash: 8c1840e74e9ed29f21e3420353721e0e6ff53c76a136968d9343fb36fb41b006
    • Instruction Fuzzy Hash: 3A31E431A80204AFD7299F55DC84E1A7BF2FB84708F10492FE94546360D731ACA1CF95
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 0042A57F
    • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0042A5A3
    • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0042A60B
    • RegDeleteKeyA.ADVAPI32(?,?), ref: 0042A62D
    • RegCloseKey.ADVAPI32(?), ref: 0042A638
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CloseDeleteEnumH_prologOpen
    • String ID:
    • API String ID: 3131381098-0
    • Opcode ID: 030e9521213b5cec4a943126c4209cfb504d0090493e7cce31642c1ea77828a9
    • Instruction ID: 74490a7ce1c544a02dbf4f80efdb720ef59ca58dfc40bea8b14ed366bb9d3a97
    • Opcode Fuzzy Hash: 030e9521213b5cec4a943126c4209cfb504d0090493e7cce31642c1ea77828a9
    • Instruction Fuzzy Hash: CA216B72E0012AAFCB21DB94D851BEEB7B4EF08314F444176FD11A72A0CB389E568B95
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strcat
    • String ID:
    • API String ID: 1765576173-0
    • Opcode ID: 458841bfa4412d0987e54f94bc18dc31fcc139bb07e64035214e5041e318658b
    • Instruction ID: 4d4309227c65d941d0923993ef45c8ee1175764ee62a210df3ff9fbdc7f6413c
    • Opcode Fuzzy Hash: 458841bfa4412d0987e54f94bc18dc31fcc139bb07e64035214e5041e318658b
    • Instruction Fuzzy Hash: EF11A37554835835EB3176625C4AFEB2A5C9B0175CF54007BFA18B40C2DABCDA6181AF
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetMapMode.GDI32(?,?,?,?,?,?,0040F257,?,00000000,?,75A8E800), ref: 00429CC3
    • GetDeviceCaps.GDI32(?,00000058), ref: 00429CFD
    • GetDeviceCaps.GDI32(?,0000005A), ref: 00429D06
      • Part of subcall function 0042873E: MulDiv.KERNEL32(?,00000000,00000000), ref: 0042877B
      • Part of subcall function 0042873E: MulDiv.KERNEL32(00000000,00000000,00000000), ref: 00428796
    • MulDiv.KERNEL32(?,000009EC,00000060), ref: 00429D2A
    • MulDiv.KERNEL32(00000000,000009EC,75A8E800), ref: 00429D35
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CapsDevice$Mode
    • String ID:
    • API String ID: 696222070-0
    • Opcode ID: 8d1704f2616a026b9f43863089cc8eee421a8b68ef1a552184c7b2fb0bd61b6a
    • Instruction ID: 6e1b7dccc2bf6b9828f3aa7ea2882f5d8b0ed906ddf1c8cc2095083f4007e547
    • Opcode Fuzzy Hash: 8d1704f2616a026b9f43863089cc8eee421a8b68ef1a552184c7b2fb0bd61b6a
    • Instruction Fuzzy Hash: DD110235700610AFCB219F55DC44C1EBBF9EF89310BA1443AF98697320C7759C029F94
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetMapMode.GDI32(?,00000000,?,?,?,?,0040F28B,?), ref: 00429D51
    • GetDeviceCaps.GDI32(?,00000058), ref: 00429D8B
    • GetDeviceCaps.GDI32(?,0000005A), ref: 00429D94
      • Part of subcall function 004286DB: MulDiv.KERNEL32(0040F28B,00000000,00000000), ref: 00428718
      • Part of subcall function 004286DB: MulDiv.KERNEL32(4689EC45,00000000,00000000), ref: 00428733
    • MulDiv.KERNEL32(0040F28B,00000060,000009EC), ref: 00429DB8
    • MulDiv.KERNEL32(4689EC45,?,000009EC), ref: 00429DC3
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CapsDevice$Mode
    • String ID:
    • API String ID: 696222070-0
    • Opcode ID: 0b9c2ff3e9452577eaa4e4a24d119cdaa1b7e241cf6bc29e48a8d0425e4ee19a
    • Instruction ID: b40078db713edfd21a9873406d00821ab7b1675308a8c764c818c18d3d9003fc
    • Opcode Fuzzy Hash: 0b9c2ff3e9452577eaa4e4a24d119cdaa1b7e241cf6bc29e48a8d0425e4ee19a
    • Instruction Fuzzy Hash: 79110E35700610AFDB21AF15DC44C1EBBFAEF89710B91442AF98697320CB75EC02DB88
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLastError.KERNEL32(?,76EAFC30,0041821A,004187D7,75920A60,?,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764), ref: 00419CF1
    • TlsGetValue.KERNEL32(?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764,75920A60,?,00419CD6,00419D7E,00415EBE), ref: 00419CFF
    • SetLastError.KERNEL32(00000000,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764,75920A60,?,00419CD6,00419D7E,00415EBE), ref: 00419D55
      • Part of subcall function 0041D4E0: __lock.LIBCMT ref: 0041D524
      • Part of subcall function 0041D4E0: HeapAlloc.KERNEL32(00000008,?,0043B1F8,00000010,00419D17,00000001,00000088,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C), ref: 0041D562
    • TlsSetValue.KERNEL32(00000000,?,00418843,?,?,?,0041540F,00000004,0043A458,0000000C,00418764,75920A60,?,00419CD6,00419D7E,00415EBE), ref: 00419D26
    • GetCurrentThreadId.KERNEL32 ref: 00419D3E
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ErrorLastValue$AllocCurrentHeapThread__lock
    • String ID:
    • API String ID: 3368326513-0
    • Opcode ID: c0dde2ab6abc5d13967d72fca5861c1375e6e24a54f52db835ed15053f81b895
    • Instruction ID: 9c9c253482250aba246a1314c7731adacca6fb7c4ca25a5bf85d0a0605742cb6
    • Opcode Fuzzy Hash: c0dde2ab6abc5d13967d72fca5861c1375e6e24a54f52db835ed15053f81b895
    • Instruction Fuzzy Hash: 0FF0C271701B119FE7301BA0FC097967BB0EF02B65B90463AE941DA2A0CBB88C458798
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • TlsFree.KERNEL32(00835BF8,?,?,0042BC00,00000000,00000001), ref: 0042BBAF
    • GlobalHandle.KERNEL32(00801ED0), ref: 0042BBBD
    • GlobalUnlock.KERNEL32(00000000,?,?,0042BC00,00000000,00000001), ref: 0042BBC6
    • GlobalFree.KERNEL32(00000000), ref: 0042BBCD
    • DeleteCriticalSection.KERNEL32(0044AEBC,?,?,0042BC00,00000000,00000001), ref: 0042BBD7
      • Part of subcall function 0042B9F1: EnterCriticalSection.KERNEL32(?), ref: 0042BA4E
      • Part of subcall function 0042B9F1: LeaveCriticalSection.KERNEL32(?,?), ref: 0042BA5E
      • Part of subcall function 0042B9F1: LocalFree.KERNEL32(?), ref: 0042BA67
      • Part of subcall function 0042B9F1: TlsSetValue.KERNEL32(?,00000000), ref: 0042BA79
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
    • String ID:
    • API String ID: 1549993015-0
    • Opcode ID: 42da1f527a2b0c3e69970945b8ac3fb8113e542abeed7d7280077cbdc7271ade
    • Instruction ID: c978259d00606411c06b9666accebdfa32c1b0646b29e90d722105786fdf7326
    • Opcode Fuzzy Hash: 42da1f527a2b0c3e69970945b8ac3fb8113e542abeed7d7280077cbdc7271ade
    • Instruction Fuzzy Hash: 72F090313006209BC6319B28FC08E6B37B9DF847253D50639F915D3655D728EC0686AC
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 004033FF
      • Part of subcall function 00403039: __EH_prolog.LIBCMT ref: 0040303E
      • Part of subcall function 00401F77: InterlockedDecrement.KERNEL32(?), ref: 00401F8B
      • Part of subcall function 00402F54: __EH_prolog.LIBCMT ref: 00402F59
      • Part of subcall function 00402065: InterlockedIncrement.KERNEL32(-000000F4), ref: 004020A8
      • Part of subcall function 004026DF: __EH_prolog.LIBCMT ref: 004026E4
      • Part of subcall function 004026DF: _strcat.LIBCMT ref: 0040275F
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00409BA2: __EH_prolog.LIBCMT ref: 00409BA7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog$Interlocked$DecrementIncrement_strcatlstrlen
    • String ID: (1D$B75630F848913FC0F8D618CD4D66F881$~#@^&*%Xy
    • API String ID: 3563784522-3627518113
    • Opcode ID: 8dc799b0bdd2e0e285bd4d34ca76e88ad679a91fdd7a6ac2db35d914667f3017
    • Instruction ID: 0945acecc41c1119d48bf44f991538611cc363480de23803dbd87cf349209659
    • Opcode Fuzzy Hash: 8dc799b0bdd2e0e285bd4d34ca76e88ad679a91fdd7a6ac2db35d914667f3017
    • Instruction Fuzzy Hash: C5E16071C01249AADB05EBE5C945EEEBBB8AF19304F10417EF505B31D2DB786B08CB65
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00402790
      • Part of subcall function 004020B5: lstrlenA.KERNEL32(?,00000000,(1D,00402EEF,0042F876,0040B70B,000F0000,0040BC1E,?,00000000,?,0000FFFF,?), ref: 004020C6
      • Part of subcall function 0040251B: CharNextA.USER32(?,?,00000000,00000000,00402825,?,?,?,00000000,?), ref: 00402548
    • _strcat.LIBCMT ref: 00402A1D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CharH_prologNext_strcatlstrlen
    • String ID: (1D$65537
    • API String ID: 2760170439-1037882189
    • Opcode ID: 6a4b3a02a9cf60cb97a4501062da0c4dfd334f7a98ec0f36bd57107b71411774
    • Instruction ID: e5f733e029df9b5a9eae3ff9d69496733049a8e8ae7aa611352d67588041cb91
    • Opcode Fuzzy Hash: 6a4b3a02a9cf60cb97a4501062da0c4dfd334f7a98ec0f36bd57107b71411774
    • Instruction Fuzzy Hash: B4A17C318051599ACB15EBA5C995BEEB778AF11308F1080FFA406721C2EF781B49CF6A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ClearH_prologVariant
    • String ID: @$@
    • API String ID: 1166855276-149943524
    • Opcode ID: 54e3d7c58431ed1a8a2faafa339e1a674b98199fcfceda2c24aa9145b0b1d073
    • Instruction ID: 7d4217390c867d17d4dff42acfee68232351a7b4ec1a73aaeb500dadfbc22095
    • Opcode Fuzzy Hash: 54e3d7c58431ed1a8a2faafa339e1a674b98199fcfceda2c24aa9145b0b1d073
    • Instruction Fuzzy Hash: 8C51A6B1A002199FDB04CF99C8849EEBBF5FF48314F14456EE506E7251E774A945CF60
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00402B1E
      • Part of subcall function 004020B5: lstrlenA.KERNEL32(?,00000000,(1D,00402EEF,0042F876,0040B70B,000F0000,0040BC1E,?,00000000,?,0000FFFF,?), ref: 004020C6
      • Part of subcall function 00401F77: InterlockedDecrement.KERNEL32(?), ref: 00401F8B
    • _strcat.LIBCMT ref: 00402C03
    • _strcat.LIBCMT ref: 00402C32
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strcat$DecrementH_prologInterlockedlstrlen
    • String ID: (1D
    • API String ID: 180800019-2129874033
    • Opcode ID: 4c3c853e3a3fc5663014bbe5f81a09a6e4498b27ab9f7d68c9925f13518fe297
    • Instruction ID: 93546b8d2cc75717105ed71affc76308f90ab1b3b0f93c10bf84eb1c8738cbfc
    • Opcode Fuzzy Hash: 4c3c853e3a3fc5663014bbe5f81a09a6e4498b27ab9f7d68c9925f13518fe297
    • Instruction Fuzzy Hash: 4841C331900119ABCB11EF66CD4AEEEBB74EF45318F50416EF408B62D1DBB86E44CB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleFileNameA.KERNEL32(00400000,?,00000104), ref: 004038F6
      • Part of subcall function 00401FE9: lstrlenA.KERNEL32(?,?,?,?,00402E72,?), ref: 00402008
      • Part of subcall function 00402FCE: __EH_prolog.LIBCMT ref: 00402FD3
    • CharLowerA.USER32(?,?,00000004,?), ref: 00403924
      • Part of subcall function 004033FA: __EH_prolog.LIBCMT ref: 004033FF
    • _strcat.LIBCMT ref: 004039BD
      • Part of subcall function 00402C6D: __EH_prolog.LIBCMT ref: 00402C72
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402C97
      • Part of subcall function 00402C6D: _strcat.LIBCMT ref: 00402CBA
      • Part of subcall function 00402C6D: MessageBoxA.USER32(00000000,?,00000000,00000030), ref: 00402D19
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog_strcat$CharFileLowerMessageModuleNamelstrlen
    • String ID: .dll
    • API String ID: 100667255-2738580789
    • Opcode ID: ed755644410f0a6ee9be1c8b2e18ebcf4b444024a13bcd5a83e04fb954c330c4
    • Instruction ID: e925d1146906c940dbfae2266fa14a7952d3259283bc435cb66516965c737666
    • Opcode Fuzzy Hash: ed755644410f0a6ee9be1c8b2e18ebcf4b444024a13bcd5a83e04fb954c330c4
    • Instruction Fuzzy Hash: 50319372A041195BDB15BBA19D42EEF375C6F00709F60013BF911B21E2DE7C9A05869D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetMenuCheckMarkDimensions.USER32 ref: 0042A849
    • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 0042A8EB
    • LoadBitmapA.USER32(00000000,00007FE3), ref: 0042A903
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
    • String ID:
    • API String ID: 2596413745-3916222277
    • Opcode ID: 99db48da26093b3bdc554be9bc4593ed5dd0760363e891f11716091b9abc253a
    • Instruction ID: 45e3c292e12f698ac8c395a513a2079db83a3a86b63308657ad0fa06f736e0d9
    • Opcode Fuzzy Hash: 99db48da26093b3bdc554be9bc4593ed5dd0760363e891f11716091b9abc253a
    • Instruction Fuzzy Hash: 9421E172A403188FEB20DF78EC88AAE7BA9EF44304F540526FD15CB292D674D446CB80
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,0043B298,00000010,00418723,00000000,00000FA0,75920A60,00000000,00419D65,00415EBE,?,0043A478,00000060), ref: 0041E405
    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionAndSpinCount), ref: 0041E415
    Strings
    • kernel32.dll, xrefs: 0041E400
    • InitializeCriticalSectionAndSpinCount, xrefs: 0041E40F
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
    • API String ID: 1646373207-3733552308
    • Opcode ID: 5c0e4825627cfcbdc909d80ba72f3c4140fdd93ae8b2e26b687a80bbd9fc07fd
    • Instruction ID: 02de6b7c6dcb1b4e2d62259ca00e2439f61271760f3b7c106522406a4349fe20
    • Opcode Fuzzy Hash: 5c0e4825627cfcbdc909d80ba72f3c4140fdd93ae8b2e26b687a80bbd9fc07fd
    • Instruction Fuzzy Hash: 5FF0903C640206EBDB208F66AC0978E37B0FB09788F60417BA824D52A1D738D581DB5C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(KERNEL32,004170FA), ref: 0041C5DF
    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0041C5EF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: IsProcessorFeaturePresent$KERNEL32
    • API String ID: 1646373207-3105848591
    • Opcode ID: c5423254268babc4adbeec866d4f3c3d1c9d9504704e86636f1309afa355d0fc
    • Instruction ID: b5510b1185d0b5d4b1d73177c6ffc23074c4178150c12f31e18a4bcac3e4c917
    • Opcode Fuzzy Hash: c5423254268babc4adbeec866d4f3c3d1c9d9504704e86636f1309afa355d0fc
    • Instruction Fuzzy Hash: 48C012703C0712B6DA281BB11C8AB6B226AAB48F02F9014B66622E1180CF99E149A03D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FreeTask$ClearH_prologVariant
    • String ID:
    • API String ID: 82050969-0
    • Opcode ID: 767c01379b479576acc13118c83d9bf4fc42745ff4993b0e5fb18cae07862a33
    • Instruction ID: d5802aa01d6b65e6a7d5b3cfdb68997afd41ca415ad1b5d610f95376a237b252
    • Opcode Fuzzy Hash: 767c01379b479576acc13118c83d9bf4fc42745ff4993b0e5fb18cae07862a33
    • Instruction Fuzzy Hash: F9616A71600605DFCB20DFA5C9C48AAB7F1BF88309754096EE1869B761CB79ED82CB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 023E6500
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: nown
    • API String ID: 3298025750-1933733983
    • Opcode ID: 4c6569f7ca7a56fbd58a0a90c434ee649684ff9a1ef119b28302fbd69edc1b45
    • Instruction ID: 78559ef2e29bfc3206ad9ad4228c90b16a0dd264507371cd5a9b78b6579152c0
    • Opcode Fuzzy Hash: 4c6569f7ca7a56fbd58a0a90c434ee649684ff9a1ef119b28302fbd69edc1b45
    • Instruction Fuzzy Hash: 3A914774908781CFD725CF24C540B9AFBF1BF99304F14896EE98A5B2A1D770A589CF81
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ReadFile.KERNEL32(-0000003C,?,00000000,-0000003C,00000000,0043A978,?,?,?,?,?,0043A478,00000060), ref: 0041B74E
    • GetLastError.KERNEL32(?,?,?,0043A478,00000060), ref: 0041B758
    • ReadFile.KERNEL32(-00000031,-00000031,00000001,-0000003C,00000000,?,?,?,0043A478,00000060), ref: 0041B818
    • GetLastError.KERNEL32(?,?,?,0043A478,00000060), ref: 0041B822
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ErrorFileLastRead
    • String ID:
    • API String ID: 1948546556-0
    • Opcode ID: 06390da874683060d690ec748a49b226ab513b879b92b8ba4dd51f48b54eaf61
    • Instruction ID: 8fb20b34bd6ea9d508b8a2884fa3a7e9fde291ada00aec3394d86df409821bcf
    • Opcode Fuzzy Hash: 06390da874683060d690ec748a49b226ab513b879b92b8ba4dd51f48b54eaf61
    • Instruction Fuzzy Hash: DE51C534A04385DFDF219F58C8807EA7BB4FF52704F5444ABE8618B391D3789986CB9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IsWindowVisible.USER32(?), ref: 004134D3
    • GetDesktopWindow.USER32 ref: 004134E6
    • GetWindowRect.USER32(?,?), ref: 004134F9
    • GetWindowRect.USER32(?,?), ref: 00413506
      • Part of subcall function 004266AC: MoveWindow.USER32(?,?,?,00000000,?,?,?,00413647,?,?,?,?,00000000), ref: 004266C8
      • Part of subcall function 004266EA: ShowWindow.USER32(?,?,00413650,00000000,?,?,?,?,00000000), ref: 004266F8
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$Rect$DesktopMoveShowVisible
    • String ID:
    • API String ID: 3835705305-0
    • Opcode ID: 88f95af8812bf0e386d89e0ec780856ec7b40cbd2bc964ae238ea1be644fa563
    • Instruction ID: 292b2c97d4d6e5fe8d50f3415b5a10e4331aa721d6f93604126fae14dd501043
    • Opcode Fuzzy Hash: 88f95af8812bf0e386d89e0ec780856ec7b40cbd2bc964ae238ea1be644fa563
    • Instruction Fuzzy Hash: A3511C75A0020AEFCB10DFA8C994DAEB7BAFF88705B544469F506E7250CB35EE41CB64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • WriteFile.KERNEL32(?,?,?,00419F5B,00000000,?,?,00000001), ref: 0041BB86
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: c01c61b8bf44389ea94e83f765c07d573316c3af947ce38cddeea1b46c53af0d
    • Instruction ID: 3e9d655b9880f60b5f09cf0eebf124177ec1137a07b6d6433de88475768fccef
    • Opcode Fuzzy Hash: c01c61b8bf44389ea94e83f765c07d573316c3af947ce38cddeea1b46c53af0d
    • Instruction Fuzzy Hash: AF51A371900209DFCB11CFA9C980AEEBBF4FF45304F5041ABE911AB255DB349A81CBA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023EE83F: HeapFree.KERNEL32(00000000), ref: 023EE8A4
      • Part of subcall function 023EE83F: CloseHandle.KERNEL32(?,023EDC7E), ref: 023EE98C
    • HeapFree.KERNEL32(00000000,?), ref: 023EE2E2
    • HeapFree.KERNEL32(00000000,?), ref: 023EE5E3
    • HeapFree.KERNEL32(00000000,?), ref: 023EE645
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID: filezillasignal::
    • API String ID: 1910495013-924609054
    • Opcode ID: e1e3461ec048acccc6db94e319ea6975a1cac35a00cda1c39ff662ae98d4b83f
    • Instruction ID: 7f7eb509a604af9883ca17ec0be1240b3b35e2de98834dd4f523755ac884d792
    • Opcode Fuzzy Hash: e1e3461ec048acccc6db94e319ea6975a1cac35a00cda1c39ff662ae98d4b83f
    • Instruction Fuzzy Hash: BE513871608380DFDB34DF14D584B9ABBE1BB98314F10891EE58E97291DB319949CF83
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023EE83F: HeapFree.KERNEL32(00000000), ref: 023EE8A4
      • Part of subcall function 023EE83F: CloseHandle.KERNEL32(?,023EDC7E), ref: 023EE98C
    • HeapFree.KERNEL32(00000000,?), ref: 023EE36F
    • HeapFree.KERNEL32(00000000,?), ref: 023EE5E3
    • HeapFree.KERNEL32(00000000,?), ref: 023EE645
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID: signaltox::
    • API String ID: 1910495013-1483858761
    • Opcode ID: 15be2f4a1fa95feb8d4c4e6949a45dddcd814e981d206dd06c4bf4f52ce7352e
    • Instruction ID: d91a5943569f9849c13dc976c21d67f36c4ee8b08c668fb145cd61bddbfce2ad
    • Opcode Fuzzy Hash: 15be2f4a1fa95feb8d4c4e6949a45dddcd814e981d206dd06c4bf4f52ce7352e
    • Instruction Fuzzy Hash: 42512671608380DFDB34DF14D584B9ABBE1BB88314F10895DE98A57291DB71A949CF83
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023EE83F: HeapFree.KERNEL32(00000000), ref: 023EE8A4
      • Part of subcall function 023EE83F: CloseHandle.KERNEL32(?,023EDC7E), ref: 023EE98C
    • HeapFree.KERNEL32(00000000,?), ref: 023EE3FC
    • HeapFree.KERNEL32(00000000,?), ref: 023EE5E3
    • HeapFree.KERNEL32(00000000,?), ref: 023EE645
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID: toxpidgin::
    • API String ID: 1910495013-2736818546
    • Opcode ID: d8bb5b0cdd6ac1928590da3a01d2649f3d1db1a3dfa24d0b8d3a66ca3bee3b86
    • Instruction ID: 5654aaa719a7c179ead0c1411c16b018ca57b49ecda13c234795c720d1de1bc5
    • Opcode Fuzzy Hash: d8bb5b0cdd6ac1928590da3a01d2649f3d1db1a3dfa24d0b8d3a66ca3bee3b86
    • Instruction Fuzzy Hash: 22513871608380DFD734DF14D584B9AB7E1BF88314F10895DE58A57291DB319949CF83
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023EE83F: HeapFree.KERNEL32(00000000), ref: 023EE8A4
      • Part of subcall function 023EE83F: CloseHandle.KERNEL32(?,023EDC7E), ref: 023EE98C
    • HeapFree.KERNEL32(00000000,?), ref: 023EE255
    • HeapFree.KERNEL32(00000000,?), ref: 023EE5E3
    • HeapFree.KERNEL32(00000000,?), ref: 023EE645
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID: anydeskfilezilla::
    • API String ID: 1910495013-2519904345
    • Opcode ID: 039f19c315aebd36b4a6d14abcff934e01d7438df32077a21c76c995650bed7d
    • Instruction ID: a43ff5d0b8361c34d3e143cb6ddabbd3ad6600bed08ceb411e750d088946f174
    • Opcode Fuzzy Hash: 039f19c315aebd36b4a6d14abcff934e01d7438df32077a21c76c995650bed7d
    • Instruction Fuzzy Hash: DC513771608380DFDB34DF14D584B9ABBE1BB98314F10895EE58E57291DB31A949CF83
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • lstrcpynA.KERNEL32(?,?,00000104), ref: 00428003
    • GetFileTime.KERNEL32(?,?,?,?), ref: 00428025
    • GetFileSize.KERNEL32(?,00000000), ref: 00428033
    • GetFileAttributesA.KERNEL32(?), ref: 0042805D
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: File$AttributesSizeTimelstrcpyn
    • String ID:
    • API String ID: 1499663573-0
    • Opcode ID: 8ed929e8840cf0571f25e06b926dfc94d164733cbe60adf04c0cc376b6f90c85
    • Instruction ID: 0f9157c03447155b879e481d300035be14b4a7e9415b58b015406b8be03fdab5
    • Opcode Fuzzy Hash: 8ed929e8840cf0571f25e06b926dfc94d164733cbe60adf04c0cc376b6f90c85
    • Instruction Fuzzy Hash: C0415E75600614AFC724DF64E880CABB7F4FF083103508A2EE1A693691EB34F949CB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0041E91D: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0041E937
      • Part of subcall function 0041E91D: GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0041E948
      • Part of subcall function 0041E91D: VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C), ref: 0041E98E
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000004,00000064,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007), ref: 00420C13
    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,004151C7,00000000,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007), ref: 00420C30
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,004151C7,?,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000,?,0041DD55,00000007), ref: 00420CA6
    • CompareStringW.KERNEL32(?,?,00000064,00000000,?,00000000,?,00000000,?,0041FB6C,00000000,00000000,00000000,00000000,00000000), ref: 00420CBC
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ByteCharMultiWide$QueryVirtual$CompareInfoStringSystem
    • String ID:
    • API String ID: 1997773198-0
    • Opcode ID: b5c51588650a37d4d1cb3d5db00bbc7826fd7714118cecf2b9c72995b1b9842b
    • Instruction ID: 03b7f2b66f2d75cf62d1d1e7f9f5aea8b6d3942825eff640f69c1656141198f9
    • Opcode Fuzzy Hash: b5c51588650a37d4d1cb3d5db00bbc7826fd7714118cecf2b9c72995b1b9842b
    • Instruction Fuzzy Hash: C431BC72900218EBCF25DF91DD45BDEBBB5FF08714FA0021AF814A62A1C7399992DB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SendMessageA.USER32(00000000,000000F0,00000000,00000000), ref: 00426B1D
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00426B60
    • SendMessageA.USER32(00000000,000000F0,00000000,00000000), ref: 00426B95
    • SendMessageA.USER32(00000000,000000F1,00000000,00000000), ref: 00426BB9
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: d1cd1edd8aebf657208b84a0c5c289419f7b47b2a8eecfcaa9bf4f1bc9fb4320
    • Instruction ID: 3f5e675f55d4a702bf8c1dec3373815d05f2456b451231204fc43b2a1b7b8f7a
    • Opcode Fuzzy Hash: d1cd1edd8aebf657208b84a0c5c289419f7b47b2a8eecfcaa9bf4f1bc9fb4320
    • Instruction Fuzzy Hash: D0215331740239EBCA219E06ECC0F277F6DEB45744F97446BF941A7351CA26BC40D6A9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strlen$___initmbctable_strcat
    • String ID:
    • API String ID: 109824703-0
    • Opcode ID: b66f0f1f44d3e18dccc17556631110f1c47ce8ced5cbe7ee97567bf552962841
    • Instruction ID: edfa828b84deb13965c1780a4a3bc283f2788126ec868cd6f67e178d54800aad
    • Opcode Fuzzy Hash: b66f0f1f44d3e18dccc17556631110f1c47ce8ced5cbe7ee97567bf552962841
    • Instruction Fuzzy Hash: 2A113A7640E088DDD720AF35AC509DA3796EB023B4725023FE6A583151DB7D68D2C78E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CreateH_prologIndirectRect
    • String ID:
    • API String ID: 2123978231-0
    • Opcode ID: 2569996c3e6fedae5f4997debf53dedfd3a986ba6360513663fe455394ac179b
    • Instruction ID: d54e3d1473b0d2deaccf452e2b84d05e55222552c863c9364fff6d2750bb1f43
    • Opcode Fuzzy Hash: 2569996c3e6fedae5f4997debf53dedfd3a986ba6360513663fe455394ac179b
    • Instruction Fuzzy Hash: 01214B71E00229DFCB11DFA4D9849DEB7B8EB08744F50806AE901AB251C774AE85CFB5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RegOpenKeyExA.ADVAPI32(80000001,00443500,00000000,00000001,?), ref: 0042A130
    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,00000004), ref: 0042A150
    • RegCloseKey.ADVAPI32(?), ref: 0042A194
    • RegCloseKey.ADVAPI32(00000000), ref: 0042A1AA
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Close$OpenQueryValue
    • String ID:
    • API String ID: 1607946009-0
    • Opcode ID: e01145a01794671db8f5410ae6055daedd9c25c5f260b156cd7b5aa0a6d2c763
    • Instruction ID: dc5cdb4f54a3a496b110042336def724de51f15833206d37b3068f0c10fa97b6
    • Opcode Fuzzy Hash: e01145a01794671db8f5410ae6055daedd9c25c5f260b156cd7b5aa0a6d2c763
    • Instruction Fuzzy Hash: 07215C71E00214EFDB21CF95EC44ABEFBB8EF50314F9040AAE905A6211D3745A25DF6A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Rect$EqualH_prologIntersect
    • String ID:
    • API String ID: 2227276553-0
    • Opcode ID: 8049af2c9bc39f3b1f89f76f96636985975a8951ba38d7189fc57d12bef8085b
    • Instruction ID: 4f953d2f79d3e31144268cefd0878d26dd0bbf6767da500f2c2b2cfc2fc991a2
    • Opcode Fuzzy Hash: 8049af2c9bc39f3b1f89f76f96636985975a8951ba38d7189fc57d12bef8085b
    • Instruction Fuzzy Hash: F92115B2A01219EFCB11EFA1D984DDEBBB8FF08354B50816AF911E3210D734AE45CB65
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindResourceA.KERNEL32(?,00000000,00000005), ref: 00422D40
    • LoadResource.KERNEL32(?,00000000), ref: 00422D48
    • LockResource.KERNEL32(00000000), ref: 00422D5A
    • FreeResource.KERNEL32(00000000), ref: 00422DA4
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Resource$FindFreeLoadLock
    • String ID:
    • API String ID: 1078018258-0
    • Opcode ID: 0603fb92bcd478c8b805d9f6208dcb30c6965e4ad22ab062ac3084de4d362369
    • Instruction ID: 37e77f0d580c985eccbe4e444c991a434d904d033160aeb73e9ee784c397293c
    • Opcode Fuzzy Hash: 0603fb92bcd478c8b805d9f6208dcb30c6965e4ad22ab062ac3084de4d362369
    • Instruction Fuzzy Hash: 4E118279611722FFC7309F54EA48AABB774FF04755F80406AE80253750D7B8AD45C7A8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 004272C1
    • GetCurrentProcess.KERNEL32(?,00000000), ref: 004272C7
    • DuplicateHandle.KERNEL32(00000000), ref: 004272CA
    • GetLastError.KERNEL32(?), ref: 004272E5
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CurrentProcess$DuplicateErrorHandleLast
    • String ID:
    • API String ID: 3907606552-0
    • Opcode ID: 61c7e7d9b6b474a063e6b9c6d7eaf6789762496f64cb53e64a4fe5b19839d303
    • Instruction ID: 46fbf665e5fe45f0ecf4fbdd7c511345cd6b3779fbaa23856ba3fec1c6fd91d8
    • Opcode Fuzzy Hash: 61c7e7d9b6b474a063e6b9c6d7eaf6789762496f64cb53e64a4fe5b19839d303
    • Instruction Fuzzy Hash: 4101B131704210ABDB209BA5ED4AF1A7BA9EF84320F904566FA05CB281DA75DC01C774
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SendMessageA.USER32(?,0000001F,00000000,00000000), ref: 00425B0D
    • SendMessageA.USER32(?,0000001F,00000000,00000000), ref: 00425B2F
    • GetCapture.USER32 ref: 00425B41
    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00425B50
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: MessageSend$Capture
    • String ID:
    • API String ID: 1665607226-0
    • Opcode ID: 41ba8c012cf105ab7cfabcbff710673018262f8e0ce4aae3eb8d127922dae7ed
    • Instruction ID: 30d2a2513be581f839b2656ca0720de834e8737dd73f72248518bd740216b687
    • Opcode Fuzzy Hash: 41ba8c012cf105ab7cfabcbff710673018262f8e0ce4aae3eb8d127922dae7ed
    • Instruction Fuzzy Hash: 2F016D703407187FFA302B15ACC9FBB76ADDB88788F914039F341EA1D2C6A59C055A64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RegSetValueExA.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,?), ref: 004296C0
    • RegCloseKey.ADVAPI32(00000000,?,?), ref: 004296C9
    • wsprintfA.USER32 ref: 004296E5
    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 004296FB
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ClosePrivateProfileStringValueWritewsprintf
    • String ID:
    • API String ID: 1902064621-0
    • Opcode ID: 927a4f46756840b7d5d769d63706027d2597c3eeb89ddb1f9a2eacf531248ca7
    • Instruction ID: a5194eaa5d267bfce1f697c3276f513d5c4f67dce319ffc6cf3dff497de3ed65
    • Opcode Fuzzy Hash: 927a4f46756840b7d5d769d63706027d2597c3eeb89ddb1f9a2eacf531248ca7
    • Instruction Fuzzy Hash: D3018B32600219FBCB11DFA4ED05F9F7BB9BF48708F90403AFA11AA150DB75DA119B98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetTopWindow.USER32(?), ref: 00424FCD
    • GetTopWindow.USER32(00000000), ref: 0042500C
    • GetWindow.USER32(00000000,00000002), ref: 0042502A
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window
    • String ID:
    • API String ID: 2353593579-0
    • Opcode ID: 6642e3dc04a849abbdc9febbdb983b15e036c38badf80aee8fee512f8d387543
    • Instruction ID: e8fda6cfe15639f69245f96e4c32ccf3e247865d1e166a8c34f89f462bfd62a7
    • Opcode Fuzzy Hash: 6642e3dc04a849abbdc9febbdb983b15e036c38badf80aee8fee512f8d387543
    • Instruction Fuzzy Hash: 4501003220152ABBCF226F91ED09E9F3B25EF89350F854025FE1055161D73AC932EBE9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetDlgItem.USER32(?,?), ref: 00424A3C
    • GetTopWindow.USER32(00000000), ref: 00424A4F
      • Part of subcall function 00424A31: GetWindow.USER32(00000000,00000002), ref: 00424A96
    • GetTopWindow.USER32(?), ref: 00424A7F
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Window$Item
    • String ID:
    • API String ID: 369458955-0
    • Opcode ID: b9f3f23133e0281108d4f9682040040fb4f1f4bc896dd1d0bc87f1e1c94142e9
    • Instruction ID: 24d9463ce005fff643b8f741c0515ee5154fda0862fcd9038226e8ac00ae5952
    • Opcode Fuzzy Hash: b9f3f23133e0281108d4f9682040040fb4f1f4bc896dd1d0bc87f1e1c94142e9
    • Instruction Fuzzy Hash: 37014432381536BB8F326B52AC04E9F3A69DFD53A4BD14036FE1055211E739C921969D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SysStringLen.OLEAUT32(?), ref: 0042B521
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,0042CE8B,00000000), ref: 0042B537
    • SysAllocStringByteLen.OLEAUT32(00000000,00000000), ref: 0042B53F
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000,00000000,?,?,?,?,0042CE8B,00000000), ref: 0042B554
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Byte$CharMultiStringWide$Alloc
    • String ID:
    • API String ID: 3384502665-0
    • Opcode ID: ebc8b17013044a55624bf79895947c7aba81f2b12cff67d93ce8b63f0bf7c138
    • Instruction ID: 753ad0f5e46b68682b0d373a57b70d68207eba0a8fe5c42bdb6e2b9dfc4e7a6e
    • Opcode Fuzzy Hash: ebc8b17013044a55624bf79895947c7aba81f2b12cff67d93ce8b63f0bf7c138
    • Instruction Fuzzy Hash: 11F0B471207234BF92209B669C48CABBFACFE8B3A4B50453AF544C2100C3755801CBF9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • QueryPerformanceFrequency.KERNEL32(?), ref: 00409067
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00409081
    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,00000000,?,?,000003E8,00000000), ref: 004090A0
    • QueryPerformanceCounter.KERNEL32(?,?,?,00000000,?,?,000003E8,00000000), ref: 004090A6
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: PerformanceQuery$Counter$FrequencyUnothrow_t@std@@@__ehfuncinfo$??2@
    • String ID:
    • API String ID: 4274601313-0
    • Opcode ID: 173bd0ea550015c7c751bb5befa3e646e50c54cb8a35351780cf122b793eb8bc
    • Instruction ID: 9b00112076147fc073e2cec24ef5242f1fd16e6971c6a05a11b588fc8eba46da
    • Opcode Fuzzy Hash: 173bd0ea550015c7c751bb5befa3e646e50c54cb8a35351780cf122b793eb8bc
    • Instruction Fuzzy Hash: 6FF06D76A00208BBCF10ABE9DC85EEF7BBDEB84710F100476A600F3181D675A9458AA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IntersectRect.USER32(?,00000000,?), ref: 0041114B
    • EqualRect.USER32(?,00000000), ref: 00411158
    • IsRectEmpty.USER32(?), ref: 00411162
    • InvalidateRect.USER32(?,?,?), ref: 0041117F
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Rect$EmptyEqualIntersectInvalidate
    • String ID:
    • API String ID: 3354205298-0
    • Opcode ID: b96f505ea3630a247bd448bdacb66984f0b113bced7556e7e02f6fbeb0dcfbd3
    • Instruction ID: 4fe3f08868a5226f7d3e4c173db8bd2c93613d59b8a0c76e427b94b244e74582
    • Opcode Fuzzy Hash: b96f505ea3630a247bd448bdacb66984f0b113bced7556e7e02f6fbeb0dcfbd3
    • Instruction Fuzzy Hash: 49010C71A0011AEBCF11DFA4DC48E9BB7BDFF09314F808472FA15D6110D275A51A8B64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • QueryPerformanceFrequency.KERNEL32(?), ref: 004090CD
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004090E7
    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,00000000,?,?,000003E8,00000000), ref: 00409106
    • QueryPerformanceCounter.KERNEL32(?,?,?,00000000,?,?,000003E8,00000000), ref: 0040910C
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: PerformanceQuery$Counter$FrequencyUnothrow_t@std@@@__ehfuncinfo$??2@
    • String ID:
    • API String ID: 4274601313-0
    • Opcode ID: 6be7badd7bad8b08e9e2c94143a38613ba85cc63ccc8eb43999f4e61355f9fc2
    • Instruction ID: 871cbde0123bd9a00944affa39dc517997de1d643d08efdba11b3d0f97e0b9e4
    • Opcode Fuzzy Hash: 6be7badd7bad8b08e9e2c94143a38613ba85cc63ccc8eb43999f4e61355f9fc2
    • Instruction Fuzzy Hash: 56F06D36A0021DBBDF10EBE8CC85EEF7B7DEB84350F500476E200E6180D674A9458BA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindResourceA.KERNEL32(?,?,000000F0), ref: 00426360
    • LoadResource.KERNEL32(?,00000000,?,?,?,?,00422CD3,?,?,00401A10,?,?,?,?,?,0042DD38), ref: 0042636C
    • LockResource.KERNEL32(00000000,?,?,?,?,00422CD3,?,?,00401A10,?,?,?,?,?,0042DD38,000000FF), ref: 00426379
    • FreeResource.KERNEL32(00000000,?,?,?,?,00422CD3,?,?,00401A10,?,?,?,?,?,0042DD38,000000FF), ref: 00426394
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Resource$FindFreeLoadLock
    • String ID:
    • API String ID: 1078018258-0
    • Opcode ID: 4c303f29aad7c5551cea9d80b4e0defa102d9efb6e724846d62db9275e0aa396
    • Instruction ID: 76cf06ceb5d42f02d60e4406da92eb06dd1ed344124334fc899015a258015dc8
    • Opcode Fuzzy Hash: 4c303f29aad7c5551cea9d80b4e0defa102d9efb6e724846d62db9275e0aa396
    • Instruction Fuzzy Hash: 40F0F63A3012229B83205FA66C4497BB7ACEFC67627C6007AFD08C2211DF258C06857C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • EnableMenuItem.USER32(?,?,?), ref: 004226D9
    • GetFocus.USER32 ref: 004226EC
    • GetParent.USER32(?), ref: 004226FA
    • SendMessageA.USER32(?,00000028,00000000,00000000), ref: 0042270F
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: EnableFocusItemMenuMessageParentSend
    • String ID:
    • API String ID: 2297321873-0
    • Opcode ID: d719d4f1826348346d23ac329250c9ff44aabbd6e9454e1dd4734ed6490b57f8
    • Instruction ID: 617dea23d70acb73f8f92018a64976e9019581151da9ed12eae54fe0019a468e
    • Opcode Fuzzy Hash: d719d4f1826348346d23ac329250c9ff44aabbd6e9454e1dd4734ed6490b57f8
    • Instruction Fuzzy Hash: 0E015E31204610ABDB389F10ED49F56BBB0EF90755F90863EF142921E0CBB4A895CA48
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prologTextWindowlstrcpynlstrlen
    • String ID:
    • API String ID: 3022380644-0
    • Opcode ID: c2260954adad8a7ac6653c1720aaf20a11d8d94ac19766ad48223eb80a2c8fb0
    • Instruction ID: 92ca4580e9c1d62aa3d8050f9c04bbde3212ba858a07986cc1264f4f20614cf9
    • Opcode Fuzzy Hash: c2260954adad8a7ac6653c1720aaf20a11d8d94ac19766ad48223eb80a2c8fb0
    • Instruction Fuzzy Hash: A9019E35610228EFCF119FA4DC08AAEBBB1FF08314F408969F5169B261CB35A910DF94
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ___addl
    • String ID:
    • API String ID: 2260456530-0
    • Opcode ID: 840ca81f9e954cee5d234986506e41ea314501c8c1644bea52ef9ccbba36ec9c
    • Instruction ID: 619351973d3273d478a4b8b93c8570466528139478c8ccff69c0fcdedee7c080
    • Opcode Fuzzy Hash: 840ca81f9e954cee5d234986506e41ea314501c8c1644bea52ef9ccbba36ec9c
    • Instruction Fuzzy Hash: 8DF04F76500102AFDA115B52EC01DE7B7A9EF48304B04447AFD9B82132E722E8AECB55
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • lstrlenA.KERNEL32(?), ref: 00428CCA
    • GetWindowTextA.USER32(?,?,00000100), ref: 00428CE6
    • lstrcmpA.KERNEL32(?,?), ref: 00428CFA
    • SetWindowTextA.USER32(?,?), ref: 00428D0A
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: TextWindow$lstrcmplstrlen
    • String ID:
    • API String ID: 330964273-0
    • Opcode ID: e7043af6485233e72652ee463e779a3a2077c7ee8e68495221b17dea8af2fa28
    • Instruction ID: ab625cd30283d468c6a5a3a0154dbe0d4626f66796105f6a39e5641a5fe47872
    • Opcode Fuzzy Hash: e7043af6485233e72652ee463e779a3a2077c7ee8e68495221b17dea8af2fa28
    • Instruction Fuzzy Hash: 35F06D75600018EBCF21AF60ED449CE7BB9EF18358F808072F909D62A0DB74DE59DB48
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetTickCount.KERNEL32 ref: 0042C118
    • GetTickCount.KERNEL32 ref: 0042C125
    • CoFreeUnusedLibraries.OLE32 ref: 0042C134
    • GetTickCount.KERNEL32 ref: 0042C13A
      • Part of subcall function 0042C09F: CoFreeUnusedLibraries.OLE32(00000000,0042C17F,00000000,?,?,004119DD), ref: 0042C0E3
      • Part of subcall function 0042C09F: OleUninitialize.OLE32(?,?,004119DD), ref: 0042C0E9
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CountTick$FreeLibrariesUnused$Uninitialize
    • String ID:
    • API String ID: 685759847-0
    • Opcode ID: b5874d32bad5070bf434eb1db7257aa41fe591bf19fa899e05926cb079051f1c
    • Instruction ID: fa01731afa84a5c76d3ef70e4e48df64ef66ba0b78331b06acedfa9e6f689827
    • Opcode Fuzzy Hash: b5874d32bad5070bf434eb1db7257aa41fe591bf19fa899e05926cb079051f1c
    • Instruction Fuzzy Hash: C9E0E534A04224DAE724AF74FC8932D7AA4EB56311FD1883BD041A2162C73858D5CE9E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __startOneArgErrorHandling.LIBCMT ref: 0245320D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: ErrorHandling__start
    • String ID: pow
    • API String ID: 3213639722-2276729525
    • Opcode ID: 93dfda981a4b14004b6ff15b32cc37b99e3d8104a58dd699a4615b721fda016b
    • Instruction ID: eb3fa6981009fdcfd8a069672bf6ce298922626ad84c794e9e64b91dbdf8603f
    • Opcode Fuzzy Hash: 93dfda981a4b14004b6ff15b32cc37b99e3d8104a58dd699a4615b721fda016b
    • Instruction Fuzzy Hash: 8D514961E1492196CB167F18CD4136F2FA4EB40785F208D9FECD5463ABEF3484D6CA46
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 0042CE4E
    • SysFreeString.OLEAUT32(00000000), ref: 0042CE7B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: ChangeFreeStringTypeVariant
    • String ID: `)u
    • API String ID: 396703022-4279031584
    • Opcode ID: 22381c88c2993f67874b90b8de5b1c7ed24da80b6e180f483c99e3a72345c273
    • Instruction ID: 40dcccd1e1420cb51b3b7de2da0c674f284437aff5cc691cd8ccc4e40ea488f4
    • Opcode Fuzzy Hash: 22381c88c2993f67874b90b8de5b1c7ed24da80b6e180f483c99e3a72345c273
    • Instruction Fuzzy Hash: 8E519170A0026ADBCB20DF14E5C07AE7BB1EF04350F95806AE95A9B391D37CDD81CB99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: Info
    • String ID: $
    • API String ID: 1807457897-3032137957
    • Opcode ID: ea25d807aac96f0c9d0dd241a4ad9b12794653fbfb175f80958580c13e1a6fab
    • Instruction ID: 25a5130d2be980f96d16b4b058943b934398b817a05338b1aaa33722a9e7f48b
    • Opcode Fuzzy Hash: ea25d807aac96f0c9d0dd241a4ad9b12794653fbfb175f80958580c13e1a6fab
    • Instruction Fuzzy Hash: FD41563110929C9FEB519B28DC99BFB3BF8EF06304F2808E2D545CB192D72849C59BD8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 0040663D
      • Part of subcall function 004065A1: __EH_prolog.LIBCMT ref: 004065A6
      • Part of subcall function 0041608F: RaiseException.KERNEL32(?,?,0043F8F0,0043BD04,?,?,?,?,?,00421222,0043F8F0), ref: 004160BD
    Strings
    • @, xrefs: 004066F7
    • FileCrypt ERROR: in CSHA::AddData(), Data Length should be > 0!, xrefs: 00406652
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prolog$ExceptionRaise
    • String ID: @$FileCrypt ERROR: in CSHA::AddData(), Data Length should be > 0!
    • API String ID: 2062786585-1065258333
    • Opcode ID: 0781dca04871273c85f8855a6e1c48621275807cf1f6e6bfa0d3047ba581c293
    • Instruction ID: 997981e73dc8d4110a09ec7aad4227e8c5bcdd091e05a99c1524a72cbd23f3f4
    • Opcode Fuzzy Hash: 0781dca04871273c85f8855a6e1c48621275807cf1f6e6bfa0d3047ba581c293
    • Instruction Fuzzy Hash: 34212EB2900204ABCB149B66CC81EAE7764FB5435CF01053FF907A61D1D73ADA65C75C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: __shift_strcat_strlen
    • String ID: e+000
    • API String ID: 208078240-1027065040
    • Opcode ID: cd828e09e77ec3b97e28114ddc337a5d9a52fed1df3e5244fcbc15e30809a79e
    • Instruction ID: 38f90e8ae88eef296e2822a328e7788b1c4cd163f5aa6413e82ee0272c96d7f9
    • Opcode Fuzzy Hash: cd828e09e77ec3b97e28114ddc337a5d9a52fed1df3e5244fcbc15e30809a79e
    • Instruction Fuzzy Hash: 5121C0322883948FD71A5E789CD07E63BD05B07758F1C84EFE489CA292D679C885C759
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ___initmbctable.LIBCMT ref: 0041AD1A
    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\app.exe,00000104,75920A60,00000000,?,?,?,?,00415EFD,?,0043A478,00000060), ref: 0041AD32
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FileModuleName___initmbctable
    • String ID: C:\Users\user\Desktop\app.exe
    • API String ID: 767393020-886552919
    • Opcode ID: 66673b88aeac30b5862c7f19f0dfac2f7032082bc53584202ad8921e1cff1ff6
    • Instruction ID: 614c3b4fec6d9241ade8c6b785d03dc512eb996b59ee3b151466fb442cd8355e
    • Opcode Fuzzy Hash: 66673b88aeac30b5862c7f19f0dfac2f7032082bc53584202ad8921e1cff1ff6
    • Instruction Fuzzy Hash: 7711E3B6A05204AFDB11CBA5AC819DB3BB8EB56361B10017BF905D3241DB74AD84CB99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _strcat.LIBCMT ref: 0040A0BD
    • GetVersionExA.KERNEL32(?), ref: 0040A0E9
      • Part of subcall function 00409F46: CreateFileA.KERNEL32(?,00000000,00000003,00000000,00000003,00000000,00000000), ref: 00409F80
      • Part of subcall function 00409F46: DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00002710,?,00000000), ref: 00409FD6
      • Part of subcall function 00409F46: _strcat.LIBCMT ref: 00409FFC
      • Part of subcall function 00409F46: _strcat.LIBCMT ref: 0040A03C
      • Part of subcall function 00409F46: CloseHandle.KERNEL32(00000000), ref: 0040A044
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: _strcat$CloseControlCreateDeviceFileHandleVersion
    • String ID: WD-W
    • API String ID: 1168194892-3576189859
    • Opcode ID: 6485ba225224145f7282db6a22674a520dc022f6170582840d3fcbc66630374b
    • Instruction ID: 02ce6297c30ed129adb8a0b18ce49833eff85ca45758082e872317efe92cca16
    • Opcode Fuzzy Hash: 6485ba225224145f7282db6a22674a520dc022f6170582840d3fcbc66630374b
    • Instruction Fuzzy Hash: 1701A271D0031466DB30A760AD06BCE76689B0631CF5040F6E588B62C2E77C9E98C79E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __EH_prolog.LIBCMT ref: 00402EF5
    • lstrlenA.KERNEL32(?,?,0040311A,?,00430E0C,00000000,?,00000008,?,?,?), ref: 00402F14
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: H_prologlstrlen
    • String ID: (1D
    • API String ID: 2133942097-2129874033
    • Opcode ID: 498eaf7c655ea821dde00ffa2611ecd78ada88d880f139fa2e0e9697808eeb0f
    • Instruction ID: c5187753b58a16d9c3fce4efe3554a6c0a3d2b53ae8d320a7dd5f9bf66fc5ee2
    • Opcode Fuzzy Hash: 498eaf7c655ea821dde00ffa2611ecd78ada88d880f139fa2e0e9697808eeb0f
    • Instruction Fuzzy Hash: 1BF0EC7590021AEFCF04DFA0C955DAEB775FB58348F00853EB825A7690DB759A14CF14
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FormatMessageA.KERNEL32(00001100,00000000,00000000), ref: 0040B4ED
    • LocalFree.KERNEL32(?), ref: 0040B509
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: FormatFreeLocalMessage
    • String ID: %s: %s
    • API String ID: 1427518018-482213395
    • Opcode ID: cb34f2c211801dad6e02dc7f0dafd164b821e9fb1e5606d2b24e1b197d6c7187
    • Instruction ID: 35399d86799f3bd421e0b29904ac2acc2a0d57492efff96d11af9728831ada6b
    • Opcode Fuzzy Hash: cb34f2c211801dad6e02dc7f0dafd164b821e9fb1e5606d2b24e1b197d6c7187
    • Instruction Fuzzy Hash: A1E04F75680208FBEB115BC0ED07FDE7B38EB09745F600070FB00A80E1D6B26A14AB6D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • __lock.LIBCMT ref: 0041BA2B
      • Part of subcall function 0041882A: EnterCriticalSection.KERNEL32(?,?,?,0041540F,00000004,0043A458,0000000C,00418764,75920A60,?,00419CD6,00419D7E,00415EBE,?,0043A478,00000060), ref: 00418852
    • EnterCriticalSection.KERNEL32(?,004168F0,?,?,?,?,?,?,?,0043A4D0,0000000C), ref: 0041BA36
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CriticalEnterSection$__lock
    • String ID: XID
    • API String ID: 3410214836-3454326751
    • Opcode ID: d75ff1193b72c636b3f216a0aadf09c9e39ff4a5fc81b7c8c8ee2b59ae0aedc0
    • Instruction ID: 5e82b271eee8a0f74b3b7c1547633c1310f9165c1a2d30d2714a1c7388a6a4bf
    • Opcode Fuzzy Hash: d75ff1193b72c636b3f216a0aadf09c9e39ff4a5fc81b7c8c8ee2b59ae0aedc0
    • Instruction Fuzzy Hash: 71D022B360038283EF286671CE8974E2358EA803423A94C7FF041C2281DB3CEDD0C00C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0243A710: CloseHandle.KERNEL32(?), ref: 0243A7A6
    • HeapFree.KERNEL32(00000000,00000000), ref: 0243A5D0
    • HeapFree.KERNEL32(00000000,?), ref: 0243A5E1
    • HeapFree.KERNEL32(00000000,00000000), ref: 0243A615
    • HeapFree.KERNEL32(00000000,?), ref: 0243A626
      • Part of subcall function 0243A710: FindFirstFileW.KERNEL32(?,?), ref: 0243A8CD
      • Part of subcall function 0243A710: FindClose.KERNEL32(00000000), ref: 0243A8E0
      • Part of subcall function 0243A710: HeapFree.KERNEL32(00000000,?), ref: 0243A9F0
      • Part of subcall function 0243A710: HeapFree.KERNEL32(00000000,?), ref: 0243AA01
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseFind$FileFirstHandle
    • String ID:
    • API String ID: 1603849924-0
    • Opcode ID: 2272c71ac61a3dd81031130a97738d95f861bb584f5e815ece5f17e9109c71b1
    • Instruction ID: b472764d3a8358d8f2d6ebe99d808aada89a7685a38fddc544ad086f4c0bb779
    • Opcode Fuzzy Hash: 2272c71ac61a3dd81031130a97738d95f861bb584f5e815ece5f17e9109c71b1
    • Instruction Fuzzy Hash: 0F71E571944B40DFE325CF29C948B52BBE0FF19318F009A5DE9DA8BA62D771B994CB40
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023F224A: HeapFree.KERNEL32(00000000,?), ref: 023F22AD
      • Part of subcall function 023F224A: HeapFree.KERNEL32(00000000,?), ref: 023F22C7
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: 7436d47da2220bba85a84bbd463799655207c145791b6b4c7c0d85b92ba03481
    • Instruction ID: 1896d00ba270a19b16913f86b694f6d46ecb0b351bdf2c94a838da824d152561
    • Opcode Fuzzy Hash: 7436d47da2220bba85a84bbd463799655207c145791b6b4c7c0d85b92ba03481
    • Instruction Fuzzy Hash: 4531DC71549B80DEEBBADB34E818BD7BBA16B12308F04081DD6EB051E5CBB42599CB02
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023EC781: HeapFree.KERNEL32(00000000,?), ref: 023ED2DD
      • Part of subcall function 023EC781: HeapFree.KERNEL32(00000000,?), ref: 023ED32E
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: 4bef0ae31bae90502e3c81627d86f792bbee16bd51f9c5fa7e4bedc45fcd1624
    • Instruction ID: 4e1cab68a044a973f37367e612ef4a5fa3dbc95667f0eb30c9ac6abeddb8c61c
    • Opcode Fuzzy Hash: 4bef0ae31bae90502e3c81627d86f792bbee16bd51f9c5fa7e4bedc45fcd1624
    • Instruction Fuzzy Hash: D731CD71549B80DEEBBADB34E818BD7BBE16B12308F04081DD6EB051E5CBB42559CF12
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: e745eb650ba646566093b5f7d73ef7789397434affd1eb23f7e964ebcdd8a884
    • Instruction ID: fd15bdd9aa005943877665a3f5680d7856295188ddec097554bb816b97fb8cce
    • Opcode Fuzzy Hash: e745eb650ba646566093b5f7d73ef7789397434affd1eb23f7e964ebcdd8a884
    • Instruction Fuzzy Hash: A031CD71149B80DEEBBADB34E818BD7BBE16B12308F04081DD6EB051E5CBB42559CF12
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023F2324: HeapFree.KERNEL32(00000000,?), ref: 023F234F
      • Part of subcall function 023F2324: HeapFree.KERNEL32(00000000,?), ref: 023F236C
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: 0e1be897eb2b979f4619b931c69b15e2d75d0dbb8599f427f24b576f73885b9a
    • Instruction ID: 5f9f3e5d9b978b7c67123fc3d96fd29e55f5fd6ef7817cc22c06374003340da7
    • Opcode Fuzzy Hash: 0e1be897eb2b979f4619b931c69b15e2d75d0dbb8599f427f24b576f73885b9a
    • Instruction Fuzzy Hash: 9C31CD71549B80DEEBBADB34E818BD7BBE16B12308F44081DD6EB051E1CBB42559CB12
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023F224A: HeapFree.KERNEL32(00000000,?), ref: 023F22AD
      • Part of subcall function 023F224A: HeapFree.KERNEL32(00000000,?), ref: 023F22C7
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: 1b4cf0c473667cd3cf5f7651b7a0c9f76b8aaa1960cbe61811149101673fdb4d
    • Instruction ID: ad7c1167e65541759ee2451eafeed1161f2f217116b70be60a7503f53d6dda6a
    • Opcode Fuzzy Hash: 1b4cf0c473667cd3cf5f7651b7a0c9f76b8aaa1960cbe61811149101673fdb4d
    • Instruction Fuzzy Hash: 3A31BB71545B80DFEBBADB74E818BD7BBA1AB12308F04081DD6EB051E5CBB42599CB42
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 0042BA4E
    • LeaveCriticalSection.KERNEL32(?,?), ref: 0042BA5E
    • LocalFree.KERNEL32(?), ref: 0042BA67
    • TlsSetValue.KERNEL32(?,00000000), ref: 0042BA79
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CriticalSection$EnterFreeLeaveLocalValue
    • String ID:
    • API String ID: 2949335588-0
    • Opcode ID: adc86d93950956f94ff1fa4b69a28a4dbd768d562191854466258b1d3a764b62
    • Instruction ID: c8599666faf44035fd4f326778121f3d69334d8a3193f5103dac8be459df7837
    • Opcode Fuzzy Hash: adc86d93950956f94ff1fa4b69a28a4dbd768d562191854466258b1d3a764b62
    • Instruction Fuzzy Hash: 3D116731700214EFD720CF54E884F6AB3B4FF05315F90802EE142876A1CB79AD51CBA8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: d3b465360c70f5d90105b13eac8df75a8dbfd0673567532b97f0d7afc173ad74
    • Instruction ID: 2207acdc337426607fa903bf74583d4a54d7202cb19bdef86e22fba1a6ae6023
    • Opcode Fuzzy Hash: d3b465360c70f5d90105b13eac8df75a8dbfd0673567532b97f0d7afc173ad74
    • Instruction Fuzzy Hash: B331CE71145B80DEEBBADB74E818BD7BBE1AB12308F04081DD6EB051E5CBB42559DF06
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 023EC781: HeapFree.KERNEL32(00000000,?), ref: 023ED2DD
      • Part of subcall function 023EC781: HeapFree.KERNEL32(00000000,?), ref: 023ED32E
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: 3edb992a036c607d52959a7bb1903dfdde0df26b3d1bb48f73844fb4779decd5
    • Instruction ID: 9bfc8a2c38376e65e0000ee6c471bb5a26487f03223951a50fbce02619006e3a
    • Opcode Fuzzy Hash: 3edb992a036c607d52959a7bb1903dfdde0df26b3d1bb48f73844fb4779decd5
    • Instruction Fuzzy Hash: EE31CC71545B80DEEBBADB74E818BD7BBA1AB12308F04081DD6EB051E5CB742559CB02
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapReAlloc.KERNEL32(00000000,00000050,75920A60,00419242,75920A60,?,76EAFC30), ref: 00418C78
    • HeapAlloc.KERNEL32(00000008,000041C4,00000000,75920A60,00419242,75920A60,?,76EAFC30), ref: 00418CB1
    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 00418CCF
    • HeapFree.KERNEL32(00000000,?), ref: 00418CE6
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: AllocHeap$FreeVirtual
    • String ID:
    • API String ID: 3499195154-0
    • Opcode ID: 781063ac87fbfd1d4cad2045dae12bfd37df52046da3970f80f829b7a7e5edd2
    • Instruction ID: 00585c3f01842366698a5c53355d7c0cceb2ecdc2162a53b836031793970d5b4
    • Opcode Fuzzy Hash: 781063ac87fbfd1d4cad2045dae12bfd37df52046da3970f80f829b7a7e5edd2
    • Instruction Fuzzy Hash: E9116D742426029FDB718F28FC85D627BB6F7927607A4463EF252C21B0E7709846CF68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 023F2137
    • HeapFree.KERNEL32(00000000,?), ref: 023F2154
    • HeapFree.KERNEL32(00000000,?), ref: 023F2187
    • CloseHandle.KERNEL32(?), ref: 023F219E
      • Part of subcall function 023F2374: HeapFree.KERNEL32(00000000,?,?,?,023FC1F4), ref: 023F2393
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: f7a47db7c4b0d72e15771584b05b7481132e94a4049a2523eea03c4eb2d64e67
    • Instruction ID: b95b0be40eea4950a52bfab261929e224fe13ea64ffb0be7a1260ec612d41926
    • Opcode Fuzzy Hash: f7a47db7c4b0d72e15771584b05b7481132e94a4049a2523eea03c4eb2d64e67
    • Instruction Fuzzy Hash: EC21F731145B40EFEBBA9B74E808BD7BBA1BF12308F04081DD6DB051E1CB75255ADB56
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • HeapFree.KERNEL32(00000000,?), ref: 023ED098
    • HeapFree.KERNEL32(00000000,?), ref: 023ED0B5
    • HeapFree.KERNEL32(00000000,?), ref: 023ED0FF
    • HeapFree.KERNEL32(00000000,?), ref: 023ED118
    Memory Dump Source
    • Source File: 00000000.00000002.2022153806.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023D0000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_23d0000_app.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 9f523c772d66fdd4040073545b0759b3dec112a99356eec2c930289ab06d40bb
    • Instruction ID: bb58cab6707e048af81e2b881ee3f4db6801c06fc6ddfe818c3de45ceffee36b
    • Opcode Fuzzy Hash: 9f523c772d66fdd4040073545b0759b3dec112a99356eec2c930289ab06d40bb
    • Instruction Fuzzy Hash: AB11E731100654EBEBB99B24DC08B9677E6FF14309F180C1DE58B150E4CBB27896CF01
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • EnterCriticalSection.KERNEL32(0044AF54,?,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BD76
    • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BD88
    • LeaveCriticalSection.KERNEL32(0044AF54,?,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BD91
    • EnterCriticalSection.KERNEL32(00000000,00000000,?,00000000,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BDA3
      • Part of subcall function 0042BCDF: InitializeCriticalSection.KERNEL32(0044AF54,0042BD56,0042B7B5,00000010,?,?,00000000,?,?,0042B396,0042B349,00429E06,0040C70D), ref: 0042BCF7
    Memory Dump Source
    • Source File: 00000000.00000002.2021489881.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2021478663.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021509523.000000000042C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021520408.000000000042D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021531365.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021547346.0000000000442000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021558438.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2021581427.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_app.jbxd
    Similarity
    • API ID: CriticalSection$EnterInitialize$Leave
    • String ID:
    • API String ID: 713024617-0
    • Opcode ID: 2f1b24a4f239d3e7a57dd448b17dc9936c7578022bdd4031e6a5dfacb9bda7aa
    • Instruction ID: f612f0568f59398d43542fae4ddb9eea5b0bce547e4844d3ce0b5f2d18dd5514
    • Opcode Fuzzy Hash: 2f1b24a4f239d3e7a57dd448b17dc9936c7578022bdd4031e6a5dfacb9bda7aa
    • Instruction Fuzzy Hash: 10F06D7A11022AEFE7109F94FC84BA2B3ACFB11316FC0043BE50482011D738A869CAEC
    Uniqueness

    Uniqueness Score: -1.00%