Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
signed.exe

Overview

General Information

Sample name:signed.exe
Analysis ID:1445853
MD5:adac67fa4e7fbd2c7de600768c40ad69
SHA1:c79c40e5272ac11180cf90715156e0538336fdbf
SHA256:3904b06e1150e4e9e167eb1b63a877ed00c08320c637396f12b98e9f14d71010
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Contains functionality for read data from the clipboard
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • signed.exe (PID: 5872 cmdline: "C:\Users\user\Desktop\signed.exe" MD5: ADAC67FA4E7FBD2C7DE600768C40AD69)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: signed.exeAvira: detected
Source: C:\Windows\etrnview.exeAvira: detection malicious, Label: TR/Agent.396616
Source: C:\Windows\etrnview.exeReversingLabs: Detection: 62%
Source: signed.exeReversingLabs: Detection: 86%
Source: signed.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0042A31A FindFirstFileA,GetLastError,0_2_0042A31A
Source: unknownDNS traffic detected: query: 206.23.85.13.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
Source: signed.exe, etrnview.exe.0.drString found in binary or memory: http://www.deposchedule.com/
Source: signed.exeString found in binary or memory: http://www.reallegal.com
Source: signed.exe, etrnview.exe.0.drString found in binary or memory: http://www.reallegal.com/
Source: signed.exe, etrnview.exe.0.drString found in binary or memory: http://www.reallegal.com/binderpull.asp
Source: signed.exe, etrnview.exe.0.drString found in binary or memory: http://www.reallegal.com/binderpull.asp.http://www.deposchedule.com/By
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0041DB44 __EH_prolog,GlobalAlloc,GlobalLock,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,GlobalUnlock,GlobalReAlloc,GlobalAlloc,GlobalLock,lstrlenA,lstrlenA,GlobalUnlock,GlobalLock,GlobalUnlock,GlobalReAlloc,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0041DB44
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0041DB44 __EH_prolog,GlobalAlloc,GlobalLock,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,GlobalUnlock,GlobalReAlloc,GlobalAlloc,GlobalLock,lstrlenA,lstrlenA,GlobalUnlock,GlobalLock,GlobalUnlock,GlobalReAlloc,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0041DB44
Source: C:\Users\user\Desktop\signed.exeFile created: C:\Windows\etrnview.exeJump to behavior
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_004204000_2_00420400
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0042E5020_2_0042E502
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_004235910_2_00423591
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_004339750_2_00433975
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0041C9DD0_2_0041C9DD
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0041DB440_2_0041DB44
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0040EC340_2_0040EC34
Source: C:\Users\user\Desktop\signed.exeCode function: String function: 00429E18 appears 80 times
Source: C:\Users\user\Desktop\signed.exeCode function: String function: 00429182 appears 35 times
Source: C:\Users\user\Desktop\signed.exeCode function: String function: 00435B40 appears 31 times
Source: C:\Users\user\Desktop\signed.exeCode function: String function: 0040AC84 appears 84 times
Source: C:\Users\user\Desktop\signed.exeCode function: String function: 0040ABFB appears 85 times
Source: signed.exe, 00000000.00000000.2044838263.0000000000449000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameENVELOPE.EXE: vs signed.exe
Source: signed.exeBinary or memory string: OriginalFilenameENVELOPE.EXE: vs signed.exe
Source: signed.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal72.winEXE@1/3@1/0
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_004278A6 GetPrivateProfileStringA,GetLastError,FormatMessageA,LocalFree,0_2_004278A6
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00405D5A MessageBoxA,LoadStringA,CoInitialize,SHGetMalloc,SHGetSpecialFolderLocation,SHGetSpecialFolderLocation,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SHGetPathFromIDListA,SHGetSpecialFolderLocation,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoCreateInstance,lstrlenA,lstrcatA,lstrcatA,lstrcatA,SHChangeNotify,SHChangeNotify,LoadStringA,LoadStringA,LoadStringA,lstrlenA,lstrlenA,lstrlenA,SHChangeNotify,MessageBoxA,CoUninitialize,0_2_00405D5A
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00409099 FindResourceA,LoadResource,LockResource,FreeResource,0_2_00409099
Source: C:\Users\user\Desktop\signed.exeFile created: C:\Users\Public\Desktop\RealLegal E-Transcript Viewer.lnkJump to behavior
Source: signed.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\signed.exeFile read: C:\ProgramData\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\signed.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: signed.exeReversingLabs: Detection: 86%
Source: signed.exeString found in binary or memory: This E-Transcript file is in a temporary folder. Do you want to save it to a different folder? If you choose Yes, you will be prompted for a save location, and the transcript will be automatically re-launched from there.
Source: signed.exeString found in binary or memory: This E-Transcript file is in a temporary folder. Do you want to save it to a different folder?If you choose Yes, you will be prompted for a save location, and the transcript will be automatically re-launched from there.
Source: signed.exeString found in binary or memory: If you choose Yes, you will be prompted for a save location, and the transcript will be automatically re-launched from there.
Source: signed.exeString found in binary or memory: If you choose Yes, you will be prompted for a save location, and the transcript will be automatically re-launched from there.Could not open this E-Transcript file for reading.Could not create the destination E-Transcript file for writing.Could not launch the new copy of the E-Transcript file, will run from the temporary folder instead.c:\pnxtrvu.ini.fts.gidFileOpenLocationTempSaveLocationDisplayBottomDisplayRightDisplayTopDisplayLeftSaveToKeychainDisplayValidShowWordIndexRICHED32.DLLMainWndClassWISplit - \ .ptxTMPTEMPAM PM 0: at /Could not find the transcript file.BININC\viewhelp.hlp~ehRealLegal E-Transcript Viewer.lnkNo main application icon (or file) was defined.Setuppnxbndr.exeptxfile\shell\open\command\StringFileInfo\%04x%04x\FileVersion\VarFileInfo\TranslationA file association could not be created. Contact your system administrator for assistance." %1"ContentType\shell\open\command\ContentTypeptxfileE-Transcript Fileapplication/x-etranscript\etrnview.exeDraftFinalSealedUnsealedSignedUnsigned%s %ld%s %ld - %ld2KWd}
Source: C:\Users\user\Desktop\signed.exeFile read: C:\Users\user\Desktop\signed.exeJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: riched32.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\signed.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: RealLegal E-Transcript Viewer.lnk.0.drLNK file: ..\..\..\..\..\..\Windows\etrnview.exe
Source: RealLegal E-Transcript Viewer.lnk0.0.drLNK file: ..\..\..\Windows\etrnview.exe
Source: C:\Users\user\Desktop\signed.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: signed.exeStatic PE information: section name: RT_CURSOR
Source: signed.exeStatic PE information: section name: RT_BITMAP
Source: signed.exeStatic PE information: section name: RT_ICON
Source: signed.exeStatic PE information: section name: RT_MENU
Source: signed.exeStatic PE information: section name: RT_DIALOG
Source: signed.exeStatic PE information: section name: RT_STRING
Source: signed.exeStatic PE information: section name: RT_ACCELERATOR
Source: signed.exeStatic PE information: section name: RT_GROUP_ICON
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00433794 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00433794
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0042BE00 push eax; ret 0_2_0042BE2E
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00429E18 push eax; ret 0_2_00429E36
Source: C:\Users\user\Desktop\signed.exeFile created: C:\Windows\etrnview.exeJump to dropped file
Source: C:\Users\user\Desktop\signed.exeFile created: C:\Windows\etrnview.exeJump to dropped file
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_004017EE __EH_prolog,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,lstrlenA,MessageBoxA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,MessageBoxA,EnableWindow,UpdateWindow,lstrcpyA,lstrcatA,lstrcatA,lstrcmpiA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MessageBoxA,EnableWindow,0_2_004017EE
Source: C:\Users\user\Desktop\signed.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RealLegal E-Transcript ViewerJump to behavior
Source: C:\Users\user\Desktop\signed.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RealLegal E-Transcript Viewer\RealLegal E-Transcript Viewer.lnkJump to behavior
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00405155 IsWindowVisible,WinHelpA,GetWindowPlacement,CopyRect,IsZoomed,GetClientRect,PostQuitMessage,IsWindowVisible,IsIconic,GetClientRect,DefWindowProcA,SetWindowLongA,0_2_00405155
Source: C:\Users\user\Desktop\signed.exeDropped PE file which has not been started: C:\Windows\etrnview.exeJump to dropped file
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0042A31A FindFirstFileA,GetLastError,0_2_0042A31A
Source: signed.exe, 00000000.00000002.3284717083.0000000000619000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\Desktop\signed.exeAPI call chain: ExitProcess graph end nodegraph_0-21390
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00433794 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00433794
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00431CEA SetUnhandledExceptionFilter,0_2_00431CEA
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00431CFC SetUnhandledExceptionFilter,0_2_00431CFC
Source: C:\Users\user\Desktop\signed.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0042BB27 GetLocalTime,GetSystemTime,GetTimeZoneInformation,0_2_0042BB27
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_00430499 GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_00430499
Source: C:\Users\user\Desktop\signed.exeCode function: 0_2_0042A6BB EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,0_2_0042A6BB
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
21
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol2
Clipboard Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
signed.exe87%ReversingLabsWin32.Trojan.Ymacco
signed.exe100%AviraTR/Agent.396616
SourceDetectionScannerLabelLink
C:\Windows\etrnview.exe100%AviraTR/Agent.396616
C:\Windows\etrnview.exe62%ReversingLabsWin32.Trojan.Scar
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.reallegal.com/binderpull.asp0%Avira URL Cloudsafe
http://www.deposchedule.com/0%Avira URL Cloudsafe
http://www.reallegal.com0%Avira URL Cloudsafe
http://www.reallegal.com/binderpull.asp.http://www.deposchedule.com/By0%Avira URL Cloudsafe
http://www.reallegal.com/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
206.23.85.13.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.reallegal.com/signed.exe, etrnview.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.reallegal.com/binderpull.aspsigned.exe, etrnview.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.reallegal.com/binderpull.asp.http://www.deposchedule.com/Bysigned.exe, etrnview.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.deposchedule.com/signed.exe, etrnview.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.reallegal.comsigned.exefalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1445853
    Start date and time:2024-05-22 17:14:34 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 6s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:signed.exe
    Detection:MAL
    Classification:mal72.winEXE@1/3@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 75
    • Number of non-executed functions: 219
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: signed.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\signed.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 14:15:38 2024, mtime=Wed May 22 14:15:38 2024, atime=Wed May 22 14:15:38 2024, length=380928, window=hide
    Category:dropped
    Size (bytes):897
    Entropy (8bit):4.629970644384975
    Encrypted:false
    SSDEEP:24:8tzhEpwA/APglh8Z+IYA82+J2bTGPqygm:8hhzPgAxdMETRyg
    MD5:156293BF19D4183D208CC6AFECC124CE
    SHA1:4BD8CACA39E1EB5CD569611513F81406FDF702AE
    SHA-256:2E883DB7578228D8256EC350F8BC9ECD75D620759DEC3929242873E342267AC4
    SHA-512:013955A1A05C2B5129800971B09A2F9293A485371C33CC4323FDB16353F4B33F2B2012966B31907A65275815A15AA5D238E00A2BCDB2303086EADCABBB5318F6
    Malicious:false
    Reputation:low
    Preview:L..................F.... ...%.d.Z...%.d.Z...%.d.Z................................P.O. .:i.....+00.../C:\...................V.1.....EW.5..Windows.@......OwH.X.y....3......................7..W.i.n.d.o.w.s.....f.2......X.y .etrnview.exe..J......X.y.X.y.............................e.t.r.n.v.i.e.w...e.x.e.......F...............-.......E..............d.....C:\Windows\etrnview.exe....R.e.a.l.L.e.g.a.l. .E.-.T.r.a.n.s.c.r.i.p.t. .V.i.e.w.e.r.&.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.e.t.r.n.v.i.e.w...e.x.e...C.:.\.W.i.n.d.o.w.s.........$..................C..B..g..(.#....`.......X.......301389...........hT..CrF.f4... .y...Jc...-...-$..hT..CrF.f4... .y...Jc...-...-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
    Process:C:\Users\user\Desktop\signed.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 14:15:38 2024, mtime=Wed May 22 14:15:38 2024, atime=Wed May 22 14:15:38 2024, length=380928, window=hide
    Category:dropped
    Size (bytes):879
    Entropy (8bit):4.649885728909304
    Encrypted:false
    SSDEEP:24:8tzhEpwA/APglh8Mv+IYA82+J2bTGPqygm:8hhzPgAM3dMETRyg
    MD5:E76367F2F85A37FA1DBDA6970844E916
    SHA1:C71E648A86B6E3EFE0D9B25CFC18C9ECED551376
    SHA-256:6D05301D63937AD01E1798FCE3B79EA46736151667BE7C8AC098966889465853
    SHA-512:67570F6F2D306065C5181E084BEF3693FC1E5C3202F272C73DD4DC3E9D04F6EFB000F6319A643AAC06E40225467A7D636211D3831D14DA3E1CB1F6A12B840F61
    Malicious:false
    Reputation:low
    Preview:L..................F.... ...%.d.Z...%.d.Z...%.d.Z................................P.O. .:i.....+00.../C:\...................V.1.....EW.5..Windows.@......OwH.X.y....3......................7..W.i.n.d.o.w.s.....f.2......X.y .etrnview.exe..J......X.y.X.y.............................e.t.r.n.v.i.e.w...e.x.e.......F...............-.......E..............d.....C:\Windows\etrnview.exe....R.e.a.l.L.e.g.a.l. .E.-.T.r.a.n.s.c.r.i.p.t. .V.i.e.w.e.r.......\.....\.....\.W.i.n.d.o.w.s.\.e.t.r.n.v.i.e.w...e.x.e...C.:.\.W.i.n.d.o.w.s.........$..................C..B..g..(.#....`.......X.......301389...........hT..CrF.f4... .y...Jc...-...-$..hT..CrF.f4... .y...Jc...-...-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
    Process:C:\Users\user\Desktop\signed.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):380928
    Entropy (8bit):6.1734613399593
    Encrypted:false
    SSDEEP:6144:AKHQypT6oiKpsoQEX6npbWdhlG8dj61M65PZDeC2TqI6/qygKjJVLesH7uCicrPW:PHQypT6oiKpsoQEX6npbWdhlG8dj6h56
    MD5:F70D964D36EA0D4BFE8F1106BCD6D9BE
    SHA1:6B98EF8904948AF07757688EEAE3036A10C03A98
    SHA-256:6953A607F4219659C440D016C4C4CD2AEF5A9945085A4ABF7537A868D1219C62
    SHA-512:EF8A2725D3113BA68774A026E65A49A21B1E2CAB3437ADF6B649B2B013C8DE578976BAE3C5982BA532ECBEA457631E1D57D6FAC7D9CFB0F8A6293732C6DE4CE1
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 62%
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.....w...w...w.p.{...w.V.|...w.V.}.s.w...y...w.T.}...w...|...w.].d...w...w...w.i.d...w...v.H.w.T.|.4.w...q...w.Rich..w.........................PE..L....v.=.................`...................p....@.........................................................................,...........(t...........................................................................p.. ...P...@....................text....T.......`.................. ..`.rdata..6H...p...P...p..............@..@.data...D...........................@....rsrc...(t...........P..............@..@................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.2783295761255555
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.84%
    • RealLegal E-Transcript (12004/3) 0.12%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:signed.exe
    File size:396'616 bytes
    MD5:adac67fa4e7fbd2c7de600768c40ad69
    SHA1:c79c40e5272ac11180cf90715156e0538336fdbf
    SHA256:3904b06e1150e4e9e167eb1b63a877ed00c08320c637396f12b98e9f14d71010
    SHA512:ea4cda9dc74b67e1a73915184be4e3161000b64de3d77af37735875b0764677a6e5938c1b8138a016c99cad582873380bc9ab05f4a2f4548db59c4b1cad19b33
    SSDEEP:12288:PHQypT6oiKpsoQEX6npbWdhlG8dj6h5PZDeCcq/qybjJVLesH7uCicrPYyr2ac85:PHQypT6oiKpsoQEX6npbWdhlG8dj6rci
    TLSH:A184AF127BE08823E4F386311E656B75FB79FA162E78C68B53C46A5EFC31542CE25305
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.....w...w...w.p.{...w.V.|...w.V.}.s.w...y...w.T.}...w...|...w.].d...w...w...w.i.d...w...v.H.w.T.|.4.w...q...w.Rich..w........
    Icon Hash:2d4e5e70faca82b8
    Entrypoint:0x42a6bb
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3DFB76EC [Sat Dec 14 18:22:36 2002 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:b6aeefc612e58a3beaa47c456a910042
    Instruction
    push ebp
    mov ebp, esp
    push FFFFFFFFh
    push 00438238h
    push 0042FF90h
    mov eax, dword ptr fs:[00000000h]
    push eax
    mov dword ptr fs:[00000000h], esp
    sub esp, 58h
    push ebx
    push esi
    push edi
    mov dword ptr [ebp-18h], esp
    call dword ptr [00437214h]
    xor edx, edx
    mov dl, ah
    mov dword ptr [00446F00h], edx
    mov ecx, eax
    and ecx, 000000FFh
    mov dword ptr [00446EFCh], ecx
    shl ecx, 08h
    add ecx, edx
    mov dword ptr [00446EF8h], ecx
    shr eax, 10h
    mov dword ptr [00446EF4h], eax
    xor esi, esi
    push esi
    call 00007F275081125Fh
    pop ecx
    test eax, eax
    jne 00007F275080DD2Ah
    push 0000001Ch
    call 00007F275080DDD5h
    pop ecx
    mov dword ptr [ebp-04h], esi
    call 00007F27508133D2h
    call dword ptr [00437218h]
    mov dword ptr [00448740h], eax
    call 00007F2750813290h
    mov dword ptr [00446EA4h], eax
    call 00007F2750813039h
    call 00007F2750812F7Bh
    call 00007F2750810F4Eh
    mov dword ptr [ebp-30h], esi
    lea eax, dword ptr [ebp-5Ch]
    push eax
    call dword ptr [0043721Ch]
    call 00007F2750812F0Ch
    mov dword ptr [ebp-64h], eax
    test byte ptr [ebp-30h], 00000001h
    je 00007F275080DD28h
    movzx eax, word ptr [ebp-2Ch]
    jmp 00007F275080DD25h
    push 0000000Ah
    pop eax
    push eax
    push dword ptr [ebp-64h]
    push esi
    push esi
    call dword ptr [00437220h]
    Programming Language:
    • [C++] VS98 (6.0) build 8168
    • [EXP] VC++ 6.0 SP5 build 8804
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x39d2c0xf0.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x17428.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x370000x520.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x39b500x40.rdata
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x354f50x360006a5a5fae276ae0a2c23cd1235b3ec3fbFalse0.5645164207175926data6.5194046239212335IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x370000x48360x500038460c6c358985e4dd49abf01f00a90dFalse0.355126953125data5.086068831149444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x3c0000xc7440x90009ddf77fe13cf57aeb2ab4654f7f8670aFalse0.4037543402777778data4.893839902601005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x490000x174280x18000e3eae7483518ebcb4c553808f1b31ad4False0.43975830078125data5.123736066627297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    BININC0x49c700x9cfASCII text, with CRLF line terminatorsEnglishUnited States0.3819195539625647
    BININC0x4a6400x9d71MS Windows 3.1 help, Thu Dec 5 18:59:46 2002, 40305 bytesEnglishUnited States0.6649299094405161
    RT_CURSOR0x5ed880x134dataEnglishUnited States0.37337662337662336
    RT_CURSOR0x5eed80x134dataEnglishUnited States0.2922077922077922
    RT_BITMAP0x5b0200x568Device independent bitmap graphic, 160 x 16 x 4, image size 1280EnglishUnited States0.4147398843930636
    RT_BITMAP0x5ae900xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96EnglishUnited States0.495
    RT_BITMAP0x5af580xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96EnglishUnited States0.385
    RT_BITMAP0x5b7e00x288Device independent bitmap graphic, 32 x 34 x 4, image size 544EnglishUnited States0.25462962962962965
    RT_BITMAP0x565800x4848Device independent bitmap graphic, 400 x 299 x 8, 1 compression, image size 17440EnglishUnited States0.25810635538262
    RT_BITMAP0x5adc80xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96EnglishUnited States0.385
    RT_BITMAP0x564b80xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96EnglishUnited States0.45
    RT_BITMAP0x5b5880xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96EnglishUnited States0.34
    RT_BITMAP0x5b6500xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96EnglishUnited States0.415
    RT_BITMAP0x5b7180xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96EnglishUnited States0.465
    RT_BITMAP0x5e9d80x3b0Device independent bitmap graphic, 112 x 15 x 4, image size 840EnglishUnited States0.2521186440677966
    RT_ICON0x561b80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.21236559139784947
    RT_MENU0x543b80x5ecdataEnglishUnited States0.3449868073878628
    RT_DIALOG0x54a280xd6dataEnglishUnited States0.6728971962616822
    RT_DIALOG0x55a080x28adataEnglishUnited States0.48307692307692307
    RT_DIALOG0x54b000x3f6dataEnglishUnited States0.4408284023668639
    RT_DIALOG0x551080x406dataEnglishUnited States0.4553398058252427
    RT_DIALOG0x54ef80x20adataEnglishUnited States0.5440613026819924
    RT_DIALOG0x555480x4bcdataEnglishUnited States0.4249174917491749
    RT_DIALOG0x555100x36dataEnglishUnited States0.7962962962962963
    RT_DIALOG0x55c980x36cdataEnglishUnited States0.4554794520547945
    RT_DIALOG0x560080x1b0dataEnglishUnited States0.5879629629629629
    RT_DIALOG0x5bce00x1b6dataEnglishUnited States0.5662100456621004
    RT_DIALOG0x5e3f00x5e6dataEnglishUnited States0.4112582781456954
    RT_DIALOG0x5be980x538dataEnglishUnited States0.46107784431137727
    RT_DIALOG0x5e0b00x33edataEnglishUnited States0.46265060240963857
    RT_DIALOG0x5c6b80x6edataEnglishUnited States0.8
    RT_DIALOG0x5c3d00x2e2dataEnglishUnited States0.5094850948509485
    RT_DIALOG0x5d4a00xd6dataEnglishUnited States0.6822429906542056
    RT_DIALOG0x5d5780x4fcdataEnglishUnited States0.45141065830721006
    RT_DIALOG0x5da780x2dcdataEnglishUnited States0.48633879781420764
    RT_DIALOG0x5ba680x272dataEnglishUnited States0.5223642172523961
    RT_DIALOG0x5c7280x556dataEnglishUnited States0.44875549048316254
    RT_DIALOG0x5dd580x352dataEnglishUnited States0.4682352941176471
    RT_DIALOG0x5cc800x40adataEnglishUnited States0.49806576402321084
    RT_DIALOG0x5d0900x40adataEnglishUnited States0.4874274661508704
    RT_STRING0x5fbf00x37adataEnglishUnited States0.3382022471910112
    RT_STRING0x5ff700xa0dataEnglishUnited States0.64375
    RT_STRING0x5f8780x1eeMatlab v4 mat-file (little endian) h, numeric, rows 0, columns 0EnglishUnited States0.4493927125506073
    RT_STRING0x5f8400x32dataEnglishUnited States0.56
    RT_STRING0x5f8000x3cdataEnglishUnited States0.7
    RT_STRING0x5f3c80x436Matlab v4 mat-file (little endian) F, numeric, rows 0, columns 0EnglishUnited States0.2884972170686456
    RT_STRING0x5f3180xacdataEnglishUnited States0.5465116279069767
    RT_STRING0x5faa80xd2dataEnglishUnited States0.6142857142857143
    RT_STRING0x5fa680x3adataEnglishUnited States0.6379310344827587
    RT_STRING0x5fb800x6cdataEnglishUnited States0.7037037037037037
    RT_STRING0x600100x48dataEnglishUnited States0.6944444444444444
    RT_STRING0x603b00x78dataEnglishUnited States0.6833333333333333
    RT_STRING0x600580xa6dataEnglishUnited States0.572289156626506
    RT_STRING0x601000xb6dataEnglishUnited States0.6538461538461539
    RT_STRING0x601b80x1f8dataEnglishUnited States0.4503968253968254
    RT_ACCELERATOR0x549a80x80dataEnglishUnited States0.7265625
    RT_GROUP_CURSOR0x5f0100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
    RT_GROUP_CURSOR0x5eec00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
    RT_GROUP_ICON0x564a00x14dataEnglishUnited States1.2
    RT_VERSION0x5f0280x2ecdataEnglishUnited States0.4679144385026738
    DLLImport
    KERNEL32.dllFreeLibrary, lstrlenA, GetTempPathA, GetTempFileNameA, lstrcpyA, GetPrivateProfileStringA, GetModuleFileNameA, LoadLibraryA, WaitForSingleObject, SetEvent, ResetEvent, CreateEventA, FormatMessageA, LocalFree, GetLastError, GetProfileStringA, GetVersionExA, lstrcpynA, GetTickCount, CopyFileA, GlobalReAlloc, WritePrivateProfileStringA, GetPrivateProfileIntA, CreateFileA, ReadFile, CloseHandle, _llseek, GlobalAlloc, GlobalLock, _hread, GlobalHandle, GlobalUnlock, GlobalFree, MultiByteToWideChar, FindResourceA, SizeofResource, LoadResource, LockResource, _hwrite, FreeResource, SystemTimeToFileTime, FileTimeToLocalFileTime, FileTimeToSystemTime, GetTimeZoneInformation, GetWindowsDirectoryA, _lopen, _lcreat, _lread, _lwrite, _lclose, lstrcatA, lstrcmpiA, GetEnvironmentStringsW, FreeEnvironmentStringsW, FreeEnvironmentStringsA, UnhandledExceptionFilter, LCMapStringW, LCMapStringA, IsBadWritePtr, VirtualAlloc, VirtualFree, HeapCreate, HeapDestroy, GetEnvironmentVariableA, HeapSize, GetCurrentProcess, TerminateProcess, WriteFile, GetLocalTime, GetSystemTime, HeapValidate, HeapReAlloc, ExitProcess, GetVersion, GetCommandLineA, GetStartupInfoA, GetModuleHandleA, CreateDirectoryA, RemoveDirectoryA, FindClose, FindFirstFileA, HeapAlloc, HeapFree, RtlUnwind, DeleteFileA, GetFileAttributesA, SetFileAttributesA, WideCharToMultiByte, RaiseException, InterlockedExchange, LocalAlloc, GetEnvironmentStrings, GetProcAddress, SetHandleCount, GetStdHandle, GetFileType, WinExec, CompareStringA, SetFilePointer, SetUnhandledExceptionFilter, SetStdHandle, FlushFileBuffers, IsBadReadPtr, IsBadCodePtr, GetCPInfo, SetEndOfFile, CompareStringW, GetACP, GetOEMCP, SetEnvironmentVariableA, GetStringTypeA, GetStringTypeW
    USER32.dllLoadAcceleratorsA, SetWindowsHookA, OffsetRect, GetSystemMetrics, GetMessageA, RegisterClassA, TranslateAcceleratorA, TranslateMessage, DispatchMessageA, UnhookWindowsHook, LoadStringA, ShowWindow, GetWindowRect, MoveWindow, SendDlgItemMessageA, SetWindowTextA, GetWindow, GetDlgItemTextA, CharLowerA, SetDlgItemTextA, GetDlgItemInt, PostQuitMessage, IsZoomed, GetWindowPlacement, PtInRect, CheckDlgButton, SetDlgItemInt, InvalidateRect, LoadIconA, GetDlgItem, EndDialog, CopyRect, SetWindowPos, CreateWindowExA, SetWindowLongA, GetParent, GetWindowLongA, SetRect, DrawTextA, BeginPaint, GetPropA, RemovePropA, SetPropA, GetClassNameA, GetKeyState, IsDialogMessageA, GetFocus, IsWindowEnabled, EmptyClipboard, SetClipboardData, EndPaint, GetMenu, GetSubMenu, EnableWindow, UpdateWindow, DialogBoxParamA, MessageBoxA, SendMessageA, SetRectEmpty, DefWindowProcA, IsIconic, IsDlgButtonChecked, CheckRadioButton, LoadBitmapA, CloseClipboard, SetTimer, KillTimer, GetScrollRange, CharUpperBuffA, GetScrollInfo, LoadCursorA, SetCursor, GetCapture, GetClientRect, IsWindowVisible, WinHelpA, InvertRect, EnableScrollBar, SetActiveWindow, ReleaseCapture, SetCapture, ClientToScreen, GetDesktopWindow, PeekMessageA, CreateDialogParamA, GetScrollPos, ScrollWindow, SetScrollPos, GetDC, ReleaseDC, InflateRect, DrawTextExA, GetCursor, DestroyWindow, IsRectEmpty, SetScrollRange, DestroyCursor, GetWindowTextA, IsCharAlphaA, CharUpperA, IsCharAlphaNumericA, IsCharLowerA, IsCharUpperA, CallWindowProcA, GetCursorPos, ScreenToClient, GetSysColor, GetWindowTextLengthA, FillRect, wsprintfA, GetActiveWindow, PostMessageA, CallNextHookEx, CheckMenuItem, GetMenuItemCount, GetMenuItemInfoA, EnableMenuItem, MessageBeep, SetFocus, IsWindow, OpenClipboard, DrawMenuBar, SetMenu, wsprintfW
    GDI32.dllSetBkMode, BitBlt, SelectObject, CreateCompatibleDC, GetStockObject, DeleteObject, GetObjectA, TextOutA, SetBkColor, SetTextColor, SetTextAlign, CreatePalette, CreateFontIndirectA, SetWindowOrgEx, CreateSolidBrush, SetRectRgn, ExtTextOutA, SelectClipRgn, CreateRectRgn, GetTextExtentPointA, GetTextMetricsA, PatBlt, CreatePatternBrush, CreateBitmap, SetViewportOrgEx, GetWindowOrgEx, LPtoDP, SetViewportExtEx, GetWindowExtEx, SetMapMode, GetDeviceCaps, EnumFontFamiliesA, CreatePen, RealizePalette, SelectPalette, LineTo, MoveToEx, CreateFontA, GetCharWidthA, CreateICA, EndPage, StartPage, StartDocA, EndDoc, AbortDoc, DeleteDC, CreateDCA, GetTextAlign
    WINSPOOL.DRVOpenPrinterA, DeviceCapabilitiesA, GetPrinterA, ClosePrinter, DocumentPropertiesA
    comdlg32.dllGetOpenFileNameA, GetSaveFileNameA, CommDlgExtendedError, PrintDlgA
    ADVAPI32.dllRegCloseKey, RegQueryValueExA, RegOpenKeyExA, RegQueryValueA, RegSetValueExA, RegCreateKeyExA, RegDeleteKeyA
    SHELL32.dllSHGetMalloc, SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHChangeNotify, ShellExecuteA
    ole32.dllCoCreateInstance, CoInitialize, OleSetMenuDescriptor, StgCreateDocfile, CoUninitialize
    RPCRT4.dllUuidToStringA, RpcStringFreeA
    COMCTL32.dllInitCommonControlsEx, CreateToolbarEx
    VERSION.dllVerQueryValueA, GetFileVersionInfoA, GetFileVersionInfoSizeA
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    May 22, 2024 17:15:54.234720945 CEST5361696162.159.36.2192.168.2.6
    May 22, 2024 17:15:54.782475948 CEST5827653192.168.2.61.1.1.1
    May 22, 2024 17:15:54.820730925 CEST53582761.1.1.1192.168.2.6
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    May 22, 2024 17:15:54.782475948 CEST192.168.2.61.1.1.10x7cfbStandard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    May 22, 2024 17:15:54.820730925 CEST1.1.1.1192.168.2.60x7cfbName error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:11:15:16
    Start date:22/05/2024
    Path:C:\Users\user\Desktop\signed.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\signed.exe"
    Imagebase:0x400000
    File size:396'616 bytes
    MD5 hash:ADAC67FA4E7FBD2C7DE600768C40AD69
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:10.3%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:6.8%
      Total number of Nodes:1497
      Total number of Limit Nodes:122
      execution_graph 20300 4175c1 GetWindowLongA 20301 4175d8 20300->20301 20302 4175f1 DefWindowProcA 20301->20302 20303 4175de KiUserCallbackDispatcher 20301->20303 20304 417601 20302->20304 20303->20304 20305 40af81 20308 40ea96 _lopen 20305->20308 20309 40eab0 _llseek _hread 20308->20309 20310 40af8a 20308->20310 20311 40ead4 20309->20311 20312 40ead7 _lclose 20309->20312 20311->20312 20312->20310 20313 417785 GetWindowLongA 20314 417815 DefWindowProcA 20313->20314 20317 41779d 20313->20317 20316 4177b5 20314->20316 20315 417802 CallWindowProcA 20315->20316 20317->20315 20317->20316 20318 4172e4 20319 4174c1 20318->20319 20320 4172fb 20318->20320 20323 417593 LoadCursorA SetCursor 20319->20323 20324 4174ca 20319->20324 20321 417301 20320->20321 20322 417389 9 API calls 20320->20322 20327 417304 20321->20327 20328 41736a SetWindowLongA 20321->20328 20325 417436 FillRect FillRect FillRect FillRect 20322->20325 20326 4173d6 FillRect FillRect FillRect FillRect 20322->20326 20336 4175ba 20323->20336 20329 4174d1 20324->20329 20330 417543 20324->20330 20333 417494 FillRect DeleteObject DeleteObject DeleteObject DeleteObject 20325->20333 20326->20333 20334 417307 20327->20334 20341 417346 20327->20341 20332 41757f DefWindowProcA 20328->20332 20335 41750f SetCapture 20329->20335 20340 4174d4 20329->20340 20330->20332 20406 4170db 19 API calls 20330->20406 20332->20336 20333->20336 20338 417334 20334->20338 20339 41730a 20334->20339 20342 41752b 20335->20342 20355 414480 ShowWindow 20338->20355 20356 414490 20338->20356 20359 41afaa 20338->20359 20363 404e7c 20338->20363 20339->20332 20343 417313 BeginPaint EndPaint 20339->20343 20340->20332 20344 4174eb ReleaseCapture 20340->20344 20348 417352 SetWindowLongA 20341->20348 20407 4170db 19 API calls 20342->20407 20343->20336 20404 4170db 19 API calls 20344->20404 20345 417340 20345->20332 20347 417503 20405 41727c GetParent GetWindowRect ScreenToClient ScreenToClient 20347->20405 20348->20332 20355->20345 20408 416dd6 GetParent GetWindowRect ScreenToClient ScreenToClient 20356->20408 20360 41afb4 IsWindowVisible 20359->20360 20361 41afc9 ShowWindow 20359->20361 20360->20361 20362 41afc4 20360->20362 20361->20362 20362->20345 20364 405148 20363->20364 20366 404e94 20363->20366 20364->20345 20365 404eb4 GetClientRect 20367 404ece 20365->20367 20366->20365 20368 404f59 20367->20368 20370 404f02 IsWindowVisible 20367->20370 20412 4086ab 20368->20412 20370->20368 20372 404f0d ShowWindow 20370->20372 20426 41557f 46 API calls 20372->20426 20373 416dd6 5 API calls 20375 404f79 ShowWindow 20373->20375 20415 40599a 20375->20415 20376 404f2d ShowWindow 20380 41afaa 2 API calls 20376->20380 20382 404f54 20380->20382 20382->20364 20384 416dd6 5 API calls 20385 404fbf ShowWindow 20384->20385 20386 4086ab GetWindowRect 20385->20386 20387 404fda 20386->20387 20387->20364 20388 405015 20387->20388 20389 4050ff 20387->20389 20390 41afaa 2 API calls 20388->20390 20391 41afaa 2 API calls 20389->20391 20392 405022 ShowWindow 20390->20392 20393 40510c ShowWindow 20391->20393 20394 405042 20392->20394 20398 4050a2 20392->20398 20396 405132 InvalidateRect 20393->20396 20395 416dd6 5 API calls 20394->20395 20397 40505d 20395->20397 20396->20364 20402 416dd6 5 API calls 20397->20402 20399 416dd6 5 API calls 20398->20399 20400 4050de 20399->20400 20401 416dd6 5 API calls 20400->20401 20403 40509a 20401->20403 20402->20403 20403->20396 20404->20347 20405->20345 20406->20342 20407->20332 20409 416e31 MoveWindow 20408->20409 20410 416e17 20408->20410 20411 4144ad 20409->20411 20410->20409 20410->20411 20411->20345 20413 4086ba GetWindowRect 20412->20413 20414 404f66 20412->20414 20413->20414 20414->20373 20416 4059b4 20415->20416 20417 4059af 20415->20417 20420 4059c5 20416->20420 20429 406d9d 11 API calls 20416->20429 20428 406dde 10 API calls 20417->20428 20427 408646 SendMessageA SendMessageA SendMessageA 20420->20427 20422 404f95 20423 417754 IsWindow 20422->20423 20424 41776a GetWindowRect 20423->20424 20425 404fa0 20423->20425 20424->20425 20425->20384 20426->20376 20427->20422 20428->20416 20429->20420 20430 406aa6 20431 406b08 20430->20431 20432 406aaf 20430->20432 20435 4146cc GetClientRect 20431->20435 20436 4146eb SetScrollRange 20435->20436 20438 406b12 20436->20438 20439 41470b 20436->20439 20441 41d1c2 GetScrollRange ScrollWindow SetScrollPos 20439->20441 20441->20438 20442 403447 20443 403457 20442->20443 20444 40356d 20442->20444 20443->20444 20445 403574 GetParent 20443->20445 20446 40346b 20443->20446 20464 416d18 GetSystemMetrics GetSystemMetrics 20445->20464 20446->20444 20448 403480 20446->20448 20449 403505 SendDlgItemMessageA 20446->20449 20450 403501 KiUserCallbackDispatcher 20448->20450 20453 403483 20448->20453 20449->20450 20452 40352a SendDlgItemMessageA 20449->20452 20450->20444 20451 4035f9 GetDlgItem KiUserCallbackDispatcher 20451->20444 20456 40355a 20452->20456 20457 40353c SendDlgItemMessageA 20452->20457 20453->20444 20458 4034a4 SendDlgItemMessageA 20453->20458 20459 4034cd 20453->20459 20454 4035a8 lstrlenA 20460 4035c2 SendDlgItemMessageA SendDlgItemMessageA 20454->20460 20461 403588 20454->20461 20456->20450 20456->20452 20457->20456 20458->20459 20462 4034b6 SendMessageA 20458->20462 20459->20444 20463 4034d7 SendDlgItemMessageA GetDlgItem EnableWindow 20459->20463 20460->20461 20461->20451 20461->20454 20462->20444 20463->20444 20465 416d44 GetWindowRect GetWindowRect 20464->20465 20466 416d3b GetDesktopWindow 20464->20466 20468 416d97 MoveWindow 20465->20468 20466->20465 20468->20461 20469 414b66 GetWindowLongA 20470 414b7d 20469->20470 20471 414b83 20470->20471 20472 414b96 DefWindowProcA 20470->20472 20475 406b1d 20471->20475 20473 414b94 20472->20473 20476 406b40 20475->20476 20477 406b2c 20475->20477 20481 4147a5 20476->20481 20515 406c64 14 API calls 20477->20515 20480 406b53 20480->20473 20482 4147c0 20481->20482 20483 4148f3 20481->20483 20484 4148e7 20482->20484 20485 4147c6 20482->20485 20486 414900 20483->20486 20487 4149af 20483->20487 20520 41d695 48 API calls 20484->20520 20492 4147cf 20485->20492 20500 41486d 20485->20500 20490 414969 20486->20490 20491 41490e 20486->20491 20501 414808 20486->20501 20524 41d148 10 API calls 20487->20524 20523 41d83c 44 API calls 20490->20523 20494 414911 20491->20494 20495 414937 20491->20495 20497 414842 BeginPaint EndPaint 20492->20497 20498 4147dd 20492->20498 20492->20501 20493 414823 20499 414982 DefWindowProcA 20493->20499 20493->20501 20494->20493 20521 41d805 GetCapture KillTimer ReleaseCapture 20494->20521 20495->20501 20510 41495b 20495->20510 20497->20501 20498->20501 20504 4147e7 20498->20504 20505 41480d 20498->20505 20499->20501 20518 41cc21 GetDC SelectObject GetTextMetricsA SelectObject ReleaseDC 20500->20518 20501->20480 20504->20499 20508 4147f2 20504->20508 20517 414719 9 API calls 20505->20517 20507 4148b7 20519 41cc21 GetDC SelectObject GetTextMetricsA SelectObject ReleaseDC 20507->20519 20516 414610 31 API calls 20508->20516 20522 41d6e0 16 API calls 20510->20522 20513 414967 20513->20499 20514 4148ca SetWindowLongA 20514->20501 20515->20476 20516->20501 20517->20493 20518->20507 20519->20514 20520->20493 20521->20493 20522->20513 20523->20499 20524->20501 20525 430484 20526 430492 20525->20526 20527 43048d 20525->20527 20529 430499 20527->20529 20548 42a0c0 20529->20548 20532 4304cc GetTimeZoneInformation 20537 4304df WideCharToMultiByte 20532->20537 20544 4305aa _wctomb_s 20532->20544 20533 4305c2 _wctomb_s 20533->20544 20554 429f58 20533->20554 20536 4305f0 _wctomb_s 20565 42a005 20536->20565 20538 43056c WideCharToMultiByte 20537->20538 20538->20544 20541 4305fd _wctomb_s 20541->20544 20568 42a4bd 20541->20568 20544->20526 20545 42a4bd _wctomb_s 6 API calls 20546 43066e 20545->20546 20546->20544 20547 42a4bd _wctomb_s 6 API calls 20546->20547 20547->20544 20549 42a0d2 20548->20549 20550 42a12f 20548->20550 20549->20550 20552 42a0e3 _wctomb_s 20549->20552 20579 42f3ac 43 API calls _wctomb_s 20549->20579 20550->20532 20550->20533 20552->20550 20574 42f36d 20552->20574 20555 429f64 20554->20555 20556 429f80 20554->20556 20557 429f84 ctype 20555->20557 20558 429f6e ctype 20555->20558 20556->20536 20559 429faf 20557->20559 20562 429f9e 20557->20562 20560 429fb0 HeapFree 20558->20560 20561 429f7a 20558->20561 20559->20560 20560->20556 20596 42dd24 VirtualFree VirtualFree HeapFree ctype 20561->20596 20597 42edda VirtualFree HeapFree VirtualFree ctype 20562->20597 20598 42a017 20565->20598 20570 42a4c5 20568->20570 20572 42a4f3 20570->20572 20615 42f4f9 6 API calls _wctomb_s 20570->20615 20573 42a53a 20572->20573 20616 42f4f9 6 API calls _wctomb_s 20572->20616 20573->20544 20573->20545 20575 42f376 20574->20575 20576 42f37a 20574->20576 20575->20552 20580 432d3b 20576->20580 20579->20552 20581 432d6e CompareStringW 20580->20581 20583 432d83 _wctomb_s 20580->20583 20582 432d8b CompareStringA 20581->20582 20581->20583 20582->20583 20592 42f399 20582->20592 20584 432de4 CompareStringA 20583->20584 20585 432dff 20583->20585 20584->20592 20586 432eb9 MultiByteToWideChar 20585->20586 20587 432e3e GetCPInfo 20585->20587 20585->20592 20588 432ed5 _wctomb_s 20586->20588 20586->20592 20589 432e53 20587->20589 20587->20592 20590 432f11 MultiByteToWideChar 20588->20590 20588->20592 20589->20586 20589->20592 20591 432f2b MultiByteToWideChar 20590->20591 20590->20592 20591->20592 20593 432f43 _wctomb_s 20591->20593 20592->20552 20593->20592 20594 432f77 MultiByteToWideChar 20593->20594 20594->20592 20595 432f8e CompareStringW 20594->20595 20595->20592 20596->20556 20597->20556 20599 42a014 20598->20599 20601 42a01e _wctomb_s 20598->20601 20599->20541 20601->20599 20602 42a043 20601->20602 20603 42a052 20602->20603 20607 42a067 20602->20607 20604 42a060 20603->20604 20613 42e04d 5 API calls _wctomb_s 20603->20613 20606 42a0a6 RtlAllocateHeap 20604->20606 20609 42a065 20604->20609 20608 42a0b5 20606->20608 20607->20604 20607->20606 20610 42a087 20607->20610 20608->20601 20609->20601 20614 42ee1f 6 API calls _wctomb_s 20610->20614 20612 42a092 20612->20606 20612->20608 20613->20604 20614->20612 20615->20570 20616->20572 20617 41b308 20618 41b4c1 20617->20618 20619 41b326 20617->20619 20622 41b51d SetFocus 20618->20622 20623 41b34a 20618->20623 20620 41b4a5 20619->20620 20621 41b32e 20619->20621 20651 41b689 20620->20651 20625 41b337 20621->20625 20626 41b46c SetWindowLongA SetScrollRange 20621->20626 20658 41b557 GetDC GetClientRect InvertRect SetCapture ReleaseDC 20622->20658 20628 41b540 DefWindowProcA 20623->20628 20634 41b4d9 20623->20634 20629 41b456 SetWindowLongA 20625->20629 20630 41b33e 20625->20630 20626->20628 20628->20634 20629->20628 20631 41b343 20630->20631 20632 41b3aa GetClientRect BeginPaint 20630->20632 20631->20623 20657 41ba52 15 API calls 20631->20657 20633 41b432 EndPaint 20632->20633 20636 41b3cd EnableScrollBar 20632->20636 20633->20623 20633->20628 20638 41b3f7 20636->20638 20638->20633 20640 42286e 20638->20640 20641 422894 20640->20641 20642 4228a0 SelectObject GetTextMetricsA 20641->20642 20643 422898 20641->20643 20644 42292f 7 API calls 20642->20644 20646 4228d3 20642->20646 20643->20638 20650 422925 SelectObject 20644->20650 20646->20650 20659 416e49 20646->20659 20650->20643 20652 41b6a1 20651->20652 20653 41b69b GetCapture 20651->20653 20654 41b6f6 20652->20654 20655 41b6b4 PtInRect 20652->20655 20653->20652 20654->20623 20655->20654 20656 41b6db GetDC InvertRect ReleaseDC 20655->20656 20656->20654 20657->20623 20658->20628 20660 416e65 GetTextExtentPointA 20659->20660 20661 416e5a lstrlenA 20659->20661 20662 416e85 GetTextExtentPointA 20660->20662 20663 416f14 TextOutA 20660->20663 20661->20660 20665 416e99 20662->20665 20664 416f25 20663->20664 20673 422802 SelectObject GetStockObject SelectObject 20664->20673 20666 416eb3 20665->20666 20667 416ea5 GetTextExtentPointA 20665->20667 20668 416ed2 20666->20668 20669 416ebd TextOutA 20666->20669 20667->20665 20670 416ee9 GetTextExtentPointA 20668->20670 20671 416efd 20668->20671 20669->20668 20670->20668 20670->20671 20671->20664 20672 416f01 TextOutA 20671->20672 20672->20664 20676 41fc3f GetCharWidthA GetTextExtentPointA GetTextMetricsA 20673->20676 20678 41fcce ctype _wctomb_s 20676->20678 20677 41ff0c SelectObject 20677->20650 20678->20677 20680 40ae78 20678->20680 20683 40ad6c 20680->20683 20691 429fc1 GetFileAttributesA 20683->20691 20685 40ad94 lstrcmpiA 20687 40ad81 20685->20687 20686 40add4 20688 40adee 20686->20688 20694 40bfe0 20686->20694 20697 40c0b5 20686->20697 20687->20685 20687->20686 20687->20688 20688->20678 20692 429fd0 GetLastError 20691->20692 20693 429fdc 20691->20693 20692->20693 20693->20687 20702 40e44d 20694->20702 20696 40bfeb 20696->20688 20709 40e538 20697->20709 20700 40c0eb _wctomb_s 20700->20688 20703 40e457 __EH_prolog 20702->20703 20706 411127 20703->20706 20705 40e464 20705->20696 20707 42a005 _wctomb_s 12 API calls 20706->20707 20708 411134 20707->20708 20708->20705 20743 42b134 20709->20743 20711 40e54b 20747 40e4ef 20711->20747 20714 40e578 lstrlenA _llseek _hread 20715 40e5bd 20714->20715 20716 40e624 20715->20716 20717 40e5ea lstrcmpiA 20715->20717 20739 40c0cf 20715->20739 20719 40e631 _llseek 20716->20719 20717->20716 20718 40e601 _llseek _hread 20717->20718 20718->20719 20750 40e753 20719->20750 20721 40e64c 20722 40e6fc 20721->20722 20723 40e753 9 API calls 20721->20723 20724 40e710 20722->20724 20727 429f58 ctype 7 API calls 20722->20727 20722->20739 20726 40e674 20723->20726 20725 40e721 20724->20725 20728 429f58 ctype 7 API calls 20724->20728 20729 40e72d _lclose 20725->20729 20725->20739 20726->20722 20730 40e753 9 API calls 20726->20730 20727->20724 20728->20725 20729->20739 20731 40e6a2 20730->20731 20731->20722 20732 42a005 _wctomb_s 12 API calls 20731->20732 20733 40e6b2 20732->20733 20734 42a005 _wctomb_s 12 API calls 20733->20734 20735 40e6be 20734->20735 20736 40e753 9 API calls 20735->20736 20737 40e6de 20736->20737 20737->20722 20738 40e753 9 API calls 20737->20738 20738->20722 20739->20700 20740 429e37 20739->20740 20741 42a017 _wctomb_s 12 API calls 20740->20741 20742 429e42 20741->20742 20742->20700 20744 42b13d _wctomb_s 20743->20744 20746 42b14a _wctomb_s 20743->20746 20745 42a005 _wctomb_s 12 API calls 20744->20745 20745->20746 20746->20711 20748 40e511 20747->20748 20749 40e4fd _lopen 20747->20749 20748->20714 20748->20739 20749->20748 20751 40e4ef _lopen 20750->20751 20752 40e761 20751->20752 20753 40e889 _llseek 20752->20753 20754 40e76e 20752->20754 20757 40e8a3 _hread 20753->20757 20761 40e870 _wctomb_s 20753->20761 20755 40e7b6 _wctomb_s 20754->20755 20756 40e787 _llseek _hread 20754->20756 20758 40e7ed _llseek _hread 20755->20758 20759 40e818 20755->20759 20756->20755 20757->20761 20758->20759 20760 40e844 _llseek _hread 20759->20760 20759->20761 20760->20761 20761->20721 20767 405aec GetWindowLongA 20768 405b03 20767->20768 20769 405b13 20768->20769 20770 405b1c DefWindowProcA 20768->20770 20773 405155 20769->20773 20772 405b1a 20770->20772 20774 4053a7 20773->20774 20775 40516b 20773->20775 20776 405350 20774->20776 20781 4053b6 20774->20781 20799 405198 20774->20799 20779 405178 20775->20779 20780 405379 SetWindowLongA 20775->20780 20775->20799 20777 405361 DefWindowProcA 20776->20777 20778 40535a 20776->20778 20785 4051ae 20777->20785 20816 408619 SendMessageA SendMessageA 20778->20816 20783 405341 20779->20783 20784 405183 20779->20784 20780->20777 20786 4053c9 20781->20786 20787 4053bb 20781->20787 20783->20776 20815 406a76 GetWindowRect SendMessageA 20783->20815 20788 4052b5 IsIconic 20784->20788 20789 40518b 20784->20789 20785->20772 20818 401000 321 API calls 20786->20818 20787->20777 20817 405493 67 API calls 20787->20817 20788->20777 20791 4052c6 GetClientRect 20788->20791 20793 405282 20789->20793 20794 405193 20789->20794 20811 4052dd 20791->20811 20793->20777 20795 405296 IsWindowVisible 20793->20795 20798 4051eb 20794->20798 20794->20799 20801 4051ca IsWindowVisible 20794->20801 20795->20777 20795->20799 20797 4053e2 20797->20777 20802 405205 GetWindowPlacement CopyRect 20798->20802 20803 4051f5 WinHelpA 20798->20803 20799->20777 20799->20785 20800 404e7c 72 API calls 20800->20799 20801->20798 20804 4051d5 20801->20804 20805 405275 PostQuitMessage 20802->20805 20806 405236 IsZoomed 20802->20806 20803->20802 20814 4154d2 10 API calls codecvt 20804->20814 20805->20777 20806->20805 20808 405246 GetClientRect 20806->20808 20810 405261 20808->20810 20809 4051e2 20812 404e7c 72 API calls 20809->20812 20810->20805 20811->20800 20813 4051e9 20812->20813 20813->20785 20814->20809 20815->20776 20816->20777 20817->20799 20818->20797 20819 4022ee 20820 402303 20819->20820 20821 4025e4 BeginPaint EndPaint 20819->20821 20822 402468 6 API calls 20820->20822 20823 40230c 20820->20823 20845 402316 20821->20845 20826 4024d6 20822->20826 20824 402313 20823->20824 20825 40232e LoadBitmapA GetObjectA 20823->20825 20827 40231d KiUserCallbackDispatcher 20824->20827 20824->20845 20828 40235a SetWindowPos DeleteObject 20825->20828 20829 40250d GetStockObject SelectObject SetRect SetBkMode 20826->20829 20831 4024f1 BitBlt 20826->20831 20827->20845 20846 4038b4 20828->20846 20832 402549 DrawTextA DrawTextA 20829->20832 20833 40257c 20829->20833 20831->20829 20832->20833 20836 4025b8 SetBkMode SelectObject SelectObject DeleteObject DeleteDC 20833->20836 20837 40258a SetRect DrawTextA 20833->20837 20835 40239b CreateWindowExA 20838 429f58 ctype 7 API calls 20835->20838 20836->20845 20837->20836 20839 4023d5 GetStockObject SendMessageA 20838->20839 20840 4038b4 13 API calls 20839->20840 20841 4023fb CreateWindowExA 20840->20841 20842 429f58 ctype 7 API calls 20841->20842 20843 402431 GetStockObject SendMessageA SetWindowLongA GetParent 20842->20843 20844 416d18 6 API calls 20843->20844 20844->20845 20847 42a005 _wctomb_s 12 API calls 20846->20847 20848 4038c7 LoadStringA 20847->20848 20848->20835 20849 407b70 14 API calls 20850 4072f0 20852 42a043 12 API calls 20850->20852 20854 40727a 20850->20854 20851 4072f5 20852->20851 20857 41f961 20854->20857 20856 407297 20856->20851 20858 41f96b __EH_prolog 20857->20858 20875 41e653 20858->20875 20860 41f987 20881 409a82 20860->20881 20862 41f9aa 20873 41fa6a ctype 20862->20873 20945 40c76c 20862->20945 20872 4096ec 22 API calls 20872->20873 20873->20856 20876 41e65d __EH_prolog 20875->20876 20877 429e37 12 API calls 20876->20877 20878 41e6f4 20876->20878 20879 41e6e1 20877->20879 20878->20860 20879->20878 21199 40b1ff 22 API calls 20879->21199 20882 409a8c __EH_prolog 20881->20882 21200 409609 20882->21200 20885 409699 19 API calls 20886 409aab 20885->20886 21205 4099a9 20886->21205 20889 42a005 _wctomb_s 12 API calls 20890 409ac5 20889->20890 20891 42a005 _wctomb_s 12 API calls 20890->20891 20892 409ace 20891->20892 20893 42a005 _wctomb_s 12 API calls 20892->20893 20894 409adb 20893->20894 20895 42a005 _wctomb_s 12 API calls 20894->20895 20896 409ae9 20895->20896 20897 42a005 _wctomb_s 12 API calls 20896->20897 20898 409af2 20897->20898 20899 42a005 _wctomb_s 12 API calls 20898->20899 20900 409aff 20899->20900 20901 42a005 _wctomb_s 12 API calls 20900->20901 20902 409b08 20901->20902 20903 42a005 _wctomb_s 12 API calls 20902->20903 20904 409b11 20903->20904 20905 42a005 _wctomb_s 12 API calls 20904->20905 20906 409b1a 20905->20906 20907 429e37 12 API calls 20906->20907 20908 409b27 20907->20908 20909 42a005 _wctomb_s 12 API calls 20908->20909 20910 409b78 20909->20910 20911 42a005 _wctomb_s 12 API calls 20910->20911 20912 409b84 20911->20912 20913 42a005 _wctomb_s 12 API calls 20912->20913 20914 409b91 20913->20914 20915 42a005 _wctomb_s 12 API calls 20914->20915 20916 409b9d 20915->20916 20917 42a005 _wctomb_s 12 API calls 20916->20917 20918 409ba9 20917->20918 20919 42a005 _wctomb_s 12 API calls 20918->20919 20920 409bb5 20919->20920 20921 42a005 _wctomb_s 12 API calls 20920->20921 20922 409bc2 20921->20922 20923 42a005 _wctomb_s 12 API calls 20922->20923 20924 409bcf 20923->20924 20925 42a005 _wctomb_s 12 API calls 20924->20925 20926 409bdb 20925->20926 20927 42a005 _wctomb_s 12 API calls 20926->20927 20928 409be7 20927->20928 20929 42a005 _wctomb_s 12 API calls 20928->20929 20930 409bf3 20929->20930 20931 42a005 _wctomb_s 12 API calls 20930->20931 20932 409c00 20931->20932 20933 42a005 _wctomb_s 12 API calls 20932->20933 20934 409c0d 20933->20934 20935 42a005 _wctomb_s 12 API calls 20934->20935 20936 409c1a 20935->20936 20937 42a005 _wctomb_s 12 API calls 20936->20937 20938 409c26 20937->20938 20939 42a005 _wctomb_s 12 API calls 20938->20939 20940 409c32 20939->20940 20941 42a005 _wctomb_s 12 API calls 20940->20941 20942 409c41 20941->20942 21208 409e77 lstrcpyA lstrcpyA 20942->21208 20946 40c776 __EH_prolog _wctomb_s 20945->20946 20947 40e4ef _lopen 20946->20947 20948 40c797 20947->20948 20949 40e753 9 API calls 20948->20949 20970 40d9c2 20948->20970 20951 40c7bc 20949->20951 20950 40e753 9 API calls 20950->20951 20951->20950 20952 40c8e3 20951->20952 20953 40e753 9 API calls 20952->20953 20954 40c8f5 20953->20954 20955 40c99d 20954->20955 20956 40e753 9 API calls 20954->20956 20957 40e753 9 API calls 20955->20957 21019 40ca89 20955->21019 21000 40c91e 20956->21000 20959 40c9ba 20957->20959 20958 40caa9 20963 40e753 9 API calls 20958->20963 21113 40cd51 20958->21113 20962 40e753 9 API calls 20959->20962 20960 40e753 9 API calls 20960->20958 20961 40e753 9 API calls 20961->21000 20972 40c9e5 20962->20972 20966 40caed 20963->20966 20964 40e753 9 API calls 20965 40cd6e 20964->20965 20971 40e753 9 API calls 20965->20971 20974 40e753 9 API calls 20966->20974 20967 40e753 9 API calls 20973 40cdf5 20967->20973 20968 40d7c8 20968->20970 20976 40e753 9 API calls 20968->20976 20969 40d11d 20969->20968 20975 40e753 9 API calls 20969->20975 21149 40a12f 20970->21149 20977 40cd8c 20971->20977 20978 40e753 9 API calls 20972->20978 20979 40e753 9 API calls 20973->20979 20980 40cb12 20974->20980 20981 40d14e 20975->20981 20982 40d7e5 20976->20982 20983 40e753 9 API calls 20977->20983 20984 40ca13 20978->20984 20985 40ce0f 20979->20985 20986 40e753 9 API calls 20980->20986 20991 40e753 9 API calls 20981->20991 20998 40e753 9 API calls 20982->20998 20987 40cdaa 20983->20987 20988 40e753 9 API calls 20984->20988 20989 40e753 9 API calls 20985->20989 20990 40cb36 20986->20990 20992 40e753 9 API calls 20987->20992 20994 40ca36 20988->20994 20995 40ce29 20989->20995 21002 40e753 9 API calls 20990->21002 20997 40d180 20991->20997 20999 40cdc8 20992->20999 20993 40a03b 21 API calls 20993->21000 21010 40e753 9 API calls 20994->21010 20996 40e753 9 API calls 20995->20996 21001 40ce43 20996->21001 21003 40e753 9 API calls 20997->21003 21004 40d816 20998->21004 20999->20967 20999->20969 21000->20955 21000->20961 21000->20993 21005 409668 29 API calls 21000->21005 21006 40e753 9 API calls 21001->21006 21007 40cb65 21002->21007 21008 40d1a7 21003->21008 21257 40a34a 21004->21257 21005->21000 21011 40ce5d 21006->21011 21012 40e753 9 API calls 21007->21012 21023 40e753 9 API calls 21008->21023 21014 40ca65 21010->21014 21016 40ce9d 21011->21016 21222 40da9b 21011->21222 21017 40cb89 21012->21017 21015 40e753 9 API calls 21014->21015 21015->21019 21022 40e753 9 API calls 21016->21022 21021 40e753 9 API calls 21017->21021 21018 40e753 9 API calls 21024 40d847 21018->21024 21019->20958 21019->20960 21025 40cba0 21021->21025 21026 40ceb3 21022->21026 21027 40d1d8 21023->21027 21024->20970 21031 42a005 _wctomb_s 12 API calls 21024->21031 21028 40e753 9 API calls 21025->21028 21029 40e753 9 API calls 21026->21029 21030 40e753 9 API calls 21027->21030 21032 40cbb7 21028->21032 21033 40cecd 21029->21033 21034 40d1ff 21030->21034 21088 40d865 ctype 21031->21088 21039 40e753 9 API calls 21032->21039 21035 40cfc5 21033->21035 21037 429f58 ctype 7 API calls 21033->21037 21038 40e753 9 API calls 21034->21038 21036 40e753 9 API calls 21035->21036 21040 40cfdb 21036->21040 21041 40ceea 21037->21041 21042 40d230 21038->21042 21043 40cbe5 21039->21043 21044 40d020 21040->21044 21047 429f58 ctype 7 API calls 21040->21047 21045 42a005 _wctomb_s 12 API calls 21041->21045 21048 40e753 9 API calls 21042->21048 21046 40e753 9 API calls 21043->21046 21049 40e753 9 API calls 21044->21049 21069 40cefd 21045->21069 21050 40cc09 21046->21050 21051 40cff3 21047->21051 21052 40d257 21048->21052 21053 40d03c 21049->21053 21058 40e753 9 API calls 21050->21058 21054 42a005 _wctomb_s 12 API calls 21051->21054 21059 40e753 9 API calls 21052->21059 21061 40e753 9 API calls 21053->21061 21055 40cffe 21054->21055 21056 40e753 9 API calls 21055->21056 21056->21044 21057 40e753 9 API calls 21057->21069 21062 40cc37 21058->21062 21063 40d288 21059->21063 21060 40e753 9 API calls 21060->21088 21064 40d06d 21061->21064 21065 40e753 9 API calls 21062->21065 21066 40e753 9 API calls 21063->21066 21068 40e753 9 API calls 21064->21068 21070 40cc5b 21065->21070 21071 40d2af 21066->21071 21067 42a005 _wctomb_s 12 API calls 21067->21088 21072 40d094 21068->21072 21069->21035 21069->21057 21073 42a005 _wctomb_s 12 API calls 21069->21073 21076 40e753 9 API calls 21070->21076 21077 40e753 9 API calls 21071->21077 21075 40e753 9 API calls 21072->21075 21073->21069 21079 40d0c5 21075->21079 21080 40cc89 21076->21080 21078 40d2e0 21077->21078 21082 40e753 9 API calls 21078->21082 21083 40e753 9 API calls 21079->21083 21084 40e753 9 API calls 21080->21084 21085 40d30a 21082->21085 21086 40d0ec 21083->21086 21087 40ccad 21084->21087 21089 40d340 21085->21089 21090 42a005 _wctomb_s 12 API calls 21085->21090 21095 40e753 9 API calls 21086->21095 21092 40e753 9 API calls 21087->21092 21088->20970 21088->21060 21088->21067 21264 411f6e 12 API calls __EH_prolog 21088->21264 21265 411faf 19 API calls 21088->21265 21266 411f4c 7 API calls codecvt 21088->21266 21091 40e753 9 API calls 21089->21091 21094 40d325 21090->21094 21096 40d366 21091->21096 21097 40ccdb 21092->21097 21098 40e753 9 API calls 21094->21098 21095->20969 21101 40e753 9 API calls 21096->21101 21099 40e753 9 API calls 21097->21099 21098->21089 21100 40ccff 21099->21100 21105 40e753 9 API calls 21100->21105 21102 40d397 21101->21102 21103 40e753 9 API calls 21102->21103 21104 40d3c1 21103->21104 21106 40d3f7 21104->21106 21108 42a005 _wctomb_s 12 API calls 21104->21108 21107 40cd2d 21105->21107 21109 40e753 9 API calls 21106->21109 21110 40e753 9 API calls 21107->21110 21111 40d3dc 21108->21111 21112 40d41d 21109->21112 21110->21113 21114 40e753 9 API calls 21111->21114 21115 40e753 9 API calls 21112->21115 21113->20964 21113->20999 21114->21106 21116 40d44e 21115->21116 21117 40e753 9 API calls 21116->21117 21118 40d475 21117->21118 21119 40e753 9 API calls 21118->21119 21120 40d4a6 21119->21120 21121 40e753 9 API calls 21120->21121 21122 40d4cd 21121->21122 21123 40e753 9 API calls 21122->21123 21124 40d4fe 21123->21124 21125 40e753 9 API calls 21124->21125 21126 40d525 21125->21126 21127 40e753 9 API calls 21126->21127 21128 40d556 21127->21128 21129 40e753 9 API calls 21128->21129 21130 40d57d 21129->21130 21131 40e753 9 API calls 21130->21131 21132 40d5ae 21131->21132 21133 40e753 9 API calls 21132->21133 21134 40d5d5 21133->21134 21135 40e753 9 API calls 21134->21135 21136 40d607 21135->21136 21137 40e753 9 API calls 21136->21137 21138 40d62e 21137->21138 21139 40e753 9 API calls 21138->21139 21140 40d660 21139->21140 21141 40e753 9 API calls 21140->21141 21142 40d68a 21141->21142 21142->20968 21263 40a302 7 API calls ctype 21142->21263 21144 40d6a2 21145 42a005 _wctomb_s 12 API calls 21144->21145 21147 40d6b1 21145->21147 21146 40e753 9 API calls 21146->21147 21147->20968 21147->21146 21148 42a005 12 API calls _wctomb_s 21147->21148 21148->21147 21150 40a140 21149->21150 21151 40a170 21149->21151 21150->21151 21153 40a162 21150->21153 21154 40a16b 21150->21154 21152 40a1b0 21151->21152 21158 40a1a2 21151->21158 21159 40a1ab 21151->21159 21156 4096ec 22 API calls 21152->21156 21165 40a259 21152->21165 21280 42a880 24 API calls 2 library calls 21153->21280 21157 42a005 _wctomb_s 12 API calls 21154->21157 21163 40a1cd lstrcpyA lstrcpyA 21156->21163 21157->21151 21281 42a880 24 API calls 2 library calls 21158->21281 21161 42a005 _wctomb_s 12 API calls 21159->21161 21161->21152 21162 40a168 21162->21151 21168 40a1ed _wctomb_s 21163->21168 21164 40a1a8 21164->21152 21166 40a39a 67 API calls 21165->21166 21169 40a28f 21165->21169 21166->21165 21167 40a24b lstrcpyA 21167->21165 21168->21167 21267 40a39a 21169->21267 21172 40a39a 67 API calls 21173 40a2b3 21172->21173 21174 40a2d1 21173->21174 21175 40a39a 67 API calls 21173->21175 21176 40a2f7 21174->21176 21177 40a39a 67 API calls 21174->21177 21175->21174 21178 4096ec 21176->21178 21177->21176 21284 409739 21178->21284 21181 409710 lstrcpyA lstrcpyA lstrcpyA 21181->21181 21182 409732 21181->21182 21183 409699 21182->21183 21184 4096a4 21183->21184 21184->21184 21185 409739 19 API calls 21184->21185 21186 4096b9 21185->21186 21187 4097f8 21186->21187 21293 40e3b5 21187->21293 21189 40980d 21190 40e3b5 13 API calls 21189->21190 21193 409818 21190->21193 21191 409890 42 API calls 21191->21193 21193->21191 21194 409879 21193->21194 21302 4097a9 7 API calls ctype 21193->21302 21195 429f58 ctype 7 API calls 21194->21195 21196 40987f 21195->21196 21197 429f58 ctype 7 API calls 21196->21197 21198 409887 21197->21198 21198->20872 21199->20878 21214 42ab20 21200->21214 21203 42a005 _wctomb_s 12 API calls 21204 409618 21203->21204 21204->20885 21206 42a005 _wctomb_s 12 API calls 21205->21206 21207 4099b3 21206->21207 21207->20889 21209 409f97 _wctomb_s 21208->21209 21210 429f58 ctype 7 API calls 21209->21210 21211 409fd5 21210->21211 21212 429f58 ctype 7 API calls 21211->21212 21213 409c4f 21212->21213 21213->20862 21215 42ab2e 21214->21215 21217 42ab33 21214->21217 21221 42e7f8 IsBadWritePtr IsBadWritePtr IsBadWritePtr 21215->21221 21216 42ab46 HeapValidate 21219 42ab5a GetLastError 21216->21219 21220 409611 21216->21220 21217->21216 21219->21220 21220->21203 21221->21217 21223 40e753 9 API calls 21222->21223 21224 40dac3 21223->21224 21225 40e753 9 API calls 21224->21225 21226 40daec 21225->21226 21227 40dcb1 21226->21227 21228 40e753 9 API calls 21226->21228 21227->21011 21229 40db1a 21228->21229 21230 40e753 9 API calls 21229->21230 21231 40db40 21230->21231 21232 40e753 9 API calls 21231->21232 21233 40db63 21232->21233 21234 40e753 9 API calls 21233->21234 21235 40db89 21234->21235 21236 40e753 9 API calls 21235->21236 21237 40dbac 21236->21237 21238 40e753 9 API calls 21237->21238 21239 40dbd2 21238->21239 21240 40e753 9 API calls 21239->21240 21241 40dbf5 21240->21241 21242 40e753 9 API calls 21241->21242 21243 40dc1b 21242->21243 21244 40e753 9 API calls 21243->21244 21245 40dc3e 21244->21245 21246 429f58 ctype 7 API calls 21245->21246 21247 40dc49 21246->21247 21248 40dc70 21247->21248 21249 42a005 _wctomb_s 12 API calls 21247->21249 21250 40e753 9 API calls 21248->21250 21251 40dc5b 21249->21251 21252 40dc88 21250->21252 21253 40e753 9 API calls 21251->21253 21254 40e753 9 API calls 21252->21254 21253->21248 21255 40dc9b 21254->21255 21256 40e753 9 API calls 21255->21256 21256->21227 21258 40a37a 21257->21258 21262 40a358 21257->21262 21259 429f58 ctype 7 API calls 21258->21259 21260 40a38c 21259->21260 21260->21018 21261 429f58 ctype 7 API calls 21261->21262 21262->21258 21262->21261 21263->21144 21264->21088 21265->21088 21266->21088 21268 40a2a2 21267->21268 21269 40a3b7 21267->21269 21268->21172 21270 42a005 _wctomb_s 12 API calls 21269->21270 21274 40a3c2 21270->21274 21271 40a998 _wctomb_s 21272 429f58 ctype 7 API calls 21271->21272 21272->21268 21273 40a9bf lstrlenA lstrcpyA lstrlenA 21273->21274 21274->21271 21274->21273 21275 40aa65 64 API calls 21274->21275 21276 435b40 15 API calls 21274->21276 21278 40a94e 21274->21278 21282 40ab04 24 API calls _wctomb_s 21274->21282 21275->21274 21276->21274 21278->21274 21283 42a880 24 API calls 2 library calls 21278->21283 21280->21162 21281->21164 21282->21274 21283->21278 21289 40977e 21284->21289 21286 409743 21287 42a005 12 API calls _wctomb_s 21286->21287 21288 4096f7 21286->21288 21287->21286 21288->21181 21291 409786 21289->21291 21290 429f58 7 API calls ctype 21290->21291 21291->21290 21292 4097a6 21291->21292 21292->21286 21295 40e3e6 21293->21295 21296 40e3c3 21293->21296 21294 40e3d9 21297 42b134 _wctomb_s 12 API calls 21294->21297 21298 40e400 lstrlenA 21295->21298 21299 40e3f9 21295->21299 21296->21294 21296->21295 21301 40e3e3 _wctomb_s 21297->21301 21298->21299 21300 42a005 _wctomb_s 12 API calls 21299->21300 21300->21301 21301->21189 21302->21193 21303 40e9f3 21304 40e753 9 API calls 21303->21304 21305 40ea0f 21304->21305 21306 40af74 21309 40ea3e _lopen 21306->21309 21310 40af7d 21309->21310 21311 40ea58 _llseek _hread 21309->21311 21314 40eb65 21311->21314 21313 40ea7c _lclose 21313->21310 21315 42a005 _wctomb_s 12 API calls 21314->21315 21316 40eb79 _llseek 21315->21316 21319 40eb95 21316->21319 21317 40ebd6 21318 429f58 ctype 7 API calls 21317->21318 21320 40ebdf 21318->21320 21319->21317 21321 40ebb2 _hread 21319->21321 21320->21313 21321->21319 21322 4086d5 GetWindowLongA 21325 4086f3 21322->21325 21330 408702 21322->21330 21323 408787 DefWindowProcA 21326 408799 21323->21326 21324 40876d CallWindowProcA 21324->21326 21325->21323 21327 408718 SendMessageA 21325->21327 21325->21330 21328 408730 SendMessageA 21327->21328 21327->21330 21334 42a548 6 API calls _wctomb_s 21328->21334 21330->21323 21330->21324 21331 408748 21332 40874e 21331->21332 21335 42a548 6 API calls _wctomb_s 21331->21335 21332->21330 21334->21331 21335->21332 21336 40c116 21337 40c13e 21336->21337 21338 40c122 21336->21338 21339 40c12c _lopen 21338->21339 21339->21337 21340 40ad58 21341 40ad6c 39 API calls 21340->21341 21342 40ad69 21341->21342 21343 42a6bb GetVersion 21369 42dc54 HeapCreate 21343->21369 21345 42a71a 21346 42a727 21345->21346 21347 42a71f 21345->21347 21381 42fddc 24 API calls _wctomb_s 21346->21381 21388 42a7d6 8 API calls _wctomb_s 21347->21388 21351 42a72f GetCommandLineA 21382 42fcaa 27 API calls 2 library calls 21351->21382 21353 42a73f 21389 42fa5d 39 API calls _wctomb_s 21353->21389 21355 42a749 21383 42f9a4 45 API calls 2 library calls 21355->21383 21357 42a74e 21358 42a753 GetStartupInfoA 21357->21358 21384 42f94c 19 API calls 21358->21384 21360 42a765 21361 42a76e 21360->21361 21362 42a777 GetModuleHandleA 21361->21362 21385 405acf 21362->21385 21364 42a789 21390 42d9a9 GetCurrentProcess TerminateProcess ExitProcess 21364->21390 21366 42a792 21391 42f7c8 UnhandledExceptionFilter 21366->21391 21368 42a7a3 21370 42dc74 21369->21370 21371 42dcaa 21369->21371 21392 42db0c 19 API calls _wctomb_s 21370->21392 21371->21345 21373 42dc79 21374 42dc83 21373->21374 21375 42dc90 21373->21375 21393 42dcb1 HeapAlloc 21374->21393 21377 42dcad 21375->21377 21394 42eb27 5 API calls _wctomb_s 21375->21394 21377->21345 21378 42dc8d 21378->21377 21380 42dc9e HeapDestroy 21378->21380 21380->21371 21381->21351 21382->21353 21383->21357 21384->21360 21395 403a45 21385->21395 21389->21355 21390->21366 21391->21368 21392->21373 21393->21378 21394->21378 21396 403a58 21395->21396 21433 403f44 21396->21433 21401 403b2e UnhookWindowsHook 21511 429182 21401->21511 21402 403b17 _wctomb_s 21402->21401 21514 429610 DeleteFileA 21402->21514 21406 403a82 21481 4043e3 21406->21481 21411 403bd4 21413 403be6 21411->21413 21415 429f58 ctype 7 API calls 21411->21415 21416 403bf2 _lclose 21413->21416 21428 403bf9 21413->21428 21414 429610 2 API calls 21417 403b78 lstrlenA lstrcpyA 21414->21417 21415->21413 21416->21428 21419 429610 2 API calls 21417->21419 21418 403aac KiUserCallbackDispatcher 21418->21402 21420 403a9c 21418->21420 21421 403baa lstrcpyA 21419->21421 21420->21418 21423 403ae0 TranslateAcceleratorA 21420->21423 21507 406a63 21420->21507 21424 429610 2 API calls 21421->21424 21423->21420 21425 403afa TranslateMessage DispatchMessageA 21423->21425 21426 403bc9 21424->21426 21425->21420 21427 429f58 ctype 7 API calls 21426->21427 21427->21411 21429 429182 codecvt 7 API calls 21428->21429 21430 403c89 21429->21430 21431 403c94 FreeLibrary 21430->21431 21432 403c9b 21430->21432 21431->21432 21432->21364 21434 403f4e __EH_prolog 21433->21434 21435 429e37 12 API calls 21434->21435 21436 403f5e 21435->21436 21517 404442 21436->21517 21439 403fda 21442 42b134 _wctomb_s 12 API calls 21439->21442 21445 403fe4 ctype 21439->21445 21440 403faa 21441 42b134 _wctomb_s 12 API calls 21440->21441 21443 403fb1 lstrlenA 21441->21443 21442->21445 21444 403fca lstrlenA 21443->21444 21443->21445 21444->21445 21446 42b134 _wctomb_s 12 API calls 21445->21446 21448 404019 21445->21448 21446->21448 21527 4048cf 21448->21527 21450 403a63 21450->21402 21452 404056 21450->21452 21775 429e18 21452->21775 21454 404060 9 API calls 21455 404138 GetSystemMetrics 21454->21455 21456 40412f 21454->21456 21457 40414f 21455->21457 21456->21455 21458 40418d CreateWindowExA GetWindowRect GetSystemMetrics 21457->21458 21459 4041b5 OffsetRect 21458->21459 21460 4041f7 21458->21460 21461 4041d6 21459->21461 21462 4041c9 OffsetRect 21459->21462 21463 429e37 12 API calls 21460->21463 21464 416dd6 5 API calls 21461->21464 21462->21461 21465 404201 21463->21465 21464->21460 21466 429e37 12 API calls 21465->21466 21467 404236 21466->21467 21776 4176a4 GetClientRect CreateWindowExA 21467->21776 21472 404285 21783 40459a 21472->21783 21473 40428e 21825 4084f1 9 API calls 21473->21825 21477 40429a ShowWindow 21478 404e7c 72 API calls 21477->21478 21479 403a75 21478->21479 21479->21402 21480 41677f LoadCursorA RegisterClassA 21479->21480 21480->21406 21482 4043f8 DialogBoxParamA 21481->21482 21483 4043ef 21481->21483 21484 40441f 21482->21484 21486 403a89 21482->21486 21483->21482 21483->21486 21484->21486 21878 40176b 21484->21878 21486->21402 21487 4064c3 GetModuleFileNameA 21486->21487 21488 4064eb ctype 21487->21488 21489 4064ff GetWindowsDirectoryA lstrcatA 21488->21489 21490 406672 21488->21490 21884 4061ba 21489->21884 21490->21420 21492 406533 21492->21490 21493 40653d LoadStringA LoadStringA MessageBoxA 21492->21493 21493->21490 21494 406577 ctype 21493->21494 21891 40e06c 21494->21891 21500 4065dd LoadStringA MessageBoxA 21500->21490 21501 4065d2 _wctomb_s 21501->21500 21503 406612 LoadStringA 21501->21503 21949 405d5a CoInitialize 21503->21949 21505 40664e 21505->21500 21506 40667f LoadStringA MessageBoxA 21505->21506 21506->21490 22035 40679c 21507->22035 22059 4068ec 21507->22059 21508 406a68 21508->21420 21512 429f58 ctype 7 API calls 21511->21512 21513 403b57 21512->21513 21513->21411 21513->21414 21515 42961e GetLastError 21514->21515 21516 429626 21514->21516 21515->21516 21516->21401 21518 40444c __EH_prolog 21517->21518 21519 429e37 12 API calls 21518->21519 21521 40445a 21519->21521 21520 429e37 12 API calls 21522 404485 21520->21522 21521->21520 21585 403d7c 21522->21585 21607 40abfb 21522->21607 21609 40abd8 21522->21609 21523 403f88 GetModuleFileNameA 21523->21439 21523->21440 21528 4048eb lstrcpyA 21527->21528 21555 404027 21527->21555 21529 40490d 21528->21529 21530 42a0c0 _wctomb_s 43 API calls 21529->21530 21529->21555 21531 404932 21530->21531 21532 404939 lstrcmpiA 21531->21532 21533 40494b 21531->21533 21532->21533 21545 4049a6 21532->21545 21534 42a0c0 _wctomb_s 43 API calls 21533->21534 21535 404955 21534->21535 21536 40495a lstrcmpiA 21535->21536 21537 40496c 21535->21537 21536->21537 21536->21545 21538 42a005 _wctomb_s 12 API calls 21537->21538 21540 404977 GetWindowsDirectoryA lstrcmpiA 21538->21540 21539 4049bf MessageBoxA 21541 4049d6 21539->21541 21539->21555 21542 404997 21540->21542 21543 4049e3 lstrcpyA 21541->21543 21544 429f58 ctype 7 API calls 21542->21544 21546 4049ff _wctomb_s 21543->21546 21544->21545 21545->21539 21545->21555 21547 42a005 _wctomb_s 12 API calls 21546->21547 21548 404a4f GetSaveFileNameA 21547->21548 21549 404a62 _lopen 21548->21549 21550 404a8d 21548->21550 21551 404a9d _lcreat _lclose _lopen 21549->21551 21554 404a7a 21549->21554 21552 429f58 ctype 7 API calls 21550->21552 21553 404ad2 _hread 21551->21553 21551->21554 21552->21555 21556 404af2 _lclose _lclose 21553->21556 21557 404ae3 _hwrite 21553->21557 21559 404a85 MessageBoxA 21554->21559 21555->21450 21570 4044c4 21555->21570 21617 429320 21556->21617 21557->21553 21559->21550 21560 404b0e lstrcmpiA 21561 404b41 21560->21561 21562 404b21 GetModuleFileNameA lstrcatA 21560->21562 21563 404b47 lstrcatA 21561->21563 21562->21563 21564 429320 21563->21564 21565 404b59 lstrlenA 21564->21565 21566 404b76 lstrcpyA 21565->21566 21567 404b6c lstrcatA 21565->21567 21568 404b93 WinExec 21566->21568 21567->21566 21569 404ba3 21568->21569 21569->21555 21571 4044ce __EH_prolog 21570->21571 21619 404d6d 21571->21619 21574 4044e0 LoadCursorA SetCursor 21576 429e37 12 API calls 21574->21576 21575 404576 21575->21450 21577 4044fd 21576->21577 21578 404510 21577->21578 21640 408f11 21577->21640 21580 404538 21578->21580 21581 429fc1 2 API calls 21578->21581 21646 408fb4 21580->21646 21581->21580 21584 40457a LoadCursorA SetCursor 21584->21575 21611 40abc4 lstrcpyA 21585->21611 21587 403d8f 21588 40abfb GetPrivateProfileIntA 21587->21588 21589 403dc4 21588->21589 21590 40abfb GetPrivateProfileIntA 21589->21590 21591 403ddd 21590->21591 21592 40abfb GetPrivateProfileIntA 21591->21592 21593 403df6 21592->21593 21612 40ac1c 21593->21612 21596 40ac1c 7 API calls 21597 403e28 21596->21597 21598 40ac1c 7 API calls 21597->21598 21599 403e41 21598->21599 21600 40ac1c 7 API calls 21599->21600 21601 403e5a KiUserCallbackDispatcher GetSystemMetrics 21600->21601 21602 403e77 21601->21602 21603 40abd8 GetPrivateProfileStringA 21602->21603 21604 403f25 21603->21604 21605 40abd8 GetPrivateProfileStringA 21604->21605 21606 403f3a 21605->21606 21606->21523 21608 40ac0c GetPrivateProfileIntA 21607->21608 21608->21523 21610 40abf1 GetPrivateProfileStringA 21609->21610 21610->21523 21611->21587 21613 40ac33 21612->21613 21614 40ac4e GetPrivateProfileStringA 21613->21614 21615 42a4bd _wctomb_s 6 API calls 21614->21615 21616 403e0f 21615->21616 21616->21596 21618 42933d 21617->21618 21618->21560 21658 42a31a FindFirstFileA 21619->21658 21621 404d87 21622 404da8 21621->21622 21623 404d8e 21621->21623 21667 42a3e4 FindClose 21622->21667 21625 404d95 MessageBoxA 21623->21625 21638 4044d8 21625->21638 21627 404dc4 21675 4058d2 LoadStringA MessageBoxA 21627->21675 21628 404dcd 21630 404e0f 21628->21630 21676 40947b 32 API calls 2 library calls 21628->21676 21630->21638 21639 40c76c 38 API calls 21630->21639 21632 404e01 21632->21630 21677 405911 30 API calls _wctomb_s 21632->21677 21634 404e57 21669 40c1f1 21634->21669 21637 40a12f 73 API calls 21637->21638 21638->21574 21638->21575 21639->21634 21641 408f1b __EH_prolog 21640->21641 21642 429e37 12 API calls 21641->21642 21643 408f2a 21642->21643 21645 408f3f 21643->21645 21681 410b8a 21643->21681 21645->21578 21688 410d7a 21646->21688 21650 408fd0 21655 408fe1 21650->21655 21698 409099 FindResourceA 21650->21698 21652 404571 21652->21575 21652->21584 21653 409066 21653->21652 21716 410e4d 21653->21716 21655->21652 21655->21653 21704 40c2c4 21655->21704 21720 4092fb 51 API calls 21655->21720 21659 42a37a 21658->21659 21660 42a33b GetLastError 21658->21660 21678 42a403 54 API calls 21659->21678 21666 42a348 _wctomb_s 21660->21666 21662 42a3a1 21679 42a403 54 API calls 21662->21679 21664 42a3b0 21680 42a403 54 API calls 21664->21680 21666->21621 21668 404dae 21667->21668 21668->21627 21668->21628 21670 40e8ba 21669->21670 21671 40e4ef _lopen 21670->21671 21672 40e8c2 21671->21672 21673 40eb65 21 API calls 21672->21673 21674 404e62 21673->21674 21674->21637 21675->21638 21676->21632 21677->21630 21678->21662 21679->21664 21680->21666 21684 410c0a 21681->21684 21685 410c17 CharUpperA IsCharUpperA 21684->21685 21686 410c37 21685->21686 21686->21685 21687 410baa 21686->21687 21687->21645 21691 410d84 21688->21691 21693 410db2 21688->21693 21692 429f58 ctype 7 API calls 21691->21692 21692->21693 21721 410b66 21693->21721 21694 408e20 21695 408e39 21694->21695 21696 42a005 _wctomb_s 12 API calls 21695->21696 21697 408e56 _wctomb_s 21696->21697 21697->21650 21699 4090b6 LoadResource 21698->21699 21700 4090c7 21698->21700 21699->21700 21701 4090cb LockResource 21699->21701 21700->21655 21727 40917a 21701->21727 21705 40c2ce __EH_prolog 21704->21705 21715 40c306 21705->21715 21757 40e8de 21705->21757 21708 429e37 12 API calls 21709 40c338 21708->21709 21710 40c363 21709->21710 21767 411352 12 API calls 2 library calls 21709->21767 21712 40c377 21710->21712 21768 40c630 IsCharAlphaA lstrlenA IsCharUpperA 21710->21768 21769 40e994 7 API calls ctype 21712->21769 21715->21655 21717 410e75 GlobalAlloc GlobalLock 21716->21717 21718 410e57 GlobalHandle GlobalUnlock GlobalHandle GlobalFree 21716->21718 21719 410ea4 21717->21719 21718->21717 21719->21652 21720->21655 21724 410b67 21721->21724 21722 408fc5 21722->21694 21724->21722 21725 429182 codecvt 7 API calls 21724->21725 21726 410a7b 7 API calls ctype 21724->21726 21725->21724 21726->21724 21728 4090da FreeResource 21727->21728 21729 409196 21727->21729 21728->21700 21729->21728 21731 4091e0 21729->21731 21732 4091ea __EH_prolog 21731->21732 21751 410c6e 15 API calls 21732->21751 21734 4091f9 21735 40923c 21734->21735 21737 409218 lstrcmpiA 21734->21737 21752 410b0a 17 API calls 21735->21752 21737->21734 21739 40922e 21737->21739 21738 409243 21744 409265 21738->21744 21753 408d15 14 API calls 21738->21753 21739->21735 21740 4092d3 21739->21740 21741 409283 21739->21741 21740->21729 21754 40e217 IsCharLowerA IsCharUpperA 21741->21754 21744->21740 21745 4092db 21744->21745 21747 4092c5 21744->21747 21756 408ddb 24 API calls _wctomb_s 21745->21756 21746 4092a2 lstrcpyA 21746->21744 21755 408dc1 7 API calls ctype 21747->21755 21750 40928b 21750->21744 21750->21746 21751->21734 21752->21738 21753->21744 21754->21750 21755->21740 21756->21740 21758 40e8f1 21757->21758 21759 40c326 21757->21759 21758->21759 21760 40e753 9 API calls 21758->21760 21759->21708 21759->21715 21761 40e933 21760->21761 21761->21759 21762 42a005 _wctomb_s 12 API calls 21761->21762 21763 40e947 21762->21763 21770 4129b6 21763->21770 21766 429f58 ctype 7 API calls 21766->21759 21767->21710 21768->21712 21769->21715 21771 42a005 _wctomb_s 12 API calls 21770->21771 21773 4129d7 21771->21773 21772 429f58 ctype 7 API calls 21774 40e968 21772->21774 21773->21772 21774->21759 21774->21766 21775->21454 21777 404266 21776->21777 21778 4176ed GetWindowLongA SetWindowLongA SetWindowLongA 21776->21778 21780 4084dc 21777->21780 21778->21777 21826 408027 7 API calls 21780->21826 21782 40427d 21782->21472 21782->21473 21784 4045a4 __EH_prolog 21783->21784 21785 4045b7 lstrlenA lstrlenA 21784->21785 21786 42a005 _wctomb_s 12 API calls 21785->21786 21787 4045d6 lstrcpyA lstrcatA 21786->21787 21837 405abd 21787->21837 21789 4045f8 lstrcatA SetWindowTextA 21790 429f58 ctype 7 API calls 21789->21790 21791 404615 21790->21791 21792 429e37 12 API calls 21791->21792 21793 40461f 21792->21793 21794 40465d SetRectEmpty 21793->21794 21870 4066b8 11 API calls 21793->21870 21838 4142f5 21794->21838 21798 429e37 12 API calls 21799 4046cf 21798->21799 21802 4046f6 21799->21802 21871 407123 7 API calls __EH_prolog 21799->21871 21857 41aec8 21802->21857 21803 404721 GetWindowLongA SetWindowLongA 21804 429e37 12 API calls 21803->21804 21805 404766 21804->21805 21807 40477e 21805->21807 21860 414fde 21805->21860 21808 429e37 12 API calls 21807->21808 21809 4047a9 21808->21809 21810 4047bf 21809->21810 21872 416fc2 LoadCursorA RegisterClassA 21809->21872 21866 41704a 21810->21866 21813 4047f3 21814 429e37 12 API calls 21813->21814 21815 4047fd 21814->21815 21817 404813 21815->21817 21873 40afaf 21 API calls 21815->21873 21818 429e37 12 API calls 21817->21818 21819 40483c 21818->21819 21820 429e37 12 API calls 21819->21820 21821 40486f 21820->21821 21874 407ef5 GetWindowRect InvalidateRect 21821->21874 21823 40428c 21823->21477 21825->21477 21831 416f2a CreateWindowExA 21826->21831 21828 408461 GetStockObject SendMessageA 21832 408570 SendMessageA 21828->21832 21831->21828 21833 408599 21832->21833 21834 4085cc lstrlenA SendMessageA 21833->21834 21836 408481 GetWindowLongA SetWindowLongA SetWindowLongA ShowWindow 21833->21836 21834->21833 21835 4085f8 SendMessageA 21834->21835 21835->21833 21836->21782 21837->21789 21846 4142ff __EH_prolog ctype 21838->21846 21839 41433b 21841 429e37 12 API calls 21839->21841 21843 414346 21841->21843 21842 414335 21844 429182 codecvt 7 API calls 21842->21844 21845 409a82 26 API calls 21843->21845 21847 414358 21843->21847 21844->21839 21845->21847 21846->21839 21875 409cab 7 API calls 2 library calls 21846->21875 21856 40c76c 38 API calls 21847->21856 21848 414370 21849 40a12f 73 API calls 21848->21849 21850 414379 IsRectEmpty 21849->21850 21851 414387 GetClientRect 21850->21851 21852 414398 CreateWindowExA 21850->21852 21851->21852 21853 4143d2 SetScrollRange 21852->21853 21855 404699 GetWindowLongA SetWindowLongA 21853->21855 21855->21798 21856->21848 21858 41aee0 21857->21858 21859 41aef1 CreateWindowExA 21858->21859 21859->21803 21861 414fe8 __EH_prolog 21860->21861 21876 423015 14 API calls _wctomb_s 21861->21876 21863 414ff9 21864 415026 21863->21864 21877 41652d LoadCursorA RegisterClassA LoadCursorA RegisterClassA 21863->21877 21864->21807 21867 42b134 _wctomb_s 12 API calls 21866->21867 21868 417073 CreateWindowExA 21867->21868 21869 4170a7 21868->21869 21869->21813 21870->21794 21871->21802 21872->21810 21873->21817 21874->21823 21875->21842 21876->21863 21877->21864 21879 401780 lstrlenA 21878->21879 21880 4017c6 21878->21880 21881 401794 21879->21881 21880->21486 21881->21879 21882 4017a4 21881->21882 21882->21880 21883 4017a8 DialogBoxParamA 21882->21883 21883->21880 21885 4061c7 21884->21885 21886 4061cc 21884->21886 21885->21492 21981 4060ae 21886->21981 21888 4061f0 21889 4060ae 32 API calls 21888->21889 21890 406208 21889->21890 21890->21492 21892 40e076 __EH_prolog 21891->21892 21893 411127 12 API calls 21892->21893 21894 40e08a _lopen 21893->21894 21895 40e0a5 _llseek _hread 21894->21895 21916 40e122 _wctomb_s 21894->21916 21897 40e129 _llseek _hread 21895->21897 21898 40e0ca 21895->21898 21899 40e13e _llseek GetWindowsDirectoryA lstrcatA _lcreat 21897->21899 21914 40e18f 21897->21914 21900 40e0d1 21898->21900 21901 40e109 21898->21901 21902 40e194 _lclose 21899->21902 21903 40e17e 21899->21903 22007 40947b 32 API calls 2 library calls 21900->22007 21901->21897 21910 40e11b _lclose 21901->21910 21906 40e1a2 _lclose 21902->21906 21902->21916 21999 40dede 21903->21999 21905 40e0e8 21905->21897 21908 40e0ef _lclose 21905->21908 21909 429610 2 API calls 21906->21909 22008 41113c 7 API calls ctype 21908->22008 21909->21916 21910->21916 21913 40e1b7 _lclose _lclose 21913->21916 21914->21902 21915 406599 21917 405fde RegOpenKeyExA 21915->21917 22009 41113c 7 API calls ctype 21916->22009 21918 406014 lstrcpyA RegQueryValueA 21917->21918 21919 4060a8 21917->21919 21920 40605b 21918->21920 21919->21501 21925 406252 7 API calls 21919->21925 21921 406065 RegCloseKey 21920->21921 21922 40607c 21921->21922 21924 40608e _wctomb_s 21922->21924 22010 42c410 15 API calls _wctomb_s 21922->22010 21924->21919 21926 429320 21925->21926 21927 4062da RegDeleteKeyA 21926->21927 21928 429320 21927->21928 21929 4062f8 RegDeleteKeyA 21928->21929 21930 429320 21929->21930 21931 406314 RegDeleteKeyA 21930->21931 21932 4064bb 21931->21932 21933 40632b RegCreateKeyExA 21931->21933 21932->21501 21934 406347 lstrlenA RegSetValueExA 21933->21934 21935 40638e 21933->21935 21934->21935 21936 406368 lstrlenA RegSetValueExA 21934->21936 21937 406391 RegCloseKey 21935->21937 21936->21935 21936->21937 21938 4063a1 RegCreateKeyExA 21937->21938 21939 4063e3 21937->21939 21938->21939 21940 4063bd lstrlenA RegSetValueExA 21938->21940 21941 4063e6 RegCloseKey lstrcpyA lstrcatA 21939->21941 21940->21939 21940->21941 21942 406414 RegCreateKeyExA 21941->21942 21943 406434 lstrcpyA lstrcatA lstrcatA 21941->21943 21942->21943 21945 406497 21943->21945 21946 40646b lstrlenA RegSetValueExA 21943->21946 21947 40649a RegCloseKey 21945->21947 21946->21945 21946->21947 21947->21932 21948 4064a8 MessageBoxA 21947->21948 21948->21932 21950 405fd0 CoUninitialize 21949->21950 21951 405d86 SHGetMalloc 21949->21951 21950->21505 21951->21950 21952 405d98 SHGetSpecialFolderLocation 21951->21952 21953 405db4 SHGetPathFromIDListA 21952->21953 21954 405dab SHGetSpecialFolderLocation 21952->21954 21955 405dd2 SHGetSpecialFolderLocation 21953->21955 21954->21953 21956 405de8 SHGetPathFromIDListA 21955->21956 21957 405ddf SHGetSpecialFolderLocation 21955->21957 21958 405e00 CoCreateInstance 21956->21958 21957->21956 21958->21950 21960 405e28 21958->21960 21960->21950 21961 405e41 lstrlenA 21960->21961 21962 405e6c lstrcatA 21961->21962 21963 405e5e lstrcatA 21961->21963 21964 405e88 21962->21964 21965 405eaa 21962->21965 21963->21962 22011 42a491 CreateDirectoryA 21964->22011 21966 405eb4 LoadStringA 21965->21966 21968 405ec1 LoadStringA LoadStringA lstrlenA 21965->21968 21966->21968 21970 405fbd MessageBoxA 21968->21970 21971 405efe lstrlenA 21968->21971 21969 405e94 SHChangeNotify 21969->21965 21970->21950 21971->21970 21972 405f0f 21971->21972 22014 405d13 21972->22014 21976 405f9a 21976->21950 21977 405d13 19 API calls 21978 405f74 21977->21978 21978->21950 21978->21976 22020 42a467 RemoveDirectoryA GetLastError 21978->22020 21980 405f8b SHChangeNotify 21980->21976 21982 429fc1 2 API calls 21981->21982 21983 4060c1 21982->21983 21984 4061b6 21983->21984 21985 4060cb GetFileVersionInfoSizeA 21983->21985 21984->21888 21986 429e37 12 API calls 21985->21986 21987 4060e1 GetFileVersionInfoA VerQueryValueA wsprintfA VerQueryValueA 21986->21987 21988 406148 21987->21988 21989 42a4bd _wctomb_s 6 API calls 21988->21989 21998 4061a2 21988->21998 21991 406154 21989->21991 21990 429182 codecvt 7 API calls 21992 4061ae 21990->21992 21993 40616e 21991->21993 21994 42a4bd _wctomb_s 6 API calls 21991->21994 21992->21888 21995 42a4bd _wctomb_s 6 API calls 21993->21995 21996 406188 21993->21996 21994->21993 21995->21996 21997 42a4bd _wctomb_s 6 API calls 21996->21997 21996->21998 21997->21998 21998->21990 22000 42a005 _wctomb_s 12 API calls 21999->22000 22003 40def2 22000->22003 22001 40defb _hread 22002 40df37 22001->22002 22001->22003 22004 429f58 ctype 7 API calls 22002->22004 22003->22001 22003->22002 22005 40df21 _hwrite 22003->22005 22006 40df42 22004->22006 22005->22002 22005->22003 22006->21913 22006->21914 22007->21905 22008->21915 22009->21915 22010->21924 22012 42a4a1 GetLastError 22011->22012 22013 42a4a9 22011->22013 22012->22013 22013->21969 22015 405d1c 22014->22015 22016 405d4c 22015->22016 22021 405b55 lstrcpyA lstrlenA 22015->22021 22016->21950 22016->21976 22016->21977 22018 405d2d 22018->22016 22026 405bda lstrcpyA lstrlenA 22018->22026 22020->21980 22022 405b9a lstrcatA lstrcatA 22021->22022 22023 405b8c lstrcatA 22021->22023 22024 429610 2 API calls 22022->22024 22023->22022 22025 405bc0 SHChangeNotify 22024->22025 22025->22018 22027 405c2c lstrcatA 22026->22027 22028 405c1e lstrcatA 22026->22028 22029 405c48 lstrcpyA lstrlenA 22027->22029 22028->22027 22031 405ca5 lstrcatA lstrcatA MultiByteToWideChar 22029->22031 22032 405c97 lstrcatA 22029->22032 22033 405cf0 SHChangeNotify 22031->22033 22032->22031 22034 405d08 22033->22034 22034->22016 22036 4067a6 __EH_prolog 22035->22036 22037 4068bd 22036->22037 22038 429e37 12 API calls 22036->22038 22037->21508 22039 406808 22038->22039 22041 40681b 22039->22041 22062 40b0dd 22 API calls 22039->22062 22055 429fc1 2 API calls 22041->22055 22056 40abfb GetPrivateProfileIntA 22041->22056 22042 406832 22043 429e37 12 API calls 22042->22043 22044 40683c 22043->22044 22045 406853 22044->22045 22046 4068ec 101 API calls 22044->22046 22047 429e37 12 API calls 22045->22047 22046->22045 22048 40686b 22047->22048 22050 406882 22048->22050 22063 40b0dd 22 API calls 22048->22063 22057 429fc1 2 API calls 22050->22057 22058 40abfb GetPrivateProfileIntA 22050->22058 22051 406899 22052 429e37 12 API calls 22051->22052 22053 4068a3 22052->22053 22053->22037 22054 4068ec 101 API calls 22053->22054 22054->22037 22055->22042 22056->22042 22057->22051 22058->22051 22064 421fda 22059->22064 22062->22041 22063->22050 22065 421fe4 __EH_prolog 22064->22065 22070 421e0e 22065->22070 22067 422000 22068 41f961 100 API calls 22067->22068 22069 406914 22068->22069 22069->21508 22071 421e18 __EH_prolog 22070->22071 22074 41ff83 22071->22074 22073 421e33 22073->22067 22075 41ff8d __EH_prolog 22074->22075 22076 429e37 12 API calls 22075->22076 22079 41ffe8 22075->22079 22077 41ffd4 22076->22077 22077->22079 22080 40b0dd 22 API calls 22077->22080 22079->22073 22080->22079 22081 41b6fc GetCursorPos ScreenToClient GetDC GetClientRect 22086 41b746 22081->22086 22082 41b79c ReleaseDC 22083 41b7af 22082->22083 22084 41b7b3 22083->22084 22085 41b7bb LoadCursorA 22083->22085 22087 41b7c9 SetCursor 22084->22087 22085->22087 22086->22082 22088 41b798 22086->22088 22090 4229c8 22086->22090 22087->22088 22091 4229ed 22090->22091 22092 4229f1 22091->22092 22093 4229f8 SelectObject GetTextMetricsA 22091->22093 22092->22086 22094 422a3a 22093->22094 22099 422ab0 SelectObject 22093->22099 22096 422a54 lstrlenA GetTextExtentPointA 22094->22096 22094->22099 22097 422a75 22096->22097 22098 422802 46 API calls 22097->22098 22097->22099 22098->22099 22099->22092

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 112 405d5a-405d80 CoInitialize 113 405fd0-405fdd CoUninitialize 112->113 114 405d86-405d92 SHGetMalloc 112->114 114->113 115 405d98-405da9 SHGetSpecialFolderLocation 114->115 116 405db4-405ddd SHGetPathFromIDListA SHGetSpecialFolderLocation 115->116 117 405dab-405db2 SHGetSpecialFolderLocation 115->117 119 405de8-405e22 SHGetPathFromIDListA CoCreateInstance 116->119 120 405ddf-405de6 SHGetSpecialFolderLocation 116->120 117->116 119->113 123 405e28-405e3b 119->123 120->119 123->113 125 405e41-405e5c lstrlenA 123->125 126 405e6c-405e86 lstrcatA 125->126 127 405e5e-405e6a lstrcatA 125->127 128 405e88-405ea1 call 42a491 126->128 129 405eaa-405ead 126->129 127->126 137 405ea3-405ea5 128->137 138 405ea7 128->138 130 405eb4-405ebf LoadStringA 129->130 131 405eaf-405eb2 129->131 133 405ec1-405ef8 LoadStringA * 2 lstrlenA 130->133 131->130 131->133 135 405fbd-405fca MessageBoxA 133->135 136 405efe-405f09 lstrlenA 133->136 135->113 136->135 139 405f0f-405f3e call 405d13 136->139 140 405ea8 SHChangeNotify 137->140 138->140 139->113 143 405f44-405f47 139->143 140->129 144 405f49-405f4b 143->144 145 405f4d-405f6f call 405d13 143->145 144->145 146 405f9a-405f9f 144->146 150 405f74-405f79 145->150 148 405fa1-405fa3 146->148 149 405fa7-405fac 146->149 148->149 151 405fb4-405fbb 149->151 152 405fae-405fb0 149->152 150->113 153 405f7b-405f7d 150->153 151->113 152->151 153->146 154 405f7f-405f98 call 42a467 SHChangeNotify 153->154 154->146
      APIs
      • CoInitialize.OLE32(00000000), ref: 00405D78
      • SHGetMalloc.SHELL32(00000001), ref: 00405D8A
      • SHGetSpecialFolderLocation.SHELL32(00000000,00000017,00000000), ref: 00405DA5
      • SHGetSpecialFolderLocation.SHELL32(00000000,00000002,00000000), ref: 00405DB2
      • SHGetPathFromIDListA.SHELL32(00000000,?), ref: 00405DC4
      • SHGetSpecialFolderLocation.SHELL32(00000000,00000019,00000000), ref: 00405DD9
      • SHGetSpecialFolderLocation.SHELL32(00000000,00000010,00000000), ref: 00405DE6
      • SHGetPathFromIDListA.SHELL32(00000000,?), ref: 00405DF2
      • CoCreateInstance.OLE32(004381A0,00000000,00000001,004381B0,?), ref: 00405E1A
      • lstrlenA.KERNEL32(?), ref: 00405E48
      • lstrcatA.KERNEL32(?,0043C984), ref: 00405E6A
      • lstrcatA.KERNEL32(?,?), ref: 00405E76
      • SHChangeNotify.SHELL32(00001000,00000001,?,00000000), ref: 00405EA8
      • LoadStringA.USER32(00001000,00000001,?,00000000), ref: 00405EBF
      • LoadStringA.USER32(?,00000010,?,00000040), ref: 00405ED5
      • LoadStringA.USER32(?,00000011,?,00000040), ref: 00405EE5
      • lstrlenA.KERNEL32(?), ref: 00405EF4
      • lstrlenA.KERNEL32(?), ref: 00405F05
      • SHChangeNotify.SHELL32(00000002,00000001,?,00000000), ref: 00405F98
      • MessageBoxA.USER32(00000000,No main application icon (or file) was defined.,Setup,00000030), ref: 00405FCA
      • CoUninitialize.OLE32 ref: 00405FD0
      Strings
      • Setup, xrefs: 00405FBF
      • RealLegal E-Transcript Viewer Install, xrefs: 00405D5A
      • The RealLegal E-Transcript Viewer was successfully installed., xrefs: 00405D64
      • No main application icon (or file) was defined., xrefs: 00405FC4
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: FolderLocationSpecial$LoadStringlstrlen$ChangeFromListNotifyPathlstrcat$CreateInitializeInstanceMallocMessageUninitialize
      • String ID: No main application icon (or file) was defined.$RealLegal E-Transcript Viewer Install$Setup$The RealLegal E-Transcript Viewer was successfully installed.
      • API String ID: 3836796150-3807052405
      • Opcode ID: 19bc78f4910e6d3d16f85c807fa2d8c77126bf2b70f5d72acaaabe778beb7bba
      • Instruction ID: 19968b255a16cf6a8ff6855e1ed1463cca4e2faa328a0df4e7b52c4ea43722da
      • Opcode Fuzzy Hash: 19bc78f4910e6d3d16f85c807fa2d8c77126bf2b70f5d72acaaabe778beb7bba
      • Instruction Fuzzy Hash: E681CAB190021EABDF11DF91CC85EEFB77DEB08704F1044A6BA05E6190DB789A859FA4

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 378 405155-405165 379 4053a7-4053aa 378->379 380 40516b 378->380 381 405350-405358 379->381 382 4053ac-4053af 379->382 383 405171-405172 380->383 384 40538e-405395 380->384 385 405361-40536d DefWindowProcA 381->385 389 40535a-40535c call 408619 381->389 387 4053b1-4053b4 382->387 388 4053e7-4053f1 382->388 390 405178-40517d 383->390 391 405379-40538c SetWindowLongA 383->391 384->385 386 405397-4053a5 384->386 396 405373-405376 385->396 386->385 387->381 392 4053b6-4053b9 387->392 388->385 397 4053f7-405407 388->397 389->385 394 405341-405349 390->394 395 405183-405185 390->395 391->385 399 4053c9-4053e2 call 401000 392->399 400 4053bb-4053be 392->400 394->381 401 40534b call 406a76 394->401 402 4052b5-4052c0 IsIconic 395->402 403 40518b-40518d 395->403 397->385 399->385 400->385 404 4053c0-4053c7 call 405493 400->404 401->381 402->385 406 4052c6-4052db GetClientRect 402->406 408 405282-405290 403->408 409 405193-405196 403->409 404->385 412 4052dd-4052ea 406->412 413 40532f-40533a call 404e7c 406->413 408->385 410 405296-4052a1 IsWindowVisible 408->410 415 4051b6-4051be 409->415 416 405198-40519b 409->416 410->385 419 4052a7-4052b0 410->419 412->413 422 4052ec-4052f9 412->422 426 40533f 413->426 417 4051c0-4051c8 415->417 418 4051eb-4051f3 415->418 416->385 423 4051a1-4051a8 416->423 417->418 425 4051ca-4051d3 IsWindowVisible 417->425 427 405205-405234 GetWindowPlacement CopyRect 418->427 428 4051f5-4051ff WinHelpA 418->428 419->385 422->413 429 4052fb-405315 call 4170c7 422->429 423->385 424 4051ae-4051b1 423->424 424->396 425->418 430 4051d5-4051e9 call 4154d2 call 404e7c 425->430 426->385 432 405275-40527d PostQuitMessage 427->432 433 405236-405244 IsZoomed 427->433 428->427 440 405317 429->440 441 405319-40531f 429->441 430->424 432->385 433->432 436 405246-405270 GetClientRect call 4170c7 call 4170ce 433->436 436->432 440->441 442 405321 441->442 443 405323-40532a call 4170ce 441->443 442->443 443->413
      APIs
      • IsWindowVisible.USER32(?), ref: 004051CB
      • WinHelpA.USER32(?,?,00000002,00000000), ref: 004051FF
      • GetWindowPlacement.USER32(?,?), ref: 00405216
      • CopyRect.USER32(?,?), ref: 00405227
      • IsZoomed.USER32(?), ref: 0040523C
      • GetClientRect.USER32(?,?), ref: 00405250
      • PostQuitMessage.USER32(00000000), ref: 00405277
      • IsWindowVisible.USER32(?), ref: 00405299
      • IsIconic.USER32(?), ref: 004052B8
      • GetClientRect.USER32(?,?), ref: 004052CD
      • DefWindowProcA.USER32(?,?,?,?), ref: 0040536D
      • SetWindowLongA.USER32(?,00000000), ref: 00405386
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Rect$ClientVisible$CopyHelpIconicLongMessagePlacementPostProcQuitZoomed
      • String ID: ,
      • API String ID: 2686395615-3772416878
      • Opcode ID: f025bf0775d7a5bd94bd0aad572074f3dfc87b59ac4718fae0f309a79208f9e8
      • Instruction ID: 6bf64b7b95b5316567acb7e5c215c2bec90c90c8f69f41078e825b0e9e6328e0
      • Opcode Fuzzy Hash: f025bf0775d7a5bd94bd0aad572074f3dfc87b59ac4718fae0f309a79208f9e8
      • Instruction Fuzzy Hash: 59714C31600A059BDB249F75C849BAB7BA5FF08740F08453EED46E62E1D778A850DF58
      APIs
      • GetTimeZoneInformation.KERNELBASE(00447080,?,0042A3A1,?,?,?,00430492,0042F47B,00000000,00000000,?,?,0042A45D,?,?,?), ref: 004304D1
      • WideCharToMultiByte.KERNEL32(00000220,Eastern Standard Time,?,0000003F,00000000,0042F47B,?,?,?,00430492,0042F47B,00000000,00000000,?,?,0042A45D), ref: 00430566
      • WideCharToMultiByte.KERNEL32(00000220,Eastern Summer Time,?,0000003F,00000000,0042F47B,?,?,?,00430492,0042F47B,00000000,00000000,?,?,0042A45D), ref: 004305A0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ByteCharMultiWide$InformationTimeZone
      • String ID: Eastern Standard Time$Eastern Summer Time$LCD
      • API String ID: 1904278450-1330890189
      • Opcode ID: 8598809a5e4cc310df250b891d10739c63dada0275e479ac6226318a1bc521d3
      • Instruction ID: c3f2083e397b4043048c74a044e82b18ac0b8e637bc12766523476965d4cbb8a
      • Opcode Fuzzy Hash: 8598809a5e4cc310df250b891d10739c63dada0275e479ac6226318a1bc521d3
      • Instruction Fuzzy Hash: 756125767042505BD7209F69FC62B563BA4E78BB44F54263FF880872A1C7788862CB5D
      APIs
      • FindResourceA.KERNEL32(?,?,BININC), ref: 004090AC
      • LoadResource.KERNEL32(?,00000000,?,00000000,00408FF8,?,?,?,00000000,769500C0,?,00404571,?,?,?,00000FAA), ref: 004090BB
      • LockResource.KERNEL32(00000000,?,00000000,00408FF8,?,?,?,00000000,769500C0,?,00404571,?,?,?,00000FAA,00000000), ref: 004090CC
      • FreeResource.KERNEL32(00000000,00000000,?,00000000,00408FF8,?,?,?,00000000,769500C0,?,00404571,?,?,?,00000FAA), ref: 004090DB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Resource$FindFreeLoadLock
      • String ID: BININC
      • API String ID: 1078018258-589224732
      • Opcode ID: 60e8a604e9bc041296d714d14623a2cb34d1aea6fcce6ff74d7e15d7b0b55e5b
      • Instruction ID: c4065e69d9dc2593a232fc237e1f855dbdb486a4f9bff0b5dff7dae611ea6463
      • Opcode Fuzzy Hash: 60e8a604e9bc041296d714d14623a2cb34d1aea6fcce6ff74d7e15d7b0b55e5b
      • Instruction Fuzzy Hash: 61E065B32092127BDB311B219C09E7F3A98AF85751B051436F981E1291CB38CC41D769
      APIs
      • FindFirstFileA.KERNELBASE(?,?), ref: 0042A32E
      • GetLastError.KERNEL32 ref: 0042A33B
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ErrorFileFindFirstLast
      • String ID:
      • API String ID: 873889042-0
      • Opcode ID: 0cf9ad153b762093c5c83fcc5747b0b405db8a926fc29fe6ae9c541ce82133e6
      • Instruction ID: 8d12b03f4c7f16013eecf5d2e46e070b495039219a5f9b17fdede5a9170fbbba
      • Opcode Fuzzy Hash: 0cf9ad153b762093c5c83fcc5747b0b405db8a926fc29fe6ae9c541ce82133e6
      • Instruction Fuzzy Hash: D711E472A002288BCB20DF69EC44ACE77E8FB05314F5446ABED55C3251D778DA94CB5A

      Control-flow Graph

      APIs
      • lstrcpyA.KERNEL32(?,?,76934D90,The RealLegal E-Transcript Viewer was successfully installed.,76990660), ref: 00406275
      • lstrcatA.KERNEL32(?,\ContentType), ref: 00406283
      • RegDeleteKeyA.ADVAPI32(80000000,?), ref: 0040629C
      • RegDeleteKeyA.ADVAPI32(80000000,?), ref: 004062A2
      • lstrcpyA.KERNEL32(?,?), ref: 004062AE
      • lstrcatA.KERNEL32(?,\shell\open\command), ref: 004062BC
      • RegDeleteKeyA.ADVAPI32(80000000,?), ref: 004062CA
      • RegDeleteKeyA.ADVAPI32(80000000,?), ref: 004062E8
      • RegDeleteKeyA.ADVAPI32(80000000,?), ref: 00406304
      • RegDeleteKeyA.ADVAPI32(80000000,?), ref: 00406320
      • RegCreateKeyExA.KERNELBASE(80000000,?,00000000,00000000,00000000,00020006,00000000,?,00000000), ref: 0040633D
      • lstrlenA.KERNEL32(?), ref: 0040634A
      • RegSetValueExA.KERNELBASE(?,00000000,00000000,00000001,?,00000001), ref: 00406362
      • lstrlenA.KERNEL32(?), ref: 0040636B
      • RegSetValueExA.KERNELBASE(?,ContentType,00000000,00000001,?,00000001), ref: 00406381
      • RegCloseKey.KERNELBASE(?), ref: 0040639A
      • RegCreateKeyExA.KERNELBASE(80000000,?,00000000,00000000,00000000,00020006,00000000,?,00000000), ref: 004063B3
      • lstrlenA.KERNEL32(00000001), ref: 004063C0
      • RegSetValueExA.KERNELBASE(?,00000000,00000000,00000001,00000001,00000001), ref: 004063D2
      • RegCloseKey.ADVAPI32(?), ref: 004063E9
      • lstrcpyA.KERNEL32(?,?), ref: 004063F5
      • lstrcatA.KERNEL32(?,\shell\open\command), ref: 0040640D
      • RegCreateKeyExA.KERNELBASE(80000000,?,00000000,00000000,00000000,00020006,00000000,?,00000000), ref: 0040642A
      • lstrcpyA.KERNEL32(?,0043CB2C), ref: 00406447
      • lstrcatA.KERNEL32(?,004454E4), ref: 00406457
      • lstrcatA.KERNEL32(?," %1), ref: 00406465
      • lstrlenA.KERNEL32(?), ref: 00406472
      • RegSetValueExA.KERNELBASE(?,00000000,00000000,00000001,?,00000001), ref: 0040648A
      • RegCloseKey.ADVAPI32(?), ref: 0040649D
      • MessageBoxA.USER32(00000000,A file association could not be created. Contact your system administrator for assistance.,Setup,00000030), ref: 004064B5
      Strings
      • \shell\open\command, xrefs: 004062B6, 00406407
      • Setup, xrefs: 004064AA
      • A file association could not be created. Contact your system administrator for assistance., xrefs: 004064AF
      • RealLegal E-Transcript Viewer Install, xrefs: 00406252
      • " %1, xrefs: 0040645F
      • The RealLegal E-Transcript Viewer was successfully installed., xrefs: 00406262
      • \ContentType, xrefs: 0040627D
      • ContentType, xrefs: 00406379
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Delete$lstrcat$Valuelstrcpylstrlen$CloseCreate$Message
      • String ID: " %1$A file association could not be created. Contact your system administrator for assistance.$ContentType$RealLegal E-Transcript Viewer Install$Setup$The RealLegal E-Transcript Viewer was successfully installed.$\ContentType$\shell\open\command
      • API String ID: 3247419236-4163030435
      • Opcode ID: f673c64fefed62b2609caf6e637651c02320746ac1c787cb49172d8e5ee5d4fc
      • Instruction ID: d19d96705eeb10c1627119a2be9fd073207e01e6ddea2a4a54b2a104d5f7aed4
      • Opcode Fuzzy Hash: f673c64fefed62b2609caf6e637651c02320746ac1c787cb49172d8e5ee5d4fc
      • Instruction Fuzzy Hash: 83711EB690021CBEDF219F90DC85EEF7B7CEB04344F0000A6FA55A2160D6749E95DF68

      Control-flow Graph

      APIs
      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00402323
      • LoadBitmapA.USER32(000000F6), ref: 00402339
      • GetObjectA.GDI32(00000000,00000018,?), ref: 00402348
      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000012), ref: 00402380
      • DeleteObject.GDI32(00000000), ref: 00402387
      • CreateWindowExA.USER32(00000000,BUTTON,?,50010000,0000012A,00000065,0000004B,00000017,?,00000001,00000000), ref: 004023C8
      • GetStockObject.GDI32(0000000C), ref: 004023DF
      • SendMessageA.USER32(?,00000030,00000000), ref: 004023E7
      • CreateWindowExA.USER32(00000000,BUTTON,?,50010000,0000012A,00000080,0000004B,00000017,?,00000002,00000000), ref: 00402425
      • GetStockObject.GDI32(0000000C), ref: 00402435
      • SendMessageA.USER32(00000000,00000030,00000000), ref: 0040243B
      • SetWindowLongA.USER32(?,00000008,?), ref: 00402449
      • GetParent.USER32(?), ref: 00402452
      • LoadBitmapA.USER32(000000F6), ref: 00402473
      • GetWindowLongA.USER32(?,00000008), ref: 00402481
      • GetClientRect.USER32(?,?), ref: 00402491
      • CreateCompatibleDC.GDI32(?), ref: 0040249B
      • SelectObject.GDI32(00000000,?), ref: 004024AE
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 004024C8
      • BitBlt.GDI32(?,00000000,?,?,00000033,?,00000000,?,00CC0020), ref: 00402507
      • GetStockObject.GDI32(0000000C), ref: 0040250F
      • SelectObject.GDI32(?,00000000), ref: 00402517
      • SetRect.USER32(?,00000037,00000063,00000124,000000CC), ref: 0040252E
      • SetBkMode.GDI32(?,00000001), ref: 00402537
      • DrawTextA.USER32(?,By opening this document I consent to the use of the electronic signature(s) attached to it pursuant to applicable uniform acts and statutory provisions.,000000FF,?,00000C10), ref: 0040255A
      • DrawTextA.USER32(?,By opening this document I consent to the use of the electronic signature(s) attached to it pursuant to applicable uniform acts and statutory provisions.,000000FF,?,00000810), ref: 00402571
      • SetRect.USER32(?,00000037,0000004F,00000168,000000CA), ref: 0040259D
      • BeginPaint.USER32(?,?), ref: 004025EB
      • EndPaint.USER32(?,?), ref: 004025F8
      Strings
      • BUTTON, xrefs: 004023C2, 0040241F
      • By opening this document I consent to the use of the electronic signature(s) attached to it pursuant to applicable uniform acts and statutory provisions., xrefs: 00402554, 0040256B
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Window$CreateRectStock$BitmapDrawLoadLongMessagePaintSelectSendText$BeginCallbackClientCompatibleDeleteDispatcherModeParentUser
      • String ID: BUTTON$By opening this document I consent to the use of the electronic signature(s) attached to it pursuant to applicable uniform acts and statutory provisions.
      • API String ID: 3957135676-3782638498
      • Opcode ID: 682f53377e00b1476d638103522fbc37b61f4b67a8ecab7e08f8f9de9f8b152b
      • Instruction ID: 46a8299b59ca5f2d52fe9694b68183f30cf76ed508ae767f3d35ca551449e2dd
      • Opcode Fuzzy Hash: 682f53377e00b1476d638103522fbc37b61f4b67a8ecab7e08f8f9de9f8b152b
      • Instruction Fuzzy Hash: BC918B71544208FFEB219FA0ED49EEE3F78FB08750F105025FA45AA1E1CBB59950EB68

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 61 4172e4-4172f5 62 4174c1-4174c4 61->62 63 4172fb 61->63 66 417593-41759b 62->66 67 4174ca-4174cf 62->67 64 417301-417302 63->64 65 417389-4173d4 GetClientRect GetSysColor CreateSolidBrush GetSysColor CreateSolidBrush GetSysColor CreateSolidBrush GetSysColor CreateSolidBrush 63->65 72 417304-417305 64->72 73 41736a-417384 SetWindowLongA 64->73 70 417436-41748d FillRect * 4 65->70 71 4173d6-417434 FillRect * 4 65->71 68 4175a4 66->68 69 41759d-4175a2 66->69 74 4174d1-4174d2 67->74 75 417543-41754b 67->75 76 4175a9-4175b9 LoadCursorA SetCursor 68->76 69->76 78 417494-4174bc FillRect DeleteObject * 4 70->78 71->78 80 417307-417308 72->80 81 417346-417365 call 405ab7 SetWindowLongA 72->81 77 41757f-417591 DefWindowProcA 73->77 82 4174d4-4174d5 74->82 83 41750f-417529 SetCapture 74->83 75->77 79 41754d-417563 call 4170db 75->79 85 4175ba-4175be 76->85 77->85 78->85 98 417570 79->98 99 417565-41756e 79->99 89 417334 80->89 90 41730a-41730d 80->90 81->77 82->77 91 4174db-4174e5 82->91 86 417536 83->86 87 41752b-417534 83->87 93 41753a-417541 86->93 87->93 108 41733a call 414490 89->108 109 41733a call 414480 89->109 110 41733a call 41afaa 89->110 111 41733a call 404e7c 89->111 90->77 95 417313-41732f BeginPaint EndPaint 90->95 91->77 96 4174eb-41750d ReleaseCapture call 4170db call 41727c 91->96 97 417575-41757a call 4170db 93->97 95->85 96->77 97->77 104 417574 98->104 99->104 100 417340-417341 100->77 104->97 108->100 109->100 110->100 111->100
      APIs
      • BeginPaint.USER32(?,?), ref: 0041731A
      • EndPaint.USER32(?,?), ref: 00417327
      • SetWindowLongA.USER32(?,00000000,00000000), ref: 00417359
      • SetWindowLongA.USER32(?,00000000), ref: 00417372
      • GetClientRect.USER32(?,?), ref: 00417390
      • GetSysColor.USER32(00000010), ref: 0041739E
      • CreateSolidBrush.GDI32(00000000), ref: 004173A7
      • GetSysColor.USER32(0000000F), ref: 004173AE
      • CreateSolidBrush.GDI32(00000000), ref: 004173B1
      • GetSysColor.USER32(00000014), ref: 004173B8
      • CreateSolidBrush.GDI32(00000000), ref: 004173BB
      • GetSysColor.USER32(00000006), ref: 004173C2
      • CreateSolidBrush.GDI32(00000000), ref: 004173C5
      • FillRect.USER32(?,?,?), ref: 004173E9
      • FillRect.USER32(?,?,?), ref: 004173FE
      • FillRect.USER32(?,?,?), ref: 00417413
      • FillRect.USER32(?,?,?), ref: 00417428
      • FillRect.USER32(?,?,?), ref: 0041749E
      • DeleteObject.GDI32(?), ref: 004174A9
      • DeleteObject.GDI32(?), ref: 004174AE
      • DeleteObject.GDI32(00000007), ref: 004174B3
      • DeleteObject.GDI32(?), ref: 004174B8
      • ReleaseCapture.USER32 ref: 004174EB
      • DefWindowProcA.USER32(?,?,?,?), ref: 0041758B
      • LoadCursorA.USER32(00000000,00007F84), ref: 004175AA
      • SetCursor.USER32(00000000), ref: 004175B1
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$Fill$BrushColorCreateDeleteObjectSolid$Window$CursorLongPaint$BeginCaptureClientLoadProcRelease
      • String ID:
      • API String ID: 883540964-0
      • Opcode ID: c79bfe37afebe15f637ce10081867b1b18701a15dcd387a7b52a74b6bfa383c3
      • Instruction ID: d20049629060191ea648a1a447417fe6170934e05eb3a2e7258110c2b6df4aad
      • Opcode Fuzzy Hash: c79bfe37afebe15f637ce10081867b1b18701a15dcd387a7b52a74b6bfa383c3
      • Instruction Fuzzy Hash: D691357180420DBFDF219FA1CC44AEF7FBAFB48340F10442AF855A6260D7759A91DBA5

      Control-flow Graph

      APIs
      • __EH_prolog.LIBCMT ref: 0040405B
      • LoadIconA.USER32(00400000,00000070), ref: 00404088
      • LoadCursorA.USER32(00000000,00007F00), ref: 00404097
      • GetStockObject.GDI32(00000002), ref: 004040A2
      • RegisterClassA.USER32(?), ref: 004040BE
      • LoadAcceleratorsA.USER32(00000066), ref: 004040CC
      • SetWindowsHookA.USER32(000000FF,00405789), ref: 004040DF
      • LoadLibraryA.KERNELBASE(RICHED32.DLL,?,(uC), ref: 004040F0
      • InitCommonControlsEx.COMCTL32(?,?,(uC), ref: 0040410A
      • GetSystemMetrics.USER32(00000001), ref: 00404121
      • GetSystemMetrics.USER32(00000000), ref: 00404143
      • CreateWindowExA.USER32(00000000,MainWndClass,00000000,00CF0000,?,?,?,?,00000000,00000000), ref: 00404192
      • GetWindowRect.USER32(00000000,?), ref: 004041A3
      • GetSystemMetrics.USER32(00000001), ref: 004041AB
      • OffsetRect.USER32(?,00000000,000000D8), ref: 004041C2
      • OffsetRect.USER32(?,00000000,?), ref: 004041D4
      • ShowWindow.USER32(?,?,00000000,?,?,?,?,?,?,(uC), ref: 004042A3
        • Part of subcall function 0040459A: __EH_prolog.LIBCMT ref: 0040459F
        • Part of subcall function 0040459A: lstrlenA.KERNEL32(00000000,00000001,?,00000000,?,?,?,(uC), ref: 004045BE
        • Part of subcall function 0040459A: lstrlenA.KERNEL32(?,?,00000000,?,?,?,(uC), ref: 004045C7
        • Part of subcall function 0040459A: lstrcpyA.KERNEL32(00000000,?,?,00000000,?,?,?,(uC), ref: 004045DD
        • Part of subcall function 0040459A: lstrcatA.KERNEL32(?, - ,?,00000000,?,?,?,(uC), ref: 004045F1
        • Part of subcall function 0040459A: lstrcatA.KERNEL32(?,00000000,?,00000000,?,?,?,(uC), ref: 004045FC
        • Part of subcall function 0040459A: SetWindowTextA.USER32(?,?), ref: 00404607
        • Part of subcall function 0040459A: SetRectEmpty.USER32(?), ref: 0040466F
        • Part of subcall function 0040459A: GetWindowLongA.USER32(?,000000EC), ref: 004046AB
        • Part of subcall function 0040459A: SetWindowLongA.USER32(?,000000EC,00000000), ref: 004046C3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$LoadRect$MetricsSystem$H_prologLongOffsetlstrcatlstrlen$AcceleratorsClassCommonControlsCreateCursorEmptyHookIconInitLibraryObjectRegisterShowStockTextWindowslstrcpy
      • String ID: (uC$MainWndClass$RICHED32.DLL$e
      • API String ID: 115372367-4190344493
      • Opcode ID: a61262daf2d872b9cc46e6bec7715bd6e3bf4ed6c98d121de5907a68f250aef2
      • Instruction ID: bf204241300b57b385898991d815b5d9074a285952339ff7a11d9fd72f2741ac
      • Opcode Fuzzy Hash: a61262daf2d872b9cc46e6bec7715bd6e3bf4ed6c98d121de5907a68f250aef2
      • Instruction Fuzzy Hash: F1713DB1A00609AFDB10DFB4DD85AEEBBF4EB48310F10452EF655E6290DB745940CF58

      Control-flow Graph

      APIs
      • GetModuleFileNameA.KERNEL32(?,?,00000104,?,(uC), ref: 004064E0
      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,(uC), ref: 00406508
      • lstrcatA.KERNEL32(?,\etrnview.exe,?,(uC), ref: 0040651B
      • LoadStringA.USER32(?,00000001,RealLegal E-Transcript Viewer Install,00000040), ref: 0040654E
      • LoadStringA.USER32(?,00000002,The RealLegal E-Transcript Viewer was successfully installed.,00000400), ref: 0040655E
      • MessageBoxA.USER32(00000000,The RealLegal E-Transcript Viewer was successfully installed.,RealLegal E-Transcript Viewer Install,00000043), ref: 0040656C
        • Part of subcall function 0040E06C: __EH_prolog.LIBCMT ref: 0040E071
        • Part of subcall function 0040E06C: _lopen.KERNEL32(?,00000020), ref: 0040E094
        • Part of subcall function 0040E06C: _llseek.KERNEL32(00000000,000000F4,00000002), ref: 0040E0B0
        • Part of subcall function 0040E06C: _hread.KERNEL32(00000000,?,00000004), ref: 0040E0BF
        • Part of subcall function 0040E06C: _lclose.KERNEL32(00000000), ref: 0040E0F0
        • Part of subcall function 00405FDE: RegOpenKeyExA.KERNELBASE(80000000,?,00000000,00020019,?,76934D90,The RealLegal E-Transcript Viewer was successfully installed.), ref: 00406001
        • Part of subcall function 00405FDE: lstrcpyA.KERNEL32(?,ptxfile\shell\open\command), ref: 00406020
        • Part of subcall function 00405FDE: RegQueryValueA.ADVAPI32(80000000,?,?,?), ref: 00406040
        • Part of subcall function 00405FDE: RegCloseKey.ADVAPI32(?), ref: 00406068
      • LoadStringA.USER32(?,00000010,?,000000FF), ref: 00406628
      • LoadStringA.USER32(?,00000013,The RealLegal E-Transcript Viewer was successfully installed.,00000400), ref: 00406668
      • MessageBoxA.USER32(00000000,The RealLegal E-Transcript Viewer was successfully installed.,RealLegal E-Transcript Viewer Install,00000010), ref: 00406670
        • Part of subcall function 00406252: lstrcpyA.KERNEL32(?,?,76934D90,The RealLegal E-Transcript Viewer was successfully installed.,76990660), ref: 00406275
        • Part of subcall function 00406252: lstrcatA.KERNEL32(?,\ContentType), ref: 00406283
        • Part of subcall function 00406252: RegDeleteKeyA.ADVAPI32(80000000,?), ref: 0040629C
        • Part of subcall function 00406252: RegDeleteKeyA.ADVAPI32(80000000,?), ref: 004062A2
        • Part of subcall function 00406252: lstrcpyA.KERNEL32(?,?), ref: 004062AE
        • Part of subcall function 00406252: lstrcatA.KERNEL32(?,\shell\open\command), ref: 004062BC
        • Part of subcall function 00406252: RegDeleteKeyA.ADVAPI32(80000000,?), ref: 004062CA
        • Part of subcall function 00406252: RegDeleteKeyA.ADVAPI32(80000000,?), ref: 004062E8
        • Part of subcall function 00406252: RegDeleteKeyA.ADVAPI32(80000000,?), ref: 00406304
        • Part of subcall function 00406252: RegDeleteKeyA.ADVAPI32(80000000,?), ref: 00406320
        • Part of subcall function 00406252: RegCreateKeyExA.KERNELBASE(80000000,?,00000000,00000000,00000000,00020006,00000000,?,00000000), ref: 0040633D
        • Part of subcall function 00406252: lstrlenA.KERNEL32(?), ref: 0040634A
        • Part of subcall function 00406252: RegSetValueExA.KERNELBASE(?,00000000,00000000,00000001,?,00000001), ref: 00406362
      • LoadStringA.USER32(?,00000003,The RealLegal E-Transcript Viewer was successfully installed.,00000400), ref: 00406688
      • MessageBoxA.USER32(00000000,The RealLegal E-Transcript Viewer was successfully installed.,RealLegal E-Transcript Viewer Install,00000040), ref: 00406690
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Delete$LoadString$Messagelstrcatlstrcpy$Value$CloseCreateDirectoryFileH_prologModuleNameOpenQueryWindows_hread_lclose_llseek_lopenlstrlen
      • String ID: (uC$.ptx$E-Transcript File$RealLegal E-Transcript Viewer Install$The RealLegal E-Transcript Viewer was successfully installed.$\etrnview.exe$application/x-etranscript$ptxfile
      • API String ID: 2986426987-4010483303
      • Opcode ID: 8f2b9ae228a92477411b36f6f1161f09f44504757b52a5ada00e0ef66e776029
      • Instruction ID: ec2467e6fed3bc082d484739e17270f646fdb0c9dadba4c6736b0b0164260be2
      • Opcode Fuzzy Hash: 8f2b9ae228a92477411b36f6f1161f09f44504757b52a5ada00e0ef66e776029
      • Instruction Fuzzy Hash: CB41D4712443057BE630EB61DC86FDB7A9CEF85704F00083AF645E61D1DAB9E544CBA9

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 232 40e06c-40e09f call 429e18 call 411127 _lopen 237 40e0a5-40e0c8 _llseek _hread 232->237 238 40e1d7-40e1e3 call 41113c 232->238 240 40e129-40e13c _llseek _hread 237->240 241 40e0ca-40e0cf 237->241 248 40e1e5-40e1f3 238->248 243 40e191 240->243 244 40e13e-40e17c _llseek GetWindowsDirectoryA lstrcatA _lcreat 240->244 245 40e0d1-40e0ed call 40947b 241->245 246 40e109-40e119 241->246 247 40e194-40e1a0 _lclose 243->247 244->247 249 40e17e-40e18d call 40dede 244->249 245->240 256 40e0ef-40e104 _lclose call 41113c 245->256 246->240 258 40e11b-40e11c _lclose 246->258 252 40e122-40e124 247->252 253 40e1a2-40e1b2 _lclose call 429610 247->253 262 40e1b7-40e1cd _lclose * 2 call 429520 249->262 263 40e18f 249->263 252->238 253->252 256->248 258->252 266 40e1d2-40e1d6 262->266 263->247 266->238
      APIs
      • __EH_prolog.LIBCMT ref: 0040E071
      • _lopen.KERNEL32(?,00000020), ref: 0040E094
      • _llseek.KERNEL32(00000000,000000F4,00000002), ref: 0040E0B0
      • _hread.KERNEL32(00000000,?,00000004), ref: 0040E0BF
      • _lclose.KERNEL32(00000000), ref: 0040E0F0
      • _lclose.KERNEL32(00000000), ref: 0040E11C
      • _llseek.KERNEL32(00000000,000000FC,00000002), ref: 0040E12E
      • _hread.KERNEL32(00000000,?,00000004), ref: 0040E137
      • _llseek.KERNEL32(00000000,00000000,00000000), ref: 0040E143
      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040E151
      • lstrcatA.KERNEL32(?,\etrnview.exe), ref: 0040E163
      • _lcreat.KERNEL32(?,00000000), ref: 0040E171
      • _lclose.KERNEL32(00000000), ref: 0040E19B
      • _lclose.KERNEL32(?), ref: 0040E1A3
      • _lclose.KERNEL32(00000000), ref: 0040E1BE
      • _lclose.KERNEL32(00000000), ref: 0040E1C1
        • Part of subcall function 0040947B: __EH_prolog.LIBCMT ref: 00409480
        • Part of subcall function 0040947B: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00409498
        • Part of subcall function 0040947B: lstrcatA.KERNEL32(?,\pnxetkey.dat), ref: 004094AA
        • Part of subcall function 0040947B: _lopen.KERNEL32(?,00000020), ref: 004094B9
      Strings
      • The RealLegal E-Transcript Viewer was successfully installed., xrefs: 0040E080
      • \etrnview.exe, xrefs: 0040E15D
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _lclose$_llseek$DirectoryH_prologWindows_hread_lopenlstrcat$_lcreat
      • String ID: The RealLegal E-Transcript Viewer was successfully installed.$\etrnview.exe
      • API String ID: 1059618082-2991720876
      • Opcode ID: 4c7ac7ec25cebd994ff741a60d78fa12d4221c47a7a7b2fc1f40c2a953a00aea
      • Instruction ID: c2eae2b909f08feef4a4fb04d1f61ae7f3e898ba86927335f0dbd577fefcc626
      • Opcode Fuzzy Hash: 4c7ac7ec25cebd994ff741a60d78fa12d4221c47a7a7b2fc1f40c2a953a00aea
      • Instruction Fuzzy Hash: D341E572900218ABDF109B65DC85DFF7B7CEF44724F10062AFA11A62D1DB385E51DB58

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 267 403447-403451 268 403457-40345a 267->268 269 40360d-40360f 267->269 271 403460-403465 268->271 272 403617-403626 call 422f88 268->272 270 403610-403614 269->270 274 403574-403597 GetParent call 416d18 271->274 275 40346b-40346c 271->275 272->270 285 4035f9-403607 GetDlgItem KiUserCallbackDispatcher 274->285 286 403599-4035a3 274->286 276 403472-40347a 275->276 277 40356d-40356f 275->277 280 403480-403481 276->280 281 403505-403528 SendDlgItemMessageA 276->281 277->270 283 403501-403503 280->283 284 403483-403488 280->284 287 403561 281->287 288 40352a-40353a SendDlgItemMessageA 281->288 291 403563-403567 KiUserCallbackDispatcher 283->291 284->277 289 40348e-4034a2 284->289 285->269 290 4035a8-4035c0 lstrlenA 286->290 287->291 292 40355a-40355f 288->292 293 40353c-403556 SendDlgItemMessageA 288->293 294 4034a4-4034b4 SendDlgItemMessageA 289->294 295 4034cd-4034d1 289->295 296 4035c2-4035e1 SendDlgItemMessageA * 2 290->296 297 4035e3-4035f7 290->297 291->277 292->287 292->288 293->292 294->295 298 4034b6-4034c8 SendMessageA 294->298 295->277 299 4034d7-4034ff SendDlgItemMessageA GetDlgItem EnableWindow 295->299 296->297 297->285 297->290 298->277 299->277
      APIs
      • SendDlgItemMessageA.USER32(?,00000421,00000190,00000000,00000000), ref: 004034B0
      • SendMessageA.USER32(?,00000111,00000001,00000000), ref: 004034C2
      • SendDlgItemMessageA.USER32(?,00000421,00000190,00000000,00000000), ref: 004034E3
      • GetDlgItem.USER32(?,00000001), ref: 004034F2
      • EnableWindow.USER32(00000000), ref: 004034F9
      • SendDlgItemMessageA.USER32(?,00000421,0000018B,00000000,00000000), ref: 0040351E
      • SendDlgItemMessageA.USER32(?,00000421,00000187,00000000,00000000), ref: 00403536
      • SendDlgItemMessageA.USER32(?,00000421,00000199,00000000,00000000), ref: 00403548
      • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00403567
      • GetParent.USER32(?), ref: 00403578
      • lstrlenA.KERNEL32(?), ref: 004035B8
      • SendDlgItemMessageA.USER32(?,00000421,00000180,00000000,?), ref: 004035D0
      • SendDlgItemMessageA.USER32(?,00000421,0000019A,00000000,?), ref: 004035E1
      • GetDlgItem.USER32(?,00000001), ref: 00403600
      • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00403607
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$MessageSend$CallbackDispatcherUser$EnableParentWindowlstrlen
      • String ID: 0
      • API String ID: 709524723-4108050209
      • Opcode ID: a33417acd069d6afb9f91f758300136241cd1b3d541addab7db64fa68345f898
      • Instruction ID: 084e3a3b4b1065fb99b7651f1b8691f2abf2612b421d36e11ce0787ed86c8ec5
      • Opcode Fuzzy Hash: a33417acd069d6afb9f91f758300136241cd1b3d541addab7db64fa68345f898
      • Instruction Fuzzy Hash: 3C41C071208206BFEB208F65DC45D6B7FACEB44785F00093AFA84A61F1C6768E01DB59

      Control-flow Graph

      APIs
      • CreateToolbarEx.COMCTL32(?,40800900,00000001,0000000B,0000006D,?,00000012,00000010,00000010,00000010,00000010,00000014,00000001,?,00000000), ref: 00408381
      • SendMessageA.USER32(00000000,00000439,00000000,00000000), ref: 00408397
      • SendMessageA.USER32(?,00000438,00000000,00000000), ref: 004083A5
      • SendMessageA.USER32(?,00000442,00001BD3,?), ref: 004083E7
      • SendMessageA.USER32(?,00000442,00001BD2,00000020), ref: 00408405
      • SendMessageA.USER32(?,00000442,00001BD4,00000020), ref: 0040841A
      • SendMessageA.USER32(?,0000041D,00000007,?), ref: 0040842C
        • Part of subcall function 00416F2A: CreateWindowExA.USER32(00000000,00001BD3,?,?,?,?,?,?,00444FE8,?,00408461,?), ref: 00416F5E
      • GetStockObject.GDI32(0000000C), ref: 0040846A
      • SendMessageA.USER32(?,00000030,00000000), ref: 00408476
        • Part of subcall function 00408570: SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 00408590
        • Part of subcall function 00408570: lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,00408481), ref: 004085D3
        • Part of subcall function 00408570: SendMessageA.USER32(?,00000143,00000000,00000025), ref: 004085F1
        • Part of subcall function 00408570: SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00408603
      • GetWindowLongA.USER32(?,000000FC), ref: 00408485
      • SetWindowLongA.USER32(?,000000EB,?), ref: 0040849B
      • SetWindowLongA.USER32(?,000000FC,004086D5), ref: 004084A6
      • ShowWindow.USER32(?,00000005), ref: 004084AC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$Window$Long$Create$ObjectShowStockToolbarlstrlen
      • String ID: $COMBOBOX
      • API String ID: 2731565370-1431761349
      • Opcode ID: 3d3c08455f83a6a9f35ed959743dd9b1025f83cef7d52c02410d8808be8d7c6f
      • Instruction ID: 2ed4a14c6884161277c877569c65893aeabfd8037dbb8755a4da4773a56a0fe5
      • Opcode Fuzzy Hash: 3d3c08455f83a6a9f35ed959743dd9b1025f83cef7d52c02410d8808be8d7c6f
      • Instruction Fuzzy Hash: FFD13DB1949398EEEB21CB68CC44BCDFFB1AB25304F4444D9D688B7251D7B50A88CF66

      Control-flow Graph

      APIs
      • __EH_prolog.LIBCMT ref: 0040459F
      • lstrlenA.KERNEL32(00000000,00000001,?,00000000,?,?,?,(uC), ref: 004045BE
      • lstrlenA.KERNEL32(?,?,00000000,?,?,?,(uC), ref: 004045C7
      • lstrcpyA.KERNEL32(00000000,?,?,00000000,?,?,?,(uC), ref: 004045DD
      • lstrcatA.KERNEL32(?, - ,?,00000000,?,?,?,(uC), ref: 004045F1
      • lstrcatA.KERNEL32(?,00000000,?,00000000,?,?,?,(uC), ref: 004045FC
      • SetWindowTextA.USER32(?,?), ref: 00404607
      • SetRectEmpty.USER32(?), ref: 0040466F
      • GetWindowLongA.USER32(?,000000EC), ref: 004046AB
      • SetWindowLongA.USER32(?,000000EC,00000000), ref: 004046C3
      • GetWindowLongA.USER32(?,000000EC), ref: 0040472F
      • SetWindowLongA.USER32(?,000000EC,00000000), ref: 00404743
        • Part of subcall function 0041704A: CreateWindowExA.USER32(00000000,PaneSplitter,00444FE8,40000000,00000000,00000000,0000000A,0000000A,?,00000000,00000000), ref: 0041709D
        • Part of subcall function 0040AFAF: lstrcpyA.KERNEL32 ref: 0040B043
        • Part of subcall function 0040AFAF: lstrcpyA.KERNEL32(0000016C,Times New Roman), ref: 0040B05D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Long$lstrcpy$lstrcatlstrlen$CreateEmptyH_prologRectText
      • String ID: - $WISplit
      • API String ID: 1986124246-3494287041
      • Opcode ID: 0573ae1ae8bba00b71459d67ffe5f971d477a6e4b1d82c7eb99fd13b5e9554f9
      • Instruction ID: 1b8ef5a6a4d552c069e3143d7b4b420e03039cf1bc30cc464c583b85bd5af3ad
      • Opcode Fuzzy Hash: 0573ae1ae8bba00b71459d67ffe5f971d477a6e4b1d82c7eb99fd13b5e9554f9
      • Instruction Fuzzy Hash: 1691A171600704ABDB15ABB4CC45AEFB7E5FF48310F104A2EF16AA32E1DB786900DB18

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 449 405bda-405c1c lstrcpyA lstrlenA 450 405c2c-405c4a lstrcatA 449->450 451 405c1e-405c2a lstrcatA 449->451 453 405c50-405c5e 450->453 454 405c4c 450->454 451->450 456 405c60 453->456 457 405c64-405c72 453->457 454->453 456->457 459 405c74 457->459 460 405c78-405c95 lstrcpyA lstrlenA 457->460 459->460 461 405ca5-405d06 lstrcatA * 2 MultiByteToWideChar SHChangeNotify 460->461 462 405c97-405ca3 lstrcatA 460->462 464 405d08 461->464 465 405d0b-405d12 461->465 462->461 464->465
      APIs
      • lstrcpyA.KERNEL32(?,?,76BD33A0,0040664E,00000000), ref: 00405BFD
      • lstrlenA.KERNEL32(?), ref: 00405C0C
      • lstrcatA.KERNEL32(?,0043C984), ref: 00405C2A
      • lstrcatA.KERNEL32(?,?), ref: 00405C36
      • lstrcpyA.KERNEL32(?,?), ref: 00405C82
      • lstrlenA.KERNEL32(?), ref: 00405C8B
      • lstrcatA.KERNEL32(?,0043C984), ref: 00405CA3
      • lstrcatA.KERNEL32(?,?), ref: 00405CAF
      • lstrcatA.KERNEL32(?,.lnk), ref: 00405CBD
      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 00405CD8
      • SHChangeNotify.SHELL32(00000002,00000001,?,00000000), ref: 00405CFE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcat$lstrcpylstrlen$ByteChangeCharMultiNotifyWide
      • String ID: .lnk
      • API String ID: 336434414-24824748
      • Opcode ID: fa98a6fc926722ddb662e9b4d369429eb08c57859182e1180d3d43129ca1d0e1
      • Instruction ID: 34de60236627501390b1431574186aeeabc5537727148d75cdbee9748cad4786
      • Opcode Fuzzy Hash: fa98a6fc926722ddb662e9b4d369429eb08c57859182e1180d3d43129ca1d0e1
      • Instruction Fuzzy Hash: 964149B690421DABDF10DFA4CC88FDA7BBCEF18318F1044A6F584E7180DAB49A858F54

      Control-flow Graph

      APIs
      • SendMessageA.USER32(?,00000404,00000003,?), ref: 00407B9F
      • GetStockObject.GDI32(0000000C), ref: 00407BA5
      • SendMessageA.USER32(?,00000030,00000000), ref: 00407BB1
      • LoadBitmapA.USER32(000000F7), ref: 00407BC4
      • LoadBitmapA.USER32(0000010E), ref: 00407BD8
      • LoadBitmapA.USER32(00000085), ref: 00407BEB
      • LoadBitmapA.USER32(0000010E), ref: 00407BFA
      • LoadBitmapA.USER32(0000007C), ref: 00407C0A
      • LoadBitmapA.USER32(0000010F), ref: 00407C1D
      • LoadBitmapA.USER32(000000F9), ref: 00407C30
      • LoadBitmapA.USER32(00000110), ref: 00407C43
      • SendMessageA.USER32(?,00000401,00001001), ref: 00407C61
      • SendMessageA.USER32(?,00000401,00001002), ref: 00407C6D
      • SendMessageA.USER32(?,00000401,00000000,00000000), ref: 00407C76
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: BitmapLoad$MessageSend$ObjectStock
      • String ID:
      • API String ID: 1752246037-0
      • Opcode ID: 1e996521f3300ccd2710ed96b73126bee02a32571e6ef873ee8a342eb2037846
      • Instruction ID: e98203713f164199a056f04980e6dbb322ccdfef782da7b6ceab7ab3d63a2609
      • Opcode Fuzzy Hash: 1e996521f3300ccd2710ed96b73126bee02a32571e6ef873ee8a342eb2037846
      • Instruction Fuzzy Hash: 182139B1140B48EFEB316F21DC46FA7BBE5EB86B00F004539F6894A1B0C6B26851DB18

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 467 432d3b-432d6c 468 432dae-432db3 467->468 469 432d6e-432d81 CompareStringW 467->469 470 432dc5-432dc8 468->470 471 432db5-432dc2 call 432fb8 468->471 472 432d83-432d89 469->472 473 432d8b-432d9e CompareStringA 469->473 477 432dda-432de2 470->477 478 432dca-432dd7 call 432fb8 470->478 471->470 472->468 474 432fa4 473->474 475 432da4 473->475 480 432fa6-432fb7 474->480 475->468 482 432de4-432dfa CompareStringA 477->482 483 432dff-432e01 477->483 478->477 482->480 483->474 485 432e07-432e0a 483->485 486 432e14-432e16 485->486 487 432e0c-432e11 485->487 488 432e21-432e24 486->488 489 432e18-432e1b 486->489 487->486 491 432e26 488->491 492 432e2e-432e31 488->492 489->488 490 432eb9-432ecf MultiByteToWideChar 489->490 490->474 496 432ed5-432f0b call 42be00 490->496 493 432e28-432e29 491->493 494 432e33-432e35 492->494 495 432e3a-432e3c 492->495 493->480 494->480 497 432e7f-432e81 495->497 498 432e3e-432e4d GetCPInfo 495->498 496->474 507 432f11-432f29 MultiByteToWideChar 496->507 497->493 498->474 500 432e53-432e55 498->500 502 432e83-432e86 500->502 503 432e57-432e5b 500->503 502->490 505 432e88-432e8c 502->505 503->497 506 432e5d-432e63 503->506 505->494 508 432e8e-432e94 505->508 506->497 509 432e65-432e6a 506->509 507->474 510 432f2b-432f41 MultiByteToWideChar 507->510 508->494 511 432e96-432e9b 508->511 509->497 512 432e6c-432e73 509->512 510->474 513 432f43-432f75 call 42be00 510->513 511->494 515 432e9d-432ea4 511->515 516 432e75-432e77 512->516 517 432e79-432e7d 512->517 513->474 523 432f77-432f8c MultiByteToWideChar 513->523 519 432ea6-432ea8 515->519 520 432eae-432eb2 515->520 516->491 516->517 517->497 517->509 519->491 519->520 520->511 522 432eb4 520->522 522->494 523->474 524 432f8e-432fa2 CompareStringW 523->524 524->480
      APIs
      • CompareStringW.KERNEL32(00000000,00000000,004384E4,00000001,004384E4,00000001,00000000,?,0000005C,0000005C,00000000,?,?,762283C0,00404932,TEMP), ref: 00432D79
      • CompareStringA.KERNEL32(00000000,00000000,004384E0,00000001,004384E0,00000001,?,?,762283C0,00404932,TEMP,?), ref: 00432D96
      • CompareStringA.KERNEL32(?,?,?,?,?,2I@,00000000,?,0000005C,0000005C,00000000,?,?,762283C0,00404932,TEMP), ref: 00432DF4
      • GetCPInfo.KERNEL32(762283C0,00000000,00000000,?,0000005C,0000005C,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432E45
      • MultiByteToWideChar.KERNEL32(762283C0,00000009,00000000,2I@,00000000,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432EC4
      • MultiByteToWideChar.KERNEL32(?,00000001,?,2I@,?,2I@,?,?,762283C0,00404932,TEMP,?), ref: 00432F25
      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432F38
      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432F84
      • CompareStringW.KERNEL32(?,?,?,?,?,00000000,?,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432F9C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ByteCharCompareMultiStringWide$Info
      • String ID: 2I@$2I@
      • API String ID: 1651298574-2381108387
      • Opcode ID: b566e0df5a59d2c4e580c43b062ca2c40d6eb2565a7de76551b8d9e98eeb5dea
      • Instruction ID: 10c11a2cb1f1521fbab9ed2ff6cf20fbb0bc193c85100dfcf4886bf7556be001
      • Opcode Fuzzy Hash: b566e0df5a59d2c4e580c43b062ca2c40d6eb2565a7de76551b8d9e98eeb5dea
      • Instruction Fuzzy Hash: 2F71AE72904249AFCF219F54DE42AEF7BB6FF09314F14212BF951A2260C3B98C51DB99

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 525 403a45-403a65 call 405aa0 call 403f44 530 403b17-403b26 call 429640 525->530 531 403a6b-403a77 call 404056 525->531 537 403b32-403b60 UnhookWindowsHook call 429182 530->537 538 403b28-403b31 call 429610 530->538 531->530 536 403a7d-403a8b call 41677f call 4043e3 531->536 536->530 550 403a91-403aab call 4064c3 536->550 548 403b62-403b64 537->548 549 403b68-403b70 537->549 538->537 548->549 551 403b72-403bd5 call 429610 lstrlenA lstrcpyA call 429610 lstrcpyA call 429610 call 429f58 549->551 552 403bd6-403bde 549->552 562 403aac-403ab0 KiUserCallbackDispatcher 550->562 551->552 554 403be0-403be6 call 429f58 552->554 555 403be7-403bf0 552->555 554->555 559 403bf2-403bf3 _lclose 555->559 560 403bf9-403c01 555->560 559->560 565 403c03-403c0c 560->565 566 403c0e-403c10 560->566 562->530 563 403ab2-403aba 562->563 568 403ac9-403ad1 563->568 569 403abc-403ac0 call 406a63 563->569 570 403c11-403c19 565->570 566->570 573 403ae0-403af8 TranslateAcceleratorA 568->573 574 403ad3-403ade 568->574 581 403ac5-403ac7 569->581 576 403c21-403c29 570->576 577 403c1b-403c1d 570->577 582 403afa-403b08 TranslateMessage DispatchMessageA 573->582 583 403b0e-403b15 573->583 574->573 574->583 579 403c31-403c39 576->579 580 403c2b-403c2d 576->580 577->576 586 403c41-403c49 579->586 587 403c3b-403c3d 579->587 580->579 581->568 581->583 582->583 583->562 590 403c50-403c58 586->590 591 403c4b-403c4d 586->591 587->586 592 403c5a-403c5c 590->592 593 403c5f-403c67 590->593 591->590 592->593 594 403c69-403c6b 593->594 595 403c6e-403c76 593->595 594->595 596 403c78-403c7a 595->596 597 403c7e-403c92 call 429182 595->597 596->597 600 403c94-403c95 FreeLibrary 597->600 601 403c9b-403ca1 597->601 600->601
      APIs
        • Part of subcall function 00403F44: __EH_prolog.LIBCMT ref: 00403F49
        • Part of subcall function 00403F44: GetModuleFileNameA.KERNEL32(?,00000104,?,?,(uC), ref: 00403F9A
        • Part of subcall function 00403F44: lstrlenA.KERNEL32(00000000,?,?,(uC), ref: 00403FC1
        • Part of subcall function 00403F44: lstrlenA.KERNEL32(00000000,?,?,(uC), ref: 00403FCB
      • KiUserCallbackDispatcher.NTDLL(00000000,00000000,00000000,00000000), ref: 00403AAC
      • TranslateAcceleratorA.USER32(?,?,00000000,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00403AF0
      • TranslateMessage.USER32(00000000), ref: 00403AFE
      • DispatchMessageA.USER32(00000000), ref: 00403B08
      • UnhookWindowsHook.USER32(000000FF,00405789), ref: 00403B46
      • lstrlenA.KERNEL32(?,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00403B7F
      • lstrcpyA.KERNEL32(?,.gid,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00403B9D
      • lstrcpyA.KERNEL32(?,?,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00403BBC
      • _lclose.KERNEL32(?), ref: 00403BF3
        • Part of subcall function 00404056: __EH_prolog.LIBCMT ref: 0040405B
        • Part of subcall function 00404056: LoadIconA.USER32(00400000,00000070), ref: 00404088
        • Part of subcall function 00404056: LoadCursorA.USER32(00000000,00007F00), ref: 00404097
        • Part of subcall function 00404056: GetStockObject.GDI32(00000002), ref: 004040A2
        • Part of subcall function 00404056: RegisterClassA.USER32(?), ref: 004040BE
        • Part of subcall function 00404056: LoadAcceleratorsA.USER32(00000066), ref: 004040CC
        • Part of subcall function 00404056: SetWindowsHookA.USER32(000000FF,00405789), ref: 004040DF
        • Part of subcall function 00404056: LoadLibraryA.KERNELBASE(RICHED32.DLL,?,(uC), ref: 004040F0
        • Part of subcall function 00404056: InitCommonControlsEx.COMCTL32(?,?,(uC), ref: 0040410A
        • Part of subcall function 00404056: GetSystemMetrics.USER32(00000001), ref: 00404121
        • Part of subcall function 00404056: GetSystemMetrics.USER32(00000000), ref: 00404143
        • Part of subcall function 00404056: CreateWindowExA.USER32(00000000,MainWndClass,00000000,00CF0000,?,?,?,?,00000000,00000000), ref: 00404192
        • Part of subcall function 00404056: GetWindowRect.USER32(00000000,?), ref: 004041A3
        • Part of subcall function 00404056: GetSystemMetrics.USER32(00000001), ref: 004041AB
      • FreeLibrary.KERNEL32(?,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00403C95
        • Part of subcall function 0041677F: LoadCursorA.USER32(00000000,00007F00), ref: 004167B1
        • Part of subcall function 0041677F: RegisterClassA.USER32(00000002), ref: 004167CB
        • Part of subcall function 004043E3: DialogBoxParamA.USER32(000000F8,?,004022EE,?), ref: 00404414
        • Part of subcall function 004064C3: GetModuleFileNameA.KERNEL32(?,?,00000104,?,(uC), ref: 004064E0
        • Part of subcall function 004064C3: GetWindowsDirectoryA.KERNEL32(?,00000104,?,(uC), ref: 00406508
        • Part of subcall function 004064C3: lstrcatA.KERNEL32(?,\etrnview.exe,?,(uC), ref: 0040651B
        • Part of subcall function 004064C3: LoadStringA.USER32(?,00000001,RealLegal E-Transcript Viewer Install,00000040), ref: 0040654E
        • Part of subcall function 004064C3: LoadStringA.USER32(?,00000002,The RealLegal E-Transcript Viewer was successfully installed.,00000400), ref: 0040655E
        • Part of subcall function 004064C3: MessageBoxA.USER32(00000000,The RealLegal E-Transcript Viewer was successfully installed.,RealLegal E-Transcript Viewer Install,00000043), ref: 0040656C
        • Part of subcall function 004064C3: LoadStringA.USER32(?,00000013,The RealLegal E-Transcript Viewer was successfully installed.,00000400), ref: 00406668
        • Part of subcall function 004064C3: MessageBoxA.USER32(00000000,The RealLegal E-Transcript Viewer was successfully installed.,RealLegal E-Transcript Viewer Install,00000010), ref: 00406670
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Load$Message$MetricsStringSystemWindowslstrlen$ClassCursorFileH_prologHookLibraryModuleNameRegisterTranslateWindowlstrcpy$AcceleratorAcceleratorsCallbackCommonControlsCreateDialogDirectoryDispatchDispatcherFreeIconInitObjectParamRectStockUnhookUser_lcloselstrcat
      • String ID: .gid
      • API String ID: 2299049595-3536957211
      • Opcode ID: dd647b51120259aa538dcc84a98db34668c4e4c38780463c5392c6b6a52c4b1f
      • Instruction ID: 4879c7a06dcdb6b8a2154e505c8b452992afc31afa14b979292a5385b3814d02
      • Opcode Fuzzy Hash: dd647b51120259aa538dcc84a98db34668c4e4c38780463c5392c6b6a52c4b1f
      • Instruction Fuzzy Hash: C67192313046059FDB29AF75D885EAB7BBCAF45305F00446EF466E72A1CB38AD01DB18
      APIs
        • Part of subcall function 0040ABC4: lstrcpyA.KERNEL32(?,00000000,00423BAE,?,?,00423084,00000000,?,00000000,00414FF9,00000000,00000000,?,76937CE0,?,0040477E), ref: 0040ABCC
        • Part of subcall function 0040ABFB: GetPrivateProfileIntA.KERNEL32(00000000,?,00423084,00000000), ref: 0040AC0D
        • Part of subcall function 0040AC1C: GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,00403E0F,DisplayLeft), ref: 0040AC4F
      • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00403E62
      • GetSystemMetrics.USER32(00000001), ref: 00403E69
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: PrivateProfile$CallbackDispatcherMetricsStringSystemUserlstrcpy
      • String ID: DisplayBottom$DisplayLeft$DisplayRight$DisplayTop$DisplayValid$FileOpenLocation$SaveToKeychain$ShowWordIndex$TempSaveLocation
      • API String ID: 1289276032-535980166
      • Opcode ID: 6f84648534c24bc131a8e5844af410069b58d54b9e8bd5b06bebbffe05749eef
      • Instruction ID: cd56a0561d9fea1cff796f42b8fa2852033300da32d32409b278d31d07ec47a5
      • Opcode Fuzzy Hash: 6f84648534c24bc131a8e5844af410069b58d54b9e8bd5b06bebbffe05749eef
      • Instruction Fuzzy Hash: 4551AC71200B09AFCB20DF79C881BABBBE9EF44359F10052AF559A7391D734AA41CF95
      APIs
      • lstrlenA.KERNEL32(?), ref: 0040E57B
      • _llseek.KERNEL32(?,000000F4,00000002), ref: 0040E5A0
      • _hread.KERNEL32(?,?,00000004), ref: 0040E5AE
      • lstrcmpiA.KERNEL32(?,.exe), ref: 0040E5F7
      • _llseek.KERNEL32(?,000000FC,00000002), ref: 0040E60B
      • _hread.KERNEL32(?,?,00000004), ref: 0040E61C
      • _llseek.KERNEL32(?,00000000,00000000), ref: 0040E63B
      • _lclose.KERNEL32(?), ref: 0040E72E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _llseek$_hread$_lcloselstrcmpilstrlen
      • String ID: .exe
      • API String ID: 2741372863-4119554291
      • Opcode ID: c04ddb5b69b99185e2f446263c4618e52dcbbf07eb4a045f661936eb7bae2441
      • Instruction ID: 4e35055330286a5e269bdc807592a93e8fc894a0d84ba33c2de1c2cbcde85148
      • Opcode Fuzzy Hash: c04ddb5b69b99185e2f446263c4618e52dcbbf07eb4a045f661936eb7bae2441
      • Instruction Fuzzy Hash: 3C519E71600300AFDB25DF76CC85A9AB7E9EB04314F648D6EF11AE72D0DB34EA118B08
      APIs
      • SelectObject.GDI32(00000000,?), ref: 004228AC
      • GetTextMetricsA.GDI32(00000000,?), ref: 004228BA
      • SelectObject.GDI32(00000000,00000000), ref: 004229B8
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$MetricsText
      • String ID:
      • API String ID: 3697559710-0
      • Opcode ID: 3dc56056ade3532b2c7686109d15c217af6e6edfb4cb3710820858a812c289ff
      • Instruction ID: b01e8a755bf65807b3fcdfa86c729c1f9a2de025772d906cff938ad2f1c8ac2b
      • Opcode Fuzzy Hash: 3dc56056ade3532b2c7686109d15c217af6e6edfb4cb3710820858a812c289ff
      • Instruction Fuzzy Hash: 1C4168B5600208BFDB158F94DC84EBE7BB9EF48310F008069FA599A2A1C775EA41DF65
      APIs
      • RegOpenKeyExA.KERNELBASE(80000000,?,00000000,00020019,?,76934D90,The RealLegal E-Transcript Viewer was successfully installed.), ref: 00406001
      • lstrcpyA.KERNEL32(?,ptxfile\shell\open\command), ref: 00406020
      • RegQueryValueA.ADVAPI32(80000000,?,?,?), ref: 00406040
      • RegCloseKey.ADVAPI32(?), ref: 00406068
      Strings
      • ptxfile\shell\open\command, xrefs: 0040601A
      • RealLegal E-Transcript Viewer Install, xrefs: 00405FDE
      • pnxbndr.exe, xrefs: 00406083
      • The RealLegal E-Transcript Viewer was successfully installed., xrefs: 00405FE7
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CloseOpenQueryValuelstrcpy
      • String ID: RealLegal E-Transcript Viewer Install$The RealLegal E-Transcript Viewer was successfully installed.$pnxbndr.exe$ptxfile\shell\open\command
      • API String ID: 534897748-1579285423
      • Opcode ID: 240fb1b81427238e12100aec325a614c9271439868a8927a6763b9ea8eba27be
      • Instruction ID: ba681b6ad867ce1f19bc7d91e4d736aacc32262078af9e648ea5c6875347564d
      • Opcode Fuzzy Hash: 240fb1b81427238e12100aec325a614c9271439868a8927a6763b9ea8eba27be
      • Instruction Fuzzy Hash: 6111A5B79442286ADB25D660EC49FDB77BCDB04729F1011B6FA81F70C0DA345E458B98
      APIs
      • GetClientRect.USER32(?,004042B0), ref: 00404EBE
      • IsWindowVisible.USER32(?), ref: 00404F03
      • ShowWindow.USER32(?,00000000), ref: 00404F1C
      • ShowWindow.USER32(?,00000000), ref: 00404F46
        • Part of subcall function 004086AB: GetWindowRect.USER32(?,?), ref: 004086C0
        • Part of subcall function 00416DD6: GetParent.USER32(00000001), ref: 00416DE1
        • Part of subcall function 00416DD6: GetWindowRect.USER32(00000001,?), ref: 00416DF0
        • Part of subcall function 00416DD6: ScreenToClient.USER32(00000000,?), ref: 00416E01
        • Part of subcall function 00416DD6: ScreenToClient.USER32(00000000,00000001), ref: 00416E08
        • Part of subcall function 00416DD6: MoveWindow.USER32(00000001,00000000,?,?,?,?,00000000,00000001,?,004042B0,?,?,(uC), ref: 00416E41
      • ShowWindow.USER32(?,00000005,?,?,?,00000000,00000001,?,004042B0,?,?,(uC), ref: 00404F8C
        • Part of subcall function 00417754: IsWindow.USER32(?), ref: 00417760
        • Part of subcall function 00417754: GetWindowRect.USER32(?,?), ref: 00417771
      • ShowWindow.USER32(?,00000005,?,?,?,?,?,?,?,?,?,00000000,00000001,?,004042B0), ref: 00404FCD
      • ShowWindow.USER32(?,00000005,00000005), ref: 00405030
      • ShowWindow.USER32(?,00000000,00000000), ref: 0040511A
      • InvalidateRect.USER32(?,00000000,00000001), ref: 00405142
        • Part of subcall function 0041AFAA: IsWindowVisible.USER32(?), ref: 0041AFBA
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Show$Rect$Client$ScreenVisible$InvalidateMoveParent
      • String ID:
      • API String ID: 1827169823-0
      • Opcode ID: 8dbc4e43ee33deb8703ec956f4bbd684fa720736d3b19e6e75986452ff1a1319
      • Instruction ID: 54133d3cf169c1b40941a69a410454258e75e41fc89676e1e5454e5ac3734fef
      • Opcode Fuzzy Hash: 8dbc4e43ee33deb8703ec956f4bbd684fa720736d3b19e6e75986452ff1a1319
      • Instruction Fuzzy Hash: 33918D71600604AFCB15EFA4CD85FEAB7F6FF48304F010469F29AAB2A1C675A950DF54
      APIs
      • GetClientRect.USER32(?,?), ref: 0041B3AF
      • BeginPaint.USER32(?,?), ref: 0041B3BA
      • EnableScrollBar.USER32(?,00000003,00000000), ref: 0041B3F1
      • EndPaint.USER32(?,?), ref: 0041B437
      • SetWindowLongA.USER32(?,00000000,00000000), ref: 0041B45B
      • SetWindowLongA.USER32(?,00000000), ref: 0041B477
      • SetScrollRange.USER32(?,00000001,00000000,?,00000001), ref: 0041B49A
      • DefWindowProcA.USER32(?,?,?,?,?,00000000,?,?,?), ref: 0041B54A
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$LongPaintScroll$BeginClientEnableProcRangeRect
      • String ID:
      • API String ID: 442844283-0
      • Opcode ID: 697040efc620e2dcd8296adde87b2f4248d3417e591baae1321e9c57940ff506
      • Instruction ID: 44a9bf6e730fdd6a0686a52d8e452182f1a763ede5e09e6cc0b541e5afdd195f
      • Opcode Fuzzy Hash: 697040efc620e2dcd8296adde87b2f4248d3417e591baae1321e9c57940ff506
      • Instruction Fuzzy Hash: 4F718EB0200619ABDB24CF28CD84EFF77B9FB48305F14441AF95696252D738ED91CBA9
      APIs
        • Part of subcall function 00429FC1: GetFileAttributesA.KERNELBASE(?,00404538,?,00000004,?,?,?,?,0040403F), ref: 00429FC5
        • Part of subcall function 00429FC1: GetLastError.KERNEL32(?,?,?,?,0040403F), ref: 00429FD0
      • GetFileVersionInfoSizeA.VERSION(?,?,?,00000104), ref: 004060D4
      • GetFileVersionInfoA.VERSION(?,?,00000000,00000000,?,?,?,00000104), ref: 004060EC
      • VerQueryValueA.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,00000000,00000000,?,?,?,00000104), ref: 004060FF
      • wsprintfA.USER32 ref: 0040611C
      • VerQueryValueA.VERSION(00000000,?,?,?), ref: 00406135
      Strings
      • \StringFileInfo\%04x%04x\FileVersion, xrefs: 00406116
      • \VarFileInfo\Translation, xrefs: 004060F9
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: File$InfoQueryValueVersion$AttributesErrorLastSizewsprintf
      • String ID: \StringFileInfo\%04x%04x\FileVersion$\VarFileInfo\Translation
      • API String ID: 565145844-2452293203
      • Opcode ID: 1c72906ce5f70d1cdaac773cc935b5745ffe15ef496a4fe3887fc67f4ddc3cf5
      • Instruction ID: d87d2e4f855fa1b631cdff149ed34cf789144a51da829ee04967547f002b616e
      • Opcode Fuzzy Hash: 1c72906ce5f70d1cdaac773cc935b5745ffe15ef496a4fe3887fc67f4ddc3cf5
      • Instruction Fuzzy Hash: C73199726002157BEB15AB66FC46EFB376CDF45364F10406BFC05DA181DB389E5086A5
      APIs
      • lstrcpyA.KERNEL32(?,00000000,0040664E), ref: 00405B69
      • lstrlenA.KERNEL32(?), ref: 00405B76
      • lstrcatA.KERNEL32(?,0043C984), ref: 00405B98
      • lstrcatA.KERNEL32(?,00000001), ref: 00405BA4
      • lstrcatA.KERNEL32(?,.lnk), ref: 00405BB2
      • SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 00405BCE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcat$ChangeNotifylstrcpylstrlen
      • String ID: .lnk
      • API String ID: 4094561717-24824748
      • Opcode ID: 02e5742214da59737a7f7e3541aff5ef7191977486fd5d22329adc4e81cdf6e9
      • Instruction ID: 63b3a713fabc1856149cf88b15b68c63adba66d56408c9ad7a6c66f2cf59cbc5
      • Opcode Fuzzy Hash: 02e5742214da59737a7f7e3541aff5ef7191977486fd5d22329adc4e81cdf6e9
      • Instruction Fuzzy Hash: 3801C7F790421DABDF209BA0DD89FDA7B7CDB14714F1004A2B745E7180D6B4A6C48F54
      APIs
        • Part of subcall function 0040E4EF: _lopen.KERNEL32(?,00000020), ref: 0040E505
      • _llseek.KERNEL32(?,?,00000000), ref: 0040E797
      • _hread.KERNEL32(?,?,00000008), ref: 0040E7A1
      • _llseek.KERNEL32(?,?,00000000), ref: 0040E7FA
      • _hread.KERNEL32(?,?,00000000), ref: 0040E80B
      • _llseek.KERNEL32(?,?,00000000), ref: 0040E851
      • _hread.KERNEL32(?,?,00000008), ref: 0040E85B
      • _llseek.KERNEL32(?,?,00000000), ref: 0040E894
      • _hread.KERNEL32(?,?,?), ref: 0040E8AF
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hread_llseek$_lopen
      • String ID:
      • API String ID: 3438067751-0
      • Opcode ID: 24b8f67a362a5211d220f2c52b4f717716d945a9a4cb0782d3db7b7ea144ac8a
      • Instruction ID: 8c7f17635c438269cffa7f3692c0b865f63ec70450139364a9f6d707b60108c8
      • Opcode Fuzzy Hash: 24b8f67a362a5211d220f2c52b4f717716d945a9a4cb0782d3db7b7ea144ac8a
      • Instruction Fuzzy Hash: B8412272A00209EFDF11DFA9CD45ADEBBB9FF04314F108926F954A7260D735AA20DB94
      APIs
      • __EH_prolog.LIBCMT ref: 004142FA
      • IsRectEmpty.USER32(?), ref: 0041437D
      • GetClientRect.USER32(?,?), ref: 0041438B
      • CreateWindowExA.USER32(00000000,PNX_TranscriptWnd,00444FE8,?,?,000000FF,?,?,?,00000000), ref: 004143C4
      • SetScrollRange.USER32(?,00000001,00000000,?,00000001), ref: 004143FC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$ClientCreateEmptyH_prologRangeScrollWindow
      • String ID: PNX_TranscriptWnd
      • API String ID: 1809096462-3827740301
      • Opcode ID: de6fef5168b4be06d5031f48075a5cd7f7bd949f5f8ff3a8a8ccef95e545961c
      • Instruction ID: a66d93e97a7cf2d2ae6e935c8b7d314457c1743442ba4c2010f4119e52bdc619
      • Opcode Fuzzy Hash: de6fef5168b4be06d5031f48075a5cd7f7bd949f5f8ff3a8a8ccef95e545961c
      • Instruction Fuzzy Hash: B9414775300605EFC724DF69C884D6ABBF9FF88315B10852EB86697690CB38EC55CB64
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$Client$LoadRectReleaseScreen
      • String ID:
      • API String ID: 1605034846-0
      • Opcode ID: ac1d8afaa0a9374c6351483f0a9659f8acd03095297734b3d24eb2c31d4a0610
      • Instruction ID: aacc33ff21c216cabc79b5876419e6b335a14b3da2e9cb55cbac20a3d3e8fb5d
      • Opcode Fuzzy Hash: ac1d8afaa0a9374c6351483f0a9659f8acd03095297734b3d24eb2c31d4a0610
      • Instruction Fuzzy Hash: 5E316F71A04109EFDF119FA0CC88EEEBBB9FF44311F10442AE956A6190C775A945DB98
      APIs
      • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 00408590
      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,00408481), ref: 004085D3
      • SendMessageA.USER32(?,00000143,00000000,00000025), ref: 004085F1
      • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00408603
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$lstrlen
      • String ID: %$COMBOBOX
      • API String ID: 1172434978-3011459713
      • Opcode ID: 61f3743742f239b2060d7553fdffbc79df53ba5e35cbf7830979cb6b92648cde
      • Instruction ID: 2574df086ced9fcb7bdaa7721be193362f74b764a5da0e09c49c01ec765c725a
      • Opcode Fuzzy Hash: 61f3743742f239b2060d7553fdffbc79df53ba5e35cbf7830979cb6b92648cde
      • Instruction Fuzzy Hash: 4F1124B1900208FFDB10DB54DD85BEEBBB8EB14304F10807AEA44B61D0D7B49E84CB95
      APIs
      • GetClientRect.USER32(?,?), ref: 004176B5
      • CreateWindowExA.USER32(00000000,msctls_statusbar32,00000000,54000100,00000000,00000000,00000000,00000000,?,000001F5,00000000), ref: 004176DC
      • GetWindowLongA.USER32(?,000000FC), ref: 004176FC
      • SetWindowLongA.USER32(?,000000EB,00000000), ref: 00417711
      • SetWindowLongA.USER32(?,000000FC,00417785), ref: 0041771D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Long$ClientCreateRect
      • String ID: msctls_statusbar32
      • API String ID: 1831954240-4095915827
      • Opcode ID: 31d9196a9476e0ed3aecbfcbe5b0ee3e5acf628eafe5a9fe42df231ab9a1fa1c
      • Instruction ID: 133f01e66d392785ce0270dbbeb7573eaf74c49f28aa8c4f6b2e78d5d219c5bb
      • Opcode Fuzzy Hash: 31d9196a9476e0ed3aecbfcbe5b0ee3e5acf628eafe5a9fe42df231ab9a1fa1c
      • Instruction Fuzzy Hash: 8601F131004204BBCB201F16DC49CABBFB9EFC6B20B204129F9B2921B0C730A480EA24
      APIs
      • GlobalHandle.KERNEL32(?), ref: 00410E5F
      • GlobalUnlock.KERNEL32(00000000,?,?,0040907F,?,?,00404571,?,?,?,00000FAA,00000000,00000001), ref: 00410E62
      • GlobalHandle.KERNEL32(?), ref: 00410E6B
      • GlobalFree.KERNEL32(00000000), ref: 00410E6E
      • GlobalAlloc.KERNELBASE(00000042,?,?,0040907F,?,?,00404571,?,?,?,00000FAA,00000000,00000001), ref: 00410E82
      • GlobalLock.KERNEL32(00000000,?,00404571,?,?,?,00000FAA,00000000,00000001,?,?,?,?,0040403F), ref: 00410E89
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$Handle$AllocFreeLockUnlock
      • String ID:
      • API String ID: 1825700950-0
      • Opcode ID: 94fc04a8adbfeb9f0156175f711719a3c129d1b35bcfae1951cd842f4ff17436
      • Instruction ID: e65621c49f7ec37acc8d42cf6ee7aab23bc114c0964e244b8c33374ec4d32316
      • Opcode Fuzzy Hash: 94fc04a8adbfeb9f0156175f711719a3c129d1b35bcfae1951cd842f4ff17436
      • Instruction Fuzzy Hash: 00F0A9B2504704AFDB209FA5DC4DD57BBE8EF493117058829F596C2760C7B4E841CF64
      APIs
      • __EH_prolog.LIBCMT ref: 00403F49
      • GetModuleFileNameA.KERNEL32(?,00000104,?,?,(uC), ref: 00403F9A
      • lstrlenA.KERNEL32(00000000,?,?,(uC), ref: 00403FC1
      • lstrlenA.KERNEL32(00000000,?,?,(uC), ref: 00403FCB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrlen$FileH_prologModuleName
      • String ID: (uC
      • API String ID: 3080448448-1954698195
      • Opcode ID: 2a6894e96b703455fba84965f5202a9066b9c4cea7ee5ab0439728f48cf279ff
      • Instruction ID: 3c03b709c43d1fe92fd87e6278d4adeb60bf3d5bbf290fc3ee41ae2b03071535
      • Opcode Fuzzy Hash: 2a6894e96b703455fba84965f5202a9066b9c4cea7ee5ab0439728f48cf279ff
      • Instruction Fuzzy Hash: 8331F4B1A047119FDB24EB71D806BBAB7E89F44319F14047FE246E32D2DB7C99408B29
      APIs
      • SelectObject.GDI32(?,?), ref: 0042281D
      • GetStockObject.GDI32(0000000C), ref: 00422836
      • SelectObject.GDI32(?,00000000), ref: 00422840
      • SelectObject.GDI32(?,?), ref: 00422863
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Select$Stock
      • String ID: %)B
      • API String ID: 3337941649-492036686
      • Opcode ID: 1fe0efa1890147aab53662c54ec436134ee563e770b15ad44649372330bdd513
      • Instruction ID: 6c2500861503ddf15cac87258eda2838cd352eaffe210e3a15567ed5bbf7a8b2
      • Opcode Fuzzy Hash: 1fe0efa1890147aab53662c54ec436134ee563e770b15ad44649372330bdd513
      • Instruction Fuzzy Hash: C101C472A00209BFDF029FA5CC459AEBF76FF49354F004064FA05AA260D7729A61DBE4
      APIs
      • SelectObject.GDI32(?,?), ref: 00422A11
      • GetTextMetricsA.GDI32(?,?), ref: 00422A21
      • lstrlenA.KERNEL32(?,?), ref: 00422A62
      • GetTextExtentPointA.GDI32(?,?,00000000), ref: 00422A6D
      • SelectObject.GDI32(?,?), ref: 00422AFB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelectText$ExtentMetricsPointlstrlen
      • String ID:
      • API String ID: 912969315-0
      • Opcode ID: 2df8dde9ec9cd3ef897e5176192f3daa0dd4c397abbdced6d8ba138da9cf6506
      • Instruction ID: b7549949c3b6b3c79e6b5a9cfa994c88eaa9e6ec38042759e775692101465ac1
      • Opcode Fuzzy Hash: 2df8dde9ec9cd3ef897e5176192f3daa0dd4c397abbdced6d8ba138da9cf6506
      • Instruction Fuzzy Hash: 6B41F7B5600219EFDB20CF64D984AAABBF9FF48340F40442AF90697250D7B4ED51CFA4
      APIs
      • GetWindowLongA.USER32(?,000000EB), ref: 004086E2
      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 0040872A
      • SendMessageA.USER32(?,00000148,00000000,00000111), ref: 0040873D
      • CallWindowProcA.USER32(?,00000111,?,?), ref: 0040877F
      • DefWindowProcA.USER32(?,00000111,?,?), ref: 00408793
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$MessageProcSend$CallLong
      • String ID:
      • API String ID: 1824273765-0
      • Opcode ID: eb1dbc8e2b99fe1fbfc1574d86cf169a670de4a8122aae0d4cdb016d4b67bf63
      • Instruction ID: aa3bf40774003cf60c1397c897ed6a5ac558c973aefac35051768658fea54dbf
      • Opcode Fuzzy Hash: eb1dbc8e2b99fe1fbfc1574d86cf169a670de4a8122aae0d4cdb016d4b67bf63
      • Instruction Fuzzy Hash: 3D21C272500209BBDF216F50EE05FAB3B65EB04700F60452AFE91A61E4DB749920DB59
      APIs
      • __EH_prolog.LIBCMT ref: 004044C9
        • Part of subcall function 00404D6D: MessageBoxA.USER32(00000000,Could not find the transcript file.,00000000,00000000), ref: 00404D9D
      • LoadCursorA.USER32(00000000,00007F02), ref: 004044ED
      • SetCursor.USER32(00000000,?,?,?,0040403F), ref: 004044F0
      • LoadCursorA.USER32(00000000,00007F00), ref: 00404581
      • SetCursor.USER32(00000000,?,?,?,?,0040403F), ref: 00404584
        • Part of subcall function 00408F11: __EH_prolog.LIBCMT ref: 00408F16
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$H_prologLoad$Message
      • String ID:
      • API String ID: 2952540675-0
      • Opcode ID: 714ded94b08ce969e81e956868885d0acf085cd951f0081ba309c6fe598af14e
      • Instruction ID: 72563bcb97c58fe7d55b507de3bb900896c1f4e7f3dc346156463005fb6f21b0
      • Opcode Fuzzy Hash: 714ded94b08ce969e81e956868885d0acf085cd951f0081ba309c6fe598af14e
      • Instruction Fuzzy Hash: 7E11D671B08602BBEB155BB1ED06BEAB794EF84314F00017AFB14A72E1CB7C9C40D668
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$CaptureInvertRelease
      • String ID:
      • API String ID: 4065165932-0
      • Opcode ID: d5d4b3ba8b8c3ad663f66e3d036b2942416ad00448b2237414c651b434af793c
      • Instruction ID: 5c1d04f7933f34a263db4bc2d4c2d69b9469ace0df957da546946e3413d7d294
      • Opcode Fuzzy Hash: d5d4b3ba8b8c3ad663f66e3d036b2942416ad00448b2237414c651b434af793c
      • Instruction Fuzzy Hash: 3D014FB11042019FD7209F35DC88EEB7BACEB95352F00182DF586C3151D7746C85DBA9
      APIs
      • GetCharWidthA.GDI32(?,00000020,0000003A,?), ref: 0041FC79
      • GetTextExtentPointA.GDI32(?,0043C988,00000001,?), ref: 0041FC8D
      • GetTextMetricsA.GDI32(?,?), ref: 0041FCA3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Text$CharExtentMetricsPointWidth
      • String ID: :
      • API String ID: 3532046770-336475711
      • Opcode ID: dcc100d475c2a6795ce0eb472e99a4a223a2ddefd0824d41f38c5e259796557d
      • Instruction ID: 37b66b582fd913823aee7c5ab000b657429dafb5b5d202062ef3ce0c8fbe910c
      • Opcode Fuzzy Hash: dcc100d475c2a6795ce0eb472e99a4a223a2ddefd0824d41f38c5e259796557d
      • Instruction Fuzzy Hash: BEB10671A0020AEFCF15CFA8C844AEEBBB5FF48304F00416AF915A7261D7359A95DFA4
      APIs
      • GetWindowLongA.USER32(?,000000EB), ref: 00417791
      • CallWindowProcA.USER32(?,?,00000005,?,?), ref: 0041780D
      • DefWindowProcA.USER32(?,?,?,?), ref: 0041781F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Proc$CallLong
      • String ID:
      • API String ID: 2055830364-3916222277
      • Opcode ID: 11a8489ee6bbac07b44f30430c3202c69938baeca75465e2318ddaa5fceb6066
      • Instruction ID: efe8d479153d74b1eb93242798843a3203c7acc84f3c989134863f18a22a9990
      • Opcode Fuzzy Hash: 11a8489ee6bbac07b44f30430c3202c69938baeca75465e2318ddaa5fceb6066
      • Instruction Fuzzy Hash: CE11A271208204FFDB288F19EC58DAB7BB9EB48321B10891EF95796291C739D850DB74
      APIs
      • __EH_prolog.LIBCMT ref: 0040C771
        • Part of subcall function 0040E4EF: _lopen.KERNEL32(?,00000020), ref: 0040E505
        • Part of subcall function 0040E753: _llseek.KERNEL32(?,?,00000000), ref: 0040E797
        • Part of subcall function 0040E753: _hread.KERNEL32(?,?,00000008), ref: 0040E7A1
        • Part of subcall function 0040E753: _llseek.KERNEL32(?,?,00000000), ref: 0040E7FA
        • Part of subcall function 0040E753: _hread.KERNEL32(?,?,00000000), ref: 0040E80B
        • Part of subcall function 0040E753: _llseek.KERNEL32(?,?,00000000), ref: 0040E851
        • Part of subcall function 0040E753: _hread.KERNEL32(?,?,00000008), ref: 0040E85B
        • Part of subcall function 0040E753: _llseek.KERNEL32(?,?,00000000), ref: 0040E894
        • Part of subcall function 0040A03B: __EH_prolog.LIBCMT ref: 0040A040
        • Part of subcall function 0040E753: _hread.KERNEL32(?,?,?), ref: 0040E8AF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hread_llseek$H_prolog$_lopen
      • String ID: $
      • API String ID: 268418082-227171996
      • Opcode ID: e75626bdf0a74a079772c2a0c647ced207303e03ce3cb5cd6564eb7ebd888624
      • Instruction ID: 6c5bf20ad51c07ba8991f788f40827b4a4e8d76b34ce36524fe9d827596026f6
      • Opcode Fuzzy Hash: e75626bdf0a74a079772c2a0c647ced207303e03ce3cb5cd6564eb7ebd888624
      • Instruction Fuzzy Hash: 3FD249B1A00219ABCF10DF99C845BBEB7F9BF04348F00882EF959E7291D7B89954DB54
      APIs
      • BeginPaint.USER32(?,?), ref: 00414849
      • EndPaint.USER32(?,?), ref: 00414856
        • Part of subcall function 00414610: GetClientRect.USER32(?,?), ref: 00414620
      • SetWindowLongA.USER32(?,00000000), ref: 004148DC
      • DefWindowProcA.USER32(?,00000204,?,?,?,?,?), ref: 0041498E
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: PaintWindow$BeginClientLongProcRect
      • String ID:
      • API String ID: 865218549-0
      • Opcode ID: 9fbf1f6014f0232a31bf79793e3d8100a579a9cfe78c8afc67bd677972b66934
      • Instruction ID: 4309b52966b526d5507a8302203597ad347ea2452557b074d461f058ff702d38
      • Opcode Fuzzy Hash: 9fbf1f6014f0232a31bf79793e3d8100a579a9cfe78c8afc67bd677972b66934
      • Instruction Fuzzy Hash: 9B6180B52102199FCB149F69C9449BF7BE9FF88700B40091EF986C76A0CB38DC91DB69
      APIs
      • _lopen.KERNEL32(?,00000020), ref: 0040EA47
      • _llseek.KERNEL32(00000000,000000F8,00000002), ref: 0040EA5E
      • _hread.KERNEL32(00000000,?,00000004), ref: 0040EA6D
      • _lclose.KERNEL32(00000000), ref: 0040EA8A
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hread_lclose_llseek_lopen
      • String ID:
      • API String ID: 2871481721-0
      • Opcode ID: 07509e6602f5172d4890714b736107504931cc63c6ee02dcc99abc7e9c0ffd5e
      • Instruction ID: 4097e9e951a3c37468946dc9094f05b8ea49518b7076fbf7f07266acb909ad2e
      • Opcode Fuzzy Hash: 07509e6602f5172d4890714b736107504931cc63c6ee02dcc99abc7e9c0ffd5e
      • Instruction Fuzzy Hash: 3EF0E9732042247BDB302735AC0DFDB3A58DF85771F104631FE15D52D0DA34891186AC
      APIs
      • _lopen.KERNEL32(?,00000020), ref: 0040EA9F
      • _llseek.KERNEL32(00000000,000000F4,00000002), ref: 0040EAB8
      • _hread.KERNEL32(00000000,?,00000004), ref: 0040EAC5
      • _lclose.KERNEL32(00000000), ref: 0040EAD8
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hread_lclose_llseek_lopen
      • String ID:
      • API String ID: 2871481721-0
      • Opcode ID: f90605a875fae5a12d4933e633e59a31af9a948f614269269f53a588c4952398
      • Instruction ID: 4be1b228064665f771d478218c218ad7b7dd45d57dd76f62795053804bef5480
      • Opcode Fuzzy Hash: f90605a875fae5a12d4933e633e59a31af9a948f614269269f53a588c4952398
      • Instruction Fuzzy Hash: A4F0A7763451147BDF301B2ADC4DF9B3B58EF85371F004631FB55A52D0C77448429AA8
      APIs
      • __EH_prolog.LIBCMT ref: 0041F966
        • Part of subcall function 0041E653: __EH_prolog.LIBCMT ref: 0041E658
        • Part of subcall function 00409A82: __EH_prolog.LIBCMT ref: 00409A87
        • Part of subcall function 0040A12F: lstrcpyA.KERNEL32(?,?,?,?,00000001), ref: 0040A1D9
        • Part of subcall function 0040A12F: lstrcpyA.KERNEL32(?,?,?,00000001), ref: 0040A1E1
        • Part of subcall function 0040A12F: lstrcpyA.KERNEL32(?,?,?,00000001), ref: 0040A257
        • Part of subcall function 004096EC: lstrcpyA.KERNEL32(?,pN@,?,?,?,00000001,0040A1CD,?,?,00000001), ref: 00409715
        • Part of subcall function 004096EC: lstrcpyA.KERNEL32(?,?,?,00000001,0040A1CD,?,?,00000001), ref: 0040971C
        • Part of subcall function 004096EC: lstrcpyA.KERNEL32(?,?,?,00000001,0040A1CD,?,?,00000001), ref: 00409724
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcpy$H_prolog
      • String ID: <~C$OD
      • API String ID: 2362665282-1514879436
      • Opcode ID: 2302317cbfecaa1d4f7c9f9e88f7d3761da239f1167550235cbde3c01a9fb921
      • Instruction ID: 30a45ee1fe4e084395d3635c72acf3e9684d059a668f946fe5a159bb89bbb5d6
      • Opcode Fuzzy Hash: 2302317cbfecaa1d4f7c9f9e88f7d3761da239f1167550235cbde3c01a9fb921
      • Instruction Fuzzy Hash: 05412EB1600705DFCB14DFA5C880BDABBF5BF18318F00482EE55A97682D778AA54CBA5
      APIs
      • _llseek.KERNEL32(00000000,?,00000000), ref: 0040EB86
      • _hread.KERNEL32(00000000,?,bN@), ref: 0040EBB9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hread_llseek
      • String ID: bN@
      • API String ID: 2197572648-2889147719
      • Opcode ID: 95365312d3ca06ca33f022f51094f3059b40b58a2dc0ce5da7a7abeabe544158
      • Instruction ID: ef1a61392e420452b3d19739a14879bd11bac54eb63a483c6cba528f42d7d4d4
      • Opcode Fuzzy Hash: 95365312d3ca06ca33f022f51094f3059b40b58a2dc0ce5da7a7abeabe544158
      • Instruction Fuzzy Hash: 0301AD32900219FBDF209F92DC4AECF7F79EF40368F10046AF405A2191D774AAA0DB98
      APIs
      • _hread.KERNEL32(00000000,?,00002000), ref: 0040DF02
      • _hwrite.KERNEL32(00000000,00000000,00000000), ref: 0040DF28
      Strings
      • RealLegal E-Transcript Viewer Install, xrefs: 0040DEDE
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hread_hwrite
      • String ID: RealLegal E-Transcript Viewer Install
      • API String ID: 194656443-3710306150
      • Opcode ID: 81f3e4f6cdb809b66747332f0e4a63e80fc687fda4ce8723ef085f00a8e79811
      • Instruction ID: 8269314856bf3be40fe330200955806573622d5ce6a324e6792731fbe027a216
      • Opcode Fuzzy Hash: 81f3e4f6cdb809b66747332f0e4a63e80fc687fda4ce8723ef085f00a8e79811
      • Instruction Fuzzy Hash: 7E01D832E04229ABCB206ED9DC8499FBB64EB41360B114136FC15A2290C7354D149698
      APIs
      • CreateWindowExA.USER32(00000000,WordIndexWndClass,00446E6C,40200000,?,?,?,?,?,00000000,00000000,!G@), ref: 0041AF25
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CreateWindow
      • String ID: !G@$WordIndexWndClass
      • API String ID: 716092398-4205693341
      • Opcode ID: 8edfc44dda15191c573665cc21bb3cacd565817b40c62c73b2cbb14a0acc71f8
      • Instruction ID: ad2a11c1c474bbefdcc0e58c724daee6ebf47de5e192c417e9ad2bfe9d5f49f1
      • Opcode Fuzzy Hash: 8edfc44dda15191c573665cc21bb3cacd565817b40c62c73b2cbb14a0acc71f8
      • Instruction Fuzzy Hash: 6A016DB6204701AFD7008F68CC45F5ABBE9EF8D304F10846AF645DB162D775A810DF19
      APIs
      • lstrlenA.KERNEL32(?,?,(uC,?,?,00404435,?), ref: 0040178A
      • DialogBoxParamA.USER32(000000F9,?,00403447,00000000), ref: 004017BE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DialogParamlstrlen
      • String ID: (uC
      • API String ID: 1571052787-1954698195
      • Opcode ID: 6dbd295494a7faea673cf2db529a920d0a1b1bfccf1c2402a3acfab037afa664
      • Instruction ID: 687dd06b1c96e774bec4d6b9d909f408b869314ef2045d4c42f027970047ffda
      • Opcode Fuzzy Hash: 6dbd295494a7faea673cf2db529a920d0a1b1bfccf1c2402a3acfab037afa664
      • Instruction Fuzzy Hash: 61F0E9762443056BD3300FA19C80B63B7A8E740B55F11443FFB91A61F0DBB55842D26C
      APIs
      • GetWindowLongA.USER32(?,00000000), ref: 004175C9
      • KiUserCallbackDispatcher.NTDLL(?,00000001,?,?), ref: 004175EC
      • DefWindowProcA.USER32(?,00000001,?,?), ref: 004175FB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$CallbackDispatcherLongProcUser
      • String ID:
      • API String ID: 797415794-0
      • Opcode ID: c8d70d0d43468735419ef05e54e672bfb9afd19233664a4c761a4f561bb1ee74
      • Instruction ID: f56cc0022f88a09734dc35a7786333bb78138a3f3b347c8af0f6610fcc095ef5
      • Opcode Fuzzy Hash: c8d70d0d43468735419ef05e54e672bfb9afd19233664a4c761a4f561bb1ee74
      • Instruction Fuzzy Hash: CDF09271104209FFDF1A9F50DC48AAA3B76FB44351F108069FD158A660D772EDA1EB58
      APIs
      • GetWindowLongA.USER32(?,00000000), ref: 0041BB12
      • KiUserCallbackDispatcher.NTDLL(?,00000001,?,?), ref: 0041BB35
      • DefWindowProcA.USER32(?,00000001,?,?), ref: 0041BB44
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$CallbackDispatcherLongProcUser
      • String ID:
      • API String ID: 797415794-0
      • Opcode ID: f3042c3cca19e3b2f464abfd0c78f9288d40e38440ebfc52de53269582223329
      • Instruction ID: b6a47510e421a6e1cf5dbd0fbbf1843a6417f8ee51c65cd6279e99ed2b6e6624
      • Opcode Fuzzy Hash: f3042c3cca19e3b2f464abfd0c78f9288d40e38440ebfc52de53269582223329
      • Instruction Fuzzy Hash: C4F0F230108209FFDF068F50DC48EAA3B26FB04311F108068FD164A660C772EDA1EB94
      APIs
        • Part of subcall function 0042A31A: FindFirstFileA.KERNELBASE(?,?), ref: 0042A32E
        • Part of subcall function 0042A31A: GetLastError.KERNEL32 ref: 0042A33B
      • MessageBoxA.USER32(00000000,Could not find the transcript file.,00000000,00000000), ref: 00404D9D
        • Part of subcall function 0040A12F: lstrcpyA.KERNEL32(?,?,?,?,00000001), ref: 0040A1D9
        • Part of subcall function 0040A12F: lstrcpyA.KERNEL32(?,?,?,00000001), ref: 0040A1E1
        • Part of subcall function 0040A12F: lstrcpyA.KERNEL32(?,?,?,00000001), ref: 0040A257
      Strings
      • Could not find the transcript file., xrefs: 00404D96
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcpy$ErrorFileFindFirstLastMessage
      • String ID: Could not find the transcript file.
      • API String ID: 972712470-2730970783
      • Opcode ID: f906ce63834cf53842c5016992f54ca838108cfe550a93c2a616c4fe05663032
      • Instruction ID: be8b35c85bd14a2021a7efc39d98dc4165e9b75d2b6cb32d52bbf258afbf4c6a
      • Opcode Fuzzy Hash: f906ce63834cf53842c5016992f54ca838108cfe550a93c2a616c4fe05663032
      • Instruction Fuzzy Hash: 6D3143B1200B019FD7259B35DC45BA7B7E9BF84309F10483EFA5AD72E1DA38A8118B55
      APIs
      • CreateWindowExA.USER32(00000000,PaneSplitter,00444FE8,40000000,00000000,00000000,0000000A,0000000A,?,00000000,00000000), ref: 0041709D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CreateWindow
      • String ID: PaneSplitter
      • API String ID: 716092398-3269436181
      • Opcode ID: 1a4e63c30599adcd5f812bf31eafc6b18b8497f23a7d5595e2f25d950b68d17b
      • Instruction ID: c3c03cca90ebc5c1d46dc3f58836131a9e1c01800cc1965434c8b6205ee7fc99
      • Opcode Fuzzy Hash: 1a4e63c30599adcd5f812bf31eafc6b18b8497f23a7d5595e2f25d950b68d17b
      • Instruction Fuzzy Hash: 9D012CB5600704AFDB109F699C41FE7BBE8FB58710F10442AB999D3240D774A8508BA8
      APIs
      • DialogBoxParamA.USER32(000000F8,?,004022EE,?), ref: 00404414
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DialogParam
      • String ID: (uC
      • API String ID: 665744214-1954698195
      • Opcode ID: a919cd84638df5159dd8d02379736436ef95dbf36aeda7232c7b611555fe19f3
      • Instruction ID: 4e3397f2d70fd232ee8da22ae9736a3c919a495e40c64348713e6660186778e3
      • Opcode Fuzzy Hash: a919cd84638df5159dd8d02379736436ef95dbf36aeda7232c7b611555fe19f3
      • Instruction Fuzzy Hash: 47F02930000B2847CA7A1720AA087CA2BC2AB62701F0009AEFDA1602E08BB80881BA48
      APIs
      • GetPrivateProfileIntA.KERNEL32(00000000,?,00423084,00000000), ref: 0040AC0D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: PrivateProfile
      • String ID: ~G@
      • API String ID: 1469295129-1758069786
      • Opcode ID: 8c9aaecc1a1871f9471b769789b773779c6c2bdf68af43e4f3a7a843698fc1d1
      • Instruction ID: 60f3ab326f9e9d45cc2ef7eb4a765bf708ae5e8376d68ef9226c0a8dcf74aab3
      • Opcode Fuzzy Hash: 8c9aaecc1a1871f9471b769789b773779c6c2bdf68af43e4f3a7a843698fc1d1
      • Instruction Fuzzy Hash: 22D09276004300EFC701CFA0C848C0ABBB9BF89315B24886CB199C6230C732D451DB11
      APIs
      • CharUpperA.USER32(?,?,00000000,?,769500C0,00410BAA,00000000,00408F3F,?,?,?,00404510,?,?,?,0040403F), ref: 00410C1F
      • IsCharUpperA.USER32(?,?,00000000,?,769500C0,00410BAA,00000000,00408F3F,?,?,?,00404510,?,?,?,0040403F), ref: 00410C2D
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CharUpper
      • String ID:
      • API String ID: 9403516-0
      • Opcode ID: 21f2db89e7cff287d7e86b0cb4164838744303e37b170a41f84cc5335c72bc03
      • Instruction ID: 25b49c83920bee2d409bbcb160b0cd97dfa0d82cf68c65d24e56e75f32e7e093
      • Opcode Fuzzy Hash: 21f2db89e7cff287d7e86b0cb4164838744303e37b170a41f84cc5335c72bc03
      • Instruction Fuzzy Hash: 1AF0F63215431A9BD3295F5598886F5B7ACFF12315B10022BD8D2C6150E76594C68BA8
      APIs
      • GetClientRect.USER32(?,?), ref: 004146DD
      • SetScrollRange.USER32(?,00000000,00000000,?,00000001), ref: 004146FE
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClientRangeRectScroll
      • String ID:
      • API String ID: 3038720056-0
      • Opcode ID: 0ac5641296253ddd73ab2ca188b6622546eb4e47a3772b3a225856b030744ab8
      • Instruction ID: 9d42f98e1c6debfbeb579549ab2ca386cb1926d11964cf21566695908306b3cb
      • Opcode Fuzzy Hash: 0ac5641296253ddd73ab2ca188b6622546eb4e47a3772b3a225856b030744ab8
      • Instruction Fuzzy Hash: DAF089326001056BD7209629DC45FAA7BF9EBC1754F100039F856D3591E7B4BD81C654
      APIs
      • HeapCreate.KERNELBASE(00000000,00001000,00000000,0042A71A,00000000), ref: 0042DC65
        • Part of subcall function 0042DB0C: GetVersionExA.KERNEL32 ref: 0042DB2B
      • HeapDestroy.KERNEL32 ref: 0042DCA4
        • Part of subcall function 0042DCB1: HeapAlloc.KERNEL32(00000000,00000140,0042DC8D,000003F8), ref: 0042DCBE
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Heap$AllocCreateDestroyVersion
      • String ID:
      • API String ID: 2507506473-0
      • Opcode ID: 5bccde47b6a80811c0778e14b265928de686f81d935374520ff0f5494c346cec
      • Instruction ID: fb73888decbd61c8c28ecc952754cf69c7bf3cca5934a0d68b529cc4474c8ed9
      • Opcode Fuzzy Hash: 5bccde47b6a80811c0778e14b265928de686f81d935374520ff0f5494c346cec
      • Instruction Fuzzy Hash: B1F06D71F583229ADF206F32BD0576A2A94DB44792FA0043BF801C82A4EFE88581E51D
      APIs
      • GetWindowLongA.USER32(?,00000000), ref: 00414B6E
      • DefWindowProcA.USER32(?,00000001,?,?), ref: 00414BA0
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$LongProc
      • String ID:
      • API String ID: 2275667008-0
      • Opcode ID: 6ffbfbbf9215fae5bbc311e932aaa529867a4a807736b1810ea018d519e79186
      • Instruction ID: b2e9d4a4cc949bd3e5d4e4995dafcc8b75801e1b9f5f9f7bbddba06a75663a8a
      • Opcode Fuzzy Hash: 6ffbfbbf9215fae5bbc311e932aaa529867a4a807736b1810ea018d519e79186
      • Instruction Fuzzy Hash: 13F09271104209FFDF159F50DC49EAA3B66FB84351F108069FD194A2A0D772EDA1EB58
      APIs
      • GetWindowLongA.USER32(?,00000000), ref: 00405AF4
      • DefWindowProcA.USER32(?,00000001,?,?), ref: 00405B1C
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$LongProc
      • String ID:
      • API String ID: 2275667008-0
      • Opcode ID: b52b44acfaf4f21e8866eb7ea3b19e8afec42441bdcec9cb1700d6922e875bcc
      • Instruction ID: 2fdc80527f9dc36831961c4a266e882665d52c5f78dd78b0ae35b060e403a6e6
      • Opcode Fuzzy Hash: b52b44acfaf4f21e8866eb7ea3b19e8afec42441bdcec9cb1700d6922e875bcc
      • Instruction Fuzzy Hash: FBE01A30200208EBDF11AF61DC45AAA3B76EB00310F008029FC159A2A0C736B820EF29
      APIs
      • GetFileAttributesA.KERNELBASE(?,00404538,?,00000004,?,?,?,?,0040403F), ref: 00429FC5
      • GetLastError.KERNEL32(?,?,?,?,0040403F), ref: 00429FD0
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AttributesErrorFileLast
      • String ID:
      • API String ID: 1799206407-0
      • Opcode ID: a37868556188085a1429a1d7ec4d7dd442e9543b7afd19f2da831cd039d79e48
      • Instruction ID: 8f7e3b2d29783edd4ffee9cbd32c55157d345e5fbbc69805c6ca78973d4d7330
      • Opcode Fuzzy Hash: a37868556188085a1429a1d7ec4d7dd442e9543b7afd19f2da831cd039d79e48
      • Instruction Fuzzy Hash: E8E08CB520821086DB519B31FD4D72B7A90AF4633DFA54A5AE5B1C02F0C7BD8C80DB1A
      APIs
      • CreateDirectoryA.KERNELBASE(00405E94,00000000,00405E94,?), ref: 0042A497
      • GetLastError.KERNEL32 ref: 0042A4A1
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CreateDirectoryErrorLast
      • String ID:
      • API String ID: 1375471231-0
      • Opcode ID: 5dab0b315b93ced53bad613e2951897686ad1719da0e997485323b7a008e8818
      • Instruction ID: 0ae6552368d2725078b731d81be7d7cd8a3b7d533250617484903f895d653ed2
      • Opcode Fuzzy Hash: 5dab0b315b93ced53bad613e2951897686ad1719da0e997485323b7a008e8818
      • Instruction Fuzzy Hash: 66D0C970315A1297DB613B31BC1C71B36A86B40371FE45E76F955C01E1EBACC852E51A
      APIs
      • DeleteFileA.KERNELBASE(?,00403B78,?,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00429614
      • GetLastError.KERNEL32(?,00000000,?,00000000,00000000,0042A789,00000000), ref: 0042961E
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DeleteErrorFileLast
      • String ID:
      • API String ID: 2018770650-0
      • Opcode ID: 5c7f5a35e9dfd7cb4a33c0d9065ded68faccf4a2e57a0bc607a81a4ab2324032
      • Instruction ID: b4d14a654ed61d25caae9c5828fb1986df6fdc94a7973387793da2011ef9090a
      • Opcode Fuzzy Hash: 5c7f5a35e9dfd7cb4a33c0d9065ded68faccf4a2e57a0bc607a81a4ab2324032
      • Instruction Fuzzy Hash: 33D01270715521968F652B317C0812B76D86F40771FE45A76F491C01E0EF7CCC41E51D
      APIs
      • IsWindowVisible.USER32(?), ref: 0041AFBA
      • ShowWindow.USER32(?,?,?,0040510C,00000000), ref: 0041AFD3
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$ShowVisible
      • String ID:
      • API String ID: 4185057100-0
      • Opcode ID: 6a7d95c4f6af5aa3ae6f0030c9bba397042efa6bfcbe1aeda28a93b4873b0dd8
      • Instruction ID: 4cb15370ff1c795c69b82dce76708b47fc792b7541c9c834c750a131ab696f41
      • Opcode Fuzzy Hash: 6a7d95c4f6af5aa3ae6f0030c9bba397042efa6bfcbe1aeda28a93b4873b0dd8
      • Instruction Fuzzy Hash: FAD05EB500D601EBCA220B10DD48AC7BBA5AB54316F01482AF586D5036D675A8E2EE9A
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 2a175606592bfddce753c927e1dc46651a864069ee682a6a0c02803d049c27f5
      • Instruction ID: d26dbaa2eaea290c5234648ca9e0c1d993cdd0ac5a13eb55e49ce92b2ce44e45
      • Opcode Fuzzy Hash: 2a175606592bfddce753c927e1dc46651a864069ee682a6a0c02803d049c27f5
      • Instruction Fuzzy Hash: F341B232A013019FD714EFB98485B6FB7E5AB84314F61853FA16AE72C2CB385C018B18
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 8695873d75d10c7fdc6422bd6650c0dce6971785f575d71bc5be1f44a78602ad
      • Instruction ID: 38eb0a89bc66ad18077ea20fd2e7e50b8ae894f7f0e93fc7e68d4a6000117d10
      • Opcode Fuzzy Hash: 8695873d75d10c7fdc6422bd6650c0dce6971785f575d71bc5be1f44a78602ad
      • Instruction Fuzzy Hash: 86215E32A0021ADFCB14DFA5C8809BEB7B9FB08314F10867EE916A7291DB389D45CB54
      APIs
      • RtlAllocateHeap.NTDLL(00000000,?,00000000,0042A027,000000E0,0042A014,?,0042FDED,00000100,?,00000000), ref: 0042A0AF
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: e2559b4b67ad8614711f96623b1c3d152e1585f8ba113e0d55f7cbda39b3536f
      • Instruction ID: 3a4d0f77509a1556849982ea1207527f438265e3c721326ddeb57b1b6d1f460b
      • Opcode Fuzzy Hash: e2559b4b67ad8614711f96623b1c3d152e1585f8ba113e0d55f7cbda39b3536f
      • Instruction Fuzzy Hash: 06F0D632B042319BEA30AF25BC40B9B73949B05760F960157FD40AB2E0D728EC6182CF
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: cd91f8ea1b2572835c49def8369b513bbab53a743d5bf8fd447aa9b9410a398d
      • Instruction ID: 6e6b7a912517eaa88a846602e8807d90943062f5d3c67b7d121932b09db4b6b2
      • Opcode Fuzzy Hash: cd91f8ea1b2572835c49def8369b513bbab53a743d5bf8fd447aa9b9410a398d
      • Instruction Fuzzy Hash: BC01A770A45614DBDB58DBB8D4067EEB7F0AF44314F10466FA526E33C0DB784E408A1D
      APIs
      • __EH_prolog.LIBCMT ref: 00421FDF
        • Part of subcall function 00421E0E: __EH_prolog.LIBCMT ref: 00421E13
        • Part of subcall function 0041F961: __EH_prolog.LIBCMT ref: 0041F966
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 67afcc3148bdc1968779cb25345c203602c0672ca23bff4ef6a460de1a726a30
      • Instruction ID: 3dcbd8e6ccfcdc8859afa58fcef45ce339e59e0d7d49e7b978fa22512d2ce857
      • Opcode Fuzzy Hash: 67afcc3148bdc1968779cb25345c203602c0672ca23bff4ef6a460de1a726a30
      • Instruction Fuzzy Hash: 710117B2610745EFCB218F41C804BCBBFB1FB48319F01841EF5992A250C7BA9568DF94
      APIs
      • CreateWindowExA.USER32(00000000,00001BD3,?,?,?,?,?,?,00444FE8,?,00408461,?), ref: 00416F5E
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CreateWindow
      • String ID:
      • API String ID: 716092398-0
      • Opcode ID: 134dd62796002e5ac5eecb9f9c224b62899fa5e9ff08203941239c55897835b9
      • Instruction ID: 7cccc1f4fff1d57d560581a2fa812e4590f35e5f0a9d9046823eb9c8ac1e1a8a
      • Opcode Fuzzy Hash: 134dd62796002e5ac5eecb9f9c224b62899fa5e9ff08203941239c55897835b9
      • Instruction Fuzzy Hash: AFF0AE36100119AFDF018F98DC09DAA7FAAEB89360B058164FE0857221C672EC20EBA0
      APIs
      • _lopen.KERNEL32(00000000,00000020), ref: 0040C12D
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _lopen
      • String ID:
      • API String ID: 2515328373-0
      • Opcode ID: 875d917a98fb82b6327eee410863569cb98c1937698f1e7aabca0fa5cd70f8fe
      • Instruction ID: 7bd8b6fe991cf8b1ac1e11391fc93663aa35514ccc7d192c762940acc18f5224
      • Opcode Fuzzy Hash: 875d917a98fb82b6327eee410863569cb98c1937698f1e7aabca0fa5cd70f8fe
      • Instruction Fuzzy Hash: 06E08C710287108AEA30AB78B845792B3D9AB00720F004BAAF0A2991C2DB7499808B10
      APIs
      • _lopen.KERNEL32(?,00000020), ref: 0040E505
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _lopen
      • String ID:
      • API String ID: 2515328373-0
      • Opcode ID: 401e21e218df1f18b43a4b0760b4a785a0d1df5ea7ac69831b7d43e41cdbf28a
      • Instruction ID: 201f5b03e974bde6cb47365d82c4e648cc976b82063b17eb90b9d2e1e0eb8ace
      • Opcode Fuzzy Hash: 401e21e218df1f18b43a4b0760b4a785a0d1df5ea7ac69831b7d43e41cdbf28a
      • Instruction Fuzzy Hash: FAD01271409B105BDA325B39BD446D6B6DAAF04334F144BEBF579D32D1CB70AD009744
      APIs
      • GetPrivateProfileStringA.KERNEL32(00000000), ref: 0040ABF2
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: PrivateProfileString
      • String ID:
      • API String ID: 1096422788-0
      • Opcode ID: 6bd72ed59be75fa3143a0b6d4729ee0d4690fad286b1c16e44fc49ee7d0e4531
      • Instruction ID: 942b10e3fef31b2b5d26d24638871de5b830a519770576d55cbb21ebdaf08ff2
      • Opcode Fuzzy Hash: 6bd72ed59be75fa3143a0b6d4729ee0d4690fad286b1c16e44fc49ee7d0e4531
      • Instruction Fuzzy Hash: 9FD09272008201AFCB02CF90DA48C0ABBA9BF99301F044858B28586031C332C825EB22
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ShowWindow
      • String ID:
      • API String ID: 1268545403-0
      • Opcode ID: 55f1cc977c1804cb32af06252afc665be73505a954de3a178f5a3f4893b49610
      • Instruction ID: 1063762d0947083ad72b53c2ab4eab20586950372e3cfcebfa4311967dfb8868
      • Opcode Fuzzy Hash: 55f1cc977c1804cb32af06252afc665be73505a954de3a178f5a3f4893b49610
      • Instruction Fuzzy Hash: 34A001B6508104ABCA129B51DE0880ABA62ABA5705B1594A9AA8E44036C7738962FB19
      APIs
        • Part of subcall function 00429FC1: GetFileAttributesA.KERNELBASE(?,00404538,?,00000004,?,?,?,?,0040403F), ref: 00429FC5
        • Part of subcall function 00429FC1: GetLastError.KERNEL32(?,?,?,?,0040403F), ref: 00429FD0
      • lstrcmpiA.KERNEL32(?,?), ref: 0040ADA3
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AttributesErrorFileLastlstrcmpi
      • String ID:
      • API String ID: 1106042219-0
      • Opcode ID: 7e1bb381b1c078ef6440124218e7368bd0cad2b0bdc9fbc783219d4c65f1f542
      • Instruction ID: 65417771eef056f906e94e0cb2904578e7ab69722811862f914ecdfc3c9b565c
      • Opcode Fuzzy Hash: 7e1bb381b1c078ef6440124218e7368bd0cad2b0bdc9fbc783219d4c65f1f542
      • Instruction Fuzzy Hash: 18217CB1600716AFDB218F59C884AABBBE6FF04355F04457FE805A7780DB349D60DB92
      APIs
      • __EH_prolog.LIBCMT ref: 004017F3
      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Internet Explorer,00000000,00000001,?), ref: 00401828
      • RegQueryValueExA.ADVAPI32(?,Version,00000000,00000000,00000000,?), ref: 0040184B
      • RegCloseKey.ADVAPI32(?), ref: 00401854
      • lstrlenA.KERNEL32(00000000), ref: 0040185E
      • MessageBoxA.USER32(?,Internet Explorer 4.0x or later must be installed for this operation to function correctly.,Newer Internet Explorer version required,00000040), ref: 0040187A
      • GetPrivateProfileStringA.KERNEL32(Defaults,SignServer,sign.reallegal.com,?,00000104,00000000), ref: 004018D8
      • GetPrivateProfileStringA.KERNEL32(Defaults,SignAppPath,/signatures/api/trancert.dll,?,00000104,00000000), ref: 004018FB
      • MessageBoxA.USER32(?,?,Internet Connection Failed,00000030), ref: 00401948
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessagePrivateProfileString$CloseH_prologOpenQueryValuelstrlen
      • String ID: (now $ on $ uC$ uC$ uC$ uC$ uC$ uC$ uC$/signatures/api/trancert.dll$Defaults$Internet Connection Failed$Internet Explorer 4.0x or later must be installed for this operation to function correctly.$Newer Internet Explorer version required$SignAppPath$SignServer$Signature Successfully Verified$Software\Microsoft\Internet Explorer$Verification Failed$Verification successful: This transcript was signed by $Verify transcript signature...$Version$rB$sign.reallegal.com
      • API String ID: 2286048586-3131112528
      • Opcode ID: d3f4ab8c882afc22c593aa11bd93015e9442679859b2e1e44c9ef8daf6ef04fb
      • Instruction ID: d780b94586076183d68e8054b5892907ab0e404010299b72a43029478c52ac70
      • Opcode Fuzzy Hash: d3f4ab8c882afc22c593aa11bd93015e9442679859b2e1e44c9ef8daf6ef04fb
      • Instruction Fuzzy Hash: 1AE18372900118ABDB249F61DC85FEE7778EF14304F1041BBF909B6191DB78AA44DF68
      APIs
      • __EH_prolog.LIBCMT ref: 0041DB49
        • Part of subcall function 00409A82: __EH_prolog.LIBCMT ref: 00409A87
      • GlobalAlloc.KERNEL32(00000042,00000400), ref: 0041DBD3
      • GlobalLock.KERNEL32(00000000), ref: 0041DBE0
      • lstrlenA.KERNEL32(00000000), ref: 0041DBFA
      • lstrlenA.KERNEL32(?), ref: 0041DC78
      • lstrlenA.KERNEL32(?), ref: 0041DCB2
      • lstrlenA.KERNEL32(?), ref: 0041DCFD
      • lstrlenA.KERNEL32(?), ref: 0041DD37
      • GlobalUnlock.KERNEL32(?), ref: 0041DD62
      • GlobalReAlloc.KERNEL32(?,?,00000000), ref: 0041DE9E
      • GlobalAlloc.KERNEL32(00000042,?), ref: 0041DEA9
      • GlobalLock.KERNEL32(?), ref: 0041DEB5
      • lstrlenA.KERNEL32(?), ref: 0041DF10
      • lstrlenA.KERNEL32(?), ref: 0041DF85
      • GlobalUnlock.KERNEL32(?), ref: 0041E048
      • GlobalLock.KERNEL32(?), ref: 0041E087
      • GlobalUnlock.KERNEL32(?), ref: 0041E093
      • GlobalReAlloc.KERNEL32(?,00000001,00000000), ref: 0041E09D
      • OpenClipboard.USER32(?), ref: 0041E0A8
      • EmptyClipboard.USER32 ref: 0041E0B2
      • SetClipboardData.USER32(00000001,00000000), ref: 0041E0BB
      • CloseClipboard.USER32 ref: 0041E0C1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$lstrlen$AllocClipboard$LockUnlock$H_prolog$CloseDataEmptyOpen
      • String ID: $ $ $
      • API String ID: 1835066233-2376886710
      • Opcode ID: 232d832d711d011b7f4f77c1e36939fc2345e4f3dd64ddfa6c60efd51b34d0dd
      • Instruction ID: 9c5d54bb23a88c19fae39e92cb4b060821be47d956a995abf7bada3b60bb4752
      • Opcode Fuzzy Hash: 232d832d711d011b7f4f77c1e36939fc2345e4f3dd64ddfa6c60efd51b34d0dd
      • Instruction Fuzzy Hash: 1512D175D0065ADFCB14CFA8C844BEEBBB1BF19304F14416AE882E7341D7799982CBA4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID:
      • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
      • API String ID: 0-1157002505
      • Opcode ID: d0758f8472a48ed155376429091c4924b3e1f4c6e552f701cab51d0ea80a1612
      • Instruction ID: f0b2a16d38fa3b2b65a7a0edc1cd84576c94820ad742522e86fff75013237da0
      • Opcode Fuzzy Hash: d0758f8472a48ed155376429091c4924b3e1f4c6e552f701cab51d0ea80a1612
      • Instruction Fuzzy Hash: 12E1E271E44209DEEB258F54D8153FABBB1BB48307F28602BD441A6282C77D9B82CB5D
      APIs
      • __EH_prolog.LIBCMT ref: 00420405
      • lstrlenA.KERNEL32(?,Pages %d to %d,?,?), ref: 00420628
      • wsprintfA.USER32 ref: 00420636
      • lstrlenA.KERNEL32(?,Page %d,?), ref: 00420650
      • wsprintfA.USER32 ref: 0042065E
      • lstrlenA.KERNEL32(?), ref: 00420673
      • InflateRect.USER32(?,00000000,00000000), ref: 004208E5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrlen$wsprintf$H_prologInflateRect
      • String ID: }C$($)$Page %d$Pages %d to %d
      • API String ID: 3032067897-2537692890
      • Opcode ID: 4029a5e5bdd8b1796f08f0337ed68f94d2ba3b91b9c406e3b03bc4fa6d670910
      • Instruction ID: 150d9fe5cf0456880231a3234b20e0c1b9b99202e93c5178613dab9eb28655ba
      • Opcode Fuzzy Hash: 4029a5e5bdd8b1796f08f0337ed68f94d2ba3b91b9c406e3b03bc4fa6d670910
      • Instruction Fuzzy Hash: D3324471A00229DFCF18DF94D884AEEBBF5FF58300F5540AAE805AB262D7759990CF94
      APIs
      • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,004301C5,?,Microsoft Visual C++ Runtime Library,00012010,?,00438764,?,004387B4,?,?,?,Runtime Error!Program: ), ref: 004337A6
      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004337BE
      • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004337CF
      • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004337DC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AddressProc$LibraryLoad
      • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
      • API String ID: 2238633743-4044615076
      • Opcode ID: 64e646348fbe36ad6605484b99d6e611229bf3472f0f8026a0e3ae6980e8c4d5
      • Instruction ID: 122f229e88054660c53af26d7f5052591d0a647276e724a8007236748e2a9a5a
      • Opcode Fuzzy Hash: 64e646348fbe36ad6605484b99d6e611229bf3472f0f8026a0e3ae6980e8c4d5
      • Instruction Fuzzy Hash: 5D0184B5608311AF9710AFF59CC0A277EE8AA4D751B14203FF501C2361DB798D029B6D
      APIs
      • AbortDoc.GDI32(?), ref: 00423A84
        • Part of subcall function 0042355C: StartDocA.GDI32(?,?), ref: 00423566
      • MessageBoxA.USER32(?,Insufficient disk space or memory to complete the print job, or the printer is not available.,00000000,00000010), ref: 00423AD1
        • Part of subcall function 0042343E: StartPage.GDI32(?), ref: 00423448
        • Part of subcall function 0042343E: SetBkColor.GDI32(?,00FFFFFF), ref: 0042345F
        • Part of subcall function 0042343E: SetBkColor.GDI32(?,00000000), ref: 00423468
        • Part of subcall function 0042343E: MoveToEx.GDI32(?,00000200,00000200,00000000), ref: 00423479
        • Part of subcall function 0042343E: EndPage.GDI32(?), ref: 00423485
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ColorPageStart$AbortMessageMove
      • String ID: IXA$Insufficient disk space or memory to complete the print job, or the printer is not available.$Printing Progress
      • API String ID: 269022264-3254887256
      • Opcode ID: 52be44b295bc38b9768fd93eeb844fa071d4fcfff18f220b3e8b7be1b43e5d08
      • Instruction ID: ea3dd72d55957b563064cae2e364e0010e3a9c22850906b5deb7f6fc51011b57
      • Opcode Fuzzy Hash: 52be44b295bc38b9768fd93eeb844fa071d4fcfff18f220b3e8b7be1b43e5d08
      • Instruction Fuzzy Hash: 0C0289B0B0022A9FCF24CE25E8417EB77F5BB44746F90442FE85686240D7BC9B91CB99
      APIs
      • GetVersion.KERNEL32 ref: 0042A6E1
        • Part of subcall function 0042DC54: HeapCreate.KERNELBASE(00000000,00001000,00000000,0042A71A,00000000), ref: 0042DC65
        • Part of subcall function 0042DC54: HeapDestroy.KERNEL32 ref: 0042DCA4
      • GetCommandLineA.KERNEL32 ref: 0042A72F
      • GetStartupInfoA.KERNEL32(?), ref: 0042A75A
      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 0042A77D
        • Part of subcall function 0042A7D6: ExitProcess.KERNEL32 ref: 0042A7F3
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
      • String ID:
      • API String ID: 2057626494-0
      • Opcode ID: e13db3058914ef47dd28965904fa4bf95fbe4d8e42b712fd361810e52b4e8ce8
      • Instruction ID: 131b8be7f7895522cbf016825cfd1d68cef6411212f25d8c920cb024130d1c1a
      • Opcode Fuzzy Hash: e13db3058914ef47dd28965904fa4bf95fbe4d8e42b712fd361810e52b4e8ce8
      • Instruction Fuzzy Hash: A82191B5A40725AFD718AFA6EC45A6E7BB8EF45704F90013EF80196251DB384440CB5A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID:
      • String ID: %A$%A
      • API String ID: 0-771997236
      • Opcode ID: 4d30150291c585049d34f858fdc1f55b082d48571674e25fa1048565be8b1a2a
      • Instruction ID: d9d46b8fe31024697e16007a11e18458155e38551520b9e79fe0b9069e3ceacb
      • Opcode Fuzzy Hash: 4d30150291c585049d34f858fdc1f55b082d48571674e25fa1048565be8b1a2a
      • Instruction Fuzzy Hash: C5231D37F0062A5BDB44CE9ECC8458DB7E3AEC825475F8265D958F7309DAB4A906CBC0
      APIs
      • SetRect.USER32(00000000,?,?,?,?), ref: 0041CB2B
      • OffsetRect.USER32(00000000,?,00000000), ref: 0041CB3D
      • InvertRect.USER32(?,00000000), ref: 0041CB4A
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$InvertOffset
      • String ID:
      • API String ID: 2623992382-0
      • Opcode ID: 74887ee90fc1d80d049fdc3ff6929172383bbf849936580e142921a1e5960529
      • Instruction ID: db4033acade29116473c5c3521cacd81856ac0a9dfd74115f613a0f02b264598
      • Opcode Fuzzy Hash: 74887ee90fc1d80d049fdc3ff6929172383bbf849936580e142921a1e5960529
      • Instruction Fuzzy Hash: 604190326401198FCB00EF69DA918EE77B5FF45304B40816AF941AB291DB38EE42CBE4
      APIs
      • GetLocalTime.KERNEL32(00000000), ref: 0042BB34
      • GetSystemTime.KERNEL32(?), ref: 0042BB3E
      • GetTimeZoneInformation.KERNEL32(?), ref: 0042BB93
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Time$InformationLocalSystemZone
      • String ID:
      • API String ID: 2475273158-0
      • Opcode ID: 4ef28894d85a66bda80c8c806d90468cda7214237df601577fc9bc939ef3f68a
      • Instruction ID: 9e4567db341d279894edfb089a13d3346da8b67130aea19029d49a2569f6c860
      • Opcode Fuzzy Hash: 4ef28894d85a66bda80c8c806d90468cda7214237df601577fc9bc939ef3f68a
      • Instruction Fuzzy Hash: 2521836DA0002995CF21EB95E804AFF7BB9EB0A711FD00152FD5096694E3785D82C7BD
      APIs
      • GetLastError.KERNEL32(7622B530,?,?,?,00426EC9,CPnxHttp::Register: ,Mozilla/4.0,00000001,?,00000000,?,00000000,?,?,00401927,?), ref: 004278AE
      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,?,00426EC9,CPnxHttp::Register: ,Mozilla/4.0,00000001,?,00000000,?,00000000), ref: 004278C8
      • LocalFree.KERNEL32(?,00000001,0000000A,?,00000000,?,00000000,?,00426EC9,CPnxHttp::Register: ,Mozilla/4.0,00000001,?,00000000,?,00000000), ref: 0042790B
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ErrorFormatFreeLastLocalMessage
      • String ID:
      • API String ID: 1365068426-0
      • Opcode ID: 7620e9e43ada411c712d2bdb30aeea8c990387936da00f48b276cb13bc234963
      • Instruction ID: 20f77c273b67142822ff5a2df9a85729255ec7758e889dff177201e4741a158a
      • Opcode Fuzzy Hash: 7620e9e43ada411c712d2bdb30aeea8c990387936da00f48b276cb13bc234963
      • Instruction Fuzzy Hash: 1DF022B2300224BBEB246B56EC0AEAF7A7CDFC5B54F10001EFA0166190CAB56E40D66C
      APIs
      • SetUnhandledExceptionFilter.KERNEL32(Function_00031CA4), ref: 00431CEF
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: 7a618fbbd621babe4e52636bd9b2981cd7550640ca02ba5a72cba714587a07d1
      • Instruction ID: a0055cf314bd699d22cb9754580d76a5e67e708bc1c17937d6ce8e54b1934621
      • Opcode Fuzzy Hash: 7a618fbbd621babe4e52636bd9b2981cd7550640ca02ba5a72cba714587a07d1
      • Instruction Fuzzy Hash: 19A022F888A200CF8B000F30AC080803AA0AA0C302B3030B3B800C0330CB3000808A0F
      APIs
      • SetUnhandledExceptionFilter.KERNEL32 ref: 00431D01
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: 0c5aaebbdc85b76dbea66b17ceabaa393c5522c44036e98c775b97d5ea99131b
      • Instruction ID: 4bae409e9d055402e5a7eed040250b5add0c7384a1e94dc6e178a5d5eb562287
      • Opcode Fuzzy Hash: 0c5aaebbdc85b76dbea66b17ceabaa393c5522c44036e98c775b97d5ea99131b
      • Instruction Fuzzy Hash:
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
      • Instruction ID: 060a6a2fc18f42bce9a06cb540b4bc12b1296e78fd29bc8969e391bdccc8cdfa
      • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
      • Instruction Fuzzy Hash: 0FB19E35A0021ADFDB15CF05D5D0AA9BBA1FF98318F64C19ED80A4B382D735EE42CB94
      APIs
      • GetWindowLongA.USER32(?,00000008), ref: 00402C9F
      • EndDialog.USER32(?,00000002), ref: 00402CEF
      • GetParent.USER32(?), ref: 00402CF6
      • EndDialog.USER32(?,00000002), ref: 00402D0B
      • GetParent.USER32(?), ref: 00402D1C
      • SetWindowLongA.USER32(?,00000008,?), ref: 00402D36
      • lstrcpyA.KERNEL32(?,Properties of ), ref: 00402D49
      • lstrcatA.KERNEL32(?,?), ref: 00402D63
      • SetWindowTextA.USER32(?,?), ref: 00402D6E
      • SetDlgItemTextA.USER32(?,0000040E,Deposition), ref: 00402DA6
      • lstrcatA.KERNEL32(?,0043C494), ref: 00402DCE
      • lstrlenA.KERNEL32(?,0000000A), ref: 00402DDD
      • lstrcatA.KERNEL32(?,0043C494), ref: 00402E02
      • lstrlenA.KERNEL32(?,0000000A), ref: 00402E0B
      • lstrcatA.KERNEL32(00000000, at ), ref: 00402E44
      • lstrlenA.KERNEL32(00000000,0000000A), ref: 00402E70
      • lstrcatA.KERNEL32(?,0043C4A0), ref: 00402E8D
      • lstrcatA.KERNEL32(?,0043C4AC), ref: 00402EAD
      • lstrlenA.KERNEL32(?,0000000A), ref: 00402EB6
      • lstrcatA.KERNEL32(?, AM), ref: 00402EEB
      • SetDlgItemTextA.USER32(?,00000412,?), ref: 00402EF8
      • lstrlenA.KERNEL32(?), ref: 00402F04
      • GetDlgItem.USER32(?,0000040F), ref: 00402F20
      • GetWindow.USER32(00000000), ref: 00402F23
      • EnableWindow.USER32(00000000), ref: 00402F2A
      • SetDlgItemTextA.USER32(?,0000040F,?), ref: 00402F3A
      • lstrlenA.KERNEL32(?), ref: 00402F46
      • GetDlgItem.USER32(?,0000040B), ref: 00402F59
      • GetWindow.USER32(00000000), ref: 00402F5C
      • EnableWindow.USER32(00000000), ref: 00402F63
      • SetDlgItemTextA.USER32(?,0000040B,?), ref: 00402F73
      • lstrlenA.KERNEL32(?), ref: 00402F7F
      • GetDlgItem.USER32(?,00000411), ref: 00402F92
      • GetWindow.USER32(00000000), ref: 00402F95
      • EnableWindow.USER32(00000000), ref: 00402F9C
      • SetDlgItemTextA.USER32(?,00000411,?), ref: 00402FAC
      • lstrlenA.KERNEL32(?), ref: 00402FB8
      • GetDlgItem.USER32(?,0000040C), ref: 00402FCB
      • GetWindow.USER32(00000000), ref: 00402FCE
      • EnableWindow.USER32(00000000), ref: 00402FD5
      • SetDlgItemTextA.USER32(?,0000040C,?), ref: 00402FE5
      • lstrlenA.KERNEL32(?), ref: 00402FF1
      • GetDlgItem.USER32(?,00000410), ref: 00403004
      • GetWindow.USER32(00000000), ref: 00403007
      • EnableWindow.USER32(00000000), ref: 0040300E
      • SetDlgItemTextA.USER32(?,00000410,?), ref: 0040301E
      • lstrcpyA.KERNEL32(?,Final transcript), ref: 0040304A
      • lstrcatA.KERNEL32(?, (sealed)), ref: 00403063
      • SetDlgItemTextA.USER32(?,0000040D,?), ref: 00403074
      • GetDlgItem.USER32(?,0000041A), ref: 0040308B
      • EnableWindow.USER32(00000000), ref: 0040308E
      • UuidToStringA.RPCRT4(?,?), ref: 0040309C
      • SetDlgItemTextA.USER32(?,0000041E,?), ref: 004030AC
      • RpcStringFreeA.RPCRT4(?), ref: 004030B7
      • lstrcpyA.KERNEL32(?,Locked out: ), ref: 004030FF
      • lstrcatA.KERNEL32(?,printing), ref: 00403119
      • lstrcatA.KERNEL32(?,0043C56C), ref: 0040314A
      • lstrcatA.KERNEL32(?,copying), ref: 0040315A
      • lstrcatA.KERNEL32(?, and ), ref: 00403184
      • lstrcatA.KERNEL32(?,save as), ref: 00403194
      • SetDlgItemTextA.USER32(?,00000415,No features are locked out), ref: 004031AC
      • lstrcpyA.KERNEL32(?,Compressed only. No password needed.), ref: 004031C8
      • lstrcpyA.KERNEL32(?,Compressed and encrypted. ), ref: 004031DD
      • lstrcatA.KERNEL32(?,Password not saved.), ref: 00403200
      • SetDlgItemTextA.USER32(?,00000416,?), ref: 00403214
      • lstrlenA.KERNEL32(?), ref: 00403220
      • GetDlgItem.USER32(?,00000413), ref: 00403233
      • GetWindow.USER32(00000000), ref: 00403236
      • EnableWindow.USER32(00000000), ref: 0040323D
      • SetDlgItemTextA.USER32(?,00000413,?), ref: 0040324D
      • lstrlenA.KERNEL32(?), ref: 00403259
      • GetDlgItem.USER32(?,00000414), ref: 0040326C
      • GetWindow.USER32(00000000), ref: 0040326F
      • EnableWindow.USER32(00000000), ref: 00403276
        • Part of subcall function 00401ECD: DialogBoxParamA.USER32(00000074,,@,Function_000037AC,?,00402CEB), ref: 00401EE4
      • SetDlgItemTextA.USER32(?,00000414,?), ref: 00403286
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$Window$Textlstrcat$lstrlen$Enable$lstrcpy$Dialog$LongParentString$FreeParamUuid
      • String ID: (sealed)$ AM$ PM$ and $ at $(uC$Compressed and encrypted. $Compressed only. No password needed.$Courtroom transcript$Deposition$Draft copy only$Expert witness$Final signed transcript$Final transcript$Locked out: $No features are locked out$Other$Password in local keychain.$Password not saved.$Properties of $copying$printing$save as
      • API String ID: 139631933-3304502761
      • Opcode ID: d70486849f59e5db39cd2bd40fb5981e7ec0217644d71e155969778cb29102cb
      • Instruction ID: 8b7e2c0f39d1b8b3a6bd6ef97a85192763a179fe3d10ad8957463b31546e1a82
      • Opcode Fuzzy Hash: d70486849f59e5db39cd2bd40fb5981e7ec0217644d71e155969778cb29102cb
      • Instruction Fuzzy Hash: F2F1B2B1148305BBDA219F70DC89FAB7BECAB48B41F00183AF685E10D1D7B8A645DB5D
      APIs
      • GetParent.USER32 ref: 004136C6
      • GetWindowLongA.USER32(?,00000008), ref: 004136D5
      • IsDlgButtonChecked.USER32(?,00001ABA), ref: 00413741
      • GetDlgItem.USER32(?,00001AB5), ref: 0041374E
      • EnableWindow.USER32(00000000), ref: 00413755
      • GetDlgItem.USER32(00000000,00000470), ref: 0041377C
      • SendMessageA.USER32(00000000), ref: 00413783
      • IsDlgButtonChecked.USER32(?,00001A8C), ref: 004137B0
      • GetDlgItem.USER32(?,00001AB0), ref: 004137BF
      • EnableWindow.USER32(00000000), ref: 004137C2
      • IsDlgButtonChecked.USER32(?,00001A8C), ref: 004137CA
      • GetDlgItem.USER32(?,00001AB7), ref: 004137D3
      • SendDlgItemMessageA.USER32(?,00001AAA,00000143,00000000,0043E7FC), ref: 00413809
      • SendDlgItemMessageA.USER32(?,00001AAA,0000014E,00000000), ref: 00413835
      • SendDlgItemMessageA.USER32(?,00001AB5,00000143,00000000,On left), ref: 00413887
      • SendDlgItemMessageA.USER32(?,00001AB5,00000143,00000000,On right), ref: 00413896
      • SendDlgItemMessageA.USER32(?,00001AB7,00000143,00000000,?), ref: 004138C0
      • SendDlgItemMessageA.USER32(?,00001AB3,00000143,00000000,?), ref: 004138F1
      • SendDlgItemMessageA.USER32(?,00001AB6,00000143,00000000,?), ref: 00413926
      • GetDlgItem.USER32(00000000,00000470), ref: 00413972
      • SendMessageA.USER32(00000000), ref: 00413975
      • GetDlgItem.USER32(?,0000047C), ref: 00413988
      • IsWindowVisible.USER32(00000000), ref: 0041398B
      • GetDlgItemTextA.USER32(?,?,?,00000104), ref: 004139B2
      • lstrcpyA.KERNEL32(00000000,.xml), ref: 004139E7
      • SetDlgItemTextA.USER32(?,0000047C,?), ref: 004139FD
      • GetWindowTextA.USER32(?,?,000000FF), ref: 00413A11
      • GetDlgItem.USER32(?,00000470), ref: 00413A24
      • SendMessageA.USER32(00000000), ref: 00413A27
      • SetWindowTextA.USER32(?,?), ref: 00413A86
      • GetDlgItem.USER32(?,00001AAA), ref: 00413A9E
      • EnableWindow.USER32(00000000), ref: 00413AA7
      • GetDlgItem.USER32(?,00001AEC), ref: 00413AB0
      • EnableWindow.USER32(00000000), ref: 00413AB3
      • GetWindowRect.USER32(00000000,?), ref: 00413AC6
      • GetWindowRect.USER32(?,?), ref: 00413ACE
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000012), ref: 00413AEA
      • SendDlgItemMessageA.USER32(?,00001AAA,00000147,00000000,00000000), ref: 00413B0B
      • IsDlgButtonChecked.USER32(?,00001A8C), ref: 00413B18
      • SendDlgItemMessageA.USER32(?,00001AB7,00000147,00000000,00000000), ref: 00413B2C
      • SendDlgItemMessageA.USER32(?,00001A88,00000147,00000000,00000000), ref: 00413B3F
      • IsDlgButtonChecked.USER32(?,00001AB9), ref: 00413B4C
      • IsDlgButtonChecked.USER32(?,00001AAF), ref: 00413B5D
      • IsDlgButtonChecked.USER32(?,00001ABA), ref: 00413B6E
      • SendDlgItemMessageA.USER32(?,00001AB5,00000147,00000000,00000000), ref: 00413B82
      • SendDlgItemMessageA.USER32(?,00001AB3,00000147,00000000,00000000), ref: 00413B97
      • SendDlgItemMessageA.USER32(?,00001AB6,00000147,00000000,00000000), ref: 00413BA7
      • IsDlgButtonChecked.USER32(?,00001ACF), ref: 00413BBD
      • IsDlgButtonChecked.USER32(?,00001ACE), ref: 00413BCA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$MessageSend$Window$ButtonChecked$EnableText$Rect$LongParentVisiblelstrcpy
      • String ID: .txt$.xml$ASCII$On left$On right$XML
      • API String ID: 844279928-1151373293
      • Opcode ID: 2659b0a74333dc56bb6ffe02777bdaded2538b60f0fa90323d9be9ab5b631417
      • Instruction ID: 931925bea3ce4ad55ea7a9aa2122c0c1aa72fc46cdb7296278621326c2d49eec
      • Opcode Fuzzy Hash: 2659b0a74333dc56bb6ffe02777bdaded2538b60f0fa90323d9be9ab5b631417
      • Instruction Fuzzy Hash: 3FD1F7B1609308BFE610EF65DC49DAB7BECEF46749F00042AF980D21D1D7789A45CB6A
      APIs
      • SendDlgItemMessageA.USER32(?,00001AAA,00000147,00000000,00000000), ref: 00413BF7
      • CheckDlgButton.USER32(?,00001A8C,00446CE8), ref: 00413C3A
      • GetDlgItem.USER32(?,00001A8C), ref: 00413C49
      • EnableWindow.USER32(00000000), ref: 00413C52
      • IsDlgButtonChecked.USER32(?,00001A8C), ref: 00413C5A
      • GetDlgItem.USER32(?,00001AB0), ref: 00413C79
      • EnableWindow.USER32(00000000), ref: 00413C7C
      • IsDlgButtonChecked.USER32(?,00001A8C), ref: 00413C84
      • GetDlgItem.USER32(?,00001AB7), ref: 00413CA3
      • EnableWindow.USER32(00000000), ref: 00413CA6
      • GetDlgItem.USER32(?,00001AAE), ref: 00413CB2
      • EnableWindow.USER32(00000000), ref: 00413CB5
      • GetDlgItem.USER32(?,00001AED), ref: 00413CC1
      • EnableWindow.USER32(00000000), ref: 00413CC4
      • SendDlgItemMessageA.USER32(?,00001AB7,0000014E,?,00000000), ref: 00413CDA
      • SendDlgItemMessageA.USER32(?,00001A88,0000014E,?,00000000), ref: 00413CF0
      • GetDlgItem.USER32(?,00001A88), ref: 00413D00
      • EnableWindow.USER32(00000000), ref: 00413D03
      • CheckDlgButton.USER32(?,00001AB9,?), ref: 00413D0E
      • CheckDlgButton.USER32(?,00001AAF,?), ref: 00413D1D
      • CheckDlgButton.USER32(?,00001ABA,?), ref: 00413D2C
      • GetDlgItem.USER32(?,00001AB1), ref: 00413D3C
      • EnableWindow.USER32(00000000), ref: 00413D3F
      • GetDlgItem.USER32(?,00001AEE), ref: 00413D4B
      • EnableWindow.USER32(00000000), ref: 00413D4E
      • GetDlgItem.USER32(?,00001AEF), ref: 00413D5A
      • EnableWindow.USER32(00000000), ref: 00413D5D
      • GetDlgItem.USER32(?,00001ABA), ref: 00413D69
      • EnableWindow.USER32(00000000), ref: 00413D6C
      • GetDlgItem.USER32(?,00001AB9), ref: 00413D78
      • EnableWindow.USER32(00000000), ref: 00413D7B
      • GetDlgItem.USER32(?,00001AAF), ref: 00413D87
      • EnableWindow.USER32(00000000), ref: 00413D8A
      • IsDlgButtonChecked.USER32(?,00001ABA), ref: 00413D92
      • GetDlgItem.USER32(?,00001AB5), ref: 00413DB1
      • EnableWindow.USER32(00000000), ref: 00413DB4
      • SendDlgItemMessageA.USER32(?,00001AB5,0000014E,00000000,00000000), ref: 00413DCC
      • SendDlgItemMessageA.USER32(?,00001AB3,0000014E,?,00000000), ref: 00413DE2
      • SendDlgItemMessageA.USER32(?,00001AB6,0000014E,?,00000000), ref: 00413DFC
      • GetDlgItem.USER32(?,00001AB3), ref: 00413E0C
      • EnableWindow.USER32(00000000), ref: 00413E0F
      • GetDlgItem.USER32(?,00001AB6), ref: 00413E1B
      • EnableWindow.USER32(00000000), ref: 00413E1E
      • CheckDlgButton.USER32(?,00001ACF,?), ref: 00413E29
      • GetDlgItem.USER32(?,00001ACF), ref: 00413E39
      • EnableWindow.USER32(00000000), ref: 00413E3C
      • CheckDlgButton.USER32(?,00001ACE,?), ref: 00413E48
      • GetDlgItem.USER32(?,00001ACE), ref: 00413E54
      • EnableWindow.USER32(00000000), ref: 00413E57
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$EnableWindow$Button$CheckMessageSend$Checked
      • String ID: lD
      • API String ID: 2518239980-1556624830
      • Opcode ID: 9d50df5108195a62a0a2077ea9272697aa7e6536d26ef07a3d46963df11b1e4f
      • Instruction ID: 5c5be1a0b0880e3ec663877240cfab64cb792540ed80ac42dad9f312dd60d2df
      • Opcode Fuzzy Hash: 9d50df5108195a62a0a2077ea9272697aa7e6536d26ef07a3d46963df11b1e4f
      • Instruction Fuzzy Hash: 2A5172B1745309BAEA20AFB19D4DE9F3E9DEF85B51F001C15BE46A60D1CA78C400DB76
      APIs
      • SendDlgItemMessageA.USER32(?,00001A4E,00000147,00000000,00000000), ref: 004191EE
      • CheckDlgButton.USER32(?,00001A5A,00000000), ref: 0041921E
      • GetDlgItem.USER32(?,00001A5A), ref: 0041922B
      • EnableWindow.USER32(00000000), ref: 0041922E
      • GetDlgItem.USER32(?,00001A82), ref: 00419242
      • EnableWindow.USER32(00000000), ref: 00419245
      • GetDlgItem.USER32(?,00001A85), ref: 0041924E
      • EnableWindow.USER32(00000000), ref: 00419251
      • GetDlgItem.USER32(?,00001A83), ref: 0041925A
      • EnableWindow.USER32(00000000), ref: 0041925D
      • GetDlgItem.USER32(?,00001A86), ref: 00419266
      • EnableWindow.USER32(00000000), ref: 00419269
      • GetDlgItem.USER32(?,00001A84), ref: 00419272
      • EnableWindow.USER32(00000000), ref: 00419275
      • IsDlgButtonChecked.USER32(?,00001AA0), ref: 0041927D
      • GetDlgItem.USER32(?,00001AA8), ref: 0041928C
      • EnableWindow.USER32(00000000), ref: 0041928F
      • GetDlgItem.USER32(?,00001AA9), ref: 00419298
      • EnableWindow.USER32(00000000), ref: 0041929B
      • GetDlgItem.USER32(?,00001A9D), ref: 004192A4
      • EnableWindow.USER32(00000000), ref: 004192A7
      • GetDlgItem.USER32(?,00001A5D), ref: 004192C4
      • EnableWindow.USER32(00000000), ref: 004192CD
      • GetDlgItem.USER32(?,00001A5A), ref: 004192D6
      • EnableWindow.USER32(00000000), ref: 004192D9
      • GetDlgItem.USER32(?,00001A82), ref: 004192E2
      • EnableWindow.USER32(00000000), ref: 004192E5
      • GetDlgItem.USER32(?,00001A85), ref: 004192EE
      • EnableWindow.USER32(00000000), ref: 004192F1
      • GetDlgItem.USER32(?,00001A83), ref: 004192FA
      • EnableWindow.USER32(00000000), ref: 004192FD
      • GetDlgItem.USER32(?,00001A86), ref: 00419306
      • EnableWindow.USER32(00000000), ref: 00419309
      • GetDlgItem.USER32(?,00001A84), ref: 00419312
      • EnableWindow.USER32(00000000), ref: 00419315
      • GetDlgItem.USER32(?,00001A9C), ref: 0041931E
      • EnableWindow.USER32(00000000), ref: 00419321
      • GetDlgItem.USER32(?,00001A9D), ref: 0041932A
      • EnableWindow.USER32(00000000), ref: 0041932D
      • GetDlgItem.USER32(?,00001A9E), ref: 00419336
      • EnableWindow.USER32(00000000), ref: 00419339
      • GetDlgItem.USER32(?,00001AA0), ref: 00419342
      • EnableWindow.USER32(00000000), ref: 00419345
      • GetDlgItem.USER32(?,00001A9F), ref: 0041934E
      • EnableWindow.USER32(00000000), ref: 00419351
      • GetDlgItem.USER32(?,00001AA8), ref: 0041935A
      • EnableWindow.USER32(00000000), ref: 0041935D
      • GetDlgItem.USER32(?,00001AA9), ref: 00419366
      • EnableWindow.USER32(00000000), ref: 00419369
      • IsDlgButtonChecked.USER32(?,00001AA2), ref: 00419371
      • GetDlgItem.USER32(?,00001A98), ref: 00419380
      • EnableWindow.USER32(00000000), ref: 00419383
      • GetDlgItem.USER32(?,00001A99), ref: 0041938C
      • EnableWindow.USER32(00000000), ref: 0041938F
      • GetDlgItem.USER32(?,00001A94), ref: 00419398
      • EnableWindow.USER32(00000000), ref: 0041939B
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$EnableWindow$Button$Checked$CheckMessageSend
      • String ID:
      • API String ID: 199739482-0
      • Opcode ID: 6a4071a59f59b0b12b4a2e91610088505c64ed9c6ad61da6ed027ecee70f8ced
      • Instruction ID: d161bd5de37eb5cd76efaa5d7cd849550d549306266b8dcc70f93eb32d4af069
      • Opcode Fuzzy Hash: 6a4071a59f59b0b12b4a2e91610088505c64ed9c6ad61da6ed027ecee70f8ced
      • Instruction Fuzzy Hash: FC419AF0F4535D7AE520B7B39C4DC9B3D5CDF86BA5B022912B60AA61C28D79E440C9B2
      APIs
      • GetMenu.USER32(?), ref: 0040549F
      • GetSubMenu.USER32(00000000,00000000), ref: 004054B5
        • Part of subcall function 0040540C: GetMenuItemCount.USER32(?), ref: 00405424
        • Part of subcall function 0040540C: GetMenuItemInfoA.USER32(?,00000000,00000001,?), ref: 00405450
        • Part of subcall function 0040540C: EnableMenuItem.USER32(?,00000000,00000000), ref: 0040547E
        • Part of subcall function 0040540C: GetMenuItemCount.USER32(?), ref: 00405486
      • EnableMenuItem.USER32(00000000,00000FC9,00000000), ref: 004054D7
      • EnableMenuItem.USER32(00000000,00000FA3,00000000), ref: 004054E0
      • CheckMenuItem.USER32(00000000,00000FA7,00000000), ref: 004054F4
      • CheckMenuItem.USER32(00000000,00000FC0,00000000), ref: 004054FD
      • CheckMenuItem.USER32(00000000,00000FAD,00000000), ref: 00405506
      • EnableMenuItem.USER32(00000000,00000FBF,00000001), ref: 0040551F
      • CheckMenuItem.USER32(00000000,00000FA8,00000000), ref: 00405529
      • EnableMenuItem.USER32(00000000,00000FA5,00000001), ref: 0040554A
      • EnableMenuItem.USER32(00000000,00000FB1,00000001), ref: 0040556B
      • IsWindowVisible.USER32(?), ref: 0040558A
      • CheckMenuItem.USER32(00000000,00000FAD,00000008), ref: 004055B9
      • EnableMenuItem.USER32(00000000,00000FBB,00000000), ref: 004055C3
      • EnableMenuItem.USER32(00000000,00000FBA,00000001), ref: 004055CF
      • EnableMenuItem.USER32(00000000,00000FC3,00000001), ref: 004055D8
      • EnableMenuItem.USER32(00000000,00000FA7,00000001), ref: 004055E1
      • EnableMenuItem.USER32(00000000,00000FC0,00000001), ref: 004055EA
      • CheckMenuItem.USER32(00000000,00000FC0,00000008), ref: 0040560C
      • EnableMenuItem.USER32(00000000,00000FC3,00000000), ref: 00405616
      • EnableMenuItem.USER32(00000000,00000FBA,00000001), ref: 00405622
      • EnableMenuItem.USER32(00000000,00000FBB,00000001), ref: 0040562B
      • EnableMenuItem.USER32(00000000,00000FAD,00000001), ref: 00405634
      • CheckMenuItem.USER32(00000000,00000FA7,00000008), ref: 00405646
      • EnableMenuItem.USER32(00000000,00000FBA,00000000), ref: 00405650
      • EnableMenuItem.USER32(00000000,00000FC3,00000001), ref: 0040565C
      • EnableMenuItem.USER32(00000000,00000FBB,00000001), ref: 00405665
      • EnableMenuItem.USER32(00000000,00000FAD,00000001), ref: 0040566E
      • EnableMenuItem.USER32(00000000,00000FC2,00000001), ref: 00405677
      • EnableMenuItem.USER32(00000000,00000FAE,00000001), ref: 00405681
      • EnableMenuItem.USER32(00000000,00000FA8,00000001), ref: 0040568D
      • EnableMenuItem.USER32(00000000,00000FC6,00000001), ref: 00405696
      • EnableMenuItem.USER32(00000000,00000FB1,00000001), ref: 0040569F
      • EnableMenuItem.USER32(00000000,00000FA4,00000001), ref: 004056A8
      • EnableMenuItem.USER32(00000000,00000FA5,00000001), ref: 004056B1
      • EnableMenuItem.USER32(00000000,00000FAF,00000001), ref: 004056BA
      • EnableMenuItem.USER32(00000000,00000FB2,00000001), ref: 004056C3
      • CheckMenuItem.USER32(00000000,00000FA9,00000000), ref: 004056EA
      • EnableMenuItem.USER32(00000000,00000FBA,00000000), ref: 004056F5
      • EnableMenuItem.USER32(00000000,00000FC3,00000000), ref: 004056FE
      • EnableMenuItem.USER32(00000000,00000FBB,00000000), ref: 00405707
      • EnableMenuItem.USER32(00000000,00000FAD,00000000), ref: 00405710
      • EnableMenuItem.USER32(00000000,00000FA7,00000000), ref: 00405719
      • EnableMenuItem.USER32(00000000,00000FC0,00000000), ref: 00405722
      • EnableMenuItem.USER32(00000000,00000FC6,00000000), ref: 00405733
      • EnableMenuItem.USER32(00000000,00000FC6,00000001), ref: 00405740
      • EnableMenuItem.USER32(00000000,00000FD2,00000001), ref: 0040574A
      • EnableMenuItem.USER32(00000000,00000FA4,00000000), ref: 00405753
      • EnableMenuItem.USER32(00000000,00000FAF,00000000), ref: 0040575C
      • EnableMenuItem.USER32(00000000,00000FB2,00000000), ref: 00405765
      • EnableMenuItem.USER32(00000000,00000FAB,00000000), ref: 0040576E
      • EnableMenuItem.USER32(00000000,00000FB3,00000000), ref: 00405782
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Menu$Item$Enable$Check$Count$InfoVisibleWindow
      • String ID:
      • API String ID: 3442356617-0
      • Opcode ID: 70dd4b841acff169e03c04094d6e356d4e92d95cba25740eedd6ababfc7cef3d
      • Instruction ID: b0f3fd078a628ab9d7628502ee20a543090f25d858496b899951d15df7caa482
      • Opcode Fuzzy Hash: 70dd4b841acff169e03c04094d6e356d4e92d95cba25740eedd6ababfc7cef3d
      • Instruction Fuzzy Hash: 9B711E6078971E7AF53156228CCAF7F2D2CDB43F98F01003AB6496D5C18AE95842BDB6
      APIs
      • SendDlgItemMessageA.USER32(?,00001AC6,000000B0,00000000,00000000), ref: 0041BDB0
      • GetDlgItemTextA.USER32(?,00001AC6,?,00000020), ref: 0041BDBD
      • lstrlenA.KERNEL32(?), ref: 0041BDC7
      • CharUpperA.USER32(?), ref: 0041BDDA
      • SetDlgItemTextA.USER32(?,00001AC6,?), ref: 0041BDE6
      • SendDlgItemMessageA.USER32(?,00001AC9,000000B0,00000000,00000000), ref: 0041BE15
      • GetDlgItemTextA.USER32(?,00001AC9,?,00000020), ref: 0041BE22
      • lstrlenA.KERNEL32(?), ref: 0041BE2C
      • CharUpperA.USER32(?), ref: 0041BE3F
      • SetDlgItemTextA.USER32(?,00001AC9,?), ref: 0041BE4B
      • SendDlgItemMessageA.USER32(?,00001AC8,000000B0,00000000,00000000), ref: 0041BE7A
      • GetDlgItemTextA.USER32(?,00001AC8,?,00000020), ref: 0041BE87
      • lstrlenA.KERNEL32(?), ref: 0041BE91
      • CharUpperA.USER32(?), ref: 0041BEA0
      • SetDlgItemTextA.USER32(?,00001AC8,?), ref: 0041BEAC
      • SendDlgItemMessageA.USER32(?,00001AC9,000000B1,00000000,000000FF), ref: 0041BEC9
      • GetDlgItem.USER32(?,00001AC9), ref: 0041BECD
      • SetFocus.USER32(00000000), ref: 0041BED4
      • SendDlgItemMessageA.USER32(?,00001AC8,000000B1,00000003,00000003), ref: 0041BEE9
      • EndDialog.USER32(?,00000001), ref: 0041BF0D
      • GetDlgItemTextA.USER32(?,00001AC8,?,00000020), ref: 0041BF2C
      • lstrcatA.KERNEL32(?,0043F7DC), ref: 0041BF3D
      • lstrlenA.KERNEL32(?), ref: 0041BF49
      • lstrlenA.KERNEL32(?,00000020), ref: 0041BF55
      • GetDlgItemTextA.USER32(?,00001AC9,?), ref: 0041BF64
      • lstrcatA.KERNEL32(?,0043F7DC), ref: 0041BF6F
      • lstrlenA.KERNEL32(?), ref: 0041BF75
      • lstrlenA.KERNEL32(?,00000020), ref: 0041BF81
      • GetDlgItemTextA.USER32(?,00001ACA,?), ref: 0041BF91
      • GetWindowLongA.USER32(?,00000008), ref: 0041BF9A
      • MessageBoxA.USER32(?,This unlock code will not work with this transcript.,00000000,00000000), ref: 0041BFD6
      • SendDlgItemMessageA.USER32(?,00001AC8,000000C5,00000003,00000000), ref: 0041C011
      • SendDlgItemMessageA.USER32(?,00001AC9,000000C5,00000006,00000000), ref: 0041C020
      • SendDlgItemMessageA.USER32(?,00001ACA,000000C5,00000004,00000000), ref: 0041C030
      • SetDlgItemTextA.USER32(?,00001ACD,?), ref: 0041C03E
      • SetWindowLongA.USER32(?,00000008,?), ref: 0041C048
      • GetDlgItem.USER32(?,00001AC8), ref: 0041C050
      • SetFocus.USER32(00000000), ref: 0041C057
      Strings
      • This unlock code will not work with this transcript., xrefs: 0041BFD0
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$Text$Message$Send$lstrlen$CharUpper$FocusLongWindowlstrcat$Dialog
      • String ID: This unlock code will not work with this transcript.
      • API String ID: 4244035017-3487098618
      • Opcode ID: c71c76a250e866b9f3f98c7cca8f7451ab87ccd154b56e7cc27cd3eaa6aeed6a
      • Instruction ID: 5c1f33ad567d80f93d87b2db7a0c59ba62d55a57a66f05e12a278adc547a1406
      • Opcode Fuzzy Hash: c71c76a250e866b9f3f98c7cca8f7451ab87ccd154b56e7cc27cd3eaa6aeed6a
      • Instruction Fuzzy Hash: 86915FB154421DBBDB20AFA0DC89FEF3BACFB04750F145426FA05E6191D7B89941CBA8
      APIs
      • GetWindowLongA.USER32(?,00000008), ref: 00402698
      • GetDlgItemTextA.USER32(?,00000418,00000000,00000104), ref: 00402729
      • lstrcpyA.KERNEL32(00000000,c:\commwrds.txt), ref: 00402748
      • lstrcpyA.KERNEL32(00000000,00000000), ref: 00402750
      • GetOpenFileNameA.COMDLG32(?), ref: 004027B8
      • CharLowerA.USER32(00000000,?), ref: 004027C2
      • SetDlgItemTextA.USER32(?,00000418,00000000), ref: 004027D1
      • EndDialog.USER32(?,00000002), ref: 004027F5
      • GetDlgItemInt.USER32(?,000003FB,?,00000000), ref: 0040280D
      • IsDlgButtonChecked.USER32(?,000003F8), ref: 00402834
      • IsDlgButtonChecked.USER32(00000000,00000416), ref: 00402847
      • GetDlgItemTextA.USER32(00000000,00000418,?,00000104), ref: 0040285D
      • MessageBoxA.USER32(00000000,The common word file you have entered does not exist or cannot be accessed.,00000000,00000030), ref: 00402887
      • IsDlgButtonChecked.USER32(00000000,000003F7), ref: 004028AB
      • IsDlgButtonChecked.USER32(00000000,000003F8), ref: 004028BF
      • IsDlgButtonChecked.USER32(00000000,00000417), ref: 004028CF
      • GetDlgItemTextA.USER32(00000000,00000418,?,00000104), ref: 004028EE
      • LoadCursorA.USER32(00000000,00007F02), ref: 004028FB
      • SetCursor.USER32(00000000), ref: 00402902
      • LoadCursorA.USER32(00000000,00007F00), ref: 0040295D
      • SetCursor.USER32(00000000), ref: 00402964
      • IsDlgButtonChecked.USER32(00000000,000003EB), ref: 00402972
      • GetClientRect.USER32(?,?), ref: 0040298A
      • MessageBeep.USER32(00000000), ref: 004029CC
      • GetDlgItem.USER32(?,000003FB), ref: 004029D4
      • SetFocus.USER32(00000000), ref: 004029DB
      • GetParent.USER32(?), ref: 004029E7
      • SetWindowLongA.USER32(?,00000008,?), ref: 004029FD
      • CheckDlgButton.USER32(?,000003F7,00000000), ref: 00402A27
      • SetDlgItemInt.USER32(?,000003FB,00000064,00000000), ref: 00402A3E
      • CheckDlgButton.USER32(?,000003F8,?), ref: 00402A57
      • CheckDlgButton.USER32(?,00000416,00000001), ref: 00402A72
      • SetDlgItemTextA.USER32(?,00000418,00000000), ref: 00402A7D
      • CheckDlgButton.USER32(?,00000417,00000001), ref: 00402A8F
        • Part of subcall function 00429FC1: GetFileAttributesA.KERNELBASE(?,00404538,?,00000004,?,?,?,?,0040403F), ref: 00429FC5
        • Part of subcall function 00429FC1: GetLastError.KERNEL32(?,?,?,?,0040403F), ref: 00429FD0
      • CheckRadioButton.USER32(?,000003EB,000003EC,?), ref: 00402AB5
      Strings
      • The common word file you have entered does not exist or cannot be accessed., xrefs: 0040287F
      • L, xrefs: 00402784
      • c:\commwrds.txt, xrefs: 00402742
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Button$Item$Checked$CheckText$Cursor$FileLoadLongMessageWindowlstrcpy$AttributesBeepCharClientDialogErrorFocusLastLowerNameOpenParentRadioRect
      • String ID: L$The common word file you have entered does not exist or cannot be accessed.$c:\commwrds.txt
      • API String ID: 415849218-450716407
      • Opcode ID: daea60ae2705087c673bff1a8d8ccf97dfe6a58bc209333f2d11efafd16767ea
      • Instruction ID: 6243c0221269db8f1f464d9dc555854f1d1665a8b01080a7124acd7f0003860a
      • Opcode Fuzzy Hash: daea60ae2705087c673bff1a8d8ccf97dfe6a58bc209333f2d11efafd16767ea
      • Instruction Fuzzy Hash: 69B1E771644209BBEB259F60DD89FEE7B68EF04705F10403AFA45A61D1CBB89D40DBAC
      APIs
      • GetDlgItemTextA.USER32(0043F624,00001A6F,?,00000021), ref: 0041A563
      • GetDlgItemInt.USER32(0043F624,00001A6E,0043F628,00000000), ref: 0041A575
      • IsDlgButtonChecked.USER32(0043F624,00001A70), ref: 0041A599
      • IsDlgButtonChecked.USER32(0043F624,00001ADF), ref: 0041A5AD
      • IsDlgButtonChecked.USER32(0043F624,00001AE0), ref: 0041A5C1
      • SendDlgItemMessageA.USER32(0043F624,00001A5C,00000147,00000000,00000000), ref: 0041A5DE
      • IsDlgButtonChecked.USER32(0043F624,00001A72), ref: 0041A5F7
      • IsDlgButtonChecked.USER32(0043F624,00001A94), ref: 0041A60B
      • IsDlgButtonChecked.USER32(0043F624,00001AD9), ref: 0041A61F
      • IsDlgButtonChecked.USER32(0043F624,00001AD4), ref: 0041A633
        • Part of subcall function 00418478: GetDlgItem.USER32(?,00000004), ref: 00425C25
        • Part of subcall function 00418478: EnableWindow.USER32(00000000), ref: 00425C2C
        • Part of subcall function 0041A35B: SendDlgItemMessageA.USER32(?,00001A4D,0000014E,00000000,00000000), ref: 0041A3EE
      • GetDlgItemInt.USER32(0043F624,00001A6E,0043F628,00000000), ref: 0041A656
      • LoadStringA.USER32(00001A74,?,00000100,000002A1), ref: 0041A68E
      • MessageBoxA.USER32(00003531,?,00000000,00000000), ref: 0041A6A8
      • GetDlgItem.USER32(0043F624,00001A6E), ref: 0041A6B2
      • SetFocus.USER32(00000000), ref: 0041A6B9
      • SetWindowLongA.USER32(0043F624,00000000,00000001), ref: 0041A6C5
      • IsDlgButtonChecked.USER32(0043F624,00001AD9), ref: 0041A77B
      • GetDlgItem.USER32(0043F624,00001AD4), ref: 0041A786
      • EnableWindow.USER32(00000000), ref: 0041A78D
      • IsDlgButtonChecked.USER32(0043F624,00001AD9), ref: 0041A797
      • GetDlgItem.USER32(0043F624,00001AD5), ref: 0041A7A2
      • EnableWindow.USER32(00000000), ref: 0041A7A9
      • SetWindowLongA.USER32(0043F624,00000008), ref: 0041A7C4
      • CheckDlgButton.USER32(0043F624,00001AD9,?), ref: 0041A83B
      • GetDlgItem.USER32(0043F624,00001AD9), ref: 0041A858
      • EnableWindow.USER32(00000000), ref: 0041A85F
      • SendMessageA.USER32(0043F624,00000111,00001AD9,00000000), ref: 0041A872
      • CheckRadioButton.USER32(0043F624,00001AD4,00001AD5,00000000), ref: 0041A898
      • CheckDlgButton.USER32(0043F624,00001A94,?), ref: 0041A8B0
      • CheckDlgButton.USER32(0043F624,00001A72,?), ref: 0041A8C8
      • SendMessageA.USER32(0043F624,00000111,00001AD4,00000000), ref: 0041A8DB
      • SendDlgItemMessageA.USER32(0043F624,00001A5C,0000014E,?,00000000), ref: 0041A8F8
      • SendDlgItemMessageA.USER32(0043F624,00001A2C,00000143,00000000,0043F624), ref: 0041A970
      • SetDlgItemInt.USER32(0043F624,00001A2C,?,00000001), ref: 0041A994
      • CheckDlgButton.USER32(0043F624,00001ADF,?), ref: 0041A9B2
      • CheckDlgButton.USER32(0043F624,00001AE0,?), ref: 0041A9C6
      • GetParent.USER32(0043F624), ref: 0041A9D2
      • GetDlgItem.USER32(0043F624,00001A6F), ref: 0041AA01
      • EnumFontFamiliesA.GDI32(00000004,00000000,0041AAD4,00000000), ref: 0041AA12
      • DeleteDC.GDI32(00000004), ref: 0041AA21
      • SetDlgItemTextA.USER32(0043F624,00001A6F,?), ref: 0041AA42
      • CheckDlgButton.USER32(0043F624,00001A70,?), ref: 0041AA5A
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Button$Item$Checked$CheckMessage$SendWindow$Enable$LongText$DeleteEnumFamiliesFocusFontLoadParentRadioString
      • String ID:
      • API String ID: 1080528936-0
      • Opcode ID: 9d1a83699b5303c37cd4f2e4d7fd4bc2ef95ed4a5167a562158c58f5c592edab
      • Instruction ID: 608f66b9288e58e5495c80fdfd4f670594e21ead6fdbe4b4d7b903d11b3a192a
      • Opcode Fuzzy Hash: 9d1a83699b5303c37cd4f2e4d7fd4bc2ef95ed4a5167a562158c58f5c592edab
      • Instruction Fuzzy Hash: 03F1B4B0305304BFEB209F61DD49FEB3BA9EF45700F04542AFA469A2D1C7789991CB5A
      APIs
      • SendDlgItemMessageA.USER32(?,00001A53,00000147,00000000,00000000), ref: 0041864E
      • GetDlgItemInt.USER32(?,00001AA7,?,00000000), ref: 00418673
      • GetDlgItemTextA.USER32(?,00001AA6,?,00000021), ref: 004186A0
      • IsDlgButtonChecked.USER32(?,00001AA4), ref: 004186AE
      • GetDlgItemInt.USER32(?,00001AA0,?,00000000), ref: 004186FE
      • GetDlgItemInt.USER32(?,00001AA7,?,00000000), ref: 0041871C
      • MessageBoxA.USER32(?,Please enter a valid starting page number for the word index.,00000000,00000000), ref: 0041874F
      • GetDlgItem.USER32(?,00001AA0), ref: 00418759
      • SetFocus.USER32(00000000), ref: 00418760
      • SetWindowLongA.USER32(?,00000000,00000001), ref: 0041876C
      • GetDlgItem.USER32(?,00001AA0), ref: 00418810
      • EnableWindow.USER32(00000000), ref: 00418817
      • SetWindowLongA.USER32(?,00000008), ref: 00418825
      • lstrlenA.KERNEL32(?,0000000A), ref: 00418849
      • lstrcatA.KERNEL32(?,0043F464), ref: 00418864
      • lstrlenA.KERNEL32(?), ref: 0041886E
      • LoadStringA.USER32(-00001A5F,?,00000020), ref: 00418890
      • SendDlgItemMessageA.USER32(?,00001A53,00000143,00000000,?), ref: 004188A8
      • SendDlgItemMessageA.USER32(?,00001A53,0000014E,?,00000000), ref: 004188D3
      • GetParent.USER32(?), ref: 004188E3
      • GetDC.USER32(?), ref: 00418905
      • GetDlgItem.USER32(?,00001AA6), ref: 00418917
      • EnumFontFamiliesA.GDI32(0000000C,00000000,0041AAD4,00000000), ref: 00418927
      • SetDlgItemTextA.USER32(?,00001AA6,?), ref: 0041893D
      • DeleteDC.GDI32(0000000C), ref: 0041894B
      • ReleaseDC.USER32(?,0000000C), ref: 00418956
      • SendDlgItemMessageA.USER32(?,00001AA7,00000143,00000000,0043F4DC), ref: 00418977
      • SetDlgItemInt.USER32(?,00001AA7,?,00000001), ref: 004189B7
      • CheckRadioButton.USER32(?,00001AA4,00001AA5,00001AA4), ref: 004189D7
      • SetDlgItemInt.USER32(?,00001AA0,00000001,00000000), ref: 004189E9
      • GetDlgItem.USER32(?,00001AA0), ref: 004189F4
      • EnableWindow.USER32(00000000), ref: 004189FB
      • CheckRadioButton.USER32(?,00001AA4,00001AA5,00001AA5), ref: 00418A12
      • SetDlgItemInt.USER32(?,00001AA0,000000FF,00000000), ref: 00418A2D
      Strings
      • Please enter a valid font-size for the word index., xrefs: 00418744
      • Please enter a valid starting page number for the word index., xrefs: 0041878E
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$Message$SendWindow$Button$CheckEnableLongRadioTextlstrlen$CheckedDeleteEnumFamiliesFocusFontLoadParentReleaseStringlstrcat
      • String ID: Please enter a valid font-size for the word index.$Please enter a valid starting page number for the word index.
      • API String ID: 2491663591-761849350
      • Opcode ID: 4e22128d0bbde42c83c8d21dbccc64bb8bace4178c42d5121b2756857872819d
      • Instruction ID: 2b07d98027ca414efd2d6d22ac5640c4fd5ebf1faf39d4f87a198b5166c8f751
      • Opcode Fuzzy Hash: 4e22128d0bbde42c83c8d21dbccc64bb8bace4178c42d5121b2756857872819d
      • Instruction Fuzzy Hash: BBC1BFB1600209FFEB249F54DC48EEA3B69FF04394F14813AFD558A1A0CB798D91DB5A
      APIs
      • wsprintfA.USER32 ref: 00411782
      • lstrlenA.KERNEL32(00000025), ref: 0041179B
      • lstrlenA.KERNEL32(0000002E,0043E368,?), ref: 004117AA
      • wsprintfA.USER32 ref: 004117B1
      • lstrcatA.KERNEL32(00000025,ld), ref: 004117C3
      • wsprintfA.USER32 ref: 004117F5
      • lstrlenA.KERNEL32(?), ref: 00411805
      • _hwrite.KERNEL32(?,?,00000000), ref: 00411812
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 00411824
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 00411830
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 0041183C
      • lstrlenA.KERNEL32(00000000), ref: 0041184B
      • lstrlenA.KERNEL32(00000000), ref: 00411871
      • lstrlenA.KERNEL32(00000000), ref: 0041188E
      • _hwrite.KERNEL32(?, ,00000020), ref: 004118A8
      • lstrlenA.KERNEL32(00000000), ref: 004118AD
      • _hwrite.KERNEL32(?,00000000,00000000), ref: 004118B6
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 004118C2
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 004118D4
      • lstrlenA.KERNEL32(?), ref: 00411923
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 0041193D
      • lstrlenA.KERNEL32(?), ref: 0041195B
      • lstrlenA.KERNEL32(?), ref: 00411978
      • _hwrite.KERNEL32(?, ,00000020), ref: 00411992
      • lstrlenA.KERNEL32(?), ref: 00411997
      • _hwrite.KERNEL32(?,?,00000000), ref: 004119A0
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 004119AC
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 004119BE
      • wsprintfA.USER32 ref: 004119E6
      • lstrlenA.KERNEL32(?), ref: 004119F6
      • _hwrite.KERNEL32(?,?,00000000), ref: 00411A03
      • _hwrite.KERNEL32(?,0043E364,00000002), ref: 00411A15
      • _hwrite.KERNEL32(?,0043E398,00000003), ref: 00411A27
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hwrite$lstrlen$wsprintf$lstrcat
      • String ID: $.$hC$ld
      • API String ID: 582996436-585884313
      • Opcode ID: 403eefb4ccd8de8a00557337420d3532a48febf51d8b325e07f35d9ed32249af
      • Instruction ID: d02100119290ebf565840d2e8c6751da56235e71669aa8a91989d4c1c86be7d4
      • Opcode Fuzzy Hash: 403eefb4ccd8de8a00557337420d3532a48febf51d8b325e07f35d9ed32249af
      • Instruction Fuzzy Hash: 16A15C71600209BBDF15DF64CD49FEE7BA9BF08344F044126FA08A61A0D779DE94CB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: __ftol$CapsDevice$H_prologMode
      • String ID: }C$RTFPrint$RichEdit
      • API String ID: 163115433-967111206
      • Opcode ID: c7c3cb28dda2b06237653fb52b4f48e5e416df35bb0f0ceeefc343e54e9f8a29
      • Instruction ID: 71540f94fe857b33089e10f207fca19ad3528c6dcb7f1614c0685310fb4efcd3
      • Opcode Fuzzy Hash: c7c3cb28dda2b06237653fb52b4f48e5e416df35bb0f0ceeefc343e54e9f8a29
      • Instruction Fuzzy Hash: FFF1A770A04218EFDF159F61DC85AEE7FB5FF08300F2180AAF905AA256D7758994CF98
      APIs
      • CreateFontA.GDI32(00000090,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000012,Times New Roman), ref: 0041C22D
      • SelectObject.GDI32(?,00000000), ref: 0041C240
      • GetTextMetricsA.GDI32(?,?), ref: 0041C24F
      • SelectObject.GDI32(?,?), ref: 0041C25B
      • SelectObject.GDI32(?,?), ref: 0041C26B
      • GetTextMetricsA.GDI32(?,?), ref: 0041C277
      • SelectObject.GDI32(?,?), ref: 0041C283
      • SetBkMode.GDI32(?,00000001), ref: 0041C28A
      • SelectObject.GDI32(?,?), ref: 0041C391
      • SetTextColor.GDI32(?,00C0C0C0), ref: 0041C39E
      • TextOutA.GDI32(?,?,?,Demo,00000004), ref: 0041C3BB
      • TextOutA.GDI32(?,?,?,Only,00000004), ref: 0041C3DD
      • SetTextColor.GDI32(?,00000000), ref: 0041C3EA
      • SelectObject.GDI32(?,?), ref: 0041C3F6
      • SelectObject.GDI32(?,?), ref: 0041C443
      • SetTextColor.GDI32(?,00CEF5B1), ref: 0041C450
      • lstrlenA.KERNEL32(This transcript has been,?,?), ref: 0041C461
      • TextOutA.GDI32(?,?,?,This transcript has been,00000000), ref: 0041C479
      • lstrlenA.KERNEL32(electronically signed using,?,?), ref: 0041C480
        • Part of subcall function 0041C583: GetStockObject.GDI32(00000007), ref: 0041C58E
        • Part of subcall function 0041C583: SelectObject.GDI32(?,00000000), ref: 0041C598
        • Part of subcall function 0041C583: MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 0041C5C0
        • Part of subcall function 0041C583: LineTo.GDI32(?,?,?), ref: 0041C5CA
        • Part of subcall function 0041C583: MoveToEx.GDI32(?,?,00000000,00000000), ref: 0041C5E1
        • Part of subcall function 0041C583: LineTo.GDI32(?,?,?), ref: 0041C5EB
        • Part of subcall function 0041C583: SelectObject.GDI32(?,?), ref: 0041C64A
      • TextOutA.GDI32(?,?,?,electronically signed using,00000000), ref: 0041C49E
      • lstrlenA.KERNEL32(RealLegal technology.,?,?), ref: 0041C4A5
      • TextOutA.GDI32(?,?,?,RealLegal technology.,00000000), ref: 0041C4C4
      • lstrlenA.KERNEL32(Click to display signature details.,?,?), ref: 0041C4CB
      • TextOutA.GDI32(?,?,?,Click to display signature details.,00000000), ref: 0041C4EA
      • SetTextColor.GDI32(?,00000000), ref: 0041C4F7
      • SelectObject.GDI32(?,?), ref: 0041C503
      • MoveToEx.GDI32(?,?,?,00000000), ref: 0041C51E
        • Part of subcall function 0041CC69: GetDC.USER32(?), ref: 0041CC77
        • Part of subcall function 0041CC69: SelectObject.GDI32(00000000,?), ref: 0041CC89
        • Part of subcall function 0041CC69: GetTextMetricsA.GDI32(00000000,?), ref: 0041CC93
        • Part of subcall function 0041CC69: SelectObject.GDI32(00000000,?), ref: 0041CC9D
        • Part of subcall function 0041CC69: ReleaseDC.USER32(?,00000000), ref: 0041CCA3
      • LineTo.GDI32(?,?,?), ref: 0041C544
      • DeleteObject.GDI32(?), ref: 0041C579
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Text$Select$Colorlstrlen$LineMetricsMove$CreateDeleteFontModeReleaseStock
      • String ID: Click to display signature details.$Demo$Only$RealLegal technology.$This transcript has been$Times New Roman$electronically signed using
      • API String ID: 1693882499-3944422226
      • Opcode ID: ac84feeefb11ee00bfe2cda9785f081f7e639cfd137de18021b1b8a62eec0760
      • Instruction ID: 72f174f23d25b4884f32a8bb1faa6668aad9517e4f4d2897bbdbb2a486bbebdb
      • Opcode Fuzzy Hash: ac84feeefb11ee00bfe2cda9785f081f7e639cfd137de18021b1b8a62eec0760
      • Instruction Fuzzy Hash: D2C10571A00209EFDF15DFA4CD85EAEBBB9FF08300F105069F906A6260DB75AA91DF54
      APIs
      • UuidToStringA.RPCRT4(?,?), ref: 00420B31
      • SelectObject.GDI32(?,?), ref: 00420B75
      • SelectObject.GDI32(?,?), ref: 00420B80
      • GetTextMetricsA.GDI32(?,?), ref: 00420B8C
      • SetTextAlign.GDI32(?,0000000A), ref: 00420B9A
      • GetDeviceCaps.GDI32(?,00000070), ref: 00420BBC
      • GetDeviceCaps.GDI32(?,00000071), ref: 00420BC6
      • lstrlenA.KERNEL32(?), ref: 00420BD0
      • TextOutA.GDI32(?,00000000), ref: 00420C17
      • RpcStringFreeA.RPCRT4(?), ref: 00420C21
      • SetTextAlign.GDI32(?,00000008), ref: 00420C48
      • lstrcatA.KERNEL32(?,Electronically signed by ,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420C9F
      • lstrcatA.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420CAB
      • lstrcatA.KERNEL32(?,0043C680,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420CB9
      • lstrcatA.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420CC5
      • lstrcatA.KERNEL32(?,0043C1A0,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420CD3
      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420CD8
      • lstrcatA.KERNEL32(?, for ,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420CEE
      • lstrcatA.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420CFA
      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420D05
      • lstrlenA.KERNEL32(0000000A,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420D2B
      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,00000000), ref: 00420D3C
      • TextOutA.GDI32(?,00000000), ref: 00420D8C
      • SetTextAlign.GDI32(?,?), ref: 00420DC0
      • SelectObject.GDI32(?,?), ref: 00420DEE
      • SelectObject.GDI32(?,?), ref: 00420DF6
      • DeleteObject.GDI32(?), ref: 00420E01
      • DeleteObject.GDI32(?), ref: 00420E06
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcat$ObjectText$lstrlen$Select$Align$CapsDeleteDeviceString$FreeMetricsUuid
      • String ID: for $0$0000000000000000$Arial$Electronically signed by
      • API String ID: 1162253022-2159187401
      • Opcode ID: 320e45d8491939b9f274710b93d4c97ef1ede94632edaa668320429dd8faad65
      • Instruction ID: cb46d312d46b917c22ea441eaa2e4fcb2f1d9d80f644cdf64fd90b732a686d22
      • Opcode Fuzzy Hash: 320e45d8491939b9f274710b93d4c97ef1ede94632edaa668320429dd8faad65
      • Instruction Fuzzy Hash: 16A16DB1900609EFCB209FA5DD84EAABBF9FF04304F40486AF685A2561D774F954CF58
      APIs
      • lstrcpyA.KERNEL32(?,?), ref: 004048FD
      • lstrcmpiA.KERNEL32(?,00000000), ref: 00404941
      • lstrcmpiA.KERNEL32(?,00000000), ref: 00404962
      • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 0040497D
      • lstrcmpiA.KERNEL32(?,?), ref: 0040498D
      • MessageBoxA.USER32(00000000,This E-Transcript file is in a temporary folder. Do you want to save it to a different folder?If you choose Yes, you will be prompted for a save location, and the transcript will be automatically re-launched from there.,00000000,00000024), ref: 004049C7
      • lstrcpyA.KERNEL32(?,00000001), ref: 004049EE
      • GetSaveFileNameA.COMDLG32(?), ref: 00404A59
      • _lopen.KERNEL32(?,00000020), ref: 00404A6A
      • MessageBoxA.USER32(00000000,Could not create the destination E-Transcript file for writing.,00000000,00000000), ref: 00404A87
      • _lcreat.KERNEL32(?,00000000), ref: 00404AA0
      • _lclose.KERNEL32(00000000), ref: 00404AB0
      • _lopen.KERNEL32(?,00000012), ref: 00404AB7
      • _hread.KERNEL32(00000000,?,00002000), ref: 00404AD9
      • _hwrite.KERNEL32(000000FF,?,00000000), ref: 00404AEA
      • _lclose.KERNEL32(00000000), ref: 00404AF5
      • _lclose.KERNEL32(000000FF), ref: 00404AFA
      • lstrcmpiA.KERNEL32(00000000,.ptx), ref: 00404B11
      • GetModuleFileNameA.KERNEL32(?,00000104), ref: 00404B2F
      • lstrcatA.KERNEL32(?,0043C988), ref: 00404B3D
      • lstrcatA.KERNEL32(?,?), ref: 00404B4D
      • lstrlenA.KERNEL32(?), ref: 00404B61
      • lstrcatA.KERNEL32(?,0043C984), ref: 00404B74
      • lstrcpyA.KERNEL32(?,?), ref: 00404B80
      • WinExec.KERNEL32(?,00000001), ref: 00404B98
      Strings
      • Could not create the destination E-Transcript file for writing., xrefs: 00404ACB
      • TMP, xrefs: 0040494B
      • .ptx, xrefs: 00404AFC
      • Could not launch the new copy of the E-Transcript file, will run from the temporary folder instead., xrefs: 00404BAB
      • Could not open this E-Transcript file for reading., xrefs: 00404A80
      • TEMP, xrefs: 00404928
      • This E-Transcript file is in a temporary folder. Do you want to save it to a different folder?If you choose Yes, you will be prompted for a save location, and the transcript will be automatically re-launched from there., xrefs: 004049C0
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcmpi$_lcloselstrcatlstrcpy$FileMessageName_lopen$DirectoryExecModuleSaveWindows_hread_hwrite_lcreatlstrlen
      • String ID: .ptx$Could not create the destination E-Transcript file for writing.$Could not launch the new copy of the E-Transcript file, will run from the temporary folder instead.$Could not open this E-Transcript file for reading.$TEMP$TMP$This E-Transcript file is in a temporary folder. Do you want to save it to a different folder?If you choose Yes, you will be prompted for a save location, and the transcript will be automatically re-launched from there.
      • API String ID: 3857194745-1328242039
      • Opcode ID: e04b5b963f0610cd5d5123759aa1f9081de37f6501343eaa4406d45fd10ef82e
      • Instruction ID: 55973cf1991970337339a9de769cd823522cd193e05cba747d8d951cad8a8efc
      • Opcode Fuzzy Hash: e04b5b963f0610cd5d5123759aa1f9081de37f6501343eaa4406d45fd10ef82e
      • Instruction Fuzzy Hash: BD8150B1A44208AFEF21AFA1EC49F9E7BB9EF44315F10506AF601B51E1DB785D409F18
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrlen$H_prolog
      • String ID: %d:%02d$" IsSealed="$"/>$%d-%d-%d$</Company>$</Date>$</DeposedBy>$</Examiner>$</GUID>$</JobNumber>$</Reporter>$</Title>$</Witness>$<Company>$<Date>$<DeposedBy>$<Examiner>$<Flags IsDraft="$<GUID>$<JobNumber>$<Reporter>$<Title>$<Witness>$Yes
      • API String ID: 3834905643-3426121586
      • Opcode ID: e949730e05c6bdc6c9331859356f62878caeaf6ce2d99b01e225a12e38bea80f
      • Instruction ID: 54079bf5cd07254208df97e6c5623e5c062ab4a72bfd0be04f1b5d100e9490fc
      • Opcode Fuzzy Hash: e949730e05c6bdc6c9331859356f62878caeaf6ce2d99b01e225a12e38bea80f
      • Instruction Fuzzy Hash: FEA15830704514AFDB29AF64C88AEED77B5EF89710B20018AF456972E0DF38AE41CF58
      APIs
        • Part of subcall function 0040ABFB: GetPrivateProfileIntA.KERNEL32(00000000,?,00423084,00000000), ref: 0040AC0D
      • GetWindowsDirectoryA.KERNEL32(?,00000104,ExpandBy,?,?,CentreNotesColumn,?,?,NotesMode,?,?,EndFullSized,?,?,StartFullSized,?), ref: 0040B897
      • lstrcatA.KERNEL32(?,\tximpwiz.ini), ref: 0040B8A9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DirectoryPrivateProfileWindowslstrcat
      • String ID: ActiveIssuesOnly$AnnotColorPrint$AppendWordIndex$CentreNotesColumn$CondensedFont$CondensedPageNum$CondensedPagePos$CondensedPageRange$DoubleSpacing$EndFullSized$ExpandBy$FirstPageFullSize$FullPageHeight$LineToTextSpaces$MarginLineNums$MarginTimeStamps$NoHdrFirstPage$NotesMode$PageLayoutOrder$PrintPitch$PrintSigDetails$PrintTimeStamps$PrintUniqueID$StartFullSized$TextBold$TimeStampMode$TranscriptColumns$TranscriptRows$\tximpwiz.ini
      • API String ID: 2855693836-404429783
      • Opcode ID: 4645d0017d9fad7f14806bfe5c57ea3c090f76b3d884e2570a7273e394aeadcb
      • Instruction ID: 7d62884cc5e7efbefc462f8ed5384ea69059e4bb2f2f78c09a81e5462072155d
      • Opcode Fuzzy Hash: 4645d0017d9fad7f14806bfe5c57ea3c090f76b3d884e2570a7273e394aeadcb
      • Instruction Fuzzy Hash: 5781C77024070BAFDE306A31DC99FE77BBAEB44718F10082FB59A621D0CA78B855D759
      APIs
      • OffsetRect.USER32(?,?,?), ref: 004158C7
      • GetStockObject.GDI32(00000000), ref: 004158D5
      • FillRect.USER32(?,?,00000000), ref: 004158E5
      • GetClientRect.USER32(?,?), ref: 004158F1
      • GetStockObject.GDI32(00000002), ref: 004158FF
      • FillRect.USER32(?,?,00000000), ref: 00415909
      • GetClientRect.USER32(?,?), ref: 00415915
      • GetStockObject.GDI32(00000002), ref: 00415923
      • FillRect.USER32(?,?,00000000), ref: 0041592D
      • GetClientRect.USER32(?,?), ref: 00415939
      • GetStockObject.GDI32(00000002), ref: 00415947
      • FillRect.USER32(?,?,00000000), ref: 00415951
      • GetClientRect.USER32(?,?), ref: 0041595D
      • GetStockObject.GDI32(00000002), ref: 0041596B
      • FillRect.USER32(?,?,00000000), ref: 00415975
      • CreateSolidBrush.GDI32(007F0000), ref: 0041597C
      • SelectObject.GDI32(?,00000000), ref: 00415989
      • SetRect.USER32(?,?,?,?,?), ref: 004159AC
      • FillRect.USER32(?,?,?), ref: 004159BC
      • SetRect.USER32(?,?,?,?,?), ref: 004159D8
      • FillRect.USER32(?,?,?), ref: 004159E8
      • SetRect.USER32(?,?,?,?,?), ref: 00415A04
      • FillRect.USER32(?,?,?), ref: 00415A14
      • SetRect.USER32(?,?,?,?,?), ref: 00415A30
      • FillRect.USER32(?,?,?), ref: 00415A40
      • SelectObject.GDI32(?,?), ref: 00415A48
      • DeleteObject.GDI32(?), ref: 00415A51
      • SetRect.USER32(?,?,?,?,?), ref: 00415A70
      • GetStockObject.GDI32(00000004), ref: 00415A78
      • FillRect.USER32(?,?,00000000), ref: 00415A82
      • SetRect.USER32(?,?,?,?,?), ref: 00415A9D
      • GetStockObject.GDI32(00000004), ref: 00415AA5
      • FillRect.USER32(?,?,00000000), ref: 00415AB0
      • SetWindowOrgEx.GDI32(?,?,?,?), ref: 00415AC9
      • SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 00415B14
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$Fill$Object$Stock$Client$SelectWindow$BrushCreateDeleteOffsetSolid
      • String ID:
      • API String ID: 4095045003-0
      • Opcode ID: 11759709e9ab6428dca135873744e62ec9845900b8eebb10513d5ea20cf31f2c
      • Instruction ID: b207d0c41b7c02ce6281d8eb41a69d9b78cd382846ec68e7022d47cb2798c47e
      • Opcode Fuzzy Hash: 11759709e9ab6428dca135873744e62ec9845900b8eebb10513d5ea20cf31f2c
      • Instruction Fuzzy Hash: 2E91B2B2904119BFDF019FA4DD85EEEBBBDFF48300F044126FA05E6261D635AA11DB64
      APIs
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00424B48
      • CreateFontA.GDI32(?,?,?,0041E984,?,00000000,00000001,00000000,?,?,00000000,?,?,?), ref: 00424B58
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00424B82
      • __ftol.LIBCMT ref: 00424B90
      • CreateFontA.GDI32(00000000,?,?,0041E984,?,00000000,00000001,00000000,?,?,00000000,?,?,?), ref: 00424B96
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00424BBB
      • __ftol.LIBCMT ref: 00424BCC
      • CreateFontA.GDI32(00000000,?,?,0041E984,?,00000000,00000001,00000000,?,?,00000000,?,?,?), ref: 00424BD2
        • Part of subcall function 00425609: SelectObject.GDI32(?,?), ref: 0042564A
        • Part of subcall function 00425609: SelectObject.GDI32(?,?), ref: 00425653
        • Part of subcall function 00425609: GetTextMetricsA.GDI32(?,?), ref: 0042565D
        • Part of subcall function 00425609: SelectObject.GDI32(?,?), ref: 0042568D
        • Part of subcall function 00425609: SelectObject.GDI32(?,?), ref: 00425693
        • Part of subcall function 00425609: DeleteObject.GDI32(?), ref: 0042569E
        • Part of subcall function 00425609: DeleteObject.GDI32(0041E984), ref: 004256A3
      • SelectObject.GDI32(?,?), ref: 00424BE1
      • SetBkMode.GDI32(?,00000001), ref: 00424D43
      • SelectObject.GDI32(?,?), ref: 00424D52
      • SelectObject.GDI32(?,?), ref: 00424D5C
      • GetTextMetricsA.GDI32(?,?), ref: 00424D6C
      • SetTextColor.GDI32(?,00C0C0C0), ref: 00424D78
      • SetTextAlign.GDI32(?,0000000E), ref: 00424D81
      • TextOutA.GDI32(?,00000000), ref: 00424DCE
      • SetTextAlign.GDI32(?,00000006), ref: 00424DD7
        • Part of subcall function 004244D3: GetDeviceCaps.GDI32(?,0000005A), ref: 004244ED
        • Part of subcall function 004244D3: GetDeviceCaps.GDI32(?,0000005A), ref: 00424503
        • Part of subcall function 004244D3: __ftol.LIBCMT ref: 00424514
        • Part of subcall function 0042448A: GetDeviceCaps.GDI32(?,00000058), ref: 004244A4
        • Part of subcall function 0042448A: GetDeviceCaps.GDI32(?,00000058), ref: 004244BA
        • Part of subcall function 0042448A: __ftol.LIBCMT ref: 004244CB
      • TextOutA.GDI32(?,00000000), ref: 00424E24
      • SetTextAlign.GDI32(?,00000000), ref: 00424E2C
      • SetTextColor.GDI32(?,00000000), ref: 00424E34
      • SelectObject.GDI32(?,?), ref: 00424E3E
      • SetBkMode.GDI32(?,?), ref: 00424E48
      • SelectObject.GDI32(?,00000000), ref: 00424E54
      • DeleteObject.GDI32(?), ref: 00424E63
      • DeleteObject.GDI32(?), ref: 00424E6D
      • DeleteObject.GDI32(?), ref: 00424E72
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$SelectText$CapsDevice$Delete$__ftol$AlignCreateFont$ColorMetricsMode
      • String ID: Demo$Only$Times New Roman
      • API String ID: 3298159434-1972234888
      • Opcode ID: eee2e0f64833130068292bc7b8f3c5efe328d38b8b4884d20801310f16f9708a
      • Instruction ID: 879d4dc82af2a8654992256667a09c3d0f98d52e7a2edaf122d2d30b9ae388eb
      • Opcode Fuzzy Hash: eee2e0f64833130068292bc7b8f3c5efe328d38b8b4884d20801310f16f9708a
      • Instruction Fuzzy Hash: E2B157B2500209FFDF21AFA5DC85E9B3FB9EF48310F44856AFA4999161C3359920DF64
      APIs
      • lstrcatA.KERNEL32(?,<Line ID="), ref: 00435568
      • lstrcatA.KERNEL32(?,00000000), ref: 00435579
      • lstrcatA.KERNEL32(?,<Line ID="Line), ref: 0043558E
      • lstrlenA.KERNEL32(?,0043CE98,?), ref: 004355A2
      • lstrlenA.KERNEL32(?,%02d,?), ref: 004355C5
      • lstrcatA.KERNEL32(?," Number="), ref: 004355E9
      • lstrlenA.KERNEL32(?,0043CE98,?), ref: 004355FB
      • lstrcatA.KERNEL32(?,0043CB2C), ref: 00435619
      • lstrcatA.KERNEL32(?, Indent="), ref: 0043562D
      • lstrlenA.KERNEL32(?,0043CE98,00000000), ref: 0043563A
      • lstrcatA.KERNEL32(?,0043CB2C), ref: 00435658
      • lstrcatA.KERNEL32(?,>), ref: 00435666
      • lstrcatA.KERNEL32(?,<SpanRef IDREF="), ref: 004356C6
      • lstrcatA.KERNEL32(?,00000000), ref: 004356D8
      • lstrcatA.KERNEL32(?,<SpanRef IDREF="Span), ref: 004356ED
      • lstrlenA.KERNEL32(?,0043CE98,?), ref: 004356FC
      • lstrcatA.KERNEL32(?,"/>), ref: 0043571A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcat$lstrlen
      • String ID: Indent="$" Number="$"/>$%02d$</Line>$<Line ID="$<Line ID="Line$<SpanRef IDREF="$<SpanRef IDREF="Span$>$Line$Span
      • API String ID: 751011610-1510624088
      • Opcode ID: f9de3dc4ff7337d9a1349b4b99bce8ca460acf392e194106b8f7a47d9f13e2ff
      • Instruction ID: e603c647a8063dc4bc4fdc983b0959d14e7643cc67babce5ddc1eb732ce76daf
      • Opcode Fuzzy Hash: f9de3dc4ff7337d9a1349b4b99bce8ca460acf392e194106b8f7a47d9f13e2ff
      • Instruction Fuzzy Hash: B781FFB190021CAFDB10DFA4DC85FDE7BB8AF48304F1444AAE605E7151DB799A85CFA8
      APIs
      • SendDlgItemMessageA.USER32(?,00001A59,00000147,00000000,00000000), ref: 00419E67
      • IsDlgButtonChecked.USER32(?,00001AD9), ref: 00419E7D
      • IsDlgButtonChecked.USER32(?,00001ADA), ref: 00419E89
      • IsDlgButtonChecked.USER32(?,00001ADB), ref: 00419E95
      • IsDlgButtonChecked.USER32(?,00001ADC), ref: 00419EA1
      • GetDlgItem.USER32(?,00001A57), ref: 00419EAB
      • EnableWindow.USER32(00000000), ref: 00419EB2
      • GetDlgItem.USER32(?,00001A57), ref: 00419EBD
      • EnableWindow.USER32(00000000), ref: 00419EC4
      • CheckDlgButton.USER32(?,00001A57,00000000), ref: 00419ECD
      • IsDlgButtonChecked.USER32(?,00001ADD), ref: 00419ED9
      • GetDlgItem.USER32(?,00001ADE), ref: 00419EE2
      • EnableWindow.USER32(00000000), ref: 00419EE9
      • SendDlgItemMessageA.USER32(?,00001A59,00000147,00000000,00000000), ref: 00419F0E
      • SendDlgItemMessageA.USER32(?,00001A54,00000147,00000000,00000000), ref: 00419F27
      • IsDlgButtonChecked.USER32(?,00001A57), ref: 00419F41
      • IsDlgButtonChecked.USER32(?,00001AD9), ref: 00419F55
      • IsDlgButtonChecked.USER32(?,00001ADA), ref: 00419F69
      • IsDlgButtonChecked.USER32(?,00001ADB), ref: 00419F7D
      • IsDlgButtonChecked.USER32(?,00001ADC), ref: 00419F91
      • IsDlgButtonChecked.USER32(?,00001ADD), ref: 00419FA6
      • IsDlgButtonChecked.USER32(?,00001ADD), ref: 00419FB6
      • IsDlgButtonChecked.USER32(?,00001ADE), ref: 00419FC2
      • SetWindowLongA.USER32(?,00000008,00000000), ref: 00419FE8
      • SendDlgItemMessageA.USER32(?,00001A59,0000014E,?,00000000), ref: 0041A041
      • SendDlgItemMessageA.USER32(?,0000195E,0000014E,?,00000000), ref: 0041A082
      • CheckDlgButton.USER32(?,00001A57,?), ref: 0041A09C
      • CheckDlgButton.USER32(?,00001AD9,?), ref: 0041A0B0
      • CheckDlgButton.USER32(?,00001ADA,?), ref: 0041A0C4
      • CheckDlgButton.USER32(?,00001ADB,?), ref: 0041A0D8
      • CheckDlgButton.USER32(?,00001ADC,?), ref: 0041A0EC
      • CheckDlgButton.USER32(?,00001ADD,?), ref: 0041A100
      • CheckDlgButton.USER32(?,00001ADE,00000000), ref: 0041A11A
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Button$Checked$CheckItem$MessageSend$Window$Enable$Long
      • String ID:
      • API String ID: 1585499299-0
      • Opcode ID: ff85b821639fa201847d1ece775bcd9c907d6c04c24db4e9d0bbffb4944e3307
      • Instruction ID: ddde208727fd3d138f35d8ebd16280d84c14fc3c2cefd1271f27270d9ab8ad2b
      • Opcode Fuzzy Hash: ff85b821639fa201847d1ece775bcd9c907d6c04c24db4e9d0bbffb4944e3307
      • Instruction Fuzzy Hash: 9C81E1713057047BE620AB66DC85FFB72EDEF4AB04F050429F7469B2D1CB689842962B
      APIs
      • GetSysColor.USER32(00000014), ref: 0042611F
      • CreateSolidBrush.GDI32(00000000), ref: 00426128
      • GetSysColor.USER32(0000000F), ref: 0042612F
      • CreateSolidBrush.GDI32(00000000), ref: 00426132
      • GetSysColor.USER32(00000010), ref: 00426139
      • CreateSolidBrush.GDI32(00000000), ref: 0042613C
      • GetSysColor.USER32(00000006), ref: 00426143
      • CreateSolidBrush.GDI32(00000000), ref: 00426146
      • SetBkMode.GDI32(?,00000001), ref: 00426151
      • GetStockObject.GDI32(0000000C), ref: 00426159
      • SelectObject.GDI32(?,00000000), ref: 00426161
      • GetTextMetricsA.GDI32(?,?), ref: 0042616F
      • SetRect.USER32(?,?,?,?,?), ref: 00426193
      • FillRect.USER32(?,?,?), ref: 004261A3
      • SetRect.USER32(?,00000000,?,00000001,?), ref: 004261B6
      • FillRect.USER32(?,?,?), ref: 004261C2
      • SetRect.USER32(?,00000001,?,00000002,?), ref: 004261D8
      • FillRect.USER32(?,?,?), ref: 004261E4
      • SetRect.USER32(?,?,?,?,?), ref: 004261FC
      • FillRect.USER32(?,?,?), ref: 00426208
      • SetRect.USER32(?,?,?,?,?), ref: 0042621D
      • FillRect.USER32(?,?,?), ref: 00426229
      • SetRect.USER32(?,?,?,?,?), ref: 00426242
      • FillRect.USER32(?,?,?), ref: 0042624E
      • lstrlenA.KERNEL32(?,?), ref: 0042625D
      • GetTextExtentPointA.GDI32(?,?,00000000), ref: 00426266
      • lstrlenA.KERNEL32(?), ref: 0042627E
      • TextOutA.GDI32(?,?,?,?,00000000), ref: 00426293
      • SelectObject.GDI32(?,?), ref: 0042629F
      • DeleteObject.GDI32(?), ref: 004262AE
      • DeleteObject.GDI32(?), ref: 004262B3
      • DeleteObject.GDI32(?), ref: 004262B8
      • DeleteObject.GDI32(?), ref: 004262BD
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$Object$Fill$BrushColorCreateDeleteSolid$Text$Selectlstrlen$ExtentMetricsModePointStock
      • String ID:
      • API String ID: 4026687699-0
      • Opcode ID: 33c5a2ff70db28bebb1589a38cea260a43f57ce428e1b822b75dc70f15f3179b
      • Instruction ID: d1225fda91c24d7519caef32439965cfc1f691d64e781327742231fdab307d56
      • Opcode Fuzzy Hash: 33c5a2ff70db28bebb1589a38cea260a43f57ce428e1b822b75dc70f15f3179b
      • Instruction Fuzzy Hash: 815193B1900209BFDB159FA9CC88DAFBBBDEF48314B008529F559A3160DA31E915DF64
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: wsprintf$H_prolog
      • String ID: uC$ uC$ uC$ uC$ uC$ uC$$uC$%lu$&AppID=$&FullName=$&Guid=$&Hash=$&Locality=$&NDTCANum=$&Pages=$&Recipient=$&Record=$&Signer=$&TimeStamp=$&Title=$?ValidateHash$?VendorID=$@
      • API String ID: 3352209545-2383976072
      • Opcode ID: 3c9d0c42c43d0bcf5444b85aaf77e9e6ec3f9e0f7ae0b46fadcf635e09600e39
      • Instruction ID: f2247941286c01c99e5c1b056066fd9bc09b4ffb08d3c3de2fea96c35d16af16
      • Opcode Fuzzy Hash: 3c9d0c42c43d0bcf5444b85aaf77e9e6ec3f9e0f7ae0b46fadcf635e09600e39
      • Instruction Fuzzy Hash: EBE170B2B002246ADF14ABA6DC86EBF77ADAF08304F40505FF545A7181DB7CAD458B6C
      APIs
      • SetRect.USER32(?,?,?,?,?), ref: 00424848
      • GetStockObject.GDI32(00000001), ref: 0042485C
        • Part of subcall function 0042451C: FillRect.USER32(?,0041E984,?), ref: 00424532
      • SetRect.USER32(?,?,?,?,?), ref: 00424891
      • GetStockObject.GDI32(00000001), ref: 004248A5
      • GetDeviceCaps.GDI32(0041E984,0000005A), ref: 004249C6
      • __ftol.LIBCMT ref: 004249D4
      • CreateFontA.GDI32(00000000), ref: 004249DA
      • GetDeviceCaps.GDI32(?,0000005A), ref: 004249FF
      • __ftol.LIBCMT ref: 00424A10
      • CreateFontA.GDI32(00000000), ref: 00424A16
      • SelectObject.GDI32(0041E984,0041EDB8), ref: 00424A2B
      • SelectObject.GDI32(?,?), ref: 00424A36
      • SetBkMode.GDI32(?,00000001), ref: 00424A40
      • GetTextAlign.GDI32(?), ref: 00424A4C
      • SetTextAlign.GDI32(?,0000000E), ref: 00424A5A
      • SetTextColor.GDI32(?,00E0E0E0), ref: 00424A68
      • GetTextMetricsA.GDI32(0041E984,?), ref: 00424A75
      • TextOutA.GDI32(?,00000000), ref: 00424AC2
      • SetTextColor.GDI32(?,00000000), ref: 00424ACA
      • SetBkMode.GDI32(?,?), ref: 00424AD4
      • SetTextAlign.GDI32(?,?), ref: 00424ADE
      • SelectObject.GDI32(?,00000000), ref: 00424AE8
      • SelectObject.GDI32(0041E984,?), ref: 00424AF0
      • DeleteObject.GDI32(0041EDB8), ref: 00424AFB
      • DeleteObject.GDI32(?), ref: 00424B00
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Text$Select$AlignRect$CapsColorCreateDeleteDeviceFontModeStock__ftol$FillMetrics
      • String ID: Draft Copy$Times New Roman
      • API String ID: 2482175906-1289951107
      • Opcode ID: 7df5f444f9c5d9bd80a5ea9f62c1877b29fbf069aeb30e9d83a157bba8d7775a
      • Instruction ID: 7afa8ace8cfd55d5bc44881c520b8bf11e76a53b64976226fb30a89123e17e80
      • Opcode Fuzzy Hash: 7df5f444f9c5d9bd80a5ea9f62c1877b29fbf069aeb30e9d83a157bba8d7775a
      • Instruction Fuzzy Hash: 0DA133B2900209EFCF119FA1DC45EEB7BB9FF48300F00852AFA599A161D7359960DFA4
      APIs
      • SetBkMode.GDI32(?,00000001), ref: 0041F149
      • SelectObject.GDI32(?,?), ref: 0041F161
      • SelectObject.GDI32(?,?), ref: 0041F172
      • GetTextMetricsA.GDI32(?,?), ref: 0041F181
      • SetRect.USER32(?,00000000,00000000,?,00000000), ref: 0041F201
      • SelectObject.GDI32(?,?), ref: 0041F22B
      • SelectObject.GDI32(?,?), ref: 0041F239
      • __ftol.LIBCMT ref: 0041F2B8
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$MetricsModeRectText__ftol
      • String ID:
      • API String ID: 3342210841-0
      • Opcode ID: 68f6a0c2d7f310cb1c33bbc51772365a8c17c7013220bf7582e931136526d987
      • Instruction ID: 6a4abab4b5c29f4ab656ea7dc226153ce07f6539cda743fb427a293a42baf7e9
      • Opcode Fuzzy Hash: 68f6a0c2d7f310cb1c33bbc51772365a8c17c7013220bf7582e931136526d987
      • Instruction Fuzzy Hash: A3027EB1A00A05EFCB21CF65CC85BDABBF5FF44304F11482DE6AA92261D734A995CF58
      APIs
      • CreateToolbarEx.COMCTL32(?,40802900,00000385,00000007,000002AE,?,0000000A,00000010,0000000F,00000010,0000000F,00000014,00000000,?,00000000), ref: 00414E25
      • SendMessageA.USER32(00000000,00000439,00000000,00000000), ref: 00414E3B
      • SendMessageA.USER32(00000000,00000438,00000000,00000000), ref: 00414E49
      • SendMessageA.USER32(00000000,00000442,0000003C,?), ref: 00414E81
      • SendMessageA.USER32(00000000,00000442,00000034,00000020), ref: 00414E9B
      • SendMessageA.USER32(00000000,00000442,0000003B,00000020), ref: 00414EB5
      • SendMessageA.USER32(00000000,00000442,0000003D,00000020), ref: 00414EC9
      • SendMessageA.USER32(00000000,0000041D,00000004,?), ref: 00414EDB
        • Part of subcall function 00416F2A: CreateWindowExA.USER32(00000000,00001BD3,?,?,?,?,?,?,00444FE8,?,00408461,?), ref: 00416F5E
      • GetStockObject.GDI32(0000000C), ref: 00414F16
      • SendMessageA.USER32(?,00000030,00000000), ref: 00414F22
        • Part of subcall function 0041669F: SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 004166BF
        • Part of subcall function 0041669F: lstrlenA.KERNEL32(?), ref: 00416702
        • Part of subcall function 0041669F: SendMessageA.USER32(?,00000143,00000000,00000025), ref: 00416720
        • Part of subcall function 0041669F: SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00416732
        • Part of subcall function 0041669F: SetFocus.USER32(?), ref: 00416744
      • ShowWindow.USER32(00000000,00000005,00000064,?,?,?,?,?,?,00000000), ref: 00414F31
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$CreateWindow$FocusObjectShowStockToolbarlstrlen
      • String ID: $($2$3$4$5$6$7$8$;$<$=$COMBOBOX$`
      • API String ID: 2642459248-3785508575
      • Opcode ID: 8d36ddb7ca6e0b4d38678c9fa93a6d5006abf8ef9db36969d0f2a1b35305589f
      • Instruction ID: 0c9d42c106007b87d28a1c790e24833c5a27b45b9b558b20a1a642b3297f2fef
      • Opcode Fuzzy Hash: 8d36ddb7ca6e0b4d38678c9fa93a6d5006abf8ef9db36969d0f2a1b35305589f
      • Instruction Fuzzy Hash: 3C9150B1945398EEFB218B64CC05BDEBFB4AB15304F4044DAE6887B291C7B51A48CF26
      APIs
      • GetStockObject.GDI32(0000000C), ref: 00416A03
      • SelectObject.GDI32(00000000,00000000), ref: 00416A0E
      • GetClientRect.USER32(00000064,00000000), ref: 00416A1E
      • wsprintfA.USER32 ref: 00416A47
      • lstrlenA.KERNEL32(?,004168D1,?,?,?,?,?,?,?,?,?,?,004169DF,00000064,00000000,00000000), ref: 00416A5E
      • GetTextExtentPointA.GDI32(00000000,?,00000000), ref: 00416A66
      • SetTextColor.GDI32(00000000,00FFFFFF), ref: 00416A80
      • SetBkColor.GDI32(00000000,00808080), ref: 00416A8C
      • CreateRectRgn.GDI32(00000000,00000000,00000001,?), ref: 00416A9C
      • SelectClipRgn.GDI32(00000000,00000000), ref: 00416AAD
      • lstrlenA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,004169DF,00000064,00000000,00000000), ref: 00416AB5
      • ExtTextOutA.GDI32(00000000,00000064,00000001,00000002,00000000,?,00000000), ref: 00416AC8
      • SetTextColor.GDI32(00000000,00000000), ref: 00416AD1
      • SetBkColor.GDI32(00000000,00FFFFFF), ref: 00416ADD
      • SetRectRgn.GDI32(00000000,00000001,00000000,?,?), ref: 00416AF1
      • SelectClipRgn.GDI32(00000000,00000000), ref: 00416AFB
      • lstrlenA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,004169DF,00000064,00000000,00000000), ref: 00416B03
      • ExtTextOutA.GDI32(00000000,00000064,00000001,00000002,00000000,?,00000000), ref: 00416B16
      • SelectClipRgn.GDI32(00000000,00000000), ref: 00416B1F
      • DeleteObject.GDI32(00000000), ref: 00416B24
      • SelectObject.GDI32(00000000,00000064), ref: 00416B2E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: SelectText$ColorObject$ClipRectlstrlen$ClientCreateDeleteExtentPointStockwsprintf
      • String ID: %d%%
      • API String ID: 2865496221-1518462796
      • Opcode ID: 3d968922300f418df847fed0c8980a71a3afe2a193457f1f9b9116db752874c5
      • Instruction ID: cff0e54426bbbf73b45997a5710a2c95f46dffb4b447c2c6cf1e8a5455d02124
      • Opcode Fuzzy Hash: 3d968922300f418df847fed0c8980a71a3afe2a193457f1f9b9116db752874c5
      • Instruction Fuzzy Hash: 4741F8B2944108FBDB12AFE0DD49EDF7BBCEF08301F105122FA41A21A0D775A6559BA8
      APIs
      • GetSysColor.USER32(00000014), ref: 00425FE8
      • CreateSolidBrush.GDI32(00000000), ref: 00425FF1
      • GetSysColor.USER32(0000000F), ref: 00425FF8
      • CreateSolidBrush.GDI32(00000000), ref: 00425FFB
      • GetSysColor.USER32(00000010), ref: 00426002
      • CreateSolidBrush.GDI32(00000000), ref: 00426005
      • GetSysColor.USER32(00000006), ref: 0042600C
      • CreateSolidBrush.GDI32(00000000), ref: 0042600F
      • SetRect.USER32(?,00000000,?,00000001,?), ref: 00426030
      • FillRect.USER32(?,?,?), ref: 00426042
      • SetRect.USER32(?,00000001,?,00000002,?), ref: 00426059
      • FillRect.USER32(?,?,?), ref: 00426065
      • SetRect.USER32(?,?,?,?,?), ref: 0042607F
      • FillRect.USER32(?,?,?), ref: 0042608B
      • SetRect.USER32(?,?,?,?,?), ref: 0042609C
      • FillRect.USER32(?,?,?), ref: 004260A8
      • SetRect.USER32(?,?,?,?,?), ref: 004260C1
      • FillRect.USER32(?,?,?), ref: 004260CD
      • SetRect.USER32(?,?,?,?,?), ref: 004260DF
      • FillRect.USER32(?,?,?), ref: 004260EB
      • DeleteObject.GDI32(?), ref: 004260F6
      • DeleteObject.GDI32(?), ref: 004260FB
      • DeleteObject.GDI32(?), ref: 00426100
      • DeleteObject.GDI32(?), ref: 00426105
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$Fill$BrushColorCreateDeleteObjectSolid
      • String ID:
      • API String ID: 622882046-0
      • Opcode ID: d4275754b8307398141af0c0cd801566837b536f23d823f5fd03c9c4beb7d31c
      • Instruction ID: 5528af2a12715f4b21404a2deeb21a6d9c4b2cf2b2d91ea9e8b4ed57378980eb
      • Opcode Fuzzy Hash: d4275754b8307398141af0c0cd801566837b536f23d823f5fd03c9c4beb7d31c
      • Instruction Fuzzy Hash: 5C4192B290061DBFDF25ABA5CC88CAEBBBDFF48310B04451AF955A3160DA35E914DF60
      APIs
      • SystemTimeToFileTime.KERNEL32(00000080,?,76936C10,?,?), ref: 00404C26
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00404C34
      • FileTimeToSystemTime.KERNEL32(?,00000080), ref: 00404C42
      • lstrcatA.KERNEL32(?,0043C9B8), ref: 00404C72
      • lstrlenA.KERNEL32(?,0000000A), ref: 00404C7D
      • lstrcatA.KERNEL32(?,0043C9B8), ref: 00404C95
      • lstrlenA.KERNEL32(?,0000000A), ref: 00404C9A
      • lstrcatA.KERNEL32(?, at ), ref: 00404CB2
      • lstrlenA.KERNEL32(?,0000000A), ref: 00404CD1
      • lstrcatA.KERNEL32(?,0043C9AC), ref: 00404CE7
      • lstrcatA.KERNEL32(?,0043C9A8), ref: 00404CF6
      • lstrlenA.KERNEL32(?,0000000A), ref: 00404CFB
      • lstrcatA.KERNEL32(?,AM ), ref: 00404D21
      • GetTimeZoneInformation.KERNEL32(?), ref: 00404D2A
      • lstrlenA.KERNEL32(?), ref: 00404D36
      • lstrlenA.KERNEL32(?), ref: 00404D49
      • lstrlenA.KERNEL32(?,?,00000080), ref: 00404D59
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Timelstrlen$lstrcat$File$System$InformationLocalZone
      • String ID: at $AM $PM
      • API String ID: 2690676821-1610600608
      • Opcode ID: 2aa1b82b81b0096be6b4d80b57b48bf17cdfd07854c87379716d09f22f45368b
      • Instruction ID: 24c1420c19963992ba76b5113ba5a4835d19fa9558da8bb8dea9a1b088805d93
      • Opcode Fuzzy Hash: 2aa1b82b81b0096be6b4d80b57b48bf17cdfd07854c87379716d09f22f45368b
      • Instruction Fuzzy Hash: 1B5144B2D0021CBADF10ABB4CC86EEE777CAF18304F01142BF602B6181E678D544CBA9
      APIs
      • __EH_prolog.LIBCMT ref: 00415198
      • CopyRect.USER32(?,?), ref: 004151CC
      • CreateWindowExA.USER32(00000000,PnxPreviewCtrWnd,00444FE8,50000000,?,?,?,?,?,00000000), ref: 00415217
      • ShowWindow.USER32(?,00000000), ref: 00415232
      • CreateWindowExA.USER32(00000000,PnxPreviewWnd,00444FE8,50300000,?,00000000,?,?,?,00000000,?,?), ref: 004152FF
      • GetWindowLongA.USER32(?,000000EC), ref: 0041530D
      • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0041531F
      • MessageBoxA.USER32(?,Nothing to preview.,00000000,00000040), ref: 00415381
        • Part of subcall function 004154D2: ShowWindow.USER32(?,00000000,?,?,00000000,00415390,00000001), ref: 004154EA
        • Part of subcall function 004154D2: DestroyWindow.USER32(?,?,00000000,00415390,00000001), ref: 004154F2
        • Part of subcall function 004154D2: DeleteDC.GDI32(?), ref: 00415558
        • Part of subcall function 00415B1D: GetWindowRect.USER32(?,?), ref: 00415B3C
        • Part of subcall function 00415B1D: OffsetRect.USER32(?,?,?), ref: 00415B52
        • Part of subcall function 00415B1D: GetDC.USER32 ref: 00415B68
        • Part of subcall function 00415B1D: ReleaseDC.USER32(?,00000000), ref: 00415BEA
        • Part of subcall function 00415F64: InvalidateRect.USER32(?,00000000,00000001,?,00000000,?,?,004153AC,?,00000001,00000001), ref: 00415FA4
        • Part of subcall function 00415F64: SendMessageA.USER32(?,00000401,00000035,00000000), ref: 00415FC9
        • Part of subcall function 00415F64: SendMessageA.USER32(?,00000401,00000036,00000001), ref: 00415FF5
        • Part of subcall function 00415F64: SendMessageA.USER32(?,00000401,00000038,00000000), ref: 00416012
        • Part of subcall function 00415F64: SendMessageA.USER32(?,00000401,00000037,00000001), ref: 00416033
      • ShowWindow.USER32(?,00000005,?,00000001,00000001), ref: 004153D2
      • SetFocus.USER32(?,00000005,?,00000001,00000001), ref: 004153E7
      • GetWindowRect.USER32(?,?), ref: 004153F7
      • InflateRect.USER32(?,000000FB,000000FB), ref: 0041540B
      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 00415430
      • InflateRect.USER32(?,00000005,00000005), ref: 0041543A
      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 0041545A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Rect$Message$Send$Show$CreateInflateLong$CopyDeleteDestroyFocusH_prologInvalidateOffsetRelease
      • String ID: DfA$Nothing to preview.$PnxPreviewCtrWnd$PnxPreviewWnd
      • API String ID: 3594346115-4265431829
      • Opcode ID: 39116ff1f062a7a87724aecae253c8d5d0f7610c3d10ce20d19b6fa839223191
      • Instruction ID: 1228dcd2d7c0d7446a12312ee2fc665df48d1f51d7e1e6b9ea5fd8dfc558da70
      • Opcode Fuzzy Hash: 39116ff1f062a7a87724aecae253c8d5d0f7610c3d10ce20d19b6fa839223191
      • Instruction Fuzzy Hash: 7E91BE71A00A09EFDB11DFA4CC85FEFBBB5FB48300F10452AF566962A0CB796880DB54
      APIs
      • __EH_prolog.LIBCMT ref: 0040DCEB
      • _lopen.KERNEL32(?,00000020), ref: 0040DD10
      • _llseek.KERNEL32(00000000,000000F4,00000002), ref: 0040DD2C
      • _hread.KERNEL32(00000000,?,00000004), ref: 0040DD3B
      • _lclose.KERNEL32(00000000), ref: 0040DD6F
      • _llseek.KERNEL32(00000000,000000FC,00000002), ref: 0040DD9B
      • _hread.KERNEL32(00000000,?,00000004), ref: 0040DDA4
      • _llseek.KERNEL32(00000000,?,00000000), ref: 0040DDB5
      • _lcreat.KERNEL32(?,00000000), ref: 0040DDBC
      • lstrcpyA.KERNEL32(00000000,?), ref: 0040DDF0
      • _llseek.KERNEL32(00000000,000000F8,00000002), ref: 0040DE43
      • _llseek.KERNEL32(00000000,000000F8,00000002), ref: 0040DE59
      • _hwrite.KERNEL32(00000000,?,00000004), ref: 0040DE68
      • _hwrite.KERNEL32(00000000,?,00000004), ref: 0040DE71
      • _lclose.KERNEL32(00000000), ref: 0040DE7A
      • _lclose.KERNEL32(00000000), ref: 0040DE7D
      • _lclose.KERNEL32(00000000), ref: 0040DEC2
      • _lclose.KERNEL32(?), ref: 0040DECE
        • Part of subcall function 0040947B: __EH_prolog.LIBCMT ref: 00409480
        • Part of subcall function 0040947B: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00409498
        • Part of subcall function 0040947B: lstrcatA.KERNEL32(?,\pnxetkey.dat), ref: 004094AA
        • Part of subcall function 0040947B: _lopen.KERNEL32(?,00000020), ref: 004094B9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _lclose_llseek$H_prolog_hread_hwrite_lopen$DirectoryWindows_lcreatlstrcatlstrcpy
      • String ID: .exe
      • API String ID: 1991261225-4119554291
      • Opcode ID: 5b6aa85ead4fa1dfbb8d812f5e1fa48be58523a0ee55287d5684b9ac5f04f5e9
      • Instruction ID: 153fa918a569d8b250a03cc3f442de2539f8883686dceef6548ba4e3fe181119
      • Opcode Fuzzy Hash: 5b6aa85ead4fa1dfbb8d812f5e1fa48be58523a0ee55287d5684b9ac5f04f5e9
      • Instruction Fuzzy Hash: 5351C3B2900219BBDF219FA4DC41EBF7B78EF18324F10012AFA11B62D1D7389955DB98
      APIs
      • GetWindowLongA.USER32(?,00000008), ref: 0041BB9C
      • EndDialog.USER32(?,00000002), ref: 0041BBB5
      • GetDlgItemTextA.USER32(?,00001A2F,?,00000020), ref: 0041BBCD
      • lstrlenA.KERNEL32(?), ref: 0041BBD7
      • CharUpperBuffA.USER32(?,00000000), ref: 0041BBE2
      • EndDialog.USER32(?,00000001), ref: 0041BBFC
      • lstrcpyA.KERNEL32(00000000,?), ref: 0041BC08
      • IsDlgButtonChecked.USER32(?,00001ABB), ref: 0041BC1A
      • SetWindowLongA.USER32(?,00000008,?), ref: 0041BC6E
      • GetDlgItem.USER32(?,00001ABB), ref: 0041BC83
      • ShowWindow.USER32(00000000), ref: 0041BC8A
      • CheckDlgButton.USER32(?,00001ABB,00000000), ref: 0041BC9D
      • SendDlgItemMessageA.USER32(?,00001A2F,000000C5,00000010,00000000), ref: 0041BCC3
      Strings
      • This password is incorrect., xrefs: 0041BC2F
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ItemWindow$ButtonDialogLong$BuffCharCheckCheckedMessageSendShowTextUpperlstrcpylstrlen
      • String ID: This password is incorrect.
      • API String ID: 996582372-1489494177
      • Opcode ID: 1a112a29db745adec74337517ccf72a1212084756c20f3bf8cd91636ad677c8c
      • Instruction ID: 30cd563a730d07ae0787e74a56d03a0964538ec7b8ef3a8853bf8a6a341015f6
      • Opcode Fuzzy Hash: 1a112a29db745adec74337517ccf72a1212084756c20f3bf8cd91636ad677c8c
      • Instruction Fuzzy Hash: 094141B5248209BBDB205B60DC8DFDB7B6CFB08711F145425F952A62D1EB789840DBA8
      APIs
      • GetDlgItemInt.USER32(?,00001AD6,?,00000000), ref: 00419BCA
      • GetDlgItemInt.USER32(?,00001AD7,?,00000000), ref: 00419BEC
      • IsDlgButtonChecked.USER32(?,00001AD2), ref: 00419C15
      • IsDlgButtonChecked.USER32(?,00001AD5), ref: 00419C25
      • GetDlgItemInt.USER32(?,00001AD6,?,00000000), ref: 00419C41
      • GetDlgItemInt.USER32(?,00001AD7,?,00000000), ref: 00419C6D
      • LoadStringA.USER32(00001A77,?,0000007F,00000000), ref: 00419CA7
      • MessageBoxA.USER32(?,?,00000000,00000000), ref: 00419CBE
      • GetDlgItem.USER32(?,00001AD6), ref: 00419CCA
      • SetFocus.USER32(00000000), ref: 00419CD1
      • SetWindowLongA.USER32(?,00000000,00000001), ref: 00419CDB
      • LoadStringA.USER32(00001A75,?,0000007F,00000000), ref: 00419D0A
      • MessageBoxA.USER32(?,?,00000000,00000000), ref: 00419D21
      • SetWindowLongA.USER32(?,00000008), ref: 00419D32
      • SetDlgItemInt.USER32(?,00001AD6,?,00000001), ref: 00419D52
      • SetDlgItemInt.USER32(?,00001AD7,?,00000001), ref: 00419D68
      • CheckDlgButton.USER32(?,00001AD2,?), ref: 00419D82
      • CheckDlgButton.USER32(?,00001AD5,?), ref: 00419D96
      • GetDlgItem.USER32(?,00001ADC), ref: 00419DB5
      • ShowWindow.USER32(00000000), ref: 00419DB8
      • GetDlgItem.USER32(?,00001AD5), ref: 00419DC5
      • ShowWindow.USER32(00000000), ref: 00419DC8
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$ButtonWindow$CheckCheckedLoadLongMessageShowString$Focus
      • String ID:
      • API String ID: 3523526359-0
      • Opcode ID: 6df30e4fa625007df4867ec6d3b5c87256652b0a63125a793279ab8f0356808e
      • Instruction ID: 406f244cd65ebf10b605174561cc92ad8b6d0f49c6bf466f67d982f0a081030b
      • Opcode Fuzzy Hash: 6df30e4fa625007df4867ec6d3b5c87256652b0a63125a793279ab8f0356808e
      • Instruction Fuzzy Hash: 5F71A471204604AFEB20DFA5DCD9EFA37B8FB09704F04042EFA4686691D778AC40DB69
      APIs
      • SendDlgItemMessageA.USER32(?,00000426,00000188,00000000,00000000), ref: 00403314
      • SendDlgItemMessageA.USER32(?,00000426,00000199,00000000,00000000), ref: 00403321
        • Part of subcall function 004017D0: DialogBoxParamA.USER32(0000006A,?,Function_00003628,?,00403331), ref: 004017E5
      • EndDialog.USER32(?,00000001), ref: 00403338
      • GetParent.USER32(?), ref: 00403348
      • lstrlenA.KERNEL32(?), ref: 00403392
      • lstrcpyA.KERNEL32(?,Signed for ), ref: 004033A8
      • lstrcatA.KERNEL32(?,?), ref: 004033B8
      • lstrcatA.KERNEL32(?, by ), ref: 004033CA
      • lstrcpyA.KERNEL32(?,Signed by ), ref: 004033DE
      • lstrcatA.KERNEL32(?,?), ref: 004033EE
      • SendDlgItemMessageA.USER32(?,00000426,00000180,00000000,?), ref: 00403406
      • SendDlgItemMessageA.USER32(?,00000426,0000019A,00000000,?), ref: 00403415
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ItemMessageSend$lstrcat$Dialoglstrcpy$ParamParentlstrlen
      • String ID: by $(uC$0$Signed by $Signed for
      • API String ID: 323108182-1896351627
      • Opcode ID: 1a8c814712f961737fa23e8d62605076036394fc947f9720ee532e43a0624a65
      • Instruction ID: a3d7154f3dad905bd73629a7a7ff75ca80e37c191bde18937e171c347050de86
      • Opcode Fuzzy Hash: 1a8c814712f961737fa23e8d62605076036394fc947f9720ee532e43a0624a65
      • Instruction Fuzzy Hash: F441CFB6504209BFDF209F65DC84EAA3F6CFB04345F404036FA04A61A0CB789A52DBAC
      APIs
      • GetParent.USER32(?), ref: 004170E9
      • GetClientRect.USER32(00000000,?), ref: 004170F9
      • ClientToScreen.USER32(00000000,?), ref: 0041710A
      • ClientToScreen.USER32(00000000,?), ref: 00417111
      • ScreenToClient.USER32(?,?), ref: 00417120
      • ScreenToClient.USER32(?,?), ref: 00417129
      • GetWindowRect.USER32(?,?), ref: 00417162
      • ScreenToClient.USER32(00000000,?), ref: 0041716D
      • ScreenToClient.USER32(00000000,?), ref: 00417174
      • OffsetRect.USER32(?,?,00000000), ref: 0041719B
      • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,0043F354), ref: 004171AE
      • CreatePatternBrush.GDI32(00000000), ref: 004171B8
      • GetDC.USER32(00000000), ref: 004171C2
      • SelectObject.GDI32(00000000,?), ref: 004171D4
      • PatBlt.GDI32(00000000,?,?,?,?,005A0049), ref: 004171F3
      • SelectObject.GDI32(00000000,?), ref: 004171FD
      • ReleaseDC.USER32(?,00000000), ref: 00417203
      • DeleteObject.GDI32(?), ref: 00417212
      • DeleteObject.GDI32(?), ref: 00417217
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Client$Screen$Object$Rect$CreateDeleteSelect$BitmapBrushOffsetParentPatternReleaseWindow
      • String ID:
      • API String ID: 3741250897-0
      • Opcode ID: 2de595ec7c9e3290537cea3232778c3785c994b91922d9be0454a48ecbc1f078
      • Instruction ID: 3519ec13be64195fc3c5eb20ccfeb6de7fd462301c94ca64868b0c7f95a5900a
      • Opcode Fuzzy Hash: 2de595ec7c9e3290537cea3232778c3785c994b91922d9be0454a48ecbc1f078
      • Instruction Fuzzy Hash: E541E6B290410EBFDB149FA4DC849EEBBBCFB08350F009026BA15E6250D774AA45CFA4
      APIs
      • lstrcatA.KERNEL32(?,<Span ID="), ref: 0043583F
      • lstrcatA.KERNEL32(?,00000000), ref: 00435850
      • lstrcatA.KERNEL32(?,<Span ID="Span), ref: 00435865
      • lstrlenA.KERNEL32(?,0043CE98,?), ref: 00435878
      • lstrcatA.KERNEL32(?,0043CB2C), ref: 0043589A
      • lstrlenA.KERNEL32(00000000), ref: 004358AD
      • lstrcatA.KERNEL32(?, Begin="), ref: 004358BF
      • lstrcatA.KERNEL32(?,00000000), ref: 004358CE
      • lstrcatA.KERNEL32(?,0043CB2C), ref: 004358DC
      • lstrcatA.KERNEL32(?,>), ref: 004358EA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcat$lstrlen
      • String ID: Begin="$</Span>$<Span ID="$<Span ID="Span$>$Span
      • API String ID: 751011610-611911509
      • Opcode ID: 02b12add5068419ddf1520399584627900d298e47e0c1db433cfcec06fea279f
      • Instruction ID: e0b0373ca92cdbe17ddfb4729c658e612dbdd5c874192605a9e865af488eb491
      • Opcode Fuzzy Hash: 02b12add5068419ddf1520399584627900d298e47e0c1db433cfcec06fea279f
      • Instruction Fuzzy Hash: 53614A71A0021CAFCF04DFA4C985BDEBBB8AF88310F1040A6F505A7251D778EA54CF69
      APIs
      • GetWindowLongA.USER32(?,00000008), ref: 0040366D
        • Part of subcall function 004017EE: __EH_prolog.LIBCMT ref: 004017F3
        • Part of subcall function 004017EE: RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Internet Explorer,00000000,00000001,?), ref: 00401828
        • Part of subcall function 004017EE: RegQueryValueExA.ADVAPI32(?,Version,00000000,00000000,00000000,?), ref: 0040184B
        • Part of subcall function 004017EE: RegCloseKey.ADVAPI32(?), ref: 00401854
        • Part of subcall function 004017EE: lstrlenA.KERNEL32(00000000), ref: 0040185E
        • Part of subcall function 004017EE: MessageBoxA.USER32(?,Internet Explorer 4.0x or later must be installed for this operation to function correctly.,Newer Internet Explorer version required,00000040), ref: 0040187A
      • EndDialog.USER32(?,00000002), ref: 00403687
      • EndDialog.USER32(?,00000002), ref: 004036AA
      • GetParent.USER32(?), ref: 004036BE
      • SetWindowLongA.USER32(?,00000008,?), ref: 004036D4
      • lstrcpyA.KERNEL32(?,?), ref: 004036F0
      • lstrcatA.KERNEL32(?,0043C680), ref: 00403708
      • lstrcatA.KERNEL32(?,?), ref: 00403714
      • lstrcatA.KERNEL32(?,0043C1A0), ref: 00403722
      • SetDlgItemTextA.USER32(?,000004BA,?), ref: 00403737
      • UuidToStringA.RPCRT4(004453E0,?), ref: 00403742
      • SetDlgItemTextA.USER32(?,0000041E,?), ref: 00403751
      • RpcStringFreeA.RPCRT4(?), ref: 00403757
      • SetDlgItemTextA.USER32(?,0000041B,?), ref: 00403766
      • SetDlgItemTextA.USER32(?,000004BB,?), ref: 0040378C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ItemText$lstrcat$DialogLongStringWindow$CloseFreeH_prologMessageOpenParentQueryUuidValuelstrcpylstrlen
      • String ID: (uC
      • API String ID: 3442865328-1954698195
      • Opcode ID: 88207d4260244c7a395d9a9e7c502c6eaebcd107da65464754800c3bca5b9f0d
      • Instruction ID: ab5a52c7e141ec66af67e48fa5a07a10a0f02d1afa51a8703077517d517da458
      • Opcode Fuzzy Hash: 88207d4260244c7a395d9a9e7c502c6eaebcd107da65464754800c3bca5b9f0d
      • Instruction Fuzzy Hash: 784192B6500209BBDB209F64DC89FEA3B6CEB48701F104476FA45E6190C779EA84DF68
      APIs
      • __EH_prolog.LIBCMT ref: 0041334A
      • _lcreat.KERNEL32(00000000,00000000), ref: 00413446
      • LoadStringA.USER32(00001A4E,00000000,00000100), ref: 00413472
      • MessageBoxA.USER32(?,?,00000000,00000000), ref: 00413485
      • LoadCursorA.USER32(00000000,00007F02), ref: 004134A2
      • SetCursor.USER32(00000000), ref: 004134A9
      • _hwrite.KERNEL32(?,?,?), ref: 00413542
      • LoadCursorA.USER32(00000000,00007F00), ref: 00413561
      • SetCursor.USER32(00000000), ref: 00413568
      • _lclose.KERNEL32(?), ref: 0041359A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$Load$H_prologMessageString_hwrite_lclose_lcreat
      • String ID: $uC$.xml$ASCII$QAA$txt
      • API String ID: 3339625415-1214683660
      • Opcode ID: c3a0fb705bc7c662d2417e517959ef31b83e1ba8a100156cf789d024aa48c10e
      • Instruction ID: daa04e774fec3ee4cf8ec01445659955fbee6087791f082c9a03d7f30201a3a6
      • Opcode Fuzzy Hash: c3a0fb705bc7c662d2417e517959ef31b83e1ba8a100156cf789d024aa48c10e
      • Instruction Fuzzy Hash: 1361A2B2904215BEDF16AFA5EC459EEBF75FF09314F10002EF500A21A1DB794A50DB6D
      APIs
      • lstrcatA.KERNEL32(?,<Page ID="), ref: 0043523A
      • lstrcatA.KERNEL32(?,00000000), ref: 0043524B
      • lstrcatA.KERNEL32(?,<Page ID="Page), ref: 0043526D
      • lstrlenA.KERNEL32(?,0043CE98,?), ref: 00435283
      • lstrcatA.KERNEL32(?," Number="), ref: 004352A5
      • lstrlenA.KERNEL32(?,%ld,?), ref: 004352B6
      • lstrcatA.KERNEL32(?,">), ref: 004352D8
      • lstrcatA.KERNEL32(?,</Page>), ref: 004353D1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcat$lstrlen
      • String ID: " Number="$">$%ld$</Page>$<Page ID="$<Page ID="Page$Page
      • API String ID: 751011610-1038023677
      • Opcode ID: 7538abce6769529743090ccf1b676293e1bff2e955329daeec99ad1219b1f6bd
      • Instruction ID: efc91013a1c2cb6ffb2d753c3036ab306e4d61c960a4002010f73389565069d5
      • Opcode Fuzzy Hash: 7538abce6769529743090ccf1b676293e1bff2e955329daeec99ad1219b1f6bd
      • Instruction Fuzzy Hash: 896183B1A0020DABCF10DF64CD44BDE7BB8BF88314F1484AAE94597251D778DA45CF69
      APIs
      • lstrlenA.KERNEL32(?,?,7626F720,76230440), ref: 00411CD6
      • _hwrite.KERNEL32(?,00000001,00000000), ref: 00411CDF
      • lstrlenA.KERNEL32(?,?,7626F720,76230440), ref: 00411CE4
      • wsprintfA.USER32 ref: 00411D0F
      • lstrcpyA.KERNEL32(?,0043E3A0,?,7626F720,76230440), ref: 00411D23
      • lstrlenA.KERNEL32(?,?,7626F720,76230440), ref: 00411D2D
      • _hwrite.KERNEL32(?,?,00000000), ref: 00411D37
      • _hwrite.KERNEL32(00000000,?,00000000), ref: 00411D79
      • lstrlenA.KERNEL32(?,?,7626F720,76230440), ref: 00411DB0
      • _hwrite.KERNEL32(00000000,00000001,00000000), ref: 00411DB9
      • _hwrite.KERNEL32(00000045,0043E39C,00000002), ref: 00411DD1
      • _hwrite.KERNEL32(00000045,0043E39C,00000002), ref: 00411E06
      • _hwrite.KERNEL32(00000045,0043E39C,00000002), ref: 00411E1A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hwrite$lstrlen$lstrcpywsprintf
      • String ID: %2d$E
      • API String ID: 4055534068-765546502
      • Opcode ID: 890aa773619f9c2e4001bb816b42cb70ef45db9bd100c044819f547f26e6f62d
      • Instruction ID: ab0618835452fe394f7a98805db70394503ed6dfaf02b9d545979d36c420cbb8
      • Opcode Fuzzy Hash: 890aa773619f9c2e4001bb816b42cb70ef45db9bd100c044819f547f26e6f62d
      • Instruction Fuzzy Hash: 95516A71904208AFDF249FA5DC44AEE7BB9EF48304F14802BFE0597261D739A991CF98
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Event$ErrorH_prologLastObjectResetSingleWait
      • String ID: $uC$($@$Download complete.$Download request timed out.$Downloaded %lu bytes.$Downloading data...$Read %lu bytes.$Read request timed out.
      • API String ID: 2931931884-3240048064
      • Opcode ID: bf06ae5918019cd186faeabdcf95a3eca333ee51cfaa85c5fa6b7084e0cdc1b9
      • Instruction ID: a5cb610f12decfd1d7c19ca3b8eb8ae89cff26e48d34e1f68463e81f73022d68
      • Opcode Fuzzy Hash: bf06ae5918019cd186faeabdcf95a3eca333ee51cfaa85c5fa6b7084e0cdc1b9
      • Instruction Fuzzy Hash: B751CFB1E04228ABDB219F96EC459AFFBF9FF94700F60455FE011A2250C7794E01CBA9
      APIs
      • SelectObject.GDI32(?,?), ref: 0041C6E9
      • SetTextColor.GDI32(?,00000080), ref: 0041C6F3
      • lstrlenA.KERNEL32(?,?,751E5070,0041C161,?,?,00000000,?,?,?,?), ref: 0041C6FC
      • TextOutA.GDI32(?,?,?,?,00000000), ref: 0041C715
      • SetTextColor.GDI32(?,00000000), ref: 0041C726
      • MoveToEx.GDI32(?,00000000,?,00000000), ref: 0041C747
      • LineTo.GDI32(?,?,?), ref: 0041C75C
      • wsprintfA.USER32 ref: 0041C775
      • SelectObject.GDI32(?,?), ref: 0041C790
      • SetTextColor.GDI32(?,00808080), ref: 0041C7A0
      • TextOutA.GDI32(?,?,?,?,?), ref: 0041C7F6
      • SetTextColor.GDI32(?,00000000), ref: 0041C80D
      • SelectObject.GDI32(?,?), ref: 0041C835
      • SelectObject.GDI32(?,?), ref: 0041C866
      • SetTextColor.GDI32(?,00000000), ref: 0041C8B0
      • TextOutA.GDI32(?,00000000,?,?,?), ref: 0041C937
      • SetTextColor.GDI32(?,?), ref: 0041C95C
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Text$Color$ObjectSelect$LineMovelstrlenwsprintf
      • String ID:
      • API String ID: 2827444756-0
      • Opcode ID: c37553a410788ad529cce8f1ae87cb2851dd7232fcff5e18a76f528f0d667a3b
      • Instruction ID: ccf717027397931fe39301c1cfef318ffdf5eb5095be8366e25a64bd9951c44d
      • Opcode Fuzzy Hash: c37553a410788ad529cce8f1ae87cb2851dd7232fcff5e18a76f528f0d667a3b
      • Instruction Fuzzy Hash: C4C10171600109EFDF159FA4CD88DAEBBB6FF08344B144069F98596260C736EDA1DFA4
      APIs
      • SelectObject.GDI32(?,00000000), ref: 00425315
      • SelectObject.GDI32(?,?), ref: 00425320
      • GetTextMetricsA.GDI32(?,?), ref: 0042532C
      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00425355
      • TextOutA.GDI32(?,00000000), ref: 0042538D
      • SetTextAlign.GDI32(?,00000006), ref: 004253A8
      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 004253AD
      • TextOutA.GDI32(?,00000000), ref: 004253EE
      • SetTextAlign.GDI32(?,00000000), ref: 004253F7
      • SetTextAlign.GDI32(?,00000002), ref: 00425408
      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 0042540D
      • TextOutA.GDI32(?,00000000), ref: 00425446
      • SetTextAlign.GDI32(?,00000000), ref: 0042544F
      • SelectObject.GDI32(00000000,00000000), ref: 0042546E
      • SelectObject.GDI32(?,?), ref: 00425474
      • DeleteObject.GDI32(00000000), ref: 0042547F
      • DeleteObject.GDI32(00000000), ref: 00425484
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Text$Object$AlignSelect$lstrlen$Delete$Metrics
      • String ID:
      • API String ID: 3220575052-0
      • Opcode ID: 026936b2c214f907f64c630d94bc111119127e4da2fd46c056303ad521412fad
      • Instruction ID: 040977616e85c5dc81fcf48d798b33672e0b02798d3005b60c5682c405e9d253
      • Opcode Fuzzy Hash: 026936b2c214f907f64c630d94bc111119127e4da2fd46c056303ad521412fad
      • Instruction Fuzzy Hash: 9C6156B1900219FFDF11AFA4DC44AAEBF79FF08314F00945AF955A6161C3399960DFA4
      APIs
      • __EH_prolog.LIBCMT ref: 00413134
        • Part of subcall function 00412D66: __EH_prolog.LIBCMT ref: 00412D6B
      • _lcreat.KERNEL32(00000000,00000000), ref: 004131DC
      • LoadStringA.USER32(00001A4E,00000000,00000100), ref: 0041320C
      • MessageBoxA.USER32(?,?,00000000,00000000), ref: 0041321F
      • LoadCursorA.USER32(00000000,00007F02), ref: 00413239
      • SetCursor.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00413240
      • _hwrite.KERNEL32(00437AD8,?,?), ref: 00413284
      • LoadCursorA.USER32(00000000,?), ref: 004132A5
      • SetCursor.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004132AC
      • _lclose.KERNEL32(00437AD8), ref: 004132DE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$Load$H_prolog$MessageString_hwrite_lclose_lcreat
      • String ID: $uC$QAA$XML$xml
      • API String ID: 2483342114-55689072
      • Opcode ID: c36d8f33dc90289c73cd4a63ca794faa3e9a8c9bdf027c31a09bf46383bfa1b7
      • Instruction ID: 5db12b73e01885e2e35476b4ab30db883e22f0c8aa02d947a8bdf4df18fb3de9
      • Opcode Fuzzy Hash: c36d8f33dc90289c73cd4a63ca794faa3e9a8c9bdf027c31a09bf46383bfa1b7
      • Instruction Fuzzy Hash: FE516FB1904219AEDB12AFA5EC469EEBB74FF08308F10416EF54472191CB790A50DB69
      APIs
      • SetEvent.KERNEL32(?), ref: 0042818C
      • ResetEvent.KERNEL32(?), ref: 0042819C
        • Part of subcall function 00427F30: SetEvent.KERNEL32(?), ref: 00427F42
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Event$Reset
      • String ID: Closing connection...$Connected to server: %s$Connecting to server: %s$Connection closed$Name resolved: %s$Receiving response...$Redirected: %s$Request sent$Resolving name: %s$Response received$Sending request...
      • API String ID: 926831536-1001971985
      • Opcode ID: 0e71bb2c99253dc93235dddde105b4b4895623fbd705bd72109f34d4453b29eb
      • Instruction ID: 9da0cb78b6b988e8dca5bcba4910bf5fbd83613957a2a1234452315cacaad0f5
      • Opcode Fuzzy Hash: 0e71bb2c99253dc93235dddde105b4b4895623fbd705bd72109f34d4453b29eb
      • Instruction Fuzzy Hash: 8A21E632386A34E6DA310EA8BA0DA3E3650F701700FF4464FF501556D6CDBD9933AA6E
      APIs
      • GetTempPathA.KERNEL32(00000104,?), ref: 004057FF
      • GetTempFileNameA.KERNEL32(?,~eh,00000000,00000000), ref: 00405824
        • Part of subcall function 00429610: DeleteFileA.KERNELBASE(?,00403B78,?,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00429614
        • Part of subcall function 00429610: GetLastError.KERNEL32(?,00000000,?,00000000,00000000,0042A789,00000000), ref: 0042961E
      • lstrcatA.KERNEL32(?,\viewhelp.hlp), ref: 00405852
      • FindResourceA.KERNEL32(00000FB7,BININC), ref: 00405868
      • SizeofResource.KERNEL32(00000000), ref: 00405877
      • LoadResource.KERNEL32(00000000), ref: 00405887
      • LockResource.KERNEL32(00000000), ref: 00405891
      • _lcreat.KERNEL32(?,00000000), ref: 004058A4
      • _hwrite.KERNEL32(00000000,00000000,?), ref: 004058B1
      • _lclose.KERNEL32(00000000), ref: 004058B8
      • FreeResource.KERNEL32(?), ref: 004058C1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Resource$FileTemp$DeleteErrorFindFreeLastLoadLockNamePathSizeof_hwrite_lclose_lcreatlstrcat
      • String ID: BININC$\viewhelp.hlp$~eh
      • API String ID: 3757150938-2111237349
      • Opcode ID: d387f53957bc613beb618b68f1b97a07e346e02b4aa38e34aa4e4e1957720b53
      • Instruction ID: 8061c85e01139017e390883415c01a312aaf2cc0ccd9768a4c7d4a3c751c8ee5
      • Opcode Fuzzy Hash: d387f53957bc613beb618b68f1b97a07e346e02b4aa38e34aa4e4e1957720b53
      • Instruction Fuzzy Hash: 48215BB2504208FFDB216FB4EC4AE9B7BBDFB49301F00547AF592A2261DBB51950DB18
      APIs
      • GetWindowRect.USER32(?,?), ref: 00415C26
      • OffsetRect.USER32(?,?,?), ref: 00415C3C
      • GetDC.USER32(?), ref: 00415C48
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000070), ref: 004251C6
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000071), ref: 004251CE
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 004251D8
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000008), ref: 004251DF
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 004251E7
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 004251F8
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000000A), ref: 004251FF
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 00425207
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 00425218
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 00425223
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 00425233
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 00425241
        • Part of subcall function 004251B1: __ftol.LIBCMT ref: 00425260
        • Part of subcall function 004251B1: __ftol.LIBCMT ref: 0042527B
        • Part of subcall function 004251B1: SetRect.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00425288
      • GetSystemMetrics.USER32(00000003), ref: 00415C7B
      • GetSystemMetrics.USER32(00000003), ref: 00415C97
      • SetScrollRange.USER32(00000000,00000001,00000000,?,00000001), ref: 00415CC3
      • SetScrollPos.USER32(?,00000001,00000000,00000001), ref: 00415CD1
      • GetSystemMetrics.USER32(00000002), ref: 00415CE0
      • GetSystemMetrics.USER32(00000002), ref: 00415CFE
      • SetScrollRange.USER32(?,00000000,00000000,?,00000001), ref: 00415D23
      • SetScrollPos.USER32(?,00000000,00000000,00000001), ref: 00415D2F
      • OffsetRect.USER32(?,?,?), ref: 00415D8F
      • __ftol.LIBCMT ref: 00415DA1
      • ReleaseDC.USER32(?,?), ref: 00415DBB
      • GetClientRect.USER32(?,?), ref: 00415DCD
      • InvalidateRect.USER32(?,?,00000001), ref: 00415DDB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice$Rect$MetricsScrollSystem$__ftol$OffsetRange$ClientInvalidateReleaseWindow
      • String ID:
      • API String ID: 2336511427-0
      • Opcode ID: 0c4ffa5e758ee966805b9285d8fcaa85fd0184d84fb296698e8c2918906d2328
      • Instruction ID: a5b95174432240b8b3e253331b135cc095a1aa5e7ce80584f7e368a7bc8fd308
      • Opcode Fuzzy Hash: 0c4ffa5e758ee966805b9285d8fcaa85fd0184d84fb296698e8c2918906d2328
      • Instruction Fuzzy Hash: 2351487160060AEFEB20DFB8CD89FEBBBB9EF44300F01055DE59AA6090DB71A951CB54
      APIs
      • CreateCompatibleDC.GDI32(?), ref: 00407E1B
      • CreateCompatibleDC.GDI32(?), ref: 00407E22
      • SetTextAlign.GDI32(?,00000000), ref: 00407E2B
      • SetTextColor.GDI32(?,00000000), ref: 00407E36
      • GetSysColor.USER32(0000000F), ref: 00407E3E
      • SetBkColor.GDI32(?,00000000), ref: 00407E48
      • SelectObject.GDI32(00000000,?), ref: 00407E56
      • BitBlt.GDI32(?,?,?,0000000C,0000000C,00000000,00000000,00000000,008800C6), ref: 00407E79
      • SelectObject.GDI32(00000000,?), ref: 00407E84
      • BitBlt.GDI32(?,?,?,0000000C,0000000C,00000000,00000000,00000000,00660046), ref: 00407EA7
      • lstrlenA.KERNEL32(?), ref: 00407EB1
      • TextOutA.GDI32(?,?,?,?,00000000), ref: 00407ECC
      • SelectObject.GDI32(00000000,?), ref: 00407ED7
      • SelectObject.GDI32(00000000,0043CBB0), ref: 00407EDE
      • DeleteDC.GDI32(00000000), ref: 00407EE7
      • DeleteDC.GDI32(00000000), ref: 00407EEA
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$ColorText$CompatibleCreateDelete$Alignlstrlen
      • String ID:
      • API String ID: 1840064652-0
      • Opcode ID: 743870f9f7ffb7350370d919c4362007d7c22cdf2152485cf9f4788e75e2ed31
      • Instruction ID: 12e35cb120f04205a42c445f84f6ac682e9fc988de9aa44ae05a1a5f146908ce
      • Opcode Fuzzy Hash: 743870f9f7ffb7350370d919c4362007d7c22cdf2152485cf9f4788e75e2ed31
      • Instruction Fuzzy Hash: 4D415E71508300AFE7209F14DC44F67BBB9FF48744F244969F586AB2A2C736AC068BA5
      APIs
      • GetWindowLongA.USER32(?,00000008), ref: 00402ADF
      • IsDlgButtonChecked.USER32(?,00000409), ref: 00402B26
      • IsDlgButtonChecked.USER32(?,00000408), ref: 00402B3A
      • IsDlgButtonChecked.USER32(?,000003F4), ref: 00402B4E
      • IsDlgButtonChecked.USER32(?,0000042E), ref: 00402BAF
      • IsDlgButtonChecked.USER32(?,0000042F), ref: 00402BC3
      • EndDialog.USER32(?,00000001), ref: 00402BD4
      • GetParent.USER32(?), ref: 00402BE2
      • SetWindowLongA.USER32(?,00000008,?), ref: 00402BF8
      • CheckDlgButton.USER32(?,00000409,?), ref: 00402C16
      • CheckDlgButton.USER32(?,00000408,?), ref: 00402C2A
      • CheckRadioButton.USER32(?,000003F4,000003F7,?), ref: 00402C47
      • CheckDlgButton.USER32(?,0000042E,?), ref: 00402C5F
      • CheckDlgButton.USER32(?,0000042F,?), ref: 00402C73
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Button$CheckChecked$LongWindow$DialogParentRadio
      • String ID:
      • API String ID: 1571229196-0
      • Opcode ID: e826e94c418414652f907fb115532933dcbd00bd55324dea295e742eb101d5da
      • Instruction ID: 62329dda35ad1ec153886648e45f8e56960f1ada57f075b1b3a8c6356c467a2f
      • Opcode Fuzzy Hash: e826e94c418414652f907fb115532933dcbd00bd55324dea295e742eb101d5da
      • Instruction Fuzzy Hash: 004177B1644309BFE7149F34CD49FE677ACFB08700F044476BB49AB2D1DAB8A8419BA4
      APIs
      • lstrcpyA.KERNEL32(?,?,00000000,?,00000008,?,?,?,?,00000000,?,?,?,?,?,004157C5), ref: 00423F29
      • GetPrinterA.WINSPOOL.DRV(00000000,00000002,00000000,00000000,?,?,?,?,?,?,004157C5,?,?,00000000), ref: 00423F3A
      • GetPrinterA.WINSPOOL.DRV(00000000,00000002,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?,?,?,?,?,004157C5), ref: 00423F57
      • GetLastError.KERNEL32 ref: 00423F6A
      • GlobalUnlock.KERNEL32(00000000), ref: 00423F85
      • GlobalFree.KERNEL32(00000002), ref: 00423F92
      • DeviceCapabilitiesA.WINSPOOL.DRV(00000000,?,0000000B,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?), ref: 00423FBF
      • DeviceCapabilitiesA.WINSPOOL.DRV(00000001,?,00000001,00000000,00000000,?,?,?,?,?,004157C5,?,?,00000000), ref: 00423FCB
      • DeviceCapabilitiesA.WINSPOOL.DRV(00000007,?,00000007,00000000,00000000,?,?,?,?,?,004157C5,?,?,00000000), ref: 00423FE6
      • DeviceCapabilitiesA.WINSPOOL.DRV(00000012,?,00000012,00000000,00000000,?,?,?,?,?,004157C5,?,?,00000000), ref: 00424011
      • DeviceCapabilitiesA.WINSPOOL.DRV(00000016,?,00000016,00000000,00000000,?,?,?,?,?,004157C5,?,?,00000000), ref: 0042403D
      • DocumentPropertiesA.WINSPOOL.DRV(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,004157C5,?,?,00000000), ref: 00424060
      • GlobalAlloc.KERNEL32(00000042,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,004157C5,?,?), ref: 0042406C
      • GlobalLock.KERNEL32(00000000,?,?,?,?,?,004157C5,?,?,00000000), ref: 00424075
      • DocumentPropertiesA.WINSPOOL.DRV(00000000,00000000,00000000,00000000,00000000,00000002,?,?,?,?,?,004157C5,?,?,00000000), ref: 0042409C
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapabilitiesDevice$Global$DocumentPrinterProperties$AllocErrorFreeLastLockUnlocklstrcpy
      • String ID:
      • API String ID: 564296290-0
      • Opcode ID: ec6995a2a3b92ace4afa875e852458d0071410c0afedda6bf9cec7282132193b
      • Instruction ID: 0b3d78b63394f3326d9f17508e8b1788662855d8580b5a0b6ec0937a34edafa1
      • Opcode Fuzzy Hash: ec6995a2a3b92ace4afa875e852458d0071410c0afedda6bf9cec7282132193b
      • Instruction Fuzzy Hash: 8161AE71A00219EFCF228F51EC45EAB7BB5FF88700F50806AFA049B260C7799991DF64
      APIs
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004254E5
      • CreateFontA.GDI32(?,?,?,?,?,?,?,?,?,?,?,00424C59,?,?), ref: 004254F2
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00425510
      • __ftol.LIBCMT ref: 00425524
      • CreateFontA.GDI32(00000000,?,?,?,?,?,?,?,?,?,?,00424C59,?,?), ref: 0042552A
      • SelectObject.GDI32(?,?), ref: 00425539
      • lstrlenA.KERNEL32(?,?), ref: 0042554E
      • GetTextExtentPointA.GDI32(?,?,00000000), ref: 0042555B
      • lstrlenA.KERNEL32(?,?), ref: 0042556D
      • GetTextExtentPointA.GDI32(?,?,00000000), ref: 0042557A
      • lstrlenA.KERNEL32(?,?), ref: 0042558C
      • GetTextExtentPointA.GDI32(?,?,00000000), ref: 00425599
      • SelectObject.GDI32(?,?), ref: 004255A5
      • DeleteObject.GDI32(?), ref: 004255E5
      • DeleteObject.GDI32(?), ref: 004255F0
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$ExtentPointTextlstrlen$CapsCreateDeleteDeviceFontSelect$__ftol
      • String ID:
      • API String ID: 2432609737-0
      • Opcode ID: 092537acc6b95a41e6f62ff6ff07cf5cab0fd3c62867a36c3ab7bdeffce1519a
      • Instruction ID: ba7b4a8b3251d1563631fb66c3886072b01a3a7a90e8f038e2f22817f73fc5b5
      • Opcode Fuzzy Hash: 092537acc6b95a41e6f62ff6ff07cf5cab0fd3c62867a36c3ab7bdeffce1519a
      • Instruction Fuzzy Hash: 71512571A01129EFCF159FA9DC498EE7FB9FF08310F508166FA09A6260C7309950DF94
      APIs
      • GetDeviceCaps.GDI32(?,00000070), ref: 004251C6
      • GetDeviceCaps.GDI32(?,00000071), ref: 004251CE
      • GetDeviceCaps.GDI32(?,00000058), ref: 004251D8
      • GetDeviceCaps.GDI32(?,00000008), ref: 004251DF
      • GetDeviceCaps.GDI32(?,00000058), ref: 004251E7
      • GetDeviceCaps.GDI32(?,0000005A), ref: 004251F8
      • GetDeviceCaps.GDI32(?,0000000A), ref: 004251FF
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00425207
      • GetDeviceCaps.GDI32(?,00000058), ref: 00425218
      • GetDeviceCaps.GDI32(?,00000058), ref: 00425223
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00425233
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00425241
      • __ftol.LIBCMT ref: 00425260
      • __ftol.LIBCMT ref: 0042527B
      • SetRect.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00425288
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice$__ftol$Rect
      • String ID:
      • API String ID: 1629992435-0
      • Opcode ID: d300e145ff3e847a4a56723d3578cee4c6f066ebe1dbf33598ba7999064cc0f7
      • Instruction ID: 0b257455a3ffcf16e9d6c16a8bcac9f05029ff1ba85f9534597f075744d7ba5a
      • Opcode Fuzzy Hash: d300e145ff3e847a4a56723d3578cee4c6f066ebe1dbf33598ba7999064cc0f7
      • Instruction Fuzzy Hash: 32314670B003187BDB149F79CC45B6E7FF9EF45701F105026BA05E61E1DAB499548F80
      APIs
      • __EH_prolog.LIBCMT ref: 00412F60
      • LoadCursorA.USER32(00000000,00007F02), ref: 0041305B
      • SetCursor.USER32(00000000), ref: 00413062
      • CopyFileA.KERNEL32(?,00000000,00000000), ref: 004130BB
      • MessageBoxA.USER32(?,00000000,00000000), ref: 004130D0
      • LoadCursorA.USER32(00000000,00007F00), ref: 004130DC
      • SetCursor.USER32(00000000), ref: 004130E3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$Load$CopyFileH_prologMessage
      • String ID: .exe$.ptx$E-Transcript$QAA$ptx
      • API String ID: 289754539-245839904
      • Opcode ID: 00fe2a13d27fcdcb5a82e2e7a2e4a34c805cad06f15a701202ed7a1410b938eb
      • Instruction ID: f5477b3f0f7b9b5ba19a5e115c8a98553a1d80041f2c7e1200364890c5f9b007
      • Opcode Fuzzy Hash: 00fe2a13d27fcdcb5a82e2e7a2e4a34c805cad06f15a701202ed7a1410b938eb
      • Instruction Fuzzy Hash: E941F772A05215BEDB15AFB1AC46DEF7BA8EF09744F10406FF400A21C1DA794E94CBAD
      APIs
      • GetParent.USER32(?), ref: 004135E1
      • GetWindowLongA.USER32(?,00000008), ref: 004135EE
      • GetDlgItem.USER32(00000000,00000470), ref: 00413624
      • SendMessageA.USER32(00000000), ref: 00413627
      • GetDlgItem.USER32(00000000,0000047C), ref: 00413636
      • IsWindowVisible.USER32(00000000), ref: 00413639
      • GetDlgItemTextA.USER32(00000000,0000047C,?,00000104), ref: 0041365B
      • lstrcpyA.KERNEL32(00000000,.exe), ref: 0041368E
      • SetDlgItemTextA.USER32(00000000,0000047C,?), ref: 0041369F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$TextWindow$LongMessageParentSendVisiblelstrcpy
      • String ID: .exe$.ptx$N
      • API String ID: 1615166204-2053508879
      • Opcode ID: 0f6509b9d2162ae89601cf4a7000b984d5b6f18018abb6a717c70218fe7c5602
      • Instruction ID: ae8ddf97aff42a4b5ec22b0f42b8bdad17ad67bf4480ef262c1f420b3647cadb
      • Opcode Fuzzy Hash: 0f6509b9d2162ae89601cf4a7000b984d5b6f18018abb6a717c70218fe7c5602
      • Instruction Fuzzy Hash: 7E2199B1544308FBEF309F60DC49BDA3BACEB14715F109055FA85A6190C7788A80DF58
      APIs
      • GetDeviceCaps.GDI32(?,0000005A), ref: 0042437A
      • __ftol.LIBCMT ref: 0042438D
      • CreateFontA.GDI32(00000000), ref: 00424393
      • SelectObject.GDI32(?,00000000), ref: 004243A5
      • GetTextMetricsA.GDI32(?,?), ref: 004243B1
      • SelectObject.GDI32(?,?), ref: 004243BD
      • DeleteObject.GDI32(?), ref: 0042440C
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0042442B
      • __ftol.LIBCMT ref: 0042443F
      • CreateFontA.GDI32(00000000), ref: 00424445
      • SelectObject.GDI32(?,00000000), ref: 0042445A
      • GetTextMetricsA.GDI32(00000000,00001FFF), ref: 00424466
      • SelectObject.GDI32(00000000,?), ref: 00424472
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Select$CapsCreateDeviceFontMetricsText__ftol$Delete
      • String ID:
      • API String ID: 414540973-0
      • Opcode ID: 11e630ff0be1bf7c8dac9a0cb3ec7d327cfe411d7be4efbb06315e3f2c253e4d
      • Instruction ID: 5ab5940efb1c77819722d37c0d245fca02efa066f53940e958e84d62726a1437
      • Opcode Fuzzy Hash: 11e630ff0be1bf7c8dac9a0cb3ec7d327cfe411d7be4efbb06315e3f2c253e4d
      • Instruction Fuzzy Hash: 5D414471200219EFDF21AF61EC099DE7FB9FF48364F424229F948A6260C7319861CFA4
      APIs
      • SelectPalette.GDI32(?,00000000), ref: 0041C0D3
      • RealizePalette.GDI32(?), ref: 0041C0DD
      • CreatePen.GDI32(00000000,00000001,00000000), ref: 0041C0F4
      • SelectObject.GDI32(?,00000000), ref: 0041C105
      • SelectObject.GDI32(?,?), ref: 0041C10E
      • GetTextMetricsA.GDI32(?,?), ref: 0041C118
      • GetClientRect.USER32(?,?), ref: 0041C125
      • GetStockObject.GDI32(00000000), ref: 0041C12D
      • FillRect.USER32(?,?,00000000), ref: 0041C139
        • Part of subcall function 0041C1C1: CreateFontA.GDI32(00000090,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000012,Times New Roman), ref: 0041C22D
        • Part of subcall function 0041C1C1: SelectObject.GDI32(?,00000000), ref: 0041C240
        • Part of subcall function 0041C1C1: GetTextMetricsA.GDI32(?,?), ref: 0041C24F
        • Part of subcall function 0041C1C1: SelectObject.GDI32(?,?), ref: 0041C25B
        • Part of subcall function 0041C1C1: SelectObject.GDI32(?,?), ref: 0041C26B
        • Part of subcall function 0041C1C1: GetTextMetricsA.GDI32(?,?), ref: 0041C277
        • Part of subcall function 0041C1C1: SelectObject.GDI32(?,?), ref: 0041C283
        • Part of subcall function 0041C1C1: SetBkMode.GDI32(?,00000001), ref: 0041C28A
      • SelectPalette.GDI32(?,00000000,00000001), ref: 0041C19F
      • SelectObject.GDI32(?,?), ref: 0041C1A9
      • SelectObject.GDI32(?,?), ref: 0041C1AF
      • DeleteObject.GDI32(?), ref: 0041C1B4
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$MetricsPaletteText$CreateRect$ClientDeleteFillFontModeRealizeStock
      • String ID:
      • API String ID: 1328710672-0
      • Opcode ID: 0edcf21d4a33b2af0069cebb717d7df16684823be1a18f773de713fe441d1c2b
      • Instruction ID: 341e597bceb0c826d6bfd4c072fd7dd45564d6cbba575cc4f18e11a816148989
      • Opcode Fuzzy Hash: 0edcf21d4a33b2af0069cebb717d7df16684823be1a18f773de713fe441d1c2b
      • Instruction Fuzzy Hash: 34310BB1940208FFDB249FA5CC88EAEBBBDFF48301F10546AF54696261D735AA40CF64
      APIs
      • GetWindowLongA.USER32(?,00000008), ref: 00423C93
      • IsDlgButtonChecked.USER32(?,00001A75), ref: 00423CB4
      • IsDlgButtonChecked.USER32(?,00001A80), ref: 00423CC4
      • IsDlgButtonChecked.USER32(?,00000411), ref: 00423CD4
      • GetDlgItemInt.USER32(?,00000482,00000000,00000000), ref: 00423CE6
      • SetWindowLongA.USER32(?,00000008,?), ref: 00423D03
      • CheckDlgButton.USER32(?,00001A75,?), ref: 00423D27
      • CheckDlgButton.USER32(?,00001A80,?), ref: 00423D37
      • GetDlgItem.USER32(?,0000043E), ref: 00423D41
      • GetClientRect.USER32(00000000,?), ref: 00423D4E
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000088,00000030,00000006), ref: 00423D61
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Button$CheckedWindow$CheckItemLong$ClientRect
      • String ID:
      • API String ID: 1193344014-0
      • Opcode ID: 15bcf9d2e7a9e07156967ebd8b91076a136c79b5158892fafb142bd5f4be1f85
      • Instruction ID: e3df07052ca5829c0ffd7f260aa397de357a9076b5737e6fd197f82f7a261cb7
      • Opcode Fuzzy Hash: 15bcf9d2e7a9e07156967ebd8b91076a136c79b5158892fafb142bd5f4be1f85
      • Instruction Fuzzy Hash: 2E3193B1244718BFEB216F60DC49DEA3FB9FB04791F404025FE855A1A0CB749E51EB98
      APIs
      • CreateDialogParamA.USER32(000002A4,?,00416C18,00000000,00000001), ref: 004167F2
      • SetWindowTextA.USER32(00000000,?), ref: 004167FE
        • Part of subcall function 00416C80: CreateWindowExA.USER32(00000000,ProgressBar,00444FE8,40800000,00000000,00000000,00000064,0000000A,00000000,00000000,00000000,0041680A), ref: 00416CA4
      • SetWindowLongA.USER32(00000000,00000008,00000000), ref: 00416821
      • GetClientRect.USER32(00000000,?), ref: 0041682C
        • Part of subcall function 00416CAB: GetDC.USER32(00000001), ref: 00416CB7
        • Part of subcall function 00416CAB: GetStockObject.GDI32(0000000C), ref: 00416CC1
        • Part of subcall function 00416CAB: SelectObject.GDI32(00000000,00000000), ref: 00416CCF
        • Part of subcall function 00416CAB: GetTextMetricsA.GDI32(00000000,?), ref: 00416CD8
        • Part of subcall function 00416CAB: SelectObject.GDI32(00000000,00000000), ref: 00416CE0
        • Part of subcall function 00416CAB: ReleaseDC.USER32(00000001,00000000), ref: 00416CE6
      • MoveWindow.USER32(00000000,0000000D,0000000D,?,00000000,00000001), ref: 00416848
      • GetWindowRect.USER32(00000000,?), ref: 00416857
      • ScreenToClient.USER32(00000000,?), ref: 00416868
      • ScreenToClient.USER32(00000000,?), ref: 0041686F
      • GetDlgItem.USER32(00000000,00000002), ref: 00416877
      • ShowWindow.USER32(00000000), ref: 0041687E
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000006), ref: 00416894
      • ShowWindow.USER32(00000000,00000005), ref: 0041689D
      • EnableWindow.USER32(?,00000000), ref: 004168A8
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$ClientObject$CreateRectScreenSelectShowText$DialogEnableItemLongMetricsMoveParamReleaseStock
      • String ID:
      • API String ID: 2661066160-0
      • Opcode ID: bb838de29b57716b4f365bb420b6d019c17c893efce7c3751de21d1ea97a4988
      • Instruction ID: bad35cc999d98f5015c273db8bf913a3cf941fd92d73c7ddfbc3c4fdbf35ac52
      • Opcode Fuzzy Hash: bb838de29b57716b4f365bb420b6d019c17c893efce7c3751de21d1ea97a4988
      • Instruction Fuzzy Hash: B521B2B2204208BFE7216FA0DC8AFEF3BACEF05715F000025FE4196191D7749901DB68
      APIs
      • lstrlenA.KERNEL32(00425686,?,751E6BA0,?,&MB,00425686,?,?), ref: 004256C2
      • wsprintfA.USER32 ref: 004256FA
      • lstrcatA.KERNEL32(00000000,00425686,?,751E6BA0,?,&MB,00425686), ref: 00425709
      • __ftol.LIBCMT ref: 00425718
      • GetTextAlign.GDI32(?), ref: 0042573D
      • SetTextAlign.GDI32(?,00000008), ref: 0042579B
      • lstrlenA.KERNEL32(?), ref: 004257A0
      • TextOutA.GDI32(?,00000000), ref: 004257D8
      • SetTextAlign.GDI32(?,?), ref: 004257E2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Text$Align$lstrlen$__ftollstrcatwsprintf
      • String ID: &MB$Page %d
      • API String ID: 3812932771-3192165671
      • Opcode ID: 0c7e8d1d21fc2f61d08a37514f71001cb0c667218290739cd32bf55dde9566cb
      • Instruction ID: 6f200f62604ca965986fa25c5e90bfecd7df350c7f9a23ac0d89f4c41ab57567
      • Opcode Fuzzy Hash: 0c7e8d1d21fc2f61d08a37514f71001cb0c667218290739cd32bf55dde9566cb
      • Instruction Fuzzy Hash: 93412672204615EFCB204F24EC49AAF3BB8FF88324F55411AFD5952250D7789C11DF99
      APIs
      • EndDialog.USER32(?,00000001), ref: 004037DF
      • GetParent.USER32(?), ref: 004037EE
      • SetDlgItemTextA.USER32(?,00000406,Version 5.0 (Build 5.0.0.241)), ref: 0040380E
      • GetDlgItem.USER32(?,0000041F), ref: 00403824
      • ShowWindow.USER32(00000000), ref: 0040382B
      • SetDlgItemTextA.USER32(?,0000040C,?), ref: 00403838
      Strings
      • Version 5.0 (Build 5.0.0.241), xrefs: 00403803
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$Text$DialogParentShowWindow
      • String ID: Version 5.0 (Build 5.0.0.241)
      • API String ID: 4122412837-1328025431
      • Opcode ID: 81df99500b43e2bd1d03d8d61752c38d07b79a942647ea9fad55a8acf3a6d9ad
      • Instruction ID: 51c09e2c9ec49d48eee0688086f2fb9f45cecc320d641cc3e5ec1135a186865c
      • Opcode Fuzzy Hash: 81df99500b43e2bd1d03d8d61752c38d07b79a942647ea9fad55a8acf3a6d9ad
      • Instruction Fuzzy Hash: 22216DB2504109BBEB11AFA49C89EBF3BBCEB05701F00406AFE41F6191D778D901EB69
      APIs
      • SendMessageA.USER32(00000000,0000043C,00000000,00447224), ref: 00428F85
      • MessageBoxA.USER32(00000000,No OLE interface!,00000000,00000000), ref: 00428F93
      • DestroyWindow.USER32(?,?,?,?), ref: 00428FA2
      • MessageBoxA.USER32(00000000,No Storage!,00000000,00000000), ref: 00428FE0
      • DestroyWindow.USER32(00000000,?,?,?), ref: 00428FEF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Message$DestroyWindow$Send
      • String ID: No OLE interface!$No Storage!$No callback object!
      • API String ID: 2941936996-2742020762
      • Opcode ID: b3e9351e4a16e4b710579b0b209128ecb8de58b26d5eaa7adc9232f9adc55ede
      • Instruction ID: a100ff8c7f993d5c3f6a56220065350773848748251f5e44a0638a5726fa5dcb
      • Opcode Fuzzy Hash: b3e9351e4a16e4b710579b0b209128ecb8de58b26d5eaa7adc9232f9adc55ede
      • Instruction Fuzzy Hash: A2310AB8784200AFE710DF78ED85F9677E9AB4D704F10486AF804DB3A0CB74A841DB58
      APIs
      • GetPropA.USER32(?,DlgKeyProc), ref: 00426B97
      • GetWindowLongA.USER32(?,000000F4), ref: 00426BAE
      • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00426BC5
      • GetParent.USER32(?), ref: 00426BD0
      • SendDlgItemMessageA.USER32(00000000), ref: 00426BD7
      • GetWindowLongA.USER32(?,000000F4), ref: 00426BE2
      • GetParent.USER32(?), ref: 00426BFA
      • SendDlgItemMessageA.USER32(00000000), ref: 00426C01
      • SendMessageA.USER32(?,000000F4,00000001,00000001), ref: 00426C0B
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 00426C1E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$Window$ItemLongParent$CallProcProp
      • String ID: DlgKeyProc
      • API String ID: 3584994089-1425268092
      • Opcode ID: e0b08de99952cfbe3bef5a3f16ddad881fcbb36e8da00c533f09e0a8984efea6
      • Instruction ID: a49f2fbb3a9f93b409aed4cda880b13b12c46731a0167dc3f22d7a3c783d3f02
      • Opcode Fuzzy Hash: e0b08de99952cfbe3bef5a3f16ddad881fcbb36e8da00c533f09e0a8984efea6
      • Instruction Fuzzy Hash: DE1173B2204254BBD7301B66ECCCE9B3F2CFB85B61F141535FE65951A1CA398440EB78
      APIs
      • __EH_prolog.LIBCMT ref: 004093A1
      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 004093B9
      • lstrcatA.KERNEL32(?,\pnxetkey.dat), ref: 004093CB
      • _lopen.KERNEL32(?,00000011), ref: 004093DA
      • _lcreat.KERNEL32(?,00000000), ref: 004093F0
      • _llseek.KERNEL32(00000000,00000000,00000002), ref: 00409402
      • lstrcpyA.KERNEL32(?,?), ref: 0040940F
      • _hwrite.KERNEL32(00000000,?,00000010), ref: 00409455
      • _lclose.KERNEL32(00000000), ref: 0040945C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DirectoryH_prologWindows_hwrite_lclose_lcreat_llseek_lopenlstrcatlstrcpy
      • String ID: Invalid password.$\pnxetkey.dat
      • API String ID: 629292376-808593213
      • Opcode ID: 32223d4f8b2c6bb80f580ec1b655d209bef510204d0cb2b50b656b0524fa1261
      • Instruction ID: 02644b2fc5b040a5a2cf4de716e8784822419a78c4745abf4ad1778e079812bb
      • Opcode Fuzzy Hash: 32223d4f8b2c6bb80f580ec1b655d209bef510204d0cb2b50b656b0524fa1261
      • Instruction Fuzzy Hash: F9212C7280461DABCF20EBA0DC49FEDB77CBB08314F104666E655B31D1D7785A45CB68
      APIs
      • lstrcatA.KERNEL32(?,0043CB2C,?,00000000,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?,?), ref: 0042424D
      • lstrcpyA.KERNEL32(?,Printer cannot fulfill request for duplexing. Check printer settings through Control Panel: ",00000000,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?,?,?), ref: 00424233
        • Part of subcall function 004242A6: lstrcatA.KERNEL32(?,?,?,?,00000008,0042427D,?,00000001,?,00424306,00000000,00000000,?,00423395,?,?), ref: 004242BC
        • Part of subcall function 004242A6: lstrcatA.KERNEL32(?,Windows error code: ,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?), ref: 004242CB
        • Part of subcall function 004242A6: lstrlenA.KERNEL32(?,0000000A,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?), ref: 004242D0
      • lstrcpyA.KERNEL32(?,Could not access the selected printer: ,00000000,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?,?,?), ref: 0042426B
      • lstrcpyA.KERNEL32(?,An unknown problem was encountered while printing.Please check your printer configuration before trying again.,00000000,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?,?,?), ref: 00424295
      Strings
      • Could not get information for the selected printer: , xrefs: 00424263
      • Could not access the selected printer: , xrefs: 0042427F
      • An unknown problem was encountered while printing.Please check your printer configuration before trying again., xrefs: 0042428D
      • Could not create device context for the selected printer: , xrefs: 00424255
      • Printer cannot fulfill request for duplexing. Check printer settings through Control Panel: ", xrefs: 0042422B
      • Could not retrieve properties for the selected printer: , xrefs: 0042425C
      • There is no default printer.Please select a default printer before trying again., xrefs: 00424286
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcatlstrcpy$lstrlen
      • String ID: An unknown problem was encountered while printing.Please check your printer configuration before trying again.$Could not access the selected printer: $Could not create device context for the selected printer: $Could not get information for the selected printer: $Could not retrieve properties for the selected printer: $Printer cannot fulfill request for duplexing. Check printer settings through Control Panel: "$There is no default printer.Please select a default printer before trying again.
      • API String ID: 3791037945-3258598027
      • Opcode ID: b97472a1f79bd5ab3bc709651b2f32049b35809a58455a907c0549d1a902c4f9
      • Instruction ID: 03f82ad25f52303a30a52891a8092300a0dfb001286ead4ff868159ffd9eb721
      • Opcode Fuzzy Hash: b97472a1f79bd5ab3bc709651b2f32049b35809a58455a907c0549d1a902c4f9
      • Instruction Fuzzy Hash: 1F018431354238E6CF116B56FC15F6A3E11FB987C0FA450A7F409942A0C6A99841D6BD
      APIs
      • EndDialog.USER32(?,00000002), ref: 00407827
      • GetDlgItemTextA.USER32(?,000003E8,?,000000FF), ref: 00407841
      • GetWindowLongA.USER32(?,00000008), ref: 0040784A
      • EndDialog.USER32(?,00000001), ref: 0040789F
      • GetDlgItem.USER32(?,000003E8), ref: 004078B2
      • GetWindowTextLengthA.USER32(00000000), ref: 004078B5
      • GetDlgItem.USER32(?,00000001), ref: 004078C5
      • EnableWindow.USER32(00000000), ref: 004078C8
      • GetParent.USER32(?), ref: 004078D5
      • SetWindowLongA.USER32(?,00000008,?), ref: 004078F1
      • GetDlgItem.USER32(?,000003E8), ref: 004078FD
      • SetFocus.USER32(00000000), ref: 00407904
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ItemWindow$DialogLongText$EnableFocusLengthParent
      • String ID:
      • API String ID: 4141629138-0
      • Opcode ID: e5740bfe2a3d29cfa1c9aa2b6ba6342c0dc42924713fd53624468ee8ac3d6a85
      • Instruction ID: fea88311845ed8c3331738205e9d0832e5b1a74791e961f4ff371a91dbda9cb5
      • Opcode Fuzzy Hash: e5740bfe2a3d29cfa1c9aa2b6ba6342c0dc42924713fd53624468ee8ac3d6a85
      • Instruction Fuzzy Hash: 0731B8B1A48205BBEB216B74DC49FAB375CFF04701F044425FA46E61D1DA78E901D769
      APIs
      • LoadLibraryA.KERNEL32(?), ref: 004289CC
      • GetLastError.KERNEL32 ref: 004289D8
      • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 00428A0B
      • InterlockedExchange.KERNEL32(?,00000000), ref: 00428A1D
      • LocalAlloc.KERNEL32(00000040,00000008), ref: 00428A31
      • FreeLibrary.KERNEL32(00000000), ref: 00428A4E
      • GetProcAddress.KERNEL32(?,?), ref: 00428AAF
      • GetLastError.KERNEL32 ref: 00428ABB
      • RaiseException.KERNEL32(C06D007F,00000000,00000001,?), ref: 00428AED
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ErrorExceptionLastLibraryRaise$AddressAllocExchangeFreeInterlockedLoadLocalProc
      • String ID: $
      • API String ID: 991255547-3993045852
      • Opcode ID: 41eecfc474d57d30347f4751eadd9466f905363e9c37dd936cc3951ed87e3f19
      • Instruction ID: 4e8fcd1747a392daeef56547cb26cbff807dc2390ac49720ebf4b1f81848843b
      • Opcode Fuzzy Hash: 41eecfc474d57d30347f4751eadd9466f905363e9c37dd936cc3951ed87e3f19
      • Instruction Fuzzy Hash: B06159B5B012159FDB24CF98E880AAEB7F5AB58300B50802EE909E7350DFB4ED45CB59
      APIs
      • LCMapStringW.KERNEL32(00000000,00000100,004384E4,00000001,00000000,00000000,00000103,00000001,00000000,?,00432C63,00200020,00000000,?,00000000,00000000), ref: 0042F5E6
      • LCMapStringA.KERNEL32(00000000,00000100,004384E0,00000001,00000000,00000000,?,00432C63,00200020,00000000,?,00000000,00000000,00000001), ref: 0042F602
      • LCMapStringA.KERNEL32(?,?,?,?,c,C ,?,00000103,00000001,00000000,?,00432C63,00200020,00000000,?,00000000,00000000), ref: 0042F64B
      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00432C63,00200020,00000000,?,00000000,00000000), ref: 0042F683
      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00432C63,00200020,00000000,?,00000000), ref: 0042F6DB
      • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00432C63,00200020,00000000,?,00000000), ref: 0042F6F1
      • LCMapStringW.KERNEL32(?,?,?,00000000,c,C ,?,?,00432C63,00200020,00000000,?,00000000), ref: 0042F724
      • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00432C63,00200020,00000000,?,00000000), ref: 0042F78C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: String$ByteCharMultiWide
      • String ID: c,C
      • API String ID: 352835431-3652846715
      • Opcode ID: 72f36d60a6d2c84034f3f1747701f024d88e4efed3a95f5e4d112b0e98198997
      • Instruction ID: e32dc69c9671cbcdbcb10640ec50af657ca95fc296c381d37e97438666379813
      • Opcode Fuzzy Hash: 72f36d60a6d2c84034f3f1747701f024d88e4efed3a95f5e4d112b0e98198997
      • Instruction Fuzzy Hash: 82519C72600259BFCF218F54ED45AAFBBB5FB89740FA0413AF850A1260C3398C16DB69
      APIs
      • __EH_prolog.LIBCMT ref: 00409480
      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00409498
      • lstrcatA.KERNEL32(?,\pnxetkey.dat), ref: 004094AA
      • _lopen.KERNEL32(?,00000020), ref: 004094B9
      • _hread.KERNEL32(00000000,?,00000010), ref: 004094E7
      • _lclose.KERNEL32(00000000), ref: 0040954F
      • lstrcpyA.KERNEL32(00000000,?), ref: 00409562
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DirectoryH_prologWindows_hread_lclose_lopenlstrcatlstrcpy
      • String ID: Invalid password.$\pnxetkey.dat
      • API String ID: 2903039819-808593213
      • Opcode ID: 11cab952260e8ff0a96d4bf48d71f9f84189edd3b1406db242c1afbed9f0f71b
      • Instruction ID: 08a6bbcb9f20983b4f3ca6d4aac48a7c911f5427e6f5084c53ff7d228f7938e0
      • Opcode Fuzzy Hash: 11cab952260e8ff0a96d4bf48d71f9f84189edd3b1406db242c1afbed9f0f71b
      • Instruction Fuzzy Hash: 6E318C7290421DABDF11DBA1DC85EEEB37CBB08314F10452AF616B21D1D7789A46CB68
      APIs
      • DeleteObject.GDI32(?), ref: 00414A37
      • DeleteObject.GDI32(000000FF), ref: 00414A44
      • DeleteObject.GDI32(?), ref: 00414A51
      • CreateFontIndirectA.GDI32(?), ref: 00414AB4
      • CreateFontIndirectA.GDI32(?), ref: 00414AC4
      • lstrcpyA.KERNEL32(?,Arial,?,00000000,?,?,?,0040465D), ref: 00414AD2
      • CreateFontIndirectA.GDI32(?), ref: 00414B01
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CreateDeleteFontIndirectObject$lstrcpy
      • String ID: "$Arial$Courier New
      • API String ID: 3480263671-80687389
      • Opcode ID: ac3c6643e187f9982b36884cb111c3b3f35abd0f6d372a1ed13923ea5194315d
      • Instruction ID: ba082012dc07d1887c9b3f65399759ecdb24a0dacc16255ce6940463a892acba
      • Opcode Fuzzy Hash: ac3c6643e187f9982b36884cb111c3b3f35abd0f6d372a1ed13923ea5194315d
      • Instruction Fuzzy Hash: 493129B2D043589ADB05DFE9D885ACEBBF9AF58300F14445BE800F7292D7B898048F68
      APIs
        • Part of subcall function 0041CC69: GetDC.USER32(?), ref: 0041CC77
        • Part of subcall function 0041CC69: SelectObject.GDI32(00000000,?), ref: 0041CC89
        • Part of subcall function 0041CC69: GetTextMetricsA.GDI32(00000000,?), ref: 0041CC93
        • Part of subcall function 0041CC69: SelectObject.GDI32(00000000,?), ref: 0041CC9D
        • Part of subcall function 0041CC69: ReleaseDC.USER32(?,00000000), ref: 0041CCA3
      • ScrollWindow.USER32(?,00000000,?,00000000,00000000), ref: 0041D324
      • ScrollWindow.USER32(?,00000000,?,00000000,00000000), ref: 0041D35C
      • GetDC.USER32(?), ref: 0041D365
      • GetClientRect.USER32(?,?), ref: 0041D374
      • GetStockObject.GDI32(00000006), ref: 0041D37C
      • SelectObject.GDI32(00000000,00000000), ref: 0041D384
      • MoveToEx.GDI32(00000000,00000000,-00000001,00000000), ref: 0041D398
      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0041D3AE
      • LineTo.GDI32(00000000,0041D89C,?), ref: 0041D3C0
      • SelectObject.GDI32(00000000,00000001), ref: 0041D3CA
      • ReleaseDC.USER32(?,00000000), ref: 0041D3D0
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Select$MoveReleaseScrollWindow$ClientLineMetricsRectStockText
      • String ID:
      • API String ID: 2824592151-0
      • Opcode ID: 4b9d958f099fa5ff065021d68f029a852c315e61ac82fcc09a496e68de46ee08
      • Instruction ID: ef6513da22c04e324ec97ae149ba5bdf5b7b82c1bdd6099cfd5bba4f647d1530
      • Opcode Fuzzy Hash: 4b9d958f099fa5ff065021d68f029a852c315e61ac82fcc09a496e68de46ee08
      • Instruction Fuzzy Hash: FA515DB1A00609AFDB149F65CC889AFBBF9FF48310710956EF85AC7660DB34E981CB54
      APIs
      • FillRect.USER32(?,0041E984,?), ref: 00424532
      • GetDeviceCaps.GDI32(?,00000058), ref: 00424547
      • GetDeviceCaps.GDI32(?,00000058), ref: 00424551
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00424559
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00424563
      • __ftol.LIBCMT ref: 00424589
      • __ftol.LIBCMT ref: 0042459B
      • __ftol.LIBCMT ref: 004245AD
      • __ftol.LIBCMT ref: 004245BE
      • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 004245D2
      • FillRect.USER32(?,?,?), ref: 00424605
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice__ftol$Rect$Fill
      • String ID:
      • API String ID: 2525312796-0
      • Opcode ID: 8ebe54039b715d0932cf9d79e48d64c482fff485075102fd628c3f80e954a39c
      • Instruction ID: 671caa5031e7ad66a59f9b656ff71211a0358be7238f5132d4e408ea14dfb869
      • Opcode Fuzzy Hash: 8ebe54039b715d0932cf9d79e48d64c482fff485075102fd628c3f80e954a39c
      • Instruction Fuzzy Hash: F331C4B1E04109BFCB02AF51E8458EE7FF9FF00391B618845FA56A2161E73099A4DFD4
      APIs
      • _lopen.KERNEL32(?,00000020), ref: 004090FF
      • _llseek.KERNEL32(00000000,00000000,00000002), ref: 0040911E
      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00409125
      • GlobalLock.KERNEL32(00000000), ref: 0040912C
      • _llseek.KERNEL32(00000000,00000000,00000000), ref: 00409139
      • _hread.KERNEL32(00000000,00000000,00000000), ref: 0040913E
      • _lclose.KERNEL32(00000000), ref: 00409145
      • GlobalHandle.KERNEL32(00000000), ref: 0040915C
      • GlobalUnlock.KERNEL32(00000000), ref: 0040915F
      • GlobalHandle.KERNEL32(00000000), ref: 00409166
      • GlobalFree.KERNEL32(00000000), ref: 00409169
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$Handle_llseek$AllocFreeLockUnlock_hread_lclose_lopen
      • String ID:
      • API String ID: 1832429640-0
      • Opcode ID: 0a66339510434a3036e7f3f7b552dafaf9ef7b28daef536b6bb8735fc6c250a0
      • Instruction ID: 9d54758384bff08165c24f7a86e83a77af390a586e7a09bcf592ffb991273a1a
      • Opcode Fuzzy Hash: 0a66339510434a3036e7f3f7b552dafaf9ef7b28daef536b6bb8735fc6c250a0
      • Instruction Fuzzy Hash: FF01A1B32042057BE62067B49C4DF6B7BACDF8A761F000425F641963D1CB785C01962D
      APIs
      • __EH_prolog.LIBCMT ref: 0041E0ED
      • lstrlenA.KERNEL32(?), ref: 0041E12F
        • Part of subcall function 0041AC92: LoadCursorA.USER32(00000000,00007F02), ref: 0041ACA2
        • Part of subcall function 0041AC92: SetCursor.USER32(00000000,?,004184F0), ref: 0041ACA9
      • lstrcpyA.KERNEL32(?,?), ref: 0041E215
      • lstrlenA.KERNEL32(?), ref: 0041E302
      • GetParent.USER32(?), ref: 0041E597
      • MessageBoxA.USER32(00000000), ref: 0041E59E
      • SetCursor.USER32(?), ref: 0041E5C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$lstrlen$H_prologLoadMessageParentlstrcpy
      • String ID: 4}C$No more matches in this transcript.
      • API String ID: 2158622280-337844737
      • Opcode ID: e3933e0a9353b2019b75a5b7be2fc02e4f0224afdd83e382504b8e725e2d8efc
      • Instruction ID: 3515a9fd9b02753e221e3b902a804fb154ee1bc86befeb27103fd8d700130452
      • Opcode Fuzzy Hash: e3933e0a9353b2019b75a5b7be2fc02e4f0224afdd83e382504b8e725e2d8efc
      • Instruction Fuzzy Hash: 7502AD75900219EFCF04DFA5D890AEEBBB5BF08304F14406EF845A7291DB389E45CBA8
      APIs
      • GetDeviceCaps.GDI32(?,00000070), ref: 00422300
      • GetDeviceCaps.GDI32(?,00000071), ref: 00422307
      • GetDeviceCaps.GDI32(?,0000000A), ref: 0042230F
      • GetDeviceCaps.GDI32(?,00000008), ref: 00422315
      • SetRect.USER32(?,00000000,00000000,00000000), ref: 00422320
      • GetDeviceCaps.GDI32(?,00000058), ref: 00422329
      • GetDeviceCaps.GDI32(?,0000005A), ref: 00422331
      • MessageBoxA.USER32(00000000,The margins need to be adjusted for this document to print properlyWould you like them to be automatically adjusted?,00000000,00000004), ref: 004223C6
      Strings
      • The margins need to be adjusted for this document to print properlyWould you like them to be automatically adjusted?, xrefs: 004223BB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice$MessageRect
      • String ID: The margins need to be adjusted for this document to print properlyWould you like them to be automatically adjusted?
      • API String ID: 1536503368-1457703030
      • Opcode ID: 6805e2b4bb12f2735742023f628e817b627b9aad4684505a1ede3177f319d4d0
      • Instruction ID: c411e7e3ad33479ed00f6f9dbc5a01308d21ce15c864674253cdd3a233393345
      • Opcode Fuzzy Hash: 6805e2b4bb12f2735742023f628e817b627b9aad4684505a1ede3177f319d4d0
      • Instruction Fuzzy Hash: 40A10570E0161AEFCB14CFA9DA84AEEB7F5BF48318F50402EE805E7250D778AA41CB54
      APIs
      • lstrcpyA.KERNEL32(?,00000008,00000000,?,00000008,?,?,?,00423379,?,00000008,00000000), ref: 00423DC2
      • OpenPrinterA.WINSPOOL.DRV(00000008,00000000,00000000,?,?,?,00423379,?,00000008,00000000,?,?,?,?,?,004157C5), ref: 00423DD0
      • GetLastError.KERNEL32(00000000,00000008,?,?,?,?,00000008,00000000,00000000,?,?,?,00423379,?,00000008,00000000), ref: 00423EE1
      • ClosePrinter.WINSPOOL.DRV(00000000,00423379,?,00000008,00000000,?,?,?,?,?,004157C5,?), ref: 00423EF8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CloseErrorLastOpenPrinterPrinter.lstrcpy
      • String ID: winspool$y3B
      • API String ID: 1746316384-1788438815
      • Opcode ID: 4c3f8d61a42dc8fe718ce8d908495f15ddfc1f78b9f82f9f831358cce63458b4
      • Instruction ID: 0831c5d1214fde62080665f9605ba784b323e0bdaab6601efab447c50c044bfd
      • Opcode Fuzzy Hash: 4c3f8d61a42dc8fe718ce8d908495f15ddfc1f78b9f82f9f831358cce63458b4
      • Instruction Fuzzy Hash: 67413671A00618EBCF22CFA1D8459EFBBB5FF48311F50842BEA5A92220D7395A45DF94
      APIs
      • lstrlenA.KERNEL32(00000000,?,?,00000000,?,00000000,?), ref: 004098C5
      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,00000000,?), ref: 00409942
      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,00000000,?), ref: 0040994A
      • lstrcatA.KERNEL32(00000000,?,?,?,?,?,?,00000000,?), ref: 0040995D
      • lstrcatA.KERNEL32(00000000,?,?,?,?,?,?,00000000,?), ref: 0040997B
      • lstrlenA.KERNEL32(00000000,?,?,00000000,?,00000000,?), ref: 00409984
      • lstrlenA.KERNEL32(00000000,?,?,00000000,?,00000000,?), ref: 0040998C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrlen$lstrcat
      • String ID: PAGEFTR$PAGEHDR
      • API String ID: 493641738-2355702794
      • Opcode ID: 2180068e0beb9791e2ac4a443f00bf21af2cf07f73fdfdfb628ca65703aff3bb
      • Instruction ID: 1ebf632b8b531be8fbda1eae75bb3d7936d346521cc399574c1b6aa7ad1feaf8
      • Opcode Fuzzy Hash: 2180068e0beb9791e2ac4a443f00bf21af2cf07f73fdfdfb628ca65703aff3bb
      • Instruction Fuzzy Hash: 0531E2B1A08249ABDF109F64DC81BAE7FA8EF05354F24802FF84566383D7789E50CB94
      APIs
      • lstrlenA.KERNEL32(?), ref: 00416E5D
      • GetTextExtentPointA.GDI32(?,?,?,?), ref: 00416E77
      • GetTextExtentPointA.GDI32(?,...,00000003,?), ref: 00416E91
      • GetTextExtentPointA.GDI32(?,?,?,?), ref: 00416EAF
      • TextOutA.GDI32(?,?,?,?,?), ref: 00416ECA
      • GetTextExtentPointA.GDI32(?,...,00000002,?), ref: 00416EF7
      • TextOutA.GDI32(?,?,?,...,00000003), ref: 00416F10
      • TextOutA.GDI32(?,?,?,?,?), ref: 00416F1F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Text$ExtentPoint$lstrlen
      • String ID: ...
      • API String ID: 245376094-440645147
      • Opcode ID: cc7fde59bf66b94163dc9af0493985185caea5a7276833f4454ddbb1953985a9
      • Instruction ID: 875607988f7ea5593c2337b50de0164662598d0d4ce7b88e6c28b8beb2e5dbaf
      • Opcode Fuzzy Hash: cc7fde59bf66b94163dc9af0493985185caea5a7276833f4454ddbb1953985a9
      • Instruction Fuzzy Hash: 6231E27660020EAFDF019F98DC81DEE7BB9EB08350F104126F914A2160D775EDA59FA5
      APIs
      • GetProfileStringA.KERNEL32(windows,device,,,,,?,00000100), ref: 004230FF
      • lstrcpyA.KERNEL32(?,00000000), ref: 0042312E
      • lstrcpyA.KERNEL32(?,00000000), ref: 0042314B
      • lstrcpyA.KERNEL32(00423283,00000000), ref: 0042317B
      • lstrcpyA.KERNEL32(?,?), ref: 00423198
      • CreateICA.GDI32(?,?,00000000,00000000), ref: 004231A3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcpy$CreateProfileString
      • String ID: ,,,$device$windows
      • API String ID: 3493348800-1718292371
      • Opcode ID: 12f82045bebbcebffd2088a2130ff7171cb1c0b0b236a6ac190206007245042e
      • Instruction ID: 4d1fb9ec66fb6529cefa9a71c0b8f950bad8fb6eef94b3fc7384b6973bb5ead9
      • Opcode Fuzzy Hash: 12f82045bebbcebffd2088a2130ff7171cb1c0b0b236a6ac190206007245042e
      • Instruction Fuzzy Hash: B921C772700229BFDF214F61AC80BBB7779FB04755F54443BF91885250C77C9A658B58
      APIs
        • Part of subcall function 0041EE34: DeleteObject.GDI32(?), ref: 0041EE4D
        • Part of subcall function 0041EE34: DeleteObject.GDI32(?), ref: 0041EE5A
        • Part of subcall function 0041EE34: DeleteObject.GDI32(?), ref: 0041EE67
        • Part of subcall function 0041EE34: DeleteObject.GDI32(?), ref: 0041EE7A
      • GetDeviceCaps.GDI32(?,00000058), ref: 0041EBDD
      • GetDeviceCaps.GDI32(?,00000058), ref: 0041EBED
      • GetDeviceCaps.GDI32(?,0000005A), ref: 0041EBF8
      • GetDeviceCaps.GDI32(?,0000005A), ref: 0041EC08
        • Part of subcall function 00424346: GetDeviceCaps.GDI32(?,0000005A), ref: 0042437A
        • Part of subcall function 00424346: __ftol.LIBCMT ref: 0042438D
        • Part of subcall function 00424346: CreateFontA.GDI32(00000000), ref: 00424393
        • Part of subcall function 00424346: SelectObject.GDI32(?,00000000), ref: 004243A5
        • Part of subcall function 00424346: GetTextMetricsA.GDI32(?,?), ref: 004243B1
        • Part of subcall function 00424346: SelectObject.GDI32(?,?), ref: 004243BD
        • Part of subcall function 00424346: DeleteObject.GDI32(?), ref: 0042440C
        • Part of subcall function 00424346: GetDeviceCaps.GDI32(00000000,0000005A), ref: 0042442B
        • Part of subcall function 00424346: __ftol.LIBCMT ref: 0042443F
        • Part of subcall function 00424346: CreateFontA.GDI32(00000000), ref: 00424445
        • Part of subcall function 00424346: SelectObject.GDI32(?,00000000), ref: 0042445A
        • Part of subcall function 00424346: GetTextMetricsA.GDI32(00000000,00001FFF), ref: 00424466
        • Part of subcall function 00424346: SelectObject.GDI32(00000000,?), ref: 00424472
      • SelectObject.GDI32(?,?), ref: 0041ECA2
      • GetTextMetricsA.GDI32(?,?), ref: 0041ECB7
      • SelectObject.GDI32(?,?), ref: 0041ECC5
      • GetTextMetricsA.GDI32(?,?), ref: 0041ECD4
      • SelectObject.GDI32(?,?), ref: 0041ECDF
        • Part of subcall function 004222E8: GetDeviceCaps.GDI32(?,00000070), ref: 00422300
        • Part of subcall function 004222E8: GetDeviceCaps.GDI32(?,00000071), ref: 00422307
        • Part of subcall function 004222E8: GetDeviceCaps.GDI32(?,0000000A), ref: 0042230F
        • Part of subcall function 004222E8: GetDeviceCaps.GDI32(?,00000008), ref: 00422315
        • Part of subcall function 004222E8: SetRect.USER32(?,00000000,00000000,00000000), ref: 00422320
        • Part of subcall function 004222E8: GetDeviceCaps.GDI32(?,00000058), ref: 00422329
        • Part of subcall function 004222E8: GetDeviceCaps.GDI32(?,0000005A), ref: 00422331
        • Part of subcall function 004222E8: MessageBoxA.USER32(00000000,The margins need to be adjusted for this document to print properlyWould you like them to be automatically adjusted?,00000000,00000004), ref: 004223C6
        • Part of subcall function 00424B07: GetDeviceCaps.GDI32(?,0000005A), ref: 00424B48
        • Part of subcall function 00424B07: CreateFontA.GDI32(?,?,?,0041E984,?,00000000,00000001,00000000,?,?,00000000,?,?,?), ref: 00424B58
        • Part of subcall function 00424B07: GetDeviceCaps.GDI32(?,0000005A), ref: 00424B82
        • Part of subcall function 00424B07: __ftol.LIBCMT ref: 00424B90
        • Part of subcall function 00424B07: CreateFontA.GDI32(00000000,?,?,0041E984,?,00000000,00000001,00000000,?,?,00000000,?,?,?), ref: 00424B96
        • Part of subcall function 00424B07: GetDeviceCaps.GDI32(?,0000005A), ref: 00424BBB
        • Part of subcall function 00424B07: __ftol.LIBCMT ref: 00424BCC
        • Part of subcall function 00424B07: CreateFontA.GDI32(00000000,?,?,0041E984,?,00000000,00000001,00000000,?,?,00000000,?,?,?), ref: 00424BD2
        • Part of subcall function 00424B07: SelectObject.GDI32(?,?), ref: 00424BE1
      • GetDeviceCaps.GDI32(?,00000058), ref: 0041ED5F
        • Part of subcall function 004247F8: SetRect.USER32(?,?,?,?,?), ref: 00424848
        • Part of subcall function 004247F8: GetStockObject.GDI32(00000001), ref: 0042485C
        • Part of subcall function 004247F8: SetRect.USER32(?,?,?,?,?), ref: 00424891
        • Part of subcall function 004247F8: GetStockObject.GDI32(00000001), ref: 004248A5
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice$Object$Select$CreateDeleteFont$MetricsText__ftol$Rect$Stock$Message
      • String ID:
      • API String ID: 916549427-0
      • Opcode ID: 594a183f743e857ec615f93076ebb4fac22f1077c7575e6da97de7be37c00a9a
      • Instruction ID: d571530a2defc87fde04ba22b2593bc46b0e6baef042487ac714b4abcef0bf35
      • Opcode Fuzzy Hash: 594a183f743e857ec615f93076ebb4fac22f1077c7575e6da97de7be37c00a9a
      • Instruction Fuzzy Hash: 5F7126B2601104AFCB44DF55CC84FEA7BA9EF49310F0840BABE4C9F15AD7716814CB69
      APIs
      • DeleteDC.GDI32(00000000), ref: 0042328F
      • OpenPrinterA.WINSPOOL.DRV(?,?,00000000,?,?,?,?,?,004157C5,?,?,00000000), ref: 0042329D
      • DeleteDC.GDI32(?), ref: 004233DC
      • GlobalFree.KERNEL32(?), ref: 004233EA
      • ClosePrinter.WINSPOOL.DRV(00000000,?,?,00000000,?,?,?,?,?,004157C5,?,?), ref: 004233F9
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Delete$CloseFreeGlobalOpenPrinterPrinter.
      • String ID:
      • API String ID: 3978192-0
      • Opcode ID: 72a0de2412829a8b20a445a3e398767db6a07593bd71bced010400514bfd3ce9
      • Instruction ID: 99c49e006c1686d729b5217b208a564c3e609b0f4bd6589bb662c3bd3a09d943
      • Opcode Fuzzy Hash: 72a0de2412829a8b20a445a3e398767db6a07593bd71bced010400514bfd3ce9
      • Instruction Fuzzy Hash: 00518070B00225ABDF11DFA5D885BAEBBB9FF44305F80406EF80592251DB7C9B51CB99
      APIs
      • lstrlenA.KERNEL32(?,?,?,00000001,?), ref: 00422D3C
      • GetFocus.USER32 ref: 00422D66
      • IsWindowEnabled.USER32(?), ref: 00422D7A
      • EnableWindow.USER32(?,00000000), ref: 00422D8F
      • GetOpenFileNameA.COMDLG32(?), ref: 00422DF1
      • GetSaveFileNameA.COMDLG32(?), ref: 00422DF8
      • CommDlgExtendedError.COMDLG32(?), ref: 00422E04
      • EnableWindow.USER32(?,00000001), ref: 00422E2C
      • IsWindow.USER32(?), ref: 00422E35
      • SetFocus.USER32(?), ref: 00422E45
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$EnableFileFocusName$CommEnabledErrorExtendedOpenSavelstrlen
      • String ID:
      • API String ID: 3637205778-0
      • Opcode ID: c73776788646221eebc8e70ae43ac326f259ed3c43ebb15588acd5f10faa40cb
      • Instruction ID: 6007d7533e797549320ca866547d720159e316dda3e66b7ad0bed19dd889a73b
      • Opcode Fuzzy Hash: c73776788646221eebc8e70ae43ac326f259ed3c43ebb15588acd5f10faa40cb
      • Instruction Fuzzy Hash: E53167B0600714AFDB309F66ED85B5BBBF8EF04704F40842EF98692651DBB8A940DF19
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice__ftol$Rect$Fill
      • String ID:
      • API String ID: 2525312796-0
      • Opcode ID: c02e70ab824a8ce39b4823e0dd0d2a8536047c7cfaffea09e126c36d4215a6c7
      • Instruction ID: ad0c057a0d649c8e3a54c6f5167b674d09d5a6ba51180a702f96ae595f9a8cbf
      • Opcode Fuzzy Hash: c02e70ab824a8ce39b4823e0dd0d2a8536047c7cfaffea09e126c36d4215a6c7
      • Instruction Fuzzy Hash: A4315CB2A0421AAFCF11AF22E9454DE7FB8EF44390F628515F92566261E7308A608FD4
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice__ftol$Rect$Fill
      • String ID:
      • API String ID: 2525312796-0
      • Opcode ID: a494ef988297137668e6d27a539e1aa040e49343e968926d9bb9a42914baf6b3
      • Instruction ID: bb302e4c109a6a06e445c18b595e0cf4a3707985abc3fc4812c39ac0202716ae
      • Opcode Fuzzy Hash: a494ef988297137668e6d27a539e1aa040e49343e968926d9bb9a42914baf6b3
      • Instruction Fuzzy Hash: 813169B2A0021ABFCF019F22E8494DE7BB8FF04350F628555F915A6261EB34DA648FD0
      APIs
      • IsDlgButtonChecked.USER32(?,000003F8), ref: 0040261C
      • IsDlgButtonChecked.USER32(?,00000416), ref: 0040262A
      • GetDlgItem.USER32(?,00000417), ref: 0040264C
      • EnableWindow.USER32(00000000), ref: 00402655
      • GetDlgItem.USER32(?,00000416), ref: 0040265E
      • EnableWindow.USER32(00000000), ref: 00402661
      • GetDlgItem.USER32(?,00000418), ref: 0040266D
      • EnableWindow.USER32(00000000), ref: 00402670
      • GetDlgItem.USER32(?,00000419), ref: 0040267C
      • EnableWindow.USER32(00000000), ref: 0040267F
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: EnableItemWindow$ButtonChecked
      • String ID:
      • API String ID: 3954683629-0
      • Opcode ID: 9d5f5ffa5ca4c6b4c3ad5eb2c9e76fa1412e347f109f37f6799fafc1ab145c10
      • Instruction ID: 739fdbe556b6e8ab5cdea735b5e5acf9f2e5f976447424d18cbcc18a727432b1
      • Opcode Fuzzy Hash: 9d5f5ffa5ca4c6b4c3ad5eb2c9e76fa1412e347f109f37f6799fafc1ab145c10
      • Instruction Fuzzy Hash: 59F0A4F294431D77D5206BF29C48E4B3E9CDB84751F015826B740A70C1C9B9D8019BB5
      APIs
      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0043010E
      • GetStdHandle.KERNEL32(000000F4,00438764,00000000,?,00000000,00000000), ref: 004301E4
      • WriteFile.KERNEL32(00000000), ref: 004301EB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: File$HandleModuleNameWrite
      • String ID: ...$<program name unknown>$@CD$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
      • API String ID: 3784150691-2176660801
      • Opcode ID: 1bcdaebf59f84367be6de6d35beb18c97fc9ea4bde34cb40d6d79ff1e4bead78
      • Instruction ID: a9aa04fbbaf0d01640efa1aeaf180f73b793c624644bf311a12322081829590d
      • Opcode Fuzzy Hash: 1bcdaebf59f84367be6de6d35beb18c97fc9ea4bde34cb40d6d79ff1e4bead78
      • Instruction Fuzzy Hash: 5D31C672B40228AFDF25DB61DC86F9A73ADEF89304F60116BF544D6140E6B8DA80CA5D
      APIs
        • Part of subcall function 00424346: GetDeviceCaps.GDI32(?,0000005A), ref: 0042437A
        • Part of subcall function 00424346: __ftol.LIBCMT ref: 0042438D
        • Part of subcall function 00424346: CreateFontA.GDI32(00000000), ref: 00424393
        • Part of subcall function 00424346: SelectObject.GDI32(?,00000000), ref: 004243A5
        • Part of subcall function 00424346: GetTextMetricsA.GDI32(?,?), ref: 004243B1
        • Part of subcall function 00424346: SelectObject.GDI32(?,?), ref: 004243BD
        • Part of subcall function 00424346: DeleteObject.GDI32(?), ref: 0042440C
        • Part of subcall function 00424346: GetDeviceCaps.GDI32(00000000,0000005A), ref: 0042442B
        • Part of subcall function 00424346: __ftol.LIBCMT ref: 0042443F
        • Part of subcall function 00424346: CreateFontA.GDI32(00000000), ref: 00424445
      • SelectObject.GDI32(?,?), ref: 0042564A
      • SelectObject.GDI32(?,?), ref: 00425653
      • GetTextMetricsA.GDI32(?,?), ref: 0042565D
        • Part of subcall function 004256AA: lstrlenA.KERNEL32(00425686,?,751E6BA0,?,&MB,00425686,?,?), ref: 004256C2
        • Part of subcall function 004256AA: wsprintfA.USER32 ref: 004256FA
        • Part of subcall function 004256AA: lstrcatA.KERNEL32(00000000,00425686,?,751E6BA0,?,&MB,00425686), ref: 00425709
        • Part of subcall function 004256AA: __ftol.LIBCMT ref: 00425718
        • Part of subcall function 004256AA: GetTextAlign.GDI32(?), ref: 0042573D
        • Part of subcall function 004256AA: SetTextAlign.GDI32(?,00000008), ref: 0042579B
        • Part of subcall function 004256AA: lstrlenA.KERNEL32(?), ref: 004257A0
        • Part of subcall function 004256AA: TextOutA.GDI32(?,00000000), ref: 004257D8
      • SelectObject.GDI32(?,?), ref: 0042568D
      • SelectObject.GDI32(?,?), ref: 00425693
      • DeleteObject.GDI32(?), ref: 0042569E
      • DeleteObject.GDI32(0041E984), ref: 004256A3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Select$Text$Delete__ftol$AlignCapsCreateDeviceFontMetricslstrlen$lstrcatwsprintf
      • String ID: &MB
      • API String ID: 1195503182-512029364
      • Opcode ID: ac8c39113270ada40330ce255f9a61d4c6801bde46b40726d15c07a460e0325b
      • Instruction ID: 17cab159f1a8c6e134c4d18b0320ab5e180165e088e46693c72468efc571ff6b
      • Opcode Fuzzy Hash: ac8c39113270ada40330ce255f9a61d4c6801bde46b40726d15c07a460e0325b
      • Instruction Fuzzy Hash: 8111907250015CBBCF12AFA1DC84CEE3FB9EB4C254F06555AFA4962120D63AD860EFA5
      APIs
      • SetRect.USER32(?,00000000,?,00000000,?), ref: 00421BD6
      • GetStockObject.GDI32(00000004), ref: 00421BE4
      • SetRect.USER32(?,?,?,?,?), ref: 00421C37
      • GetStockObject.GDI32(00000004), ref: 00421C45
      • SetRect.USER32(?,?,?,00000000,00000000), ref: 00421CA6
      • GetStockObject.GDI32(00000004), ref: 00421CB4
      • SetRect.USER32(?,?,?,00000000,?), ref: 00421D18
      • GetStockObject.GDI32(00000004), ref: 00421D26
      • InflateRect.USER32(?,00000000,00000000), ref: 00421D59
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$ObjectStock$Inflate
      • String ID:
      • API String ID: 2526234015-0
      • Opcode ID: 33b227b7a03702bdaa137684d78ae70c091bf8d0b673154ef2e337bdfadfabbb
      • Instruction ID: ef156a17290e8674bbc6f8942ea16ae88faa7c5b64370e6de0524274d9028a04
      • Opcode Fuzzy Hash: 33b227b7a03702bdaa137684d78ae70c091bf8d0b673154ef2e337bdfadfabbb
      • Instruction Fuzzy Hash: 38C18972A00119EFCF00CF98D985A9A7BB5FF58304F6540AAF808AB261D735EE51CF94
      APIs
      • __EH_prolog.LIBCMT ref: 0040740C
        • Part of subcall function 0040E26F: IsCharAlphaNumericA.USER32(?,00000000,?,?,?,?,00409327,?,?,?,00000000,00000000,00000000,?,?), ref: 0040E28C
      • MessageBoxA.USER32(?,00000000,00000002,00000000), ref: 0040757E
      • MessageBoxA.USER32(?,00000000,00000002,00000000), ref: 004075C4
      • MessageBoxA.USER32(?,00000000,00000002,00000000), ref: 00407606
      • MessageBoxA.USER32(?,00000000,00000002,00000000), ref: 0040764C
      • wsprintfA.USER32 ref: 004076E0
      • wsprintfA.USER32 ref: 00407719
        • Part of subcall function 004038B4: LoadStringA.USER32(00407701,00000000,00000200,00000000), ref: 004038DD
      • MessageBoxA.USER32(?,00000000,00000000,00000000), ref: 00407736
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Message$wsprintf$AlphaCharH_prologLoadNumericString
      • String ID:
      • API String ID: 2055882333-0
      • Opcode ID: abfc3aafcb0e5276000c5bfbbb17331fc34b5d54aca13bb8cc946a39967670e8
      • Instruction ID: b60b7355a9b7871d9f037f6ac890e3e77b5a04b1b6dd452a735a5404c680b650
      • Opcode Fuzzy Hash: abfc3aafcb0e5276000c5bfbbb17331fc34b5d54aca13bb8cc946a39967670e8
      • Instruction Fuzzy Hash: 7791BF71A04109ABDF10AF91DC06BDE3B79EF04304F1440B6FA05BB1D2D739AA14DB6A
      APIs
      • CreateFontA.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000002,?,?), ref: 004218DD
      • CreateFontA.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000002,?,?), ref: 00421907
      • SelectObject.GDI32(?,?), ref: 00421918
      • GetTextMetricsA.GDI32(?,?), ref: 00421923
      • GetCharWidthA.GDI32(?,00000000,000000FF,0000003C), ref: 00421935
      • SelectObject.GDI32(?,?), ref: 0042197F
      • SelectObject.GDI32(?,?), ref: 004219F3
      • DeleteObject.GDI32(?), ref: 004219FE
      • DeleteObject.GDI32(?), ref: 00421A03
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Select$CreateDeleteFont$CharMetricsTextWidth
      • String ID:
      • API String ID: 2467450592-0
      • Opcode ID: d4ff7e78498e7c87d9d9aba877603b88378dc3d918b341d16abc8c1733714d10
      • Instruction ID: d0e8f86dcb5f4fab6d1018306c97d5015a415d340f1c179e51821d2631f840dc
      • Opcode Fuzzy Hash: d4ff7e78498e7c87d9d9aba877603b88378dc3d918b341d16abc8c1733714d10
      • Instruction Fuzzy Hash: 495143B1601229AFCF25CF05DC98DEF3F6AEF59364F60815AF8055A260C235DDA1CBA4
      APIs
      • GetDlgItemInt.USER32(?,00001A8E,?,00000000), ref: 00414047
      • EndDialog.USER32(?,00000001), ref: 0041408D
      • MessageBeep.USER32(00000000), ref: 004140B6
      • GetParent.USER32(?), ref: 004140C5
      • SetDlgItemTextA.USER32(?,00001A8E,?), ref: 004140F7
      • GetDlgItem.USER32(?,00001A8E), ref: 0041410E
      • SendMessageA.USER32(00000000), ref: 00414111
      • GetDlgItem.USER32(?,00001A8E), ref: 00414119
      • SetFocus.USER32(00000000), ref: 0041411C
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$Message$BeepDialogFocusParentSendText
      • String ID:
      • API String ID: 3410869093-0
      • Opcode ID: 06a01f961192865feace7ae765d6857ac101aa30a9a0acd6df9780c88eaedd4b
      • Instruction ID: ff12eeef55ec85fff4b6ba6dc2d621c65ddabb3d7a9b19d41f49c35e92c7f4d1
      • Opcode Fuzzy Hash: 06a01f961192865feace7ae765d6857ac101aa30a9a0acd6df9780c88eaedd4b
      • Instruction Fuzzy Hash: 1831C475504205ABCB10AF75DC49DAB7FA9FB89320B10462AF915C61E1D7788881CBAD
      APIs
      • IsDialogMessageA.USER32(?,?,?,?,?,?,00420176,?), ref: 00425D9B
        • Part of subcall function 00425DB3: GetParent.USER32(?), ref: 00425DC1
        • Part of subcall function 00425DB3: GetWindowLongA.USER32(?,000000F0), ref: 00425DCC
      • PostMessageA.USER32(00000000,00000111,00000002,00000000), ref: 00425D17
      • GetDlgItem.USER32(00000000,00000004), ref: 00425D32
      • GetWindowLongA.USER32(00000000), ref: 00425D3B
      • GetDlgItem.USER32(00000000,00000002), ref: 00425D4B
      • GetWindowLongA.USER32(00000000), ref: 00425D4E
      • GetFocus.USER32 ref: 00425D5E
      • GetKeyState.USER32(00000010), ref: 00425D78
      • SetFocus.USER32(00000000,?,?,?,?,00420176,?), ref: 00425D8F
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: LongWindow$FocusItemMessage$DialogParentPostState
      • String ID:
      • API String ID: 1773305422-0
      • Opcode ID: 1ebb01ee611d4028fd4b16693ec4cefe584df0861a35489039b8b5e899cfd8c5
      • Instruction ID: 95877db6b4158007b1e67bf11e40f84382fe3d97911a428788155fe9f0149ccc
      • Opcode Fuzzy Hash: 1ebb01ee611d4028fd4b16693ec4cefe584df0861a35489039b8b5e899cfd8c5
      • Instruction Fuzzy Hash: A7214270328A28B7DA3026A5BC8CF6B3A5DEB92350F908413F640E6290CA789C01952D
      APIs
      • GetStockObject.GDI32(00000007), ref: 0041C58E
      • SelectObject.GDI32(?,00000000), ref: 0041C598
      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 0041C5C0
      • LineTo.GDI32(?,?,?), ref: 0041C5CA
      • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0041C5E1
      • LineTo.GDI32(?,?,?), ref: 0041C5EB
      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 0041C631
      • LineTo.GDI32(?,?,?), ref: 0041C63B
      • SelectObject.GDI32(?,?), ref: 0041C64A
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: LineMoveObject$Select$Stock
      • String ID:
      • API String ID: 1481511353-0
      • Opcode ID: 949efa462af52156028e5b650fc389073a17fc5365be12959b388a5b76631432
      • Instruction ID: 248c154eee89aa0c74b3e4143629953eca43aa3124f5c643bc721ec8f5dfdb2c
      • Opcode Fuzzy Hash: 949efa462af52156028e5b650fc389073a17fc5365be12959b388a5b76631432
      • Instruction Fuzzy Hash: 5A3104B5200208EFDB219F54DC85EAABBB6FF08350F108055F9858A2A0C771ADA1DFA4
      APIs
      • SendMessageA.USER32(?,00000401,00000FD3,?), ref: 00408510
      • SendMessageA.USER32(?,00000401,00000FB1,?), ref: 0040851B
      • SendMessageA.USER32(?,00000401,00000FA7,?), ref: 00408526
      • SendMessageA.USER32(?,00000401,00000FC1,?), ref: 00408531
      • SendMessageA.USER32(?,00000401,00000FA4,?), ref: 0040853C
      • SendMessageA.USER32(?,00000401,00000FA6,?), ref: 00408547
      • SendMessageA.USER32(?,00000401,00000FA5,?), ref: 00408552
      • SendMessageA.USER32(?,00000401,00000FA8,?), ref: 0040855D
      • EnableWindow.USER32(?,?), ref: 00408563
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$EnableWindow
      • String ID:
      • API String ID: 1554173715-0
      • Opcode ID: 79ac5b0106efcc32768ab9ff4fb8030141635a3cf7eb24a22b5c96e4b5982c43
      • Instruction ID: e849c737a530f37984822f58e3ba88e864b4ad5e3efc1b1c2414276c901ab2d0
      • Opcode Fuzzy Hash: 79ac5b0106efcc32768ab9ff4fb8030141635a3cf7eb24a22b5c96e4b5982c43
      • Instruction Fuzzy Hash: 9C01BBB524424DBFF6312B12DC49D27BE9DDFC27D9B124435F6C4154A48AA32C20EA35
      APIs
      • GetTextExtentPointA.GDI32(?,...,00000003,00000000), ref: 00424ECD
      • GetDeviceCaps.GDI32(?,00000058), ref: 00424EFE
      • __ftol.LIBCMT ref: 00424F13
      • ExtTextOutA.GDI32(00000001,00000000,?,?,?,00000000,?,?), ref: 00424FAD
      • ExtTextOutA.GDI32(00000001,00000000,?,?,?,00000000,00000000,...), ref: 00424FF8
      • ExtTextOutA.GDI32(00000001,00000000,?,?,?,00000000,00000000,?), ref: 00425037
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Text$CapsDeviceExtentPoint__ftol
      • String ID: ...
      • API String ID: 2574158308-440645147
      • Opcode ID: 3f546ea0640dddd2614b9e7f7eeef0fd3adfb1e52661245687f4d8e497d51ce2
      • Instruction ID: 3eb12728856b874d3b579ff7eec7eac513c5a283012a69722a0932c2ae4208a3
      • Opcode Fuzzy Hash: 3f546ea0640dddd2614b9e7f7eeef0fd3adfb1e52661245687f4d8e497d51ce2
      • Instruction Fuzzy Hash: 665166B1A00119EFDF11AF95DC449EE7BB8FF48348F42815AFC58A2150C3399A61DFA8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID:
      • String ID: cM@$cM@
      • API String ID: 0-2597188917
      • Opcode ID: c55bb7b5f45767b37ce55672006cbb5b6df7fa2e36a9bf73a047a8e860e46f08
      • Instruction ID: 6c0e8ae59b2c8617950338ab192a9e9e9c4fe04410a4eda50d48c8a708108cc8
      • Opcode Fuzzy Hash: c55bb7b5f45767b37ce55672006cbb5b6df7fa2e36a9bf73a047a8e860e46f08
      • Instruction Fuzzy Hash: 4651C47160412AFFDF219F40BC808BE3765EB02314BA085BBFD5192391D6369DA5DB2E
      APIs
      • GetTempPathA.KERNEL32(00000104,?,?), ref: 00401570
      • GetTempFileNameA.KERNEL32(?,~es,00000000,?), ref: 00401585
      • WinExec.KERNEL32(?,00000001), ref: 0040160E
      • MessageBoxA.USER32(00000000,00000000,00000000), ref: 0040162C
        • Part of subcall function 00429610: DeleteFileA.KERNELBASE(?,00403B78,?,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00429614
        • Part of subcall function 00429610: GetLastError.KERNEL32(?,00000000,?,00000000,00000000,0042A789,00000000), ref: 0042961E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: FileTemp$DeleteErrorExecLastMessageNamePath
      • String ID: .rtf$write.exe $~es
      • API String ID: 1272379566-1990357642
      • Opcode ID: 20bde1e0d29d4a2a2daa1d98bde50545b36f832021ad86216e0223bc718d43c0
      • Instruction ID: 0e5168aed16c78cb3ecbc5e303b4e02c7600c868f5b4dc9feaab0f2a951fcea4
      • Opcode Fuzzy Hash: 20bde1e0d29d4a2a2daa1d98bde50545b36f832021ad86216e0223bc718d43c0
      • Instruction Fuzzy Hash: F44150726092906FE712A770AC96FE67FB4DF0A324F1C00DFF481AA093DA7C49858755
      APIs
      • GetStringTypeW.KERNEL32(00000001,004384E4,00000001,00000000,00000103,00000001,00000000,00432C63,00200020,00000000,?,00000000,00000000,00000001), ref: 00433648
      • GetStringTypeA.KERNEL32(00000000,00000001,004384E0,00000001,?,?,00000000,00000000,00000001), ref: 00433662
      • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00432C63,00200020,00000000,?,00000000,00000000,00000001), ref: 00433696
      • MultiByteToWideChar.KERNEL32(c,C ,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00432C63,00200020,00000000,?,00000000,00000000,00000001), ref: 004336CE
      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 00433724
      • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 00433736
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: StringType$ByteCharMultiWide
      • String ID: c,C
      • API String ID: 3852931651-3652846715
      • Opcode ID: 01873c333122844c1c9623a54caa0a109afb65acc8b0e82712b0bb36b8482594
      • Instruction ID: 56f2bc46d07a090098222533fac3a7c04484f36e681cad45039ecff5e90e18e6
      • Opcode Fuzzy Hash: 01873c333122844c1c9623a54caa0a109afb65acc8b0e82712b0bb36b8482594
      • Instruction Fuzzy Hash: 1D419FB2600219BFCF218F95DC86EAF7F79FB09725F10552AF911D2260C3399A50DB98
      APIs
      • GetTempPathA.KERNEL32(00000104,?,?), ref: 00401570
      • GetTempFileNameA.KERNEL32(?,~es,00000000,?), ref: 00401585
      • WinExec.KERNEL32(?,00000001), ref: 0040160E
      • MessageBoxA.USER32(00000000,00000000,00000000), ref: 0040162C
        • Part of subcall function 00429610: DeleteFileA.KERNELBASE(?,00403B78,?,?,00000000,?,00000000,00000000,0042A789,00000000), ref: 00429614
        • Part of subcall function 00429610: GetLastError.KERNEL32(?,00000000,?,00000000,00000000,0042A789,00000000), ref: 0042961E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: FileTemp$DeleteErrorExecLastMessageNamePath
      • String ID: .rtf$write.exe $~es
      • API String ID: 1272379566-1990357642
      • Opcode ID: 7f640dc2ee8656bccc0ea9f5ae422c780feec7d3facbb68349470f10e415a245
      • Instruction ID: 89bb8e5d18483cf0ad5e32162d70871aa6a4d41981e303e79834bb1060342ad6
      • Opcode Fuzzy Hash: 7f640dc2ee8656bccc0ea9f5ae422c780feec7d3facbb68349470f10e415a245
      • Instruction Fuzzy Hash: 15210772B002147AEB21B761AC86FEB33ACDB48714F50006FF541F60C2EAB85D848B6C
      APIs
      • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 004166BF
      • lstrlenA.KERNEL32(?), ref: 00416702
      • SendMessageA.USER32(?,00000143,00000000,00000025), ref: 00416720
      • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00416732
      • SetFocus.USER32(?), ref: 00416744
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$Focuslstrlen
      • String ID: Page %d of %d$%
      • API String ID: 2565912116-1893957304
      • Opcode ID: 8974fca64ede159e9ee7721eeb9e7aabbacf9bc444e83687fba543ee410ccd8a
      • Instruction ID: ca278bff00f2b2b1b663b81af0082864a3f1f400b062a2674e89f7e03e558202
      • Opcode Fuzzy Hash: 8974fca64ede159e9ee7721eeb9e7aabbacf9bc444e83687fba543ee410ccd8a
      • Instruction Fuzzy Hash: 3A1124B1900208FFDB10DF94DD85BEEBFB8EB14305F104076E905A6190D7B49E95DB95
      APIs
      • GetStockObject.GDI32(0000000C), ref: 00414F7E
      • SelectObject.GDI32(00000385,00000000), ref: 00414F8E
      • SetBkMode.GDI32(00000385,00000001), ref: 00414F97
      • SetTextColor.GDI32(00000385,00000000), ref: 00414FA2
      • DrawTextExA.USER32(00000385,&Close,00000006,?,00000001,00000000), ref: 00414FBE
      • SelectObject.GDI32(00000385,00000000), ref: 00414FC8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$SelectText$ColorDrawModeStock
      • String ID: &Close
      • API String ID: 2841674865-1960123989
      • Opcode ID: 0260ac72d5c9dfdd76815dc53d0bb2b0eebab436897c2a045f91f2102fb86215
      • Instruction ID: f1fe4e8140b0158f4c4efc02e008f2098ea084485be8a7f418e3145803faec5b
      • Opcode Fuzzy Hash: 0260ac72d5c9dfdd76815dc53d0bb2b0eebab436897c2a045f91f2102fb86215
      • Instruction Fuzzy Hash: D611A031208700AFE7345F24DC09FA777B4FB88750F10093AF282856E0C6B5AC96DB29
      APIs
      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0042A73F), ref: 0042FCC5
      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0042A73F), ref: 0042FCD9
      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0042A73F), ref: 0042FD05
      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0042A73F), ref: 0042FD3D
      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0042A73F), ref: 0042FD5F
      • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,0042A73F), ref: 0042FD78
      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0042A73F), ref: 0042FD8B
      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0042FDC9
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: EnvironmentStrings$ByteCharFreeMultiWide
      • String ID:
      • API String ID: 1823725401-0
      • Opcode ID: b6fc58de17fe3cce5aea74dd43253c492548af9d8d7631a3f3ede5445292ae59
      • Instruction ID: 30c928e22e57fe89dd39ea785f6119240fdda97fc49dfef4933bea914b54fd48
      • Opcode Fuzzy Hash: b6fc58de17fe3cce5aea74dd43253c492548af9d8d7631a3f3ede5445292ae59
      • Instruction Fuzzy Hash: FD31D4B37182396F97202FB57C8483BBABCEA453587D5043BF583C3301E6295C4986AD
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrlen
      • String ID: &#x%2.2X;$&amp;$&apos;$&gt;$&lt;$&nbsp;$&quot;
      • API String ID: 1659193697-2875783524
      • Opcode ID: 0788ff829e3c5a41d336be006852dd68b3de3753396b669678eb789436281c62
      • Instruction ID: f48624fb74ec0349d219cd0ef29b45ab6f78a5c58dd65b2d168ab5e264da2f92
      • Opcode Fuzzy Hash: 0788ff829e3c5a41d336be006852dd68b3de3753396b669678eb789436281c62
      • Instruction Fuzzy Hash: E1218D212045199BEB349E58C8C9BF6F7A4EFC8301F64254BE581C72A5D65CFC818A5E
      APIs
      • GetDC.USER32(?), ref: 00425F2C
      • GetStockObject.GDI32(0000000C), ref: 00425F37
      • SelectObject.GDI32(?,00000000), ref: 00425F41
      • GetTextMetricsA.GDI32(?,?), ref: 00425F51
      • lstrlenA.KERNEL32(?,?), ref: 00425F78
      • GetTextExtentPointA.GDI32(?,?,00000000), ref: 00425F89
      • SelectObject.GDI32(?,?), ref: 00425FBE
      • ReleaseDC.USER32(?,?), ref: 00425FCA
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$SelectText$ExtentMetricsPointReleaseStocklstrlen
      • String ID:
      • API String ID: 2128506940-0
      • Opcode ID: 2e01e1100cfdbaff37b6518e83b5abc97a2743edecaf31b76ef52c78f0a22f21
      • Instruction ID: cbd107bdaa16140d7727be117c50493f5690b156e25805ba2791cbcc93628729
      • Opcode Fuzzy Hash: 2e01e1100cfdbaff37b6518e83b5abc97a2743edecaf31b76ef52c78f0a22f21
      • Instruction Fuzzy Hash: 9E2177B1900605EFCB21DF98DD89C9EBBF4FF08304B008469F68A93620C730AA50DF94
      APIs
      • GetSysColor.USER32(00000014), ref: 004262D7
      • CreateSolidBrush.GDI32(00000000), ref: 004262E0
      • GetSysColor.USER32(00000010), ref: 004262E6
      • CreateSolidBrush.GDI32(00000000), ref: 004262E9
      • SetRect.USER32(?,?,?,?,?), ref: 00426301
      • FillRect.USER32(?,?,00000000), ref: 0042630F
      • DeleteObject.GDI32(00000000), ref: 0042631C
      • DeleteObject.GDI32(00000000), ref: 0042631F
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: BrushColorCreateDeleteObjectRectSolid$Fill
      • String ID:
      • API String ID: 3072689239-0
      • Opcode ID: 1d4366469e48f6ea5d14516b072ac24cf878326ee6ff1d058b48c5a8fb8379be
      • Instruction ID: 310a8944cad25787f3cf70a30e52ee2f2541f8dfdc6d3694031826c785698fe8
      • Opcode Fuzzy Hash: 1d4366469e48f6ea5d14516b072ac24cf878326ee6ff1d058b48c5a8fb8379be
      • Instruction Fuzzy Hash: F0F04FB290421E7FDF10ABA4DC88DAF7BACEB88354B040426FA45D3251DA75AC01DBB4
      APIs
      • DeleteObject.GDI32(?), ref: 00407C95
      • DeleteObject.GDI32(?), ref: 00407C9D
      • DeleteObject.GDI32(?), ref: 00407CA5
      • DeleteObject.GDI32(?), ref: 00407CAD
      • DeleteObject.GDI32(?), ref: 00407CB5
      • DeleteObject.GDI32(?), ref: 00407CBD
      • DeleteObject.GDI32(?), ref: 00407CC5
      • DeleteObject.GDI32(?), ref: 00407CCD
        • Part of subcall function 00417744: DestroyWindow.USER32(?,00407CD6,?,?,00407B5C), ref: 0041774D
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DeleteObject$DestroyWindow
      • String ID:
      • API String ID: 409195656-0
      • Opcode ID: 9f2fb235cc912e1f8a2d11801da08a3c9604fc29b34a4ac1d48ebfd100617dcb
      • Instruction ID: cca48cdd7ecf649fc893a852a754ed195b5b3104443d766d383f853376f26377
      • Opcode Fuzzy Hash: 9f2fb235cc912e1f8a2d11801da08a3c9604fc29b34a4ac1d48ebfd100617dcb
      • Instruction Fuzzy Hash: 7CE07D31105A58ABCB763B36DC09ECFBFA6FFC5310F16586DE0AA511308A752851EE54
      APIs
      • CreateFileA.KERNEL32(00000001,80000000,?,0000000C,00000001,00000080,00000000,?,00000000,00000000), ref: 004322BC
      • GetFileType.KERNEL32(00000000), ref: 004322C9
      • CloseHandle.KERNEL32(00000000), ref: 004322D4
      • GetLastError.KERNEL32 ref: 004322DA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: File$CloseCreateErrorHandleLastType
      • String ID: @$H
      • API String ID: 1809617866-104103126
      • Opcode ID: 6e331775426153c9deff17774ffe4d19269ef410aadfa8cebad1db2a694c2385
      • Instruction ID: 8460b7c5a24d20f1e3a3b0a76cae69dc2bcd326aad5ccde95073623bade7673a
      • Opcode Fuzzy Hash: 6e331775426153c9deff17774ffe4d19269ef410aadfa8cebad1db2a694c2385
      • Instruction Fuzzy Hash: B0812B7190820557EF208F68CF847AF7B60AB0A324F24625BEE51663D1C3FC8945DB5E
      APIs
      • GetParent.USER32(?), ref: 00416343
      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00416399
      • SendMessageA.USER32(?,00000148,00000000,?), ref: 004163B7
      • __ftol.LIBCMT ref: 004163D1
      • GetParent.USER32(?), ref: 004164B4
      • SetWindowLongA.USER32(?,00000000), ref: 004164E4
      • DefWindowProcA.USER32(?,?,?,?), ref: 004164F4
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageParentSendWindow$LongProc__ftol
      • String ID:
      • API String ID: 15107494-0
      • Opcode ID: acd5bf23037317a709aced391d83ae9e94d0c1328b026325243307a12e43e015
      • Instruction ID: a9c46a17e9371baf6d6d911bbb9b7c31d75b9327cc1b4ae2ae2e75e01433c5e8
      • Opcode Fuzzy Hash: acd5bf23037317a709aced391d83ae9e94d0c1328b026325243307a12e43e015
      • Instruction Fuzzy Hash: FD51B071604605EBCB21DF69DC44AEB7BB4FF88314F11442EF95A87290CB38D981DB59
      APIs
      • GetClientRect.USER32(000000FF,?), ref: 0041B7EE
      • GetDC.USER32(000000FF), ref: 0041B806
      • GetStockObject.GDI32(0000000C), ref: 0041B811
      • SelectObject.GDI32(?,00000000), ref: 0041B81B
      • GetTextMetricsA.GDI32(?,?), ref: 0041B82B
      • SelectObject.GDI32(?,?), ref: 0041B8AC
      • ReleaseDC.USER32(000000FF,?), ref: 0041B8B8
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Select$ClientMetricsRectReleaseStockText
      • String ID:
      • API String ID: 706300301-0
      • Opcode ID: d6e33794777ba345fd1ad6e05c1daa43772e7954820377a3e40a992f0afe70ec
      • Instruction ID: 0569c2cfd69772c965fb7d890686f781837987bea099bfcb7fc1540d2c61c6c6
      • Opcode Fuzzy Hash: d6e33794777ba345fd1ad6e05c1daa43772e7954820377a3e40a992f0afe70ec
      • Instruction Fuzzy Hash: C331D675900209EFDF15DFA8D888EDEBBB8FF08310F10816AF915AB260D734AA44DB54
      APIs
      • InvalidateRect.USER32(?,00000000,00000001,?,00000000,?,?,004153AC,?,00000001,00000001), ref: 00415FA4
      • SendMessageA.USER32(?,00000401,00000035,00000000), ref: 00415FC9
      • SendMessageA.USER32(?,00000401,00000035,00000001), ref: 00415FE6
      • SendMessageA.USER32(?,00000401,00000036,00000001), ref: 00415FF5
      • SendMessageA.USER32(?,00000401,00000038,00000000), ref: 00416012
      • SendMessageA.USER32(?,00000401,00000038,00000001), ref: 00416024
      • SendMessageA.USER32(?,00000401,00000037,00000001), ref: 00416033
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$InvalidateRect
      • String ID:
      • API String ID: 2778011698-0
      • Opcode ID: 54e288feebe3c5e9f92f7bd3396928d28a1cbe5f23bb86f537fdde348f858e18
      • Instruction ID: 631a0fd93663b0705f56bb5366e976c3a96a86e74947a2826b69b9343d830a03
      • Opcode Fuzzy Hash: 54e288feebe3c5e9f92f7bd3396928d28a1cbe5f23bb86f537fdde348f858e18
      • Instruction Fuzzy Hash: 8F217C71248B08AFD6319A20CC84FE7B7E9EB98744F01082DF65A9B1A0CB72BC45DB14
      APIs
      • GetParent.USER32(?), ref: 00425E6F
      • GetParent.USER32(?), ref: 00425E7C
      • GetClassNameA.USER32(00000000), ref: 00425E7F
      • lstrcmpiA.KERNEL32(?,combobox), ref: 00425E8E
      • GetParent.USER32(?), ref: 00425E99
        • Part of subcall function 00425DE6: GetClassNameA.USER32(?,?,00000040), ref: 00425E09
        • Part of subcall function 00425DE6: lstrcmpiA.KERNEL32(?,combobox), ref: 00425E18
        • Part of subcall function 00425DE6: GetWindow.USER32(?,00000005), ref: 00425E2D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Parent$ClassNamelstrcmpi$Window
      • String ID: combobox
      • API String ID: 178677527-2240613097
      • Opcode ID: ea4036fd5ae7d6f0f5769ff36ddb2c7a2d85dd31077794934471c72e60dac867
      • Instruction ID: 059ebc30956034494f68d514db3f62cbbe3d1778279c4ac6d8ffa5ae89bf58f1
      • Opcode Fuzzy Hash: ea4036fd5ae7d6f0f5769ff36ddb2c7a2d85dd31077794934471c72e60dac867
      • Instruction Fuzzy Hash: D2215071B00628BB8B10AFA6ED85D9FBBADEB44740B918027F805E3241D778DE01CB58
      APIs
      • __EH_prolog.LIBCMT ref: 004184DC
        • Part of subcall function 0041AC92: LoadCursorA.USER32(00000000,00007F02), ref: 0041ACA2
        • Part of subcall function 0041AC92: SetCursor.USER32(00000000,?,004184F0), ref: 0041ACA9
      • SetActiveWindow.USER32(?), ref: 004184FF
      • ShowWindow.USER32(?,00000005), ref: 00418593
      • SetCursor.USER32 ref: 004185A6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$Window$ActiveH_prologLoadShow
      • String ID: 4}C$Page Setup
      • API String ID: 330486087-996107671
      • Opcode ID: c044b952e357edcb600b8e785996c61028e5a572559f6a996658c80f1565d911
      • Instruction ID: 9462e64c956223d759c1d1a6a7e20c83cb72b2f8fb6c2671323e5be1824a0aed
      • Opcode Fuzzy Hash: c044b952e357edcb600b8e785996c61028e5a572559f6a996658c80f1565d911
      • Instruction Fuzzy Hash: 7C219F71600605EFCB259F65D885AAEBBE1EF08304F10886FF556972A1DB789D40CB49
      APIs
        • Part of subcall function 00409A82: __EH_prolog.LIBCMT ref: 00409A87
      • lstrcpyA.KERNEL32(?,pnxtrvu.ini), ref: 004039CF
      • SetRect.USER32(?,00000014,00000014,000002A8,00000230), ref: 004039E6
      • lstrcpyA.KERNEL32(?,c:\), ref: 00403A25
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcpy$H_prologRect
      • String ID: (uC$c:\$pnxtrvu.ini
      • API String ID: 803513713-3135303394
      • Opcode ID: f8d2f1af00016c7ee3cf5159b72ddca493d38c7a6f1ae303e572e522fc400986
      • Instruction ID: 8c9a99b68a2ff0b48c35676d132d424013bfd4e2934dc67910cef919350e0e15
      • Opcode Fuzzy Hash: f8d2f1af00016c7ee3cf5159b72ddca493d38c7a6f1ae303e572e522fc400986
      • Instruction Fuzzy Hash: B931F1B1901B00AFD3248F6A88817D3FBE8FB49312F90592ED2EE92290D7743200CF54
      APIs
      • MultiByteToWideChar.KERNEL32(?,00000001,?,2I@,?,2I@,?,?,762283C0,00404932,TEMP,?), ref: 00432F25
      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432F38
      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432F84
      • CompareStringW.KERNEL32(?,?,?,?,?,00000000,?,00000000,?,?,762283C0,00404932,TEMP,?), ref: 00432F9C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ByteCharMultiWide$CompareString
      • String ID: 2I@$2I@
      • API String ID: 376665442-2381108387
      • Opcode ID: 82a3a9a73cc9a7a3da8ed9652f34ac39311b7852f960ad7dd02b139364fe7aac
      • Instruction ID: b1f2d485d2a4e32e7d271f44cd4ef87812363634610574d76781a31cd7d910bb
      • Opcode Fuzzy Hash: 82a3a9a73cc9a7a3da8ed9652f34ac39311b7852f960ad7dd02b139364fe7aac
      • Instruction Fuzzy Hash: CB211572900259EFCF218F94CD419DEBFB5FF48364F14426AFA1062260C3769962EFA4
      APIs
      • StartPage.GDI32(?), ref: 004234A3
      • SetBkMode.GDI32(?,00000001), ref: 004234B1
      • SetTextColor.GDI32(?,00FFFFFF), ref: 004234E6
      • MoveToEx.GDI32(?,00000200,00000200,00000000), ref: 004234F9
      • LineTo.GDI32(?,00000201,00000201), ref: 0042350C
      • SetTextColor.GDI32(?,00000000), ref: 00423519
        • Part of subcall function 00416935: GetTickCount.KERNEL32 ref: 00416943
        • Part of subcall function 00416935: GetTickCount.KERNEL32 ref: 00416952
        • Part of subcall function 00416935: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0041696A
        • Part of subcall function 00416935: TranslateMessage.USER32(?), ref: 00416974
        • Part of subcall function 00416935: DispatchMessageA.USER32(?), ref: 0041697E
      • EndPage.GDI32(?), ref: 00423526
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Message$ColorCountPageTextTick$DispatchLineModeMovePeekStartTranslate
      • String ID:
      • API String ID: 3563606782-0
      • Opcode ID: 9130891bf321b2f6d68826f019438c830dbf39de67e2ef88db08618055b3ab32
      • Instruction ID: a0fa751b28921e40663687ac8e6466d5e69a5af2f35a17b41ed743fb20c3fbd8
      • Opcode Fuzzy Hash: 9130891bf321b2f6d68826f019438c830dbf39de67e2ef88db08618055b3ab32
      • Instruction Fuzzy Hash: A8118E71204604BFDB215F64EC48FEBBBB9EF18310F000429F9DA92270CBB5AC919B64
      APIs
      • __EH_prolog.LIBCMT ref: 0041AD12
      • GetStockObject.GDI32(00000000), ref: 0041AD83
      • RegisterClassA.USER32(00000002), ref: 0041AD9A
      • LoadCursorA.USER32(000002A7), ref: 0041ADAB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClassCursorH_prologLoadObjectRegisterStock
      • String ID: 8}C$WordIndexWndClass
      • API String ID: 1816707620-85494816
      • Opcode ID: a989f0260ded16845653d9a8d50730a0a0e117fd57fe0fd30b3228d5cf04906d
      • Instruction ID: 30045d4f7855c4e443dff4b4acfbd4e33d460d0f1e317b5c45f94d962b703601
      • Opcode Fuzzy Hash: a989f0260ded16845653d9a8d50730a0a0e117fd57fe0fd30b3228d5cf04906d
      • Instruction Fuzzy Hash: 092104F19007049FC720DFAAD98569EFBF8EF99304F00842FE699A6211D7B81504CF69
      APIs
      • _lopen.KERNEL32(?,00000020), ref: 0040EAF0
      • _llseek.KERNEL32(00000000,000000E4,00000002), ref: 0040EB10
      • _hread.KERNEL32(00000000,?,00000010), ref: 0040EB1D
      • lstrcmpiA.KERNEL32(?,?), ref: 0040EB4B
      • _lclose.KERNEL32(00000000), ref: 0040EB59
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: _hread_lclose_llseek_lopenlstrcmpi
      • String ID: p"v
      • API String ID: 2166762341-2250726858
      • Opcode ID: 292c57e4bbb89982ccf9aae78dd83483d0dc7ca8d46a05ac606b4e005b4a332b
      • Instruction ID: 51761b51d829a774e3632983badfc7ff792bfde4628411bdf2fbcd0a1cc891b5
      • Opcode Fuzzy Hash: 292c57e4bbb89982ccf9aae78dd83483d0dc7ca8d46a05ac606b4e005b4a332b
      • Instruction Fuzzy Hash: 4801F57380411CBBDF10EBA4DC0DEEE77BCDB05324F004226FA12E21A1D7349A009768
      APIs
      • LoadCursorA.USER32(00000000,00007F00), ref: 00416566
      • RegisterClassA.USER32(?), ref: 0041657C
      • LoadCursorA.USER32(00000000,00007F00), ref: 004165A7
      • RegisterClassA.USER32(?), ref: 004165BD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClassCursorLoadRegister
      • String ID: PnxPreviewCtrWnd$PnxPreviewWnd
      • API String ID: 1693014935-539333512
      • Opcode ID: e94e8c8f186db150047ebe0808545dbcb41bad766446233f727865f120973706
      • Instruction ID: 265b8aa65efa0d16e62fd0588d125000d89b880cb039d572952bac5b1397038d
      • Opcode Fuzzy Hash: e94e8c8f186db150047ebe0808545dbcb41bad766446233f727865f120973706
      • Instruction Fuzzy Hash: 0C119CB1D11228ABCB10CFDAE885ACEBBF8FB49710F10512BE604A6250D7B455458FA8
      APIs
      • GetParent.USER32(?), ref: 0041614F
      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00416198
      • SendMessageA.USER32(?,00000148,00000000,?), ref: 004161B6
      • __ftol.LIBCMT ref: 004161D0
      • SetWindowLongA.USER32(?,00000000), ref: 00416281
      • DefWindowProcA.USER32(?,?,?,?), ref: 00416291
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSendWindow$LongParentProc__ftol
      • String ID:
      • API String ID: 3478141048-0
      • Opcode ID: b03fd6988ae861b6986e0d2ceda455f4d52d9cc88354b442719dd0420bc3a400
      • Instruction ID: 8ccba7718bdc44415d320d32a75501a2a096f5b78ad4a7539c39ab1feec2f2a1
      • Opcode Fuzzy Hash: b03fd6988ae861b6986e0d2ceda455f4d52d9cc88354b442719dd0420bc3a400
      • Instruction Fuzzy Hash: B951A072204615EFDB21DF64DC44EFB77A8FB48304F05091AF95AC6291CB38E891DB59
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$ClientMetricsRectReleaseText
      • String ID:
      • API String ID: 3867337699-0
      • Opcode ID: 32a30d3cff92dd6975636e27bfcf35d0179d615ddfa8e0b2cf30ecae60008dc2
      • Instruction ID: daca1f2b99feeac109d88a535b67dff082b9a8570e26b87c365701f483ecbcfd
      • Opcode Fuzzy Hash: 32a30d3cff92dd6975636e27bfcf35d0179d615ddfa8e0b2cf30ecae60008dc2
      • Instruction Fuzzy Hash: 3E4149B1D04209EFCF11DFA4C8449FEBBB9FF48344F10846AE556A7260D735AA45CBA4
      APIs
      • GetSystemMetrics.USER32(00000000), ref: 00416D29
      • GetSystemMetrics.USER32(00000001), ref: 00416D30
      • GetDesktopWindow.USER32 ref: 00416D3B
      • GetWindowRect.USER32(?,?), ref: 00416D51
      • GetWindowRect.USER32(00000000,?), ref: 00416D66
      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00416DCB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$MetricsRectSystem$DesktopMove
      • String ID:
      • API String ID: 1445645410-0
      • Opcode ID: 7541982c7b9581dd7087a64f86910e52b7f4c9e2cf818646124077db85a8bb75
      • Instruction ID: 6e6b27899317e0736f14ab92190a4db21f219cf176277ebf8c48fd9c9733da6a
      • Opcode Fuzzy Hash: 7541982c7b9581dd7087a64f86910e52b7f4c9e2cf818646124077db85a8bb75
      • Instruction Fuzzy Hash: C2214C75B0020AAFCF04CEB9DD84AEE7BB5EB88315F158039E909E7244DA74E9818B54
      APIs
      • GetClientRect.USER32(?,?), ref: 0041BA64
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0041BAA2
      • SetScrollPos.USER32(?,00000001,00000000,00000001), ref: 0041BAAF
      • SetScrollPos.USER32(?,00000001,?,00000001), ref: 0041BACD
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0041BADF
      • UpdateWindow.USER32(?), ref: 0041BAFB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$InvalidateScroll$ClientUpdateWindow
      • String ID:
      • API String ID: 2610322746-0
      • Opcode ID: 5e976f881fbfd72b37f8274cadf0f16dd3249562eae8fd7308e452870158ea3f
      • Instruction ID: 4dcbc449fa691a7750499e2077c2e711c9dd26452e32f1dbea7e52cb17fcd9d2
      • Opcode Fuzzy Hash: 5e976f881fbfd72b37f8274cadf0f16dd3249562eae8fd7308e452870158ea3f
      • Instruction Fuzzy Hash: 8921B4B0294705AFEB209B64CC89FFB76ACFF00791F540416B656D51D1C7F8A880D6AD
      APIs
      • CreateDialogParamA.USER32(?,?,?,?,00000000), ref: 004269BF
      • GetClientRect.USER32(?,?), ref: 004269D5
      • MoveWindow.USER32(00000000,00000011,?,?,?,00000001), ref: 004269F7
      • ShowWindow.USER32(00000000,00000005,00000000,?,00000000,000002A5), ref: 00426A0C
      • ShowWindow.USER32(?,00000000), ref: 00426A18
      • SetFocus.USER32(00000000), ref: 00426A1E
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Show$ClientCreateDialogFocusMoveParamRect
      • String ID:
      • API String ID: 711945400-0
      • Opcode ID: 58aad92e4b91ab8750a4a1b11ffe64da12abdcfa380bc2ef3f1c645f1495a0ff
      • Instruction ID: 0268c966e1009368f878f118b1a4abb31f96858f235ec859a5005231e1c68273
      • Opcode Fuzzy Hash: 58aad92e4b91ab8750a4a1b11ffe64da12abdcfa380bc2ef3f1c645f1495a0ff
      • Instruction Fuzzy Hash: EF11C4B2200304AFD7209F69DC85E6BBBEDEF58710B05052AFA47D3262D670EC00CB28
      APIs
      • GlobalHandle.KERNEL32(?), ref: 00410EC5
      • GlobalUnlock.KERNEL32(00000000,?,?,00410F52,?), ref: 00410EC8
      • GlobalHandle.KERNEL32(?), ref: 00410EDA
      • GlobalReAlloc.KERNEL32(00000000), ref: 00410EDD
      • GlobalLock.KERNEL32(00000000,?,?,00410F52,?), ref: 00410EE4
      • CharUpperA.USER32(?,?,?,00410F52,?), ref: 00410EFC
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$Handle$AllocCharLockUnlockUpper
      • String ID:
      • API String ID: 4211404105-0
      • Opcode ID: cb886916f7c55d1133f19df2847b9bf95eaa6f10f5d22f08c19a85a9ec6ae0a0
      • Instruction ID: cf67e8a809c4ace78b47eea1217399f5bf0e94b19664466342913ab8ef342d57
      • Opcode Fuzzy Hash: cb886916f7c55d1133f19df2847b9bf95eaa6f10f5d22f08c19a85a9ec6ae0a0
      • Instruction Fuzzy Hash: EB1114B15007029FD7308F2AD884A53BBF5EB44315B10896EE49A87B61C7B8E886CF94
      APIs
        • Part of subcall function 004182F4: LoadStringA.USER32(00001A64,?,00000020), ref: 0041832C
        • Part of subcall function 004182F4: LoadStringA.USER32(00001A66,?,00000020), ref: 0041833F
      • lstrcpyA.KERNEL32(?,Layout,?), ref: 004183A9
      • lstrcpyA.KERNEL32(?,Text), ref: 004183B4
      • lstrcpyA.KERNEL32(?,Advanced), ref: 004183C5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcpy$LoadString
      • String ID: Advanced$Layout$Text
      • API String ID: 2270206385-1855523771
      • Opcode ID: b9a18a27a3aa8b406a097278ab7523e9960c51094846cd18b8f6274b83933ffe
      • Instruction ID: e505fab056386b24d75c996278c193c7f718295b096bc15464968ed3b490a53b
      • Opcode Fuzzy Hash: b9a18a27a3aa8b406a097278ab7523e9960c51094846cd18b8f6274b83933ffe
      • Instruction Fuzzy Hash: 5511E4B1A01B05AFC711DF6AC9C8986FBE8BF58308710882FD14A8B611D7B5F459CB94
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DeleteObject$CursorDestroyH_prolog
      • String ID:
      • API String ID: 434556251-0
      • Opcode ID: cacf921051ad3a6b1d7240a0e6d9e5033b88e6646d266a44c0c9e3a6157d7f54
      • Instruction ID: 0e7361507eb8628596049cf1a290dba374992760773ff85ae41c74426b0d83b7
      • Opcode Fuzzy Hash: cacf921051ad3a6b1d7240a0e6d9e5033b88e6646d266a44c0c9e3a6157d7f54
      • Instruction Fuzzy Hash: AF01A130610754DFCB25AF66C809A9FBBB5EFC4314F10496EE092976A0CBB8AC41CF54
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrlen$TextWindowlstrcpy
      • String ID:
      • API String ID: 3464547807-0
      • Opcode ID: c96d02368233a5eee18a3ad5d71173254907aaefab841d4ec7b1fb2a3e36b98a
      • Instruction ID: d32f8d357c40824f46a0e9f09ee775353c0a8c075854890c43b68d75eba4cf46
      • Opcode Fuzzy Hash: c96d02368233a5eee18a3ad5d71173254907aaefab841d4ec7b1fb2a3e36b98a
      • Instruction Fuzzy Hash: 95012575D0821D6ADF61E7A4DC08BEE7BECBB44310F1484B69584D2140DA74AA4DCFE5
      APIs
      • GlobalAlloc.KERNEL32(00000042,00000010,76933EB0,0042900B,00447200,00000000,00000010,?,?,?), ref: 00428B55
      • GlobalLock.KERNEL32(00000000,?,?,?), ref: 00428B5C
        • Part of subcall function 00428DB0: GlobalAlloc.KERNEL32(00000042,00000010,00428B82,?,?,?,?), ref: 00428DB4
        • Part of subcall function 00428DB0: GlobalLock.KERNEL32(00000000,?,?,?), ref: 00428DBB
      • GlobalHandle.KERNEL32(00000000), ref: 00428B94
      • GlobalUnlock.KERNEL32(00000000,?,?,?,?), ref: 00428B97
      • GlobalHandle.KERNEL32(00000000), ref: 00428B9E
      • GlobalFree.KERNEL32(00000000), ref: 00428BA1
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$AllocHandleLock$FreeUnlock
      • String ID:
      • API String ID: 2354309331-0
      • Opcode ID: b4a9161a6d891504c437656afe67022b6c244ba79bf2ae6472b2a11918f1b97c
      • Instruction ID: 51703ef101f8e7dbffef4280d6a027348968e82bd0fb4a51e81ceb0c886a8664
      • Opcode Fuzzy Hash: b4a9161a6d891504c437656afe67022b6c244ba79bf2ae6472b2a11918f1b97c
      • Instruction Fuzzy Hash: 9BF030F26057215BDB206F75BC08E8B7BE8AF85710B414429F985D3710DB78E8418B98
      APIs
      • GetDC.USER32(00000001), ref: 00416CB7
      • GetStockObject.GDI32(0000000C), ref: 00416CC1
      • SelectObject.GDI32(00000000,00000000), ref: 00416CCF
      • GetTextMetricsA.GDI32(00000000,?), ref: 00416CD8
      • SelectObject.GDI32(00000000,00000000), ref: 00416CE0
      • ReleaseDC.USER32(00000001,00000000), ref: 00416CE6
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Select$MetricsReleaseStockText
      • String ID:
      • API String ID: 3540026775-0
      • Opcode ID: 3eca307554a3baf37b02b4af9c8ae3b05bc119b5559154845373cec3ac2ac9f0
      • Instruction ID: fe478a015b96522aa787beb6b6f7e2ad1797449e0ab88d9fbd4bc7e97a0070b6
      • Opcode Fuzzy Hash: 3eca307554a3baf37b02b4af9c8ae3b05bc119b5559154845373cec3ac2ac9f0
      • Instruction Fuzzy Hash: 49F03072504008BBE7116BA5EC88CAF7FBCDB89695B004022FA45D6160D7309841DBF4
      APIs
      • __EH_prolog.LIBCMT ref: 00412D6B
      • lstrcpyA.KERNEL32(00000000,?), ref: 00412E03
      • lstrcatA.KERNEL32(00000000,?), ref: 00412E1F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: H_prologlstrcatlstrcpy
      • String ID: QAA$Save As
      • API String ID: 1260663600-4051652275
      • Opcode ID: ebf7f0f8d2666cadae7e531aee0aa205736cedbf6149e82fc4e22f71b5526468
      • Instruction ID: 8a9c1b373d580684919e6718cdd791cba652367444346c0b4dc55a28f1fbf685
      • Opcode Fuzzy Hash: ebf7f0f8d2666cadae7e531aee0aa205736cedbf6149e82fc4e22f71b5526468
      • Instruction Fuzzy Hash: 2A517E71B042299EDB15EF65DC41BEEBBB4AF09308F50419EF409E2181DB785E84CF5A
      APIs
      • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,00000000,?), ref: 0042C92B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: FileWrite
      • String ID: $uC
      • API String ID: 3934441357-2107157175
      • Opcode ID: e19963a3b30c727fddbfef5babaa5653edbedc006450c84b9cf5d31ab01dc5ba
      • Instruction ID: d1ae1cdd3427ea045db711e12ad2f8c32e0632df0437e59432ff7e5423969eb1
      • Opcode Fuzzy Hash: e19963a3b30c727fddbfef5babaa5653edbedc006450c84b9cf5d31ab01dc5ba
      • Instruction Fuzzy Hash: 5451D2B1A00218EFCB11CF68D8C4AAE7BB4FF46344FA0816BE555DB250D774D980CB59
      APIs
      • GetVersionExA.KERNEL32 ref: 0042DB2B
      • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 0042DB60
      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0042DBC0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: EnvironmentFileModuleNameVariableVersion
      • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
      • API String ID: 1385375860-4131005785
      • Opcode ID: 490722ed36e1c82266166a1aa3f974a438b1e89a0d15280e167a8f78fce80c40
      • Instruction ID: 7b132bf464c1331de4ef7604e96d30102af62b83167fbe6d503d11ac05d98937
      • Opcode Fuzzy Hash: 490722ed36e1c82266166a1aa3f974a438b1e89a0d15280e167a8f78fce80c40
      • Instruction Fuzzy Hash: 00316A71F052B82DEB3196717C65BDA7B688B06304FA400DBD185D7242E67CEEC9CB19
      APIs
      • SetScrollPos.USER32(?,00000001,00000000,00000001), ref: 0041B147
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0041B156
      • GetParent.USER32(?), ref: 0041B182
      • MessageBoxA.USER32(00000000), ref: 0041B189
      Strings
      • This search word has been removed from the word index as it occurs too often. To change the maximum number of times a word may occur before being excluded, please change the Word Index Options from the Tools menu.Do you want to continue to display this mes, xrefs: 0041B177
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: InvalidateMessageParentRectScroll
      • String ID: This search word has been removed from the word index as it occurs too often. To change the maximum number of times a word may occur before being excluded, please change the Word Index Options from the Tools menu.Do you want to continue to display this mes
      • API String ID: 3753924916-6526060
      • Opcode ID: c5b533e08a99a8cdd13883f0ce2a30f2788cd0b11ed5f8d671d2a9c4ef37cc41
      • Instruction ID: 871e9e4237386e8684cf0c94619ba6d1c10a883b8185f15b3f5a638a4b736e62
      • Opcode Fuzzy Hash: c5b533e08a99a8cdd13883f0ce2a30f2788cd0b11ed5f8d671d2a9c4ef37cc41
      • Instruction Fuzzy Hash: 5F317EB1600B00AFD320DF69C995F97B7E9FF44344F10452EE65A8B252D775A881CF88
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Event
      • String ID: Request complete$Request error: %s
      • API String ID: 4201588131-138420935
      • Opcode ID: 6234f74e7a363fa1cce58f99c2c9f6955d76ffd992466065d3820db1c7bf4d96
      • Instruction ID: 6ffde28c8c95679ae0cac37d4c26fe16d675e27133ad217d308aed98d7097676
      • Opcode Fuzzy Hash: 6234f74e7a363fa1cce58f99c2c9f6955d76ffd992466065d3820db1c7bf4d96
      • Instruction Fuzzy Hash: 8121F472708321AFE7309F21ED41E2B77A9AB04704B41492FF64652601CB7DA919DBAD
      APIs
      • GetMenuItemCount.USER32(?), ref: 00405424
      • GetMenuItemInfoA.USER32(?,00000000,00000001,?), ref: 00405450
      • EnableMenuItem.USER32(?,00000000,00000000), ref: 0040547E
      • GetMenuItemCount.USER32(?), ref: 00405486
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ItemMenu$Count$EnableInfo
      • String ID: ,
      • API String ID: 4244199141-3772416878
      • Opcode ID: 5c2e6f996d36970e8ec0fa684d22adf4c0b72cffd54d56d261c74f601cb5ca54
      • Instruction ID: 58227d91f0725cda91b52bfa700d2be79e54fae318f84239a891035f91dc5beb
      • Opcode Fuzzy Hash: 5c2e6f996d36970e8ec0fa684d22adf4c0b72cffd54d56d261c74f601cb5ca54
      • Instruction Fuzzy Hash: C60156B1900218BAEB219BA5EC89FEFBB7DEB44315F00802AF941B61D1D7785945CF64
      APIs
      • wsprintfA.USER32 ref: 00407D21
      • wsprintfA.USER32 ref: 00407D55
      • SendMessageA.USER32(?,00000401,00000000,?), ref: 00407D71
        • Part of subcall function 004038B4: LoadStringA.USER32(00407701,00000000,00000200,00000000), ref: 004038DD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: wsprintf$LoadMessageSendString
      • String ID: %s %ld$%s %ld - %ld
      • API String ID: 313507221-4166707028
      • Opcode ID: 9ce26406aae3cb595b5e3fe27fe3713587030f59c8b9c208471260d48e0a05e3
      • Instruction ID: 4aa1de3b7c5e720e7c12917349fcd90aac329d66436535f4a4243da9e26a3aac
      • Opcode Fuzzy Hash: 9ce26406aae3cb595b5e3fe27fe3713587030f59c8b9c208471260d48e0a05e3
      • Instruction Fuzzy Hash: A211C272500204FBCB216F64EC46ED6BFE9EF48700F00846EF64AAA191D776B614DB58
      APIs
      • wsprintfW.USER32 ref: 00428C9C
      • MessageBoxA.USER32(00000000,Ole Error,Insufficient memory; please close some applications and try again.,00000000), ref: 00428CCF
      Strings
      • Insufficient memory; please close some applications and try again., xrefs: 00428CC4
      • Ole Error, xrefs: 00428CC9
      • REOBJ%ld, xrefs: 00428C96
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Messagewsprintf
      • String ID: Insufficient memory; please close some applications and try again.$Ole Error$REOBJ%ld
      • API String ID: 300413163-3865698872
      • Opcode ID: 109a2f416d4cf34c41e0fbcf82035f3027729712c8d1d3bdca34c5ea01317dfe
      • Instruction ID: 0527986464426b545bcdab799aab75fb6e49748148f0b47826f90c9917b5e92f
      • Opcode Fuzzy Hash: 109a2f416d4cf34c41e0fbcf82035f3027729712c8d1d3bdca34c5ea01317dfe
      • Instruction Fuzzy Hash: 90018F75240300ABE320DB1AEC88EA7B7F8FBD8314F40445EE999C3261D774A854CB64
      APIs
      • LoadCursorA.USER32(00000000,00007F00), ref: 00426B14
      • GetSysColor.USER32(0000000F), ref: 00426B1F
      • CreateSolidBrush.GDI32(00000000), ref: 00426B26
      • RegisterClassA.USER32(?), ref: 00426B3D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: BrushClassColorCreateCursorLoadRegisterSolid
      • String ID: TabbedDlgClass
      • API String ID: 3559002682-3631343754
      • Opcode ID: 8ffa231feac20c56e14c6b5f9e1afc5eb121e4e48365991c3b9d6a267cca2877
      • Instruction ID: 65fd5bbe19038e99ccdd581eb2635e865a5c8bf64ba3aa3307c647255ba1ad43
      • Opcode Fuzzy Hash: 8ffa231feac20c56e14c6b5f9e1afc5eb121e4e48365991c3b9d6a267cca2877
      • Instruction Fuzzy Hash: 93F0CFB1C15329ABDB10DFE8A8496DEBFF8FB09704F10506AE641E6250D7B85640CBE8
      APIs
      • IsBadWritePtr.KERNEL32(?,?,000000FE,00000000), ref: 0042E816
      • IsBadWritePtr.KERNEL32(?,000041C4,?,000000FE,00000000), ref: 0042E84F
      • IsBadWritePtr.KERNEL32(00008000,00008000,?,000000FE,00000000), ref: 0042E8AF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Write
      • String ID: $@
      • API String ID: 3165279579-1077428164
      • Opcode ID: 1da079d3a1439e717fdd2323ae867b5f0dea250080b5103358dd48ec0298fb12
      • Instruction ID: dc29893b2a40b23f46556d86006aa0a2fb94c1e98d2e2b03048c3a86d90de781
      • Opcode Fuzzy Hash: 1da079d3a1439e717fdd2323ae867b5f0dea250080b5103358dd48ec0298fb12
      • Instruction Fuzzy Hash: 4FA18E30A00135DBCF24CF5AE880AAEB7B0FF45324FB4426BD422A76D1D778A941DB59
      APIs
      • SelectObject.GDI32(?,?), ref: 0041EEF7
      • GetTextMetricsA.GDI32(?,?), ref: 0041EF0A
      • SetRect.USER32(?,00000000,00000000,?,00000000), ref: 0041EFFB
      • SelectObject.GDI32(?,?), ref: 0041F00D
        • Part of subcall function 00416935: GetTickCount.KERNEL32 ref: 00416943
        • Part of subcall function 00416935: GetTickCount.KERNEL32 ref: 00416952
        • Part of subcall function 00416935: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0041696A
        • Part of subcall function 00416935: TranslateMessage.USER32(?), ref: 00416974
        • Part of subcall function 00416935: DispatchMessageA.USER32(?), ref: 0041697E
        • Part of subcall function 004168F2: GetWindowLongA.USER32(000005DC,00000008), ref: 004168FB
        • Part of subcall function 004168F2: IsWindowVisible.USER32(000005DC), ref: 00416904
        • Part of subcall function 004168F2: ShowWindow.USER32(000005DC,00000005), ref: 00416911
        • Part of subcall function 004168F2: UpdateWindow.USER32(000005DC), ref: 00416918
      • SelectObject.GDI32(?,?), ref: 0041F0FB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$MessageObjectSelect$CountTick$DispatchLongMetricsPeekRectShowTextTranslateUpdateVisible
      • String ID:
      • API String ID: 2014783612-0
      • Opcode ID: 36d150f792549bae6722f0334d22410c953fbbcce7c589b41c3896a34bb21e54
      • Instruction ID: 3005a5977370229453aaaa79a391a5f354bea0a2158c22c0906aa3fc51d4c6d4
      • Opcode Fuzzy Hash: 36d150f792549bae6722f0334d22410c953fbbcce7c589b41c3896a34bb21e54
      • Instruction Fuzzy Hash: A3714AB5A01704DFCB24DFA5C880AEAB7F5FF48309F10442EE66A97252D735AD46CB08
      APIs
      • GetStartupInfoA.KERNEL32(?), ref: 0042FE35
      • GetFileType.KERNEL32(00000800), ref: 0042FEDB
      • GetStdHandle.KERNEL32(-000000F6), ref: 0042FF34
      • GetFileType.KERNEL32(00000000), ref: 0042FF42
      • SetHandleCount.KERNEL32 ref: 0042FF79
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: FileHandleType$CountInfoStartup
      • String ID:
      • API String ID: 1710529072-0
      • Opcode ID: 5da3ccb0497b1f05a5e7f24cd6d758ae18ebea4f3d17a78032750b47108dc95b
      • Instruction ID: 703c2a037f5767a463947d6c42d64da21c76c0a220f8f181bdcb0c6cde41eb3b
      • Opcode Fuzzy Hash: 5da3ccb0497b1f05a5e7f24cd6d758ae18ebea4f3d17a78032750b47108dc95b
      • Instruction Fuzzy Hash: A85106717082214BD7219B28ED4475A37B0EB13328FD6467FE9A6C73E1DB289849C70D
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$MetricsReleaseText
      • String ID:
      • API String ID: 594571999-0
      • Opcode ID: 5519dc83b351f8fa950d3875bd6b5c6162ce3224d617b618a2e2a396c763dee6
      • Instruction ID: 975f6d8a183f669b4aa259a088fa31accd30836f8230add46a915a1b0cbd0a26
      • Opcode Fuzzy Hash: 5519dc83b351f8fa950d3875bd6b5c6162ce3224d617b618a2e2a396c763dee6
      • Instruction Fuzzy Hash: CD516A75900209EFCB14CFA4CC849FEBBB9FF08305B14846AE552A7210D738E985DB64
      APIs
      • GetTickCount.KERNEL32 ref: 0041B1CC
      • CharUpperA.USER32(?), ref: 0041B201
      • SetScrollPos.USER32(?,00000001,?,00000001), ref: 0041B2E3
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0041B2EF
      • GetTickCount.KERNEL32 ref: 0041B2F5
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CountTick$CharInvalidateRectScrollUpper
      • String ID:
      • API String ID: 3182909612-0
      • Opcode ID: 67e334d520b1fd968d903632f619050dc62da8891c6bd9572266bc0bc0cc8779
      • Instruction ID: 9fc53ec2ec032cd1f8e2e68bb83236cde7ea095514facf1045369165a5fd5760
      • Opcode Fuzzy Hash: 67e334d520b1fd968d903632f619050dc62da8891c6bd9572266bc0bc0cc8779
      • Instruction Fuzzy Hash: 9241F3B11047009FD724DF64C8D5BEABBE4EF05304F14889DE69A4B292C7B5B889CB9D
      APIs
      • GetScrollPos.USER32(?,00000001), ref: 00415DFC
      • GetClientRect.USER32(?,?), ref: 00415E0D
        • Part of subcall function 00414C05: GetWindowRect.USER32(?,?), ref: 00414C1A
      • ScrollWindow.USER32(?,00000000,00000000,00000000,00000000), ref: 00415E75
      • SetScrollPos.USER32(?,00000001,-00000010,00000001), ref: 00415E83
      • UpdateWindow.USER32(?), ref: 00415E8F
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ScrollWindow$Rect$ClientUpdate
      • String ID:
      • API String ID: 1812947832-0
      • Opcode ID: 93d1a5eacccbe883448f3555586056b0889ffd681a98ea1aadfcb5608ff3670a
      • Instruction ID: 669c8a6444262e66e85e6436e6c486005bf9b38a7aec43b6698f8fc0cb666f0d
      • Opcode Fuzzy Hash: 93d1a5eacccbe883448f3555586056b0889ffd681a98ea1aadfcb5608ff3670a
      • Instruction Fuzzy Hash: 3D218075910704DFCB349F15DC88AEB77B6EBC1700B15092AE442D7260C774AE85DB08
      APIs
      • GetScrollPos.USER32(?,00000000), ref: 00415EAF
      • GetClientRect.USER32(?,?), ref: 00415EC3
        • Part of subcall function 00414C05: GetWindowRect.USER32(?,?), ref: 00414C1A
      • ScrollWindow.USER32(?,00000000,00000000,00000000,00000000), ref: 00415F34
      • SetScrollPos.USER32(?,00000000,-00000020,00000001), ref: 00415F45
      • UpdateWindow.USER32(?), ref: 00415F57
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ScrollWindow$Rect$ClientUpdate
      • String ID:
      • API String ID: 1812947832-0
      • Opcode ID: 8e2fbcee164c5a476c0bc200fcaf5d4a199e4a8f161430c41062834c50266952
      • Instruction ID: 0c8b2e79401afe263e314f66fdf62d1e49b129eea78a95152b57f3c0b34a1276
      • Opcode Fuzzy Hash: 8e2fbcee164c5a476c0bc200fcaf5d4a199e4a8f161430c41062834c50266952
      • Instruction Fuzzy Hash: 29216271510504EBCB34AB65CC88AEBBBA6EBC4300F55052AF55697260CB75BC83DB58
      APIs
      • GetDC.USER32(?), ref: 0041B565
      • GetClientRect.USER32(?,?), ref: 0041B575
      • InvertRect.USER32(?,?), ref: 0041B5E8
      • SetCapture.USER32(?,?,?,?,?,0041B540,?,00000000), ref: 0041B5FD
      • ReleaseDC.USER32(?,?), ref: 0041B609
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Rect$CaptureClientInvertRelease
      • String ID:
      • API String ID: 2533136114-0
      • Opcode ID: 67839a25e47fd6e1a2cc5c7060136e4e52d91bf9b0bbaa399472bf125653e250
      • Instruction ID: dc6698103d554749a98bd19b981c89d0ac71983240f7df524aa4c069c22cf8d2
      • Opcode Fuzzy Hash: 67839a25e47fd6e1a2cc5c7060136e4e52d91bf9b0bbaa399472bf125653e250
      • Instruction Fuzzy Hash: FF215E71A00108EFCF11CF95CD85AEEBFB9FF58301F10442AE546A3250C735AA91DB95
      APIs
      • GlobalLock.KERNEL32(?,00000000,?,00000008,?,?,004232FE,?,?,00000008,00000000,00000001,00000001,?,?,00000008), ref: 0042410A
      • lstrcpyA.KERNEL32(?,?,?,004232FE,?,?,00000008,00000000,00000001,00000001,?,?,00000008,?,?,?), ref: 0042412C
      • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,0000000A,?,004232FE,?,?,00000008,00000000,00000001,00000001,?,?), ref: 0042417F
      • GetLastError.KERNEL32 ref: 00424192
      • GlobalUnlock.KERNEL32(?,00000000,?,?,00000000,00000000,0000000A,?,004232FE,?,?,00000008,00000000,00000001,00000001,?), ref: 004241A1
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$DocumentErrorLastLockPropertiesUnlocklstrcpy
      • String ID:
      • API String ID: 482598960-0
      • Opcode ID: 22ea0df652300f1482029cfa82083d5aa34b9fa3d4d63a70f8e3cef7bd4d11b9
      • Instruction ID: c4aab669fe007fa971c5d80287ce1056da7e323ea3f9f315bd49283787479663
      • Opcode Fuzzy Hash: 22ea0df652300f1482029cfa82083d5aa34b9fa3d4d63a70f8e3cef7bd4d11b9
      • Instruction Fuzzy Hash: 4821D530604715EFDB209F21EC885EBBBF4FF19354F40052EE85A86320D375A9A0DB59
      APIs
      • GetClientRect.USER32(?,?), ref: 0041B9C5
      • GetScrollInfo.USER32(?,00000001,?), ref: 0041BA01
      • SetScrollPos.USER32(?,00000001,?,00000001), ref: 0041BA13
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0041BA1E
      • UpdateWindow.USER32(?), ref: 0041BA46
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: RectScroll$ClientInfoInvalidateUpdateWindow
      • String ID:
      • API String ID: 751044016-0
      • Opcode ID: 091c0de188a980d88e5e1c1ffd4bc34089ebe343b4681242d05f925591a9791d
      • Instruction ID: 10c97e6ca61d69f651588b254712ce8641425e1120294250f611c643c60af9d7
      • Opcode Fuzzy Hash: 091c0de188a980d88e5e1c1ffd4bc34089ebe343b4681242d05f925591a9791d
      • Instruction Fuzzy Hash: 98119471504208ABDB209B95CC89FFEB7BCEF45740F14041BF942E21A0C3B49885D6A9
      APIs
      • SendDlgItemMessageA.USER32(?,00001A4D,00000147,00000000,00000000), ref: 0041A2D4
        • Part of subcall function 0041A1BD: wsprintfA.USER32 ref: 0041A1CF
        • Part of subcall function 0041A1BD: lstrlenA.KERNEL32(00446E60,0043F624,0041A94A,0043F624), ref: 0041A1D9
      • SetDlgItemTextA.USER32(?,00001A49,00000000), ref: 0041A30A
      • SetDlgItemTextA.USER32(?,00001A4B,00000000), ref: 0041A320
      • SetDlgItemTextA.USER32(?,00001A4A,00000000), ref: 0041A336
      • SetDlgItemTextA.USER32(?,00001A4C,00000000), ref: 0041A34C
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Item$Text$MessageSendlstrlenwsprintf
      • String ID:
      • API String ID: 3689792990-0
      • Opcode ID: 887371cced08f62526b3303bd6f9a88a7368fdc3e44bc397fdfb2f509badb58d
      • Instruction ID: 21b6e28aebfca2034b593c26436563f5902b3cd71a46aa76b11147f2cb778093
      • Opcode Fuzzy Hash: 887371cced08f62526b3303bd6f9a88a7368fdc3e44bc397fdfb2f509badb58d
      • Instruction Fuzzy Hash: 2D01DF353022087FE6102B619C01FEB766DDBE5755F04183EFE1B95193CAA4A828962E
      APIs
      • GetParent.USER32(00000001), ref: 00416DE1
      • GetWindowRect.USER32(00000001,?), ref: 00416DF0
      • ScreenToClient.USER32(00000000,?), ref: 00416E01
      • ScreenToClient.USER32(00000000,00000001), ref: 00416E08
      • MoveWindow.USER32(00000001,00000000,?,?,?,?,00000000,00000001,?,004042B0,?,?,(uC), ref: 00416E41
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClientScreenWindow$MoveParentRect
      • String ID:
      • API String ID: 3734752182-0
      • Opcode ID: f0f4062d4230a2ad4bf4f58996ad8f74054dabfa2d44ce57514d8cfb116f761a
      • Instruction ID: 0571ce558f13d2804022fa109ee18c25e1cb910e4fa7e689fe10381004552c47
      • Opcode Fuzzy Hash: f0f4062d4230a2ad4bf4f58996ad8f74054dabfa2d44ce57514d8cfb116f761a
      • Instruction Fuzzy Hash: CC01C576900119AFCF12DFA4DD84CFE7B79EB44350B008169FD55A2210DB30EA91DB94
      APIs
      • GetTickCount.KERNEL32 ref: 00416943
      • GetTickCount.KERNEL32 ref: 00416952
      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0041696A
      • TranslateMessage.USER32(?), ref: 00416974
      • DispatchMessageA.USER32(?), ref: 0041697E
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Message$CountTick$DispatchPeekTranslate
      • String ID:
      • API String ID: 3906477200-0
      • Opcode ID: 715725a5e2a00f58d11943aa8f9feded5b2da4945ff0e1835035d53a1e1b1479
      • Instruction ID: 8fbe111464f2179caf08aab183c9ce3f86923adbe6342992b87378ed7f00ea1c
      • Opcode Fuzzy Hash: 715725a5e2a00f58d11943aa8f9feded5b2da4945ff0e1835035d53a1e1b1479
      • Instruction Fuzzy Hash: 64F068B6D0014967CB20ABA9DC44DEB7BBCDBCAB44B010076F501D3140D6649441CB75
      APIs
      • GetWindowLongA.USER32(00000064,00000000), ref: 0041699F
      • GetTickCount.KERNEL32 ref: 004169B8
      • GetDC.USER32(00000064), ref: 004169CE
      • ReleaseDC.USER32(00000064,00000064), ref: 004169E6
      • GetTickCount.KERNEL32 ref: 004169EC
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CountTick$LongReleaseWindow
      • String ID:
      • API String ID: 2380013091-0
      • Opcode ID: 41814ebd65ae273d5d1d7698818d16784145e0062ec50c3e8b35a219e9755fbe
      • Instruction ID: c8d24ebaa5c68e1728fc9d6194d1fabac0d679b87cffd82d71835c58b3b724a2
      • Opcode Fuzzy Hash: 41814ebd65ae273d5d1d7698818d16784145e0062ec50c3e8b35a219e9755fbe
      • Instruction Fuzzy Hash: A9F031F5500304ABDB20AF6AEC84A8ABFECEF45750F11443AF94983211D674D450CBA5
      APIs
      • GetClientRect.USER32(?,?), ref: 00407F3B
      • GetCursorPos.USER32(?), ref: 00407F45
      • ScreenToClient.USER32(?,?), ref: 00407F52
      • LoadCursorA.USER32(000002A7), ref: 00407F7C
      • SetCursor.USER32(00000000), ref: 00407F83
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$Client$LoadRectScreen
      • String ID:
      • API String ID: 1568396109-0
      • Opcode ID: db1611ba18ab63012f3ec215fd2fe3b404e89440ce6b0e64597a1769308252d6
      • Instruction ID: 620268515b04a240cb50067140649e6ed8c76cd0a5a8b2a486db92f5125087b8
      • Opcode Fuzzy Hash: db1611ba18ab63012f3ec215fd2fe3b404e89440ce6b0e64597a1769308252d6
      • Instruction Fuzzy Hash: D9F0A47190820AAFDF209FA4DC49DAE7FB8EB04340F00043AFD82D21A0D774B985DB59
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CaptureRelease$InvertRect
      • String ID:
      • API String ID: 713726679-0
      • Opcode ID: 81158b9b33d3bebefcdec4bcd6f70b9ca3b4e8bb6960d1d575bae356dd96afa8
      • Instruction ID: af55e6c05506e798bdf119320d1e2210c298f9ea1317a9c23646b005ba3bfedf
      • Opcode Fuzzy Hash: 81158b9b33d3bebefcdec4bcd6f70b9ca3b4e8bb6960d1d575bae356dd96afa8
      • Instruction Fuzzy Hash: A4013C72100204EFDB216F64DC48BDB7FB9FF94352F014436FA9A86160C775A8A1DBA9
      APIs
      • GetDC.USER32(?), ref: 0041CC77
      • SelectObject.GDI32(00000000,?), ref: 0041CC89
      • GetTextMetricsA.GDI32(00000000,?), ref: 0041CC93
      • SelectObject.GDI32(00000000,?), ref: 0041CC9D
      • ReleaseDC.USER32(?,00000000), ref: 0041CCA3
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$MetricsReleaseText
      • String ID:
      • API String ID: 594571999-0
      • Opcode ID: 37dc436d79dacc18c0030932d9c8fe4ab35892c8534859dbf33054b510f93ff8
      • Instruction ID: 4d7b4660606bd293678217ccec182035eafa26ab82b0441788c31994fb15f271
      • Opcode Fuzzy Hash: 37dc436d79dacc18c0030932d9c8fe4ab35892c8534859dbf33054b510f93ff8
      • Instruction Fuzzy Hash: E0F030B6500208FFD7217BA5EC48C9FBBBCEB482107005426F94292131DA71AC109BA0
      APIs
      • GetDC.USER32(?), ref: 0041CC2F
      • SelectObject.GDI32(00000000,?), ref: 0041CC41
      • GetTextMetricsA.GDI32(00000000,?), ref: 0041CC4B
      • SelectObject.GDI32(00000000,?), ref: 0041CC55
      • ReleaseDC.USER32(?,00000000), ref: 0041CC5B
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$MetricsReleaseText
      • String ID:
      • API String ID: 594571999-0
      • Opcode ID: 0e5632f3cd1e1461ad46a7d6d8fb9c982390fa2edb5f0bccee32ea8e0360df99
      • Instruction ID: f51f71b1a1878cae766f95fd9a5462c2137bf5133350017aa29d18d3136a6b13
      • Opcode Fuzzy Hash: 0e5632f3cd1e1461ad46a7d6d8fb9c982390fa2edb5f0bccee32ea8e0360df99
      • Instruction Fuzzy Hash: 2BF030B6500208FFD7216BA5EC48C9FBFBCEB482117005426F94292131D671AC109BA0
      APIs
      • StartPage.GDI32(?), ref: 00423448
      • SetBkColor.GDI32(?,00FFFFFF), ref: 0042345F
      • SetBkColor.GDI32(?,00000000), ref: 00423468
      • MoveToEx.GDI32(?,00000200,00000200,00000000), ref: 00423479
      • EndPage.GDI32(?), ref: 00423485
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ColorPage$MoveStart
      • String ID:
      • API String ID: 2096235825-0
      • Opcode ID: 20b5033b6b8da68d898e2be0f1e098173c0918df9eadbd8cdde2866633792f6c
      • Instruction ID: 76de670a0012077283748a0d59a49e52cb7bcdf21a08323467bfcede0826ed24
      • Opcode Fuzzy Hash: 20b5033b6b8da68d898e2be0f1e098173c0918df9eadbd8cdde2866633792f6c
      • Instruction Fuzzy Hash: 4DE0C97210C600AFE6651B24EC09FA77AA9EF54710F111539B4D6911B0CBA16C929A24
      APIs
      • GetWindowLongA.USER32(?,00000008), ref: 00422CA1
      • SetWindowLongA.USER32(?,00000008,?), ref: 00422CC6
      • GetParent.USER32(?), ref: 00422CD9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: LongWindow$Parent
      • String ID: N
      • API String ID: 2125864951-1130791706
      • Opcode ID: 9b7151e988b64b4339b61311ef701fa407057bf56029a1c6396ad462aefc058f
      • Instruction ID: 2ffb463d1776111d9875e0240fd9c377ca74bbdb7284981a00feef463ca4c86f
      • Opcode Fuzzy Hash: 9b7151e988b64b4339b61311ef701fa407057bf56029a1c6396ad462aefc058f
      • Instruction Fuzzy Hash: 69117C71600628BBDB318F15E988B9B7BA8FB04751F44841AFD4A9B251C7B8ED40DB94
      APIs
      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00432C63,00200020,00000000,?,00000000), ref: 0042F6DB
      • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00432C63,00200020,00000000,?,00000000), ref: 0042F6F1
      • LCMapStringW.KERNEL32(?,?,?,00000000,c,C ,?,?,00432C63,00200020,00000000,?,00000000), ref: 0042F724
      • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00432C63,00200020,00000000,?,00000000), ref: 0042F78C
      • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,c,C ,?,00000000,00000000,?,00000000,?,00432C63,00200020,00000000,?,00000000), ref: 0042F7B1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: String$ByteCharMultiWide
      • String ID: c,C
      • API String ID: 352835431-3652846715
      • Opcode ID: e61f7b5103acbecda6d6254afaeb23f390ee5ee54899d3d0372ccbe242b624dd
      • Instruction ID: c5b2a1f46514825fb93fdc45a3643c8560d263da5f745636826c2dd06ddc9c3d
      • Opcode Fuzzy Hash: e61f7b5103acbecda6d6254afaeb23f390ee5ee54899d3d0372ccbe242b624dd
      • Instruction Fuzzy Hash: 92113A72A00259AFDF228F94DC40ADEBBB5FF98750F908176F91062260D3368D61DB54
      APIs
      • GetClassNameA.USER32(?,?,00000040), ref: 00425E09
      • lstrcmpiA.KERNEL32(?,combobox), ref: 00425E18
      • GetWindow.USER32(?,00000005), ref: 00425E2D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClassNameWindowlstrcmpi
      • String ID: combobox
      • API String ID: 2460297613-2240613097
      • Opcode ID: 5482d824fc8d329272cef8a06ee342c7f9f28c9ee11aa213b624d2364718d67b
      • Instruction ID: 621db261f690b15350a4632fdf9547774396562b3ad4afc61c4f8a5eec44cbf7
      • Opcode Fuzzy Hash: 5482d824fc8d329272cef8a06ee342c7f9f28c9ee11aa213b624d2364718d67b
      • Instruction Fuzzy Hash: 2501F272300619BBDF111FA1EC05FAF3B69EB04B90F50403AFA04E61A0EB74DD129768
      APIs
      • GetSysColor.USER32(00000014), ref: 00425BD0
      • CreateSolidBrush.GDI32(00000000), ref: 00425BD7
      • CreateWindowExA.USER32(00000001,TabbedDlgClass,?,80C00000,80000000,80000000,?,?,?,00000000), ref: 00425C08
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Create$BrushColorSolidWindow
      • String ID: TabbedDlgClass
      • API String ID: 2570879405-3631343754
      • Opcode ID: 16926ab2eb5ec05fd82db0727e527f6d13e9d74526d0833369748d92895b5b6d
      • Instruction ID: 0bb6b69ba55f25be0fcc03d38b2d76a2f61fdeae5b13e472af7fbd9b2abd131a
      • Opcode Fuzzy Hash: 16926ab2eb5ec05fd82db0727e527f6d13e9d74526d0833369748d92895b5b6d
      • Instruction Fuzzy Hash: 2301C971554319AFDB20CFA8DC05FA67BE8EB08710F10452AFE49D3260D275E820DF94
      APIs
      • LoadCursorA.USER32(00000000,00007F00), ref: 00414B3B
      • RegisterClassA.USER32(qz@fKA), ref: 00414B55
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClassCursorLoadRegister
      • String ID: PNX_TranscriptWnd$qz@fKA
      • API String ID: 1693014935-3453033467
      • Opcode ID: b8f4038930ebc05fe2965593c682fadc1711561bbd26b710e65931dc8c4fda5c
      • Instruction ID: de990219f99df7f7ece95121f8cbac417a8621d6143be8d071ebc6989b62e700
      • Opcode Fuzzy Hash: b8f4038930ebc05fe2965593c682fadc1711561bbd26b710e65931dc8c4fda5c
      • Instruction Fuzzy Hash: FCF0AFB5C15229DBCB10DFA8D9456CEBFF8EB09B04F10516BE504F6240D7B456848BE9
      APIs
      • lstrcatA.KERNEL32(?,?,?,?,00000008,0042427D,?,00000001,?,00424306,00000000,00000000,?,00423395,?,?), ref: 004242BC
      • lstrcatA.KERNEL32(?,Windows error code: ,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?), ref: 004242CB
      • lstrlenA.KERNEL32(?,0000000A,?,00424306,00000000,00000000,?,00423395,?,?,?,00000008,?), ref: 004242D0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcat$lstrlen
      • String ID: Windows error code:
      • API String ID: 751011610-3697394911
      • Opcode ID: 0a9e0f501f048f06eb65386b53278d52b59c51f7e23a3189e32ddf4f83c46d45
      • Instruction ID: c7bb4688f96a5061ae0addde15ffe38261bff1b6fe1b60a75a99faa0b234e3eb
      • Opcode Fuzzy Hash: 0a9e0f501f048f06eb65386b53278d52b59c51f7e23a3189e32ddf4f83c46d45
      • Instruction Fuzzy Hash: 0AE0DFB3700211BBC2046B25EC85F9BFBACFB88311F042037B64892121C6B49C69CBB4
      APIs
      • LoadCursorA.USER32(00000000,00007F00), ref: 004167B1
      • RegisterClassA.USER32(00000002), ref: 004167CB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClassCursorLoadRegister
      • String ID: (uC$ProgressBar
      • API String ID: 1693014935-1662027708
      • Opcode ID: 8141c612ce0d5c60d43fe1cc2fe69b423793b1d40a26dfb3986882cf415d8018
      • Instruction ID: 034a3afac2126aa664130e73771cd3289d2264896ee1eb1ef7417487947ffc31
      • Opcode Fuzzy Hash: 8141c612ce0d5c60d43fe1cc2fe69b423793b1d40a26dfb3986882cf415d8018
      • Instruction Fuzzy Hash: 49F0BCB1C05229EBCB00DF98D8496CEBFF8FB08744F10506AE900B2240D7B856448BE8
      APIs
      • lstrlenA.KERNEL32(?,?,00401457), ref: 00401E9D
      • ShellExecuteA.SHELL32(00000000,open,http://www.deposchedule.com/,00000000,0043C374,00000001), ref: 00401EC5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ExecuteShelllstrlen
      • String ID: http://www.deposchedule.com/$open
      • API String ID: 1628651668-799183738
      • Opcode ID: b3b47b697cd3a05b2383ca654c480d40e71ce4d46212b2e366fc1ea5cbd19d53
      • Instruction ID: d259d123ed050f84532244bbb6f58b2b21fefd5cd4dd938fef8223467b9b1d26
      • Opcode Fuzzy Hash: b3b47b697cd3a05b2383ca654c480d40e71ce4d46212b2e366fc1ea5cbd19d53
      • Instruction Fuzzy Hash: 80D0C272684210E6CB301B20AC89F873A38EB04700F289076BE857B0E0C77928028BDC
      APIs
      • GetPropA.USER32(?,DlgKeyProc), ref: 00426362
      • SetWindowLongA.USER32(?,000000FC,00000000), ref: 0042636C
      • RemovePropA.USER32(?,DlgKeyProc), ref: 00426374
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Prop$LongRemoveWindow
      • String ID: DlgKeyProc
      • API String ID: 885655055-1425268092
      • Opcode ID: 05ee0ce747bcb84407b96ed04081cb7dd1474aa77133f292282785ff6c54bc2e
      • Instruction ID: 51c32840301955affd671738950f6c21bc78bade3d07fe3e5ef599b4a2a05286
      • Opcode Fuzzy Hash: 05ee0ce747bcb84407b96ed04081cb7dd1474aa77133f292282785ff6c54bc2e
      • Instruction Fuzzy Hash: F6D09E724090207B522127156C4CCFBBE6CEBDA671715513AFD659216147340402E6B5
      APIs
      • GetWindowLongA.USER32(?,000000FC), ref: 00426330
      • SetPropA.USER32(?,DlgKeyProc,00000000), ref: 0042633D
      • SetWindowLongA.USER32(?,000000FC,00426B88), ref: 0042634B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: LongWindow$Prop
      • String ID: DlgKeyProc
      • API String ID: 3887896539-1425268092
      • Opcode ID: 22809898a74e0fe9383831316b87c98de6398bec4427845230b2e1b3694a522f
      • Instruction ID: 04972f3a64738cd9a171c6ba687a3189d121bcf821375486c80e7262d4d132a0
      • Opcode Fuzzy Hash: 22809898a74e0fe9383831316b87c98de6398bec4427845230b2e1b3694a522f
      • Instruction Fuzzy Hash: DED0A9B200D230BB8B012708BC49CCB3E18BF1A3313301322FD70E20E18B280601D7AD
      APIs
      • GetModuleHandleA.KERNEL32(KERNEL32,00429CE3), ref: 0042D51D
      • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0042D52D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: IsProcessorFeaturePresent$KERNEL32
      • API String ID: 1646373207-3105848591
      • Opcode ID: 058eadd32f4a7db39e70fcbc685d299ebdacbc8ed1a10c18168a73f972ab75c0
      • Instruction ID: 97c2c2343ede4369e55c278104297889b575af7b7d6de1f489e9307a0882a427
      • Opcode Fuzzy Hash: 058eadd32f4a7db39e70fcbc685d299ebdacbc8ed1a10c18168a73f972ab75c0
      • Instruction Fuzzy Hash: 1BC0806074C31571D97037703C09F2754041B24B05F9454D7F141D11C1DFECC140D42D
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9191e8095f8831d3192f83fa9bdb35ab9725863355b3a4c4ebdc7c5819361fff
      • Instruction ID: c95a3c44c532febd16219e603f0e4d654eeb3d3d0d4ceed3168a2bac8a069224
      • Opcode Fuzzy Hash: 9191e8095f8831d3192f83fa9bdb35ab9725863355b3a4c4ebdc7c5819361fff
      • Instruction Fuzzy Hash: 1E7139727001306BDF226B16BC44BAF3A25DF417A0F920527FD14962A1DB38DDA1D29E
      APIs
      • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0042DC9A), ref: 0042EB48
      • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0042DC9A), ref: 0042EB6C
      • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0042DC9A), ref: 0042EB86
      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0042DC9A), ref: 0042EC47
      • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0042DC9A), ref: 0042EC5E
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AllocVirtual$FreeHeap
      • String ID:
      • API String ID: 714016831-0
      • Opcode ID: b848a6c77285f5c6017ec850d881bf955fa94859d176076bc5b7d67688ae9323
      • Instruction ID: 4e08a13471882751b05b7563ecaad4ad76ce1778a2e1229ecdadb8ccaad2fcfc
      • Opcode Fuzzy Hash: b848a6c77285f5c6017ec850d881bf955fa94859d176076bc5b7d67688ae9323
      • Instruction Fuzzy Hash: 6B3102B56407119FD330DF27EC84B22BBA0EB45754F50863AE1569B3E0E778A885CB4C
      APIs
      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000100,00000000), ref: 00430278
      • GetLastError.KERNEL32 ref: 00430282
      • ReadFile.KERNEL32(?,?,00000001,00000000,00000000), ref: 00430349
      • GetLastError.KERNEL32 ref: 00430353
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ErrorFileLastRead
      • String ID:
      • API String ID: 1948546556-0
      • Opcode ID: 006669eeaf75c50b19faa1485a4d86a0f53f7bf73c88224692be698c6d0c02b6
      • Instruction ID: 4c9ce5c587be144a59c9d8b7ca449599c948ef8846e96ee40e1e0626ba4ce3e7
      • Opcode Fuzzy Hash: 006669eeaf75c50b19faa1485a4d86a0f53f7bf73c88224692be698c6d0c02b6
      • Instruction Fuzzy Hash: 8361F531604385DFDF21CF58C8A47AE7BB4AF0A314F24629BE89197351D778D946CB0A
      APIs
      • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 00401045
      • GetClientRect.USER32(?,?), ref: 004011FD
      • GetClientRect.USER32(?,?), ref: 00401287
      • IsWindowVisible.USER32(?), ref: 004013AB
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClientRect$MessageSendVisibleWindow
      • String ID:
      • API String ID: 3528201328-0
      • Opcode ID: 83b80ba348b00430c23148385cc4e5e52a9813e2dd1e56a89df8f346e98f0b70
      • Instruction ID: 85a8ecc3eb2f6b465dbaba8823b934b483dc43d96b9d3474dd87edbb7a990713
      • Opcode Fuzzy Hash: 83b80ba348b00430c23148385cc4e5e52a9813e2dd1e56a89df8f346e98f0b70
      • Instruction Fuzzy Hash: 5F519271204604DBD714AB30D851FEA77E6AF45704F10453AF69BAB2F1CB38A846DF8A
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: __ftol$Textlstrlen
      • String ID:
      • API String ID: 1499030138-0
      • Opcode ID: 9195b4cb23bbcea9cf6befa518348e7b99a9ac0e40a60708bae89517d051c6fa
      • Instruction ID: 00a82c068d46f2b05bfebc6dfafc3ef39639c18f423a2babf9a02b0cd413f3cf
      • Opcode Fuzzy Hash: 9195b4cb23bbcea9cf6befa518348e7b99a9ac0e40a60708bae89517d051c6fa
      • Instruction Fuzzy Hash: E7414BB1100606DFCB24DF25C985AEBBBF5FF54318F01483EE65E96261C734A895CB58
      APIs
      • GetStockObject.GDI32(00000004), ref: 00425080
        • Part of subcall function 0042460F: GetDeviceCaps.GDI32(?,00000058), ref: 00424638
        • Part of subcall function 0042460F: GetDeviceCaps.GDI32(?,00000058), ref: 00424642
        • Part of subcall function 0042460F: GetDeviceCaps.GDI32(?,0000005A), ref: 0042464A
        • Part of subcall function 0042460F: GetDeviceCaps.GDI32(?,0000005A), ref: 00424654
        • Part of subcall function 0042460F: __ftol.LIBCMT ref: 00424679
        • Part of subcall function 0042460F: __ftol.LIBCMT ref: 0042468F
        • Part of subcall function 0042460F: __ftol.LIBCMT ref: 004246B1
        • Part of subcall function 0042460F: __ftol.LIBCMT ref: 004246C4
        • Part of subcall function 0042460F: SetRect.USER32(00000000,00000000,00000000,?,?), ref: 004246EA
        • Part of subcall function 0042460F: FillRect.USER32(?,?,?), ref: 004246F8
      • GetStockObject.GDI32(00000004), ref: 004250BA
      • GetStockObject.GDI32(00000004), ref: 004250F1
      • GetStockObject.GDI32(00000004), ref: 00425125
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDeviceObjectStock__ftol$Rect$Fill
      • String ID:
      • API String ID: 3813481265-0
      • Opcode ID: e7d169f1c80cb0f13b4ebfed9c9b72b1601d0b365eccf8a885d87c51fe82d19c
      • Instruction ID: ae8cb1bd05b296629d22826c9fdfd79376130cdf092c18749430832239a3ba21
      • Opcode Fuzzy Hash: e7d169f1c80cb0f13b4ebfed9c9b72b1601d0b365eccf8a885d87c51fe82d19c
      • Instruction Fuzzy Hash: 31314AB2500619FFDF225F91DC48FAB7BA5FF48304F05881AFAA945160C37A98A0DF59
      APIs
        • Part of subcall function 0041C65C: MoveToEx.GDI32(?,00000000,?,00000000), ref: 0041C67C
        • Part of subcall function 0041C65C: LineTo.GDI32(?,?,?), ref: 0041C68F
        • Part of subcall function 0040E26F: IsCharAlphaNumericA.USER32(?,00000000,?,?,?,?,00409327,?,?,?,00000000,00000000,00000000,?,?), ref: 0040E28C
      • lstrcmpiA.KERNEL32(?,?), ref: 00406BF7
      • lstrlenA.KERNEL32(?), ref: 00406C1D
      • GetStockObject.GDI32(00000001), ref: 00406C37
      • FillRect.USER32(?,?,00000000), ref: 00406C45
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AlphaCharFillLineMoveNumericObjectRectStocklstrcmpilstrlen
      • String ID:
      • API String ID: 764755550-0
      • Opcode ID: bbd03d6205d5f0dcb034e268988c34efab0d296a523c23c2a592c50b42b4d4f2
      • Instruction ID: 4dcac53c2ac09a5d0407cc41c90143fdc76530a8d7ea7f0a37f9bfe784135bcf
      • Opcode Fuzzy Hash: bbd03d6205d5f0dcb034e268988c34efab0d296a523c23c2a592c50b42b4d4f2
      • Instruction Fuzzy Hash: 9331E372A00209AFDF11DFA8CC85EDA7BB8FF08344F05416AF955E6250E734E9A0CB64
      APIs
      • GetWindowRect.USER32(?,?), ref: 00415B3C
      • OffsetRect.USER32(?,?,?), ref: 00415B52
      • GetDC.USER32 ref: 00415B68
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000070), ref: 004251C6
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000071), ref: 004251CE
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 004251D8
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000008), ref: 004251DF
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 004251E7
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 004251F8
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000000A), ref: 004251FF
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 00425207
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 00425218
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,00000058), ref: 00425223
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 00425233
        • Part of subcall function 004251B1: GetDeviceCaps.GDI32(?,0000005A), ref: 00425241
        • Part of subcall function 004251B1: __ftol.LIBCMT ref: 00425260
        • Part of subcall function 004251B1: __ftol.LIBCMT ref: 0042527B
        • Part of subcall function 004251B1: SetRect.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00425288
      • ReleaseDC.USER32(?,00000000), ref: 00415BEA
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CapsDevice$Rect$__ftol$OffsetReleaseWindow
      • String ID:
      • API String ID: 3885856596-0
      • Opcode ID: 6c6acebd3e964c749fceadd32a23695e6797b99432d14c600981f44a41e335a1
      • Instruction ID: 8e1c03ac377ebd74ee05f8abae549e1d3a38c62231e12d56dc76d9fff01f2e63
      • Opcode Fuzzy Hash: 6c6acebd3e964c749fceadd32a23695e6797b99432d14c600981f44a41e335a1
      • Instruction Fuzzy Hash: D62193B1504A05EFDB319B78CC49EEBBBB8FF85304F44491AF5AA92251C7346960CB68
      APIs
      • SelectObject.GDI32(?,?), ref: 0041F77F
      • lstrlenA.KERNEL32(?,?), ref: 0041F78F
      • GetTextExtentPointA.GDI32(?,?,00000000), ref: 0041F79A
      • SelectObject.GDI32(?,00000000), ref: 0041F7BD
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ObjectSelect$ExtentPointTextlstrlen
      • String ID:
      • API String ID: 2577617693-0
      • Opcode ID: 41e853cb84978dffff0b26dabde2369ace2f6d9197fbb989eccd12b9a3cec006
      • Instruction ID: c28bd1c11aae9777dba584721573594df3cee8b449f06292e916b7babe304ef9
      • Opcode Fuzzy Hash: 41e853cb84978dffff0b26dabde2369ace2f6d9197fbb989eccd12b9a3cec006
      • Instruction Fuzzy Hash: F3114FB6500308AFDB149F65DC85BDA7BF9FB48318F00442AFA5987290D775A885CF68
      APIs
      • lstrcpyA.KERNEL32 ref: 0040B043
      • lstrcpyA.KERNEL32(0000016C,Times New Roman), ref: 0040B05D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcpy
      • String ID: Courier New$Times New Roman
      • API String ID: 3722407311-1080295943
      • Opcode ID: c5aa0337d7b7d01737311442548fcef374f1e5074299c593226aec093e422188
      • Instruction ID: 65eacf5a5c97e52d297aa037852d498f6f2aa3d848346a63ecd6050fbe24d61d
      • Opcode Fuzzy Hash: c5aa0337d7b7d01737311442548fcef374f1e5074299c593226aec093e422188
      • Instruction Fuzzy Hash: 5B2149B1905B049FD3618F6A88817D3FBE8BFA9310F10492FD2EE82261D7B56544CF54
      APIs
      • GetCursorPos.USER32(?), ref: 0041472B
      • ScreenToClient.USER32(?,?), ref: 00414738
      • GetCursor.USER32(?,?,?,?,00414823,?,?,?), ref: 00414749
      • SetCursor.USER32(?,?,?,00000001,?,?,?,?,00414823,?,?,?), ref: 00414754
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$ClientScreen
      • String ID:
      • API String ID: 2747520593-0
      • Opcode ID: 4e8d07cf88078f797e4f5a470466d467fe1251e5c5d3420570589d05382a6e0c
      • Instruction ID: e3b8728083697be1d951bac2cd3a84f6bf7edbfcd0b89f7673c4bc6962337e68
      • Opcode Fuzzy Hash: 4e8d07cf88078f797e4f5a470466d467fe1251e5c5d3420570589d05382a6e0c
      • Instruction Fuzzy Hash: 24118270100504EFCB24DFA0C844EEE7BB8FF41310F50886AF8A69B2A0D734AE85DB58
      APIs
      • GetWindowLongA.USER32(?,00000000), ref: 00416BB9
        • Part of subcall function 004169F8: GetStockObject.GDI32(0000000C), ref: 00416A03
        • Part of subcall function 004169F8: SelectObject.GDI32(00000000,00000000), ref: 00416A0E
        • Part of subcall function 004169F8: GetClientRect.USER32(00000064,00000000), ref: 00416A1E
        • Part of subcall function 004169F8: wsprintfA.USER32 ref: 00416A47
        • Part of subcall function 004169F8: lstrlenA.KERNEL32(?,004168D1,?,?,?,?,?,?,?,?,?,?,004169DF,00000064,00000000,00000000), ref: 00416A5E
        • Part of subcall function 004169F8: GetTextExtentPointA.GDI32(00000000,?,00000000), ref: 00416A66
        • Part of subcall function 004169F8: SetTextColor.GDI32(00000000,00FFFFFF), ref: 00416A80
        • Part of subcall function 004169F8: SetBkColor.GDI32(00000000,00808080), ref: 00416A8C
        • Part of subcall function 004169F8: CreateRectRgn.GDI32(00000000,00000000,00000001,?), ref: 00416A9C
        • Part of subcall function 004169F8: SelectClipRgn.GDI32(00000000,00000000), ref: 00416AAD
        • Part of subcall function 004169F8: lstrlenA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,004169DF,00000064,00000000,00000000), ref: 00416AB5
        • Part of subcall function 004169F8: ExtTextOutA.GDI32(00000000,00000064,00000001,00000002,00000000,?,00000000), ref: 00416AC8
        • Part of subcall function 004169F8: SetTextColor.GDI32(00000000,00000000), ref: 00416AD1
        • Part of subcall function 004169F8: SetBkColor.GDI32(00000000,00FFFFFF), ref: 00416ADD
        • Part of subcall function 004169F8: SetRectRgn.GDI32(00000000,00000001,00000000,?,?), ref: 00416AF1
        • Part of subcall function 004169F8: SelectClipRgn.GDI32(00000000,00000000), ref: 00416AFB
        • Part of subcall function 004169F8: lstrlenA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,004169DF,00000064,00000000,00000000), ref: 00416B03
      • GetWindowLongA.USER32(?,00000000), ref: 00416BD1
      • SetWindowLongA.USER32(?,00000000,00000000), ref: 00416BFD
      • DefWindowProcA.USER32(?,?,?,?), ref: 00416C0D
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ColorTextWindow$LongRectSelectlstrlen$ClipObject$ClientCreateExtentPointProcStockwsprintf
      • String ID:
      • API String ID: 2692704880-0
      • Opcode ID: 801b778443ca79812ac801b41ef797a8d297772496d4902b1be289ed80d02187
      • Instruction ID: 4002382d3691bf50c0da5f4ea83e77ec99feb43d7b78290a6fee2be0328431b2
      • Opcode Fuzzy Hash: 801b778443ca79812ac801b41ef797a8d297772496d4902b1be289ed80d02187
      • Instruction Fuzzy Hash: C001A272108225BBEB116BA4AC05FFB3B18EF04701F11402AFE51C5190CA78EA51E76E
      APIs
      • SendMessageA.USER32(?,00000146,00000000,00000000), ref: 0041AAEF
      • SendMessageA.USER32(?,00000148,00000000,?), ref: 0041AB08
      • lstrcmpiA.KERNEL32(?,?), ref: 0041AB12
      • SendMessageA.USER32(?,00000143,00000000,?), ref: 0041AB30
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSend$lstrcmpi
      • String ID:
      • API String ID: 2977491028-0
      • Opcode ID: 9e51e3043565c6d79829706d10b1598cdcc1b5f7f414c03dddb1e5eb36df96a3
      • Instruction ID: 4860565841aa30aaacf25475880251e18b2cfcb50964f7861122e3cc9d8e7b94
      • Opcode Fuzzy Hash: 9e51e3043565c6d79829706d10b1598cdcc1b5f7f414c03dddb1e5eb36df96a3
      • Instruction Fuzzy Hash: 4BF081726001087ADB20DF56DD85ECF7BBDEB84740F100027F601E61A0D6B0EE50CA71
      APIs
        • Part of subcall function 0041A1BD: wsprintfA.USER32 ref: 0041A1CF
        • Part of subcall function 0041A1BD: lstrlenA.KERNEL32(00446E60,0043F624,0041A94A,0043F624), ref: 0041A1D9
      • SetDlgItemTextA.USER32(?,00001A49,00000000), ref: 0041A25B
      • SetDlgItemTextA.USER32(?,00001A4B,00000000), ref: 0041A277
      • SetDlgItemTextA.USER32(?,00001A4A,00000000), ref: 0041A293
      • SetDlgItemTextA.USER32(?,00001A4C,00000000), ref: 0041A2AF
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ItemText$lstrlenwsprintf
      • String ID:
      • API String ID: 340967515-0
      • Opcode ID: 39c466f1041de693663dedbd6ad556ff0d8a7ee820e2241e035139c3f1f23f22
      • Instruction ID: a5c29fc3bc6ec3a3f12dd04243cea698e92949807765a722ec752f0bdd449964
      • Opcode Fuzzy Hash: 39c466f1041de693663dedbd6ad556ff0d8a7ee820e2241e035139c3f1f23f22
      • Instruction Fuzzy Hash: 260181753013107FD210A765CC45EEBBBFEEF89750F05046AFA0697262C7B06C14CA66
      APIs
      • GetParent.USER32(?), ref: 0041728A
      • GetWindowRect.USER32(?,?), ref: 00417299
      • ScreenToClient.USER32(00000000,?), ref: 004172AA
      • ScreenToClient.USER32(00000000,?), ref: 004172B1
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClientScreen$ParentRectWindow
      • String ID:
      • API String ID: 2099118873-0
      • Opcode ID: bdfa5b1935c30d5a76a16ae17017626da96650c51a3683a4fab1e3183546132b
      • Instruction ID: 1429cfff0f0daa995fee4a21b37ff72a819f78afcf7a049e6eb221dbfcc63696
      • Opcode Fuzzy Hash: bdfa5b1935c30d5a76a16ae17017626da96650c51a3683a4fab1e3183546132b
      • Instruction Fuzzy Hash: CFF06272104208AFDB15AB78DC45CFFBFFDEF48314B00042AF95792111DA706D11CA98
      APIs
      • DeleteObject.GDI32(?), ref: 00414588
      • DeleteObject.GDI32(?), ref: 0041458D
      • DeleteObject.GDI32(?), ref: 00414592
        • Part of subcall function 0041CC21: GetDC.USER32(?), ref: 0041CC2F
        • Part of subcall function 0041CC21: SelectObject.GDI32(00000000,?), ref: 0041CC41
        • Part of subcall function 0041CC21: GetTextMetricsA.GDI32(00000000,?), ref: 0041CC4B
        • Part of subcall function 0041CC21: SelectObject.GDI32(00000000,?), ref: 0041CC55
        • Part of subcall function 0041CC21: ReleaseDC.USER32(?,00000000), ref: 0041CC5B
      • InvalidateRect.USER32(?,00000000,00000001), ref: 004145CF
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Object$Delete$Select$InvalidateMetricsRectReleaseText
      • String ID:
      • API String ID: 337145824-0
      • Opcode ID: ec599e45dbbc0533f34d6e8e66557d2a589c9fd108a805b7b9da9d763b9e3847
      • Instruction ID: 7cf0e020886c2691bf313ec6dd29dd6ddd6128db708d30dfd1bab0a14cd5457c
      • Opcode Fuzzy Hash: ec599e45dbbc0533f34d6e8e66557d2a589c9fd108a805b7b9da9d763b9e3847
      • Instruction Fuzzy Hash: 09014B71200A009FCB29AF6ACC4896EFBE6FFC8700711582EE48787660CB75A841DF44
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DeleteObject
      • String ID:
      • API String ID: 1531683806-0
      • Opcode ID: 8a0a32eb8496cfa162164572ea78a8bbbee17bfb5215598df37681f2dc181ba5
      • Instruction ID: 21ed8d581efab9dd5e8bb9c1c8db0bf7cc7fced952778997608c29bb017bd092
      • Opcode Fuzzy Hash: 8a0a32eb8496cfa162164572ea78a8bbbee17bfb5215598df37681f2dc181ba5
      • Instruction Fuzzy Hash: 15F09CF5600B489BC6209FBADC84A97F7E9AB45705F94081EE259D3201CB75B8848A5C
      APIs
      • wsprintfA.USER32 ref: 0041A1CF
      • lstrlenA.KERNEL32(00446E60,0043F624,0041A94A,0043F624), ref: 0041A1D9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrlenwsprintf
      • String ID: %.4d$`nD
      • API String ID: 357247895-1428641093
      • Opcode ID: 6c7090547d6166b40f94b1b1bd3d1bb4e39e7b445312abb63056df0327059cf7
      • Instruction ID: 2dc82ccb41e0cd90834c51a18f31d6ac09ec2c7adacdadfc196aa2b452089a5d
      • Opcode Fuzzy Hash: 6c7090547d6166b40f94b1b1bd3d1bb4e39e7b445312abb63056df0327059cf7
      • Instruction Fuzzy Hash: FDF0F4B95047C06BE7214AA4DC08B43BFC89F12309F2508AFE58582262D3F85478C71F
      APIs
      • GlobalHandle.KERNEL32(76933EB0), ref: 00428C48
      • GlobalUnlock.KERNEL32(00000000,?,00000000,00000000,0042909B,00000000,76933EB0,004180B3,?,?,?), ref: 00428C4B
      • GlobalHandle.KERNEL32(76933EB0), ref: 00428C52
      • GlobalFree.KERNEL32(00000000), ref: 00428C55
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$Handle$FreeUnlock
      • String ID:
      • API String ID: 3923883194-0
      • Opcode ID: 430f4d629fa07c9e218f0f5955111b0e8b365529b425afe6d908853115c815b2
      • Instruction ID: 0d5a95c7fa71e75f6ed2db18b74ee28129b46a1460ea77b72dbe0affabc89fd3
      • Opcode Fuzzy Hash: 430f4d629fa07c9e218f0f5955111b0e8b365529b425afe6d908853115c815b2
      • Instruction Fuzzy Hash: 06F012B77096109B9A149B69EC8485BB3A9EFD9321304443EF649C3310CA34DC41C778
      APIs
      • GetCapture.USER32 ref: 0041D6A1
      • GetCursorPos.USER32(?), ref: 0041D6AF
      • ScreenToClient.USER32(?,?), ref: 0041D6BC
        • Part of subcall function 0041D83C: GetClientRect.USER32(?,00414982), ref: 0041D868
        • Part of subcall function 0041D83C: GetCapture.USER32 ref: 0041D86E
        • Part of subcall function 0041D83C: UpdateWindow.USER32(?), ref: 0041D8BA
      • KillTimer.USER32(?,00000001,?,?,?,?,?,004148EE), ref: 0041D6D6
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CaptureClient$CursorKillRectScreenTimerUpdateWindow
      • String ID:
      • API String ID: 244392045-0
      • Opcode ID: abbeac6826ece96dbc20f7ba6fa814a95eecdcbee568ba5709959f2b749f1716
      • Instruction ID: 36724bb49aa81530321205f225ff3fe4eb6d51740eea4a3409cef2c9a9b1d3ac
      • Opcode Fuzzy Hash: abbeac6826ece96dbc20f7ba6fa814a95eecdcbee568ba5709959f2b749f1716
      • Instruction Fuzzy Hash: C2F030B2504508BFDB216B91DC49DEF7FBDEB44750F100066F59692060D7B1AD81EB64
      APIs
      • lstrcpyA.KERNEL32(?,pN@,?,?,?,00000001,0040A1CD,?,?,00000001), ref: 00409715
      • lstrcpyA.KERNEL32(?,?,?,00000001,0040A1CD,?,?,00000001), ref: 0040971C
      • lstrcpyA.KERNEL32(?,?,?,00000001,0040A1CD,?,?,00000001), ref: 00409724
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: lstrcpy
      • String ID: pN@
      • API String ID: 3722407311-3012989529
      • Opcode ID: 10bd9f8b63304a5794f624c349a802c25d7e6e138fa6e22da1e6ba00c2a9c4f8
      • Instruction ID: 416c139b394ffa15249e14e76b520ef9bbabebf7ee2321b3f94a59bf6e8af193
      • Opcode Fuzzy Hash: 10bd9f8b63304a5794f624c349a802c25d7e6e138fa6e22da1e6ba00c2a9c4f8
      • Instruction Fuzzy Hash: 38F03076200319EBDB216F65DC8085AFBA5FF94364B01083AFA8453261D737EC25DB69
      APIs
      • GlobalHandle.KERNEL32(?), ref: 00428E7B
      • GlobalUnlock.KERNEL32(00000000), ref: 00428E7E
      • GlobalHandle.KERNEL32(?), ref: 00428E85
      • GlobalFree.KERNEL32(00000000), ref: 00428E88
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$Handle$FreeUnlock
      • String ID:
      • API String ID: 3923883194-0
      • Opcode ID: 174d01f1562d7f996a9466266a2026756ac69808c35f16766fae5f33b4b8f733
      • Instruction ID: aae178821d0d545ea25cb94757093d90cee243c0ab3d582444422bc411301d21
      • Opcode Fuzzy Hash: 174d01f1562d7f996a9466266a2026756ac69808c35f16766fae5f33b4b8f733
      • Instruction Fuzzy Hash: 66E01ABB7096109B9A109B59BC8488BB3A9EBD9261301443BF649C3310CA74DC02867C
      APIs
      • GetStockObject.GDI32(0000000C), ref: 004226E1
      • GetObjectA.GDI32(00000000), ref: 004226E8
      • CreateFontIndirectA.GDI32(?), ref: 004226F8
      • CreateFontIndirectA.GDI32(?), ref: 0042270B
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: CreateFontIndirectObject$Stock
      • String ID:
      • API String ID: 959261365-0
      • Opcode ID: 51aaa2634ae1313e4b52250e781784cd348515330763b03315fc8ae6458ecea2
      • Instruction ID: 1ef793c5c0e768ef1923c1730f914fe8c8b6501dff5ec13c1f59675172f118c4
      • Opcode Fuzzy Hash: 51aaa2634ae1313e4b52250e781784cd348515330763b03315fc8ae6458ecea2
      • Instruction Fuzzy Hash: 21E0C0B2D04219ABDB04ABA5EC09DCA7BFCEB48214F004126F611E3151DB7065058FA4
      APIs
      • GlobalHandle.KERNEL32(?), ref: 00410E35
      • GlobalUnlock.KERNEL32(00000000,?,?,00408F7A), ref: 00410E38
      • GlobalHandle.KERNEL32(?), ref: 00410E41
      • GlobalFree.KERNEL32(00000000), ref: 00410E44
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Global$Handle$FreeUnlock
      • String ID:
      • API String ID: 3923883194-0
      • Opcode ID: 257abe2aa0a5fac63aeea8dce974402201d8401642c48d1f6789300945e5c867
      • Instruction ID: 25fb7273c8d7eb8f9a35d90141a21b23ce3803a40ffff1c5ae7f27276f7c9c30
      • Opcode Fuzzy Hash: 257abe2aa0a5fac63aeea8dce974402201d8401642c48d1f6789300945e5c867
      • Instruction Fuzzy Hash: 67E030712007009FDB305F76EC08A4777A8AF88711B01986DE082C7310C7B5E880CB54
      APIs
      • GetWindowLongA.USER32(000005DC,00000008), ref: 004168FB
      • IsWindowVisible.USER32(000005DC), ref: 00416904
      • ShowWindow.USER32(000005DC,00000005), ref: 00416911
      • UpdateWindow.USER32(000005DC), ref: 00416918
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$LongShowUpdateVisible
      • String ID:
      • API String ID: 1590855407-0
      • Opcode ID: 3afab8b94b84f585b294ac7d986c02bc1cb51aeab27ae707830a7a31259481f4
      • Instruction ID: 5540f24a6f1ceacbc1d034b0b5094bd3c59a93d1b75f15345252de08002d5856
      • Opcode Fuzzy Hash: 3afab8b94b84f585b294ac7d986c02bc1cb51aeab27ae707830a7a31259481f4
      • Instruction Fuzzy Hash: 29E0D872108210B7D7211F50AC0CFCF3F68FF99701F011025FA4092071D7349552DB99
      APIs
      • LoadCursorA.USER32(00000000,00007F01), ref: 004145F2
      • GetCursor.USER32 ref: 004145F6
      • LoadCursorA.USER32(00000000,00007F01), ref: 00414603
      • SetCursor.USER32(00000000), ref: 00414606
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Cursor$Load
      • String ID:
      • API String ID: 1675784387-0
      • Opcode ID: 22a1afddeaea843c5051f82ea0f9d6a300af30297ce91d47d4d40a363277f44a
      • Instruction ID: 770233942ba92f6f2dc88b076f39b9d6bbcb903feb9e7a46888b2317112e4639
      • Opcode Fuzzy Hash: 22a1afddeaea843c5051f82ea0f9d6a300af30297ce91d47d4d40a363277f44a
      • Instruction Fuzzy Hash: 08D0A7A2F0C25567DA202BE96C8CF9B2F6CDBC5762F14103BF604D3150C6A85C00D6B8
      APIs
      • GetCPInfo.KERNEL32(?,00000000), ref: 00433236
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Info
      • String ID: $
      • API String ID: 1807457897-3032137957
      • Opcode ID: 26dbcb0c5ee339fdffb02fa0dd7fc1947ac89f5a6c60bbbdd49ff746c844122e
      • Instruction ID: 369ae92cf9d1cc9b228ec435d596aa747a3d34b8dc5de4ac54472bc1ce0b9891
      • Opcode Fuzzy Hash: 26dbcb0c5ee339fdffb02fa0dd7fc1947ac89f5a6c60bbbdd49ff746c844122e
      • Instruction Fuzzy Hash: 4A41A0310082986EEB118F54DC49BFB3F98EB0A705F1410E6ED49CB152C7394B45DBAA
      APIs
      • EnableWindow.USER32(?,00000001), ref: 0041E8F9
        • Part of subcall function 0041E911: IsWindowVisible.USER32(?), ref: 0041E91B
      • EnableWindow.USER32(?,00000000), ref: 0041E838
      Strings
      • Preparing word index page layout..., xrefs: 0041E85D
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$Enable$Visible
      • String ID: Preparing word index page layout...
      • API String ID: 3300910207-563682661
      • Opcode ID: c8bdc6085a187515c5fd0ef0d950bd48402a395aadc89927ee1882c7d7cd3bf4
      • Instruction ID: 4dd29c00adb5f17a6a51e4be0c5613bd3d5f5658537ca69c06024d824bd46d64
      • Opcode Fuzzy Hash: c8bdc6085a187515c5fd0ef0d950bd48402a395aadc89927ee1882c7d7cd3bf4
      • Instruction Fuzzy Hash: 6D314CB56047019FC724AF66D881A9BBBE5EF44314F14883FFA5A87251CB34E884CB1D
      APIs
      • ResetEvent.KERNEL32(?,?,?,00437520,00426F43,?,?,?,?,POST,00000000,00000001,00000000,?,00401AEC,00002AF9), ref: 00427C6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: EventReset
      • String ID: Accept: */*$Content-Type: application/x-www-form-urlencoded
      • API String ID: 2632953641-2016586534
      • Opcode ID: ec624ce48285cf512cd0a8feeb6be52c6f2d9679c2569a41c94e705bfe86ac08
      • Instruction ID: a9220b79ff25a0d1f3af19e5a6c45f84d8719eb2a72b7065fe8fdc8262927700
      • Opcode Fuzzy Hash: ec624ce48285cf512cd0a8feeb6be52c6f2d9679c2569a41c94e705bfe86ac08
      • Instruction Fuzzy Hash: FD11C2B27046216EE7316F33BCC5E3B76ADEBC1354F50452FF54192251DA389C429A6C
      APIs
      • __EH_prolog.LIBCMT ref: 00413EDB
        • Part of subcall function 00422B2F: lstrcpynA.KERNEL32(?,00000104,00000104,?), ref: 00422BB9
        • Part of subcall function 00422D2E: lstrlenA.KERNEL32(?,?,?,00000001,?), ref: 00422D3C
        • Part of subcall function 00422D2E: GetFocus.USER32 ref: 00422D66
        • Part of subcall function 00422D2E: IsWindowEnabled.USER32(?), ref: 00422D7A
        • Part of subcall function 00422D2E: EnableWindow.USER32(?,00000000), ref: 00422D8F
        • Part of subcall function 00422D2E: GetOpenFileNameA.COMDLG32(?), ref: 00422DF1
        • Part of subcall function 00422D2E: CommDlgExtendedError.COMDLG32(?), ref: 00422E04
        • Part of subcall function 00422D2E: EnableWindow.USER32(?,00000001), ref: 00422E2C
        • Part of subcall function 00422D2E: IsWindow.USER32(?), ref: 00422E35
        • Part of subcall function 00422D2E: SetFocus.USER32(?), ref: 00422E45
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Window$EnableFocus$CommEnabledErrorExtendedFileH_prologNameOpenlstrcpynlstrlen
      • String ID: {C$ptx
      • API String ID: 2416099814-1112222908
      • Opcode ID: 4c3856fd61622f53617dcc62beb80ff2414efe2a6a3e8770cbc29cd35cdf47ee
      • Instruction ID: be26cd729379ab54639d1c06042b98ff7255f656198c5d6057d9e092b3118f26
      • Opcode Fuzzy Hash: 4c3856fd61622f53617dcc62beb80ff2414efe2a6a3e8770cbc29cd35cdf47ee
      • Instruction Fuzzy Hash: 1C11E132A01228BADF11AF20ED02BED7B70AF08318F50409AF515260A3CB785F88DF58
      APIs
      • __EH_prolog.LIBCMT ref: 0041AE2D
      • DestroyWindow.USER32(?,?,?,?,?,0040721A), ref: 0041AE6F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: DestroyH_prologWindow
      • String ID: <}C
      • API String ID: 4080165092-2809451127
      • Opcode ID: 1188902576434a20a13323f9db5c7a78860901755e6f57d926edb03eb0b44373
      • Instruction ID: 46757f3152b56f61e8c97fb631e3815d36e9e061cf9f7a877ad0522480e73995
      • Opcode Fuzzy Hash: 1188902576434a20a13323f9db5c7a78860901755e6f57d926edb03eb0b44373
      • Instruction Fuzzy Hash: AE1100B27407119FDB289F24D8047AFB7F8EF84309F10492EE05A9B281C7BC29048B9D
      APIs
        • Part of subcall function 00422F40: IsWindow.USER32(?), ref: 00422F4D
        • Part of subcall function 00422F40: SendMessageA.USER32(?,00000464,00000104,?), ref: 00422F6B
      • MessageBoxA.USER32(?,?,00000000,00000000), ref: 00413EB7
      • SetWindowLongA.USER32(?,00000000,00000001), ref: 00413EC4
      Strings
      • The file %s is not a valid E-Transcript file., xrefs: 00413E94
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageWindow$LongSend
      • String ID: The file %s is not a valid E-Transcript file.
      • API String ID: 24234429-2495432812
      • Opcode ID: f1d357cdd5ce7b572c1594626587b8669a7f890f3107e37ee1df4e4bc5edfb94
      • Instruction ID: 1165a8b675c51ef84117341fcb59e3ef04cea6d92e80c5cb17b79115311058d0
      • Opcode Fuzzy Hash: f1d357cdd5ce7b572c1594626587b8669a7f890f3107e37ee1df4e4bc5edfb94
      • Instruction Fuzzy Hash: E4F0C8723043147BE720B7659C86FAB776DAB44705F10047BFA06E2192DAA8A8445BA8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: H_prolog
      • String ID: string too long$OD
      • API String ID: 3519838083-2212743506
      • Opcode ID: fa34c3587b33fc9bc9914c179e7fc41bb5f1f7c8c9f815f4b859f3d0baa0147a
      • Instruction ID: d0b00db9b4c59796ff664d5183c8af0715fd4a98257dea1dc30a58c34bb459e3
      • Opcode Fuzzy Hash: fa34c3587b33fc9bc9914c179e7fc41bb5f1f7c8c9f815f4b859f3d0baa0147a
      • Instruction Fuzzy Hash: 69F062B6700255AED7009F89D841BAEF7B9EF85305F10445FF111A7281CBB85904CBA4
      APIs
      • LoadCursorA.USER32(00000000,00007F84), ref: 00417633
      • RegisterClassA.USER32(?), ref: 0041764D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ClassCursorLoadRegister
      • String ID: PaneSplitter
      • API String ID: 1693014935-3269436181
      • Opcode ID: 088a1c23ca29f835b02ef299e4a07f0bfc3b4b1020145b8b3d116213a3f2f89a
      • Instruction ID: eef74f5a629b0f50c86d4fda26a2cda6542f9f96ff491d052117ec774d4eaa02
      • Opcode Fuzzy Hash: 088a1c23ca29f835b02ef299e4a07f0bfc3b4b1020145b8b3d116213a3f2f89a
      • Instruction Fuzzy Hash: ADF0AFB1C15229EBCB00DFD8D8456DEBFF8AB09B04F10516BE500F6240D7B856848BE9
      APIs
      • wsprintfA.USER32 ref: 0040ACD5
      • WritePrivateProfileStringA.KERNEL32(00000000), ref: 0040ACF1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: PrivateProfileStringWritewsprintf
      • String ID: %ld
      • API String ID: 1995626314-1112595699
      • Opcode ID: d08ceaf40cfa068617b7dbaff6fb7f6c713322ae3829dd28cde02d080c42aad9
      • Instruction ID: 1f37a3ca2d96f206ce7b44966381dccd165d6201256e815a2e350ebbfa75593c
      • Opcode Fuzzy Hash: d08ceaf40cfa068617b7dbaff6fb7f6c713322ae3829dd28cde02d080c42aad9
      • Instruction Fuzzy Hash: F3E012B2500118ABCF10AF94DC49CDE7BFCEF0C2007044026FC46E3150D674E914CBA4
      APIs
      • wsprintfA.USER32 ref: 00414BE3
      • SendMessageA.USER32(?,00000401,00000000,?), ref: 00414BFA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: MessageSendwsprintf
      • String ID: Page %d of %d
      • API String ID: 3751067900-1023386322
      • Opcode ID: 5fe3d38543bcab92406f2d081f68beba836f1ec86ce7d841f1117cdfe421cc8a
      • Instruction ID: 793128ed15cff08623b650deb28ed0fc1b045058eaa01eeff52ff67a2dcbaaff
      • Opcode Fuzzy Hash: 5fe3d38543bcab92406f2d081f68beba836f1ec86ce7d841f1117cdfe421cc8a
      • Instruction Fuzzy Hash: 90E086B2400218FBDB106B54DC06EDE7BACEB04700F008025FE51A2191D2B1A914C798
      APIs
      • MessageBoxA.USER32(?,Please remove all the printed pages from the printer's output tray, and return them to the top of the paper tray.,Manual Duplex Printing,00000001), ref: 00423AFE
      Strings
      • Manual Duplex Printing, xrefs: 00423AF0
      • Please remove all the printed pages from the printer's output tray, and return them to the top of the paper tray., xrefs: 00423AF5
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: Message
      • String ID: Manual Duplex Printing$Please remove all the printed pages from the printer's output tray, and return them to the top of the paper tray.
      • API String ID: 2030045667-1276341297
      • Opcode ID: ebf65a862c2419a30bdb2b68a5d6a07b44e333f430e7e36b44b17938d61d8823
      • Instruction ID: 969aa8a8fc2b0d768360c9159159d11f135ae32e210714a463a0dc4225332f0e
      • Opcode Fuzzy Hash: ebf65a862c2419a30bdb2b68a5d6a07b44e333f430e7e36b44b17938d61d8823
      • Instruction Fuzzy Hash: ACC09BB67E830567D71447109C4BF4E6551E75CF01F20643ABD43D40E0C7D588A4F55D
      APIs
      • ShellExecuteA.SHELL32(00000000,open,http://www.reallegal.com/binderpull.asp,00000000,0043C374,00000001), ref: 00401E8D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: ExecuteShell
      • String ID: http://www.reallegal.com/binderpull.asp$open
      • API String ID: 587946157-3567267458
      • Opcode ID: 8ba22e745709d161bd0e47b3dbd756d333b31aca214199c3750a7509f2c81e8e
      • Instruction ID: d2fde552fb2afa08fd1e6524f0a9b2018354cdcb131a5091967ce4b1ec8ff010
      • Opcode Fuzzy Hash: 8ba22e745709d161bd0e47b3dbd756d333b31aca214199c3750a7509f2c81e8e
      • Instruction Fuzzy Hash: 11B092607D030075DD2063A46CCBF0628145748F05F30E56339407A0D184EC10004A2C
      APIs
      • HeapReAlloc.KERNEL32(00000000,?,?,00000000,0042E11E,?,?,?,00000100,?,00000000), ref: 0042E37E
      • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,0042E11E,?,?,?,00000100,?,00000000), ref: 0042E3B2
      • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,0042E11E,?,?,?,00000100,?,00000000), ref: 0042E3CC
      • HeapFree.KERNEL32(00000000,?,?,00000000,0042E11E,?,?,?,00000100,?,00000000), ref: 0042E3E3
      Memory Dump Source
      • Source File: 00000000.00000002.3284228189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3284211810.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284267076.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284282183.000000000043C000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284303051.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284320324.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3284356673.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_signed.jbxd
      Similarity
      • API ID: AllocHeap$FreeVirtual
      • String ID:
      • API String ID: 3499195154-0
      • Opcode ID: 8cb648292bd96f43a038297cb447a57f836384cb969eb0bc9cfd4f46ece1fb72
      • Instruction ID: 46b850fea1f7caa01f5c75c44a76ac0506f6b3ac42b377159240b627cf3c5f3b
      • Opcode Fuzzy Hash: 8cb648292bd96f43a038297cb447a57f836384cb969eb0bc9cfd4f46ece1fb72
      • Instruction Fuzzy Hash: 80118CB42002009FD731CF19EC9492A7BF2FB863127604A3DF691C76B0CB709842CB68