Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mIzAhxUQjY.exe

Overview

General Information

Sample name:mIzAhxUQjY.exe
renamed because original name is a hash value
Original sample name:501ae6c21ceb803f00f565f4de6a476ee71c7a7cf336edf8a722dc00033e42c8.exe
Analysis ID:1466962
MD5:fb520aa6e750c9527a1f06587b71d541
SHA1:8e559f1ef60d530817c65669eafa53fd27a83c82
SHA256:501ae6c21ceb803f00f565f4de6a476ee71c7a7cf336edf8a722dc00033e42c8
Tags:exe
Infos:

Detection

Score:54
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Uses Windows timers to delay execution
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • mIzAhxUQjY.exe (PID: 7028 cmdline: "C:\Users\user\Desktop\mIzAhxUQjY.exe" MD5: FB520AA6E750C9527A1F06587B71D541)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: mIzAhxUQjY.exeAvira: detected
Source: mIzAhxUQjY.exeReversingLabs: Detection: 58%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
Source: mIzAhxUQjY.exeJoe Sandbox ML: detected
Source: mIzAhxUQjY.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E04696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E04696
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00E0C9C7
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0C93C FindFirstFileW,FindClose,0_2_00E0C93C
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E0F200
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E0F35D
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E0F65E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E03A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E03A2B
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E03D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E03D4E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E0BF27
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E125E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00E125E2
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E1425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E1425A
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E14458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00E14458
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E1425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E1425A
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E00219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00E00219
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E2CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00E2CDAC

System Summary

barindex
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: This is a third-party compiled AutoIt script.0_2_00DA3B4C
Source: mIzAhxUQjY.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: mIzAhxUQjY.exe, 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f134cc75-a
Source: mIzAhxUQjY.exe, 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4f9c3a53-3
Source: mIzAhxUQjY.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8a9653f3-4
Source: mIzAhxUQjY.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_80d038bb-a
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E040B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00E040B1
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DF8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00DF8858
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00E0545F
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E2804A0_2_00E2804A
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DAE0600_2_00DAE060
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DB41400_2_00DB4140
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC24050_2_00DC2405
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD65220_2_00DD6522
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E206650_2_00E20665
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD267E0_2_00DD267E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DB68430_2_00DB6843
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DAE8000_2_00DAE800
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC283A0_2_00DC283A
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD89DF0_2_00DD89DF
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E20AE20_2_00E20AE2
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD6A940_2_00DD6A94
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DB8A0E0_2_00DB8A0E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DFEB070_2_00DFEB07
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E08B130_2_00E08B13
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCCD610_2_00DCCD61
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD70060_2_00DD7006
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DB31900_2_00DB3190
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DB710E0_2_00DB710E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA12870_2_00DA1287
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC33C70_2_00DC33C7
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCF4190_2_00DCF419
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC16C40_2_00DC16C4
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DB56800_2_00DB5680
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC78D30_2_00DC78D3
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DB58C00_2_00DB58C0
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC1BB80_2_00DC1BB8
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCDBB50_2_00DCDBB5
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD9D050_2_00DD9D05
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DAFE400_2_00DAFE40
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC1FD00_2_00DC1FD0
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCBFE60_2_00DCBFE6
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: String function: 00DC8B40 appears 42 times
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: String function: 00DC0D27 appears 70 times
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: String function: 00DA7F41 appears 35 times
Source: mIzAhxUQjY.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal54.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0A2D5 GetLastError,FormatMessageW,0_2_00E0A2D5
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DF8713 AdjustTokenPrivileges,CloseHandle,0_2_00DF8713
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DF8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00DF8CC3
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00E0B59E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E1F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00E1F121
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E186D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00E186D0
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00DA4FE9
Source: mIzAhxUQjY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: mIzAhxUQjY.exeReversingLabs: Detection: 58%
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: ndfapi.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wdi.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: duser.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: ndfapi.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: wdi.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeAutomated click: OK
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: mIzAhxUQjY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: mIzAhxUQjY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: mIzAhxUQjY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: mIzAhxUQjY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: mIzAhxUQjY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: mIzAhxUQjY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: mIzAhxUQjY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: mIzAhxUQjY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: mIzAhxUQjY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: mIzAhxUQjY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: mIzAhxUQjY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: mIzAhxUQjY.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E1C304 LoadLibraryA,GetProcAddress,0_2_00E1C304
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E08719 push FFFFFF8Bh; iretd 0_2_00E0871B
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCE94F push edi; ret 0_2_00DCE951
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCEA68 push esi; ret 0_2_00DCEA6A
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC8B85 push ecx; ret 0_2_00DC8B98
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCEC43 push esi; ret 0_2_00DCEC45
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCED2C push edi; ret 0_2_00DCED2E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00DA4A35
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E255FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00E255FD
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00DC33C7
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeUser Timer Set: Timeout: 750msJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeUser Timer Set: Timeout: 750msJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeUser Timer Set: Timeout: 750msJump to behavior
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeAPI coverage: 3.8 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E04696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E04696
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00E0C9C7
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0C93C FindFirstFileW,FindClose,0_2_00E0C93C
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E0F200
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E0F35D
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E0F65E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E03A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E03A2B
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E03D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E03D4E
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E0BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E0BF27
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DA4AFE
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E141FD BlockInput,0_2_00E141FD
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DA3B4C
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00DD5CCC
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E1C304 LoadLibraryA,GetProcAddress,0_2_00E1C304
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DF81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00DF81F7
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DCA395
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DCA364 SetUnhandledExceptionFilter,0_2_00DCA364
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DF8C93 LogonUserW,0_2_00DF8C93
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DA3B4C
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00DA4A35
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E04EF5 mouse_event,0_2_00E04EF5
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DF81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00DF81F7
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E04C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00E04C03
Source: mIzAhxUQjY.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: mIzAhxUQjY.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DC886B cpuid 0_2_00DC886B
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00DD50D7
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DE2230 GetUserNameW,0_2_00DE2230
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DD418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00DD418A
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00DA4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DA4AFE
Source: mIzAhxUQjY.exeBinary or memory string: WIN_81
Source: mIzAhxUQjY.exeBinary or memory string: WIN_XP
Source: mIzAhxUQjY.exeBinary or memory string: WIN_XPe
Source: mIzAhxUQjY.exeBinary or memory string: WIN_VISTA
Source: mIzAhxUQjY.exeBinary or memory string: WIN_7
Source: mIzAhxUQjY.exeBinary or memory string: WIN_8
Source: mIzAhxUQjY.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E16596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00E16596
Source: C:\Users\user\Desktop\mIzAhxUQjY.exeCode function: 0_2_00E16A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00E16A5A
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
2
Valid Accounts
2
Valid Accounts
2
Valid Accounts
21
Input Capture
2
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Virtualization/Sandbox Evasion
LSASS Memory3
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
Access Token Manipulation
1
Disable or Modify Tools
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Process Injection
21
Access Token Manipulation
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials1
Account Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync1
System Owner/User Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem2
File and Directory Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow15
System Information Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
mIzAhxUQjY.exe58%ReversingLabsWin32.Trojan.AutoitInject
mIzAhxUQjY.exe100%AviraWORM/FakeExt.Gen8
mIzAhxUQjY.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1466962
Start date and time:2024-07-03 15:47:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:mIzAhxUQjY.exe
renamed because original name is a hash value
Original Sample Name:501ae6c21ceb803f00f565f4de6a476ee71c7a7cf336edf8a722dc00033e42c8.exe
Detection:MAL
Classification:mal54.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 30
  • Number of non-executed functions: 301
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, conhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • VT rate limit hit for: mIzAhxUQjY.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.594312478444017
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:mIzAhxUQjY.exe
File size:847'872 bytes
MD5:fb520aa6e750c9527a1f06587b71d541
SHA1:8e559f1ef60d530817c65669eafa53fd27a83c82
SHA256:501ae6c21ceb803f00f565f4de6a476ee71c7a7cf336edf8a722dc00033e42c8
SHA512:fe6e2f08204978fa92ddda73e3056291dfaffbcdb649ede033607619c4aa5cd518bfea56e07220a0068a8cea047d2086b72415a922cd15eafb5ab1e37c9c0273
SSDEEP:24576:gAHnh+eWsN3skA4RV1Hom2KXMmHa7xK5:Xh+ZkldoPK8Ya7+
TLSH:D4057B0273D2D036FFAB92739B6AB20156BD7D650123852F13983DB9BD701B1263E663
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
Icon Hash:70e4968a8c84dc71
Entrypoint:0x42800a
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
Time Stamp:0x666B2A47 [Thu Jun 13 17:20:07 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:afcdf79be1557326c854b6e20cb900a7
Instruction
call 00007F7C8CB73C0Dh
jmp 00007F7C8CB669C4h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push edi
push esi
mov esi, dword ptr [esp+10h]
mov ecx, dword ptr [esp+14h]
mov edi, dword ptr [esp+0Ch]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007F7C8CB66B4Ah
cmp edi, eax
jc 00007F7C8CB66EAEh
bt dword ptr [004C41FCh], 01h
jnc 00007F7C8CB66B49h
rep movsb
jmp 00007F7C8CB66E5Ch
cmp ecx, 00000080h
jc 00007F7C8CB66D14h
mov eax, edi
xor eax, esi
test eax, 0000000Fh
jne 00007F7C8CB66B50h
bt dword ptr [004BF324h], 01h
jc 00007F7C8CB67020h
bt dword ptr [004C41FCh], 00000000h
jnc 00007F7C8CB66CEDh
test edi, 00000003h
jne 00007F7C8CB66CFEh
test esi, 00000003h
jne 00007F7C8CB66CDDh
bt edi, 02h
jnc 00007F7C8CB66B4Fh
mov eax, dword ptr [esi]
sub ecx, 04h
lea esi, dword ptr [esi+04h]
mov dword ptr [edi], eax
lea edi, dword ptr [edi+04h]
bt edi, 03h
jnc 00007F7C8CB66B53h
movq xmm1, qword ptr [esi]
sub ecx, 08h
lea esi, dword ptr [esi+08h]
movq qword ptr [edi], xmm1
lea edi, dword ptr [edi+08h]
test esi, 00000007h
je 00007F7C8CB66BA5h
bt esi, 03h
Programming Language:
  • [ASM] VS2013 build 21005
  • [ C ] VS2013 build 21005
  • [C++] VS2013 build 21005
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2013 UPD5 build 40629
  • [RES] VS2013 build 21005
  • [LNK] VS2013 UPD5 build 40629
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x490c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xcd0000x7134.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xc80000x490c0x4a0046b6a4730ca207062fa4119df17f086bFalse0.37410261824324326data4.932600749031585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xcd0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xc83500x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
RT_ICON0xc84780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishGreat Britain0.18667917448405252
RT_STRING0xc95200x594dataEnglishGreat Britain0.3333333333333333
RT_STRING0xc9ab40x68adataEnglishGreat Britain0.2747909199522103
RT_STRING0xca1400x490dataEnglishGreat Britain0.3715753424657534
RT_STRING0xca5d00x5fcdataEnglishGreat Britain0.3087467362924282
RT_STRING0xcabcc0x65cdataEnglishGreat Britain0.34336609336609336
RT_STRING0xcb2280x466dataEnglishGreat Britain0.3605683836589698
RT_STRING0xcb6900x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
RT_RCDATA0xcb7e80xa36data1.0042081101759754
RT_GROUP_ICON0xcc2200x14dataEnglishGreat Britain1.2
RT_GROUP_ICON0xcc2340x14dataEnglishGreat Britain1.15
RT_VERSION0xcc2480x2d4dataEnglishGreat Britain0.5359116022099447
RT_MANIFEST0xcc51c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
DLLImport
WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
PSAPI.DLLGetProcessMemoryInfo
IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
UxTheme.dllIsThemeActive
KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
Language of compilation systemCountry where language is spokenMap
EnglishGreat Britain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:09:48:08
Start date:03/07/2024
Path:C:\Users\user\Desktop\mIzAhxUQjY.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\mIzAhxUQjY.exe"
Imagebase:0xda0000
File size:847'872 bytes
MD5 hash:FB520AA6E750C9527A1F06587B71D541
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:4.7%
    Total number of Nodes:1550
    Total number of Limit Nodes:124
    execution_graph 97089 ddb7cd 97092 dafbbd 97089->97092 97093 de49ff DestroyWindow 97092->97093 97094 dafbfc mciSendStringW 97092->97094 97106 de4a0b 97093->97106 97095 dafc18 97094->97095 97096 dafde5 97094->97096 97098 dafc26 97095->97098 97095->97106 97096->97095 97097 dafdf4 UnregisterHotKey 97096->97097 97097->97096 97126 db12ad 97098->97126 97100 de4a29 FindClose 97100->97106 97101 de4a50 97105 de4a74 97101->97105 97107 de4a63 FreeLibrary 97101->97107 97103 dafc3b 97103->97105 97112 dafc49 97103->97112 97108 de4a88 VirtualFree 97105->97108 97115 dafcb6 97105->97115 97106->97100 97106->97101 97132 da5dcf 97106->97132 97107->97101 97108->97105 97109 dafca5 OleUninitialize 97109->97115 97110 de4acf 97116 de4ade 97110->97116 97136 e09e68 CloseHandle 97110->97136 97111 dafcc1 97113 dafcd1 Mailbox 97111->97113 97112->97109 97130 db61fe 61 API calls Mailbox 97113->97130 97115->97110 97115->97111 97122 de4af2 97116->97122 97137 dfcf23 59 API calls Mailbox 97116->97137 97118 dafce7 Mailbox 97131 db608e 59 API calls Mailbox 97118->97131 97122->97122 97127 db12bc Mailbox 97126->97127 97128 dafc2d 97127->97128 97138 dfd9e3 59 API calls 97127->97138 97128->97101 97128->97103 97130->97118 97133 da5de8 97132->97133 97134 da5dd9 97132->97134 97133->97134 97135 da5ded CloseHandle 97133->97135 97134->97106 97135->97134 97136->97110 97137->97116 97138->97127 97139 da107d 97144 da71eb 97139->97144 97141 da108c 97175 dc2f80 97141->97175 97145 da71fb __ftell_nolock 97144->97145 97178 da77c7 97145->97178 97149 da72ba 97190 dc074f 97149->97190 97156 da77c7 59 API calls 97157 da72eb 97156->97157 97209 da7eec 97157->97209 97159 da72f4 RegOpenKeyExW 97160 ddecda RegQueryValueExW 97159->97160 97164 da7316 Mailbox 97159->97164 97161 dded6c RegCloseKey 97160->97161 97162 ddecf7 97160->97162 97161->97164 97174 dded7e _wcscat Mailbox __NMSG_WRITE 97161->97174 97213 dc0ff6 97162->97213 97164->97141 97165 dded10 97223 da538e 97165->97223 97166 da7b52 59 API calls 97166->97174 97169 dded38 97226 da7d2c 97169->97226 97171 dded52 97171->97161 97173 da3f84 59 API calls 97173->97174 97174->97164 97174->97166 97174->97173 97235 da7f41 97174->97235 97306 dc2e84 97175->97306 97177 da1096 97179 dc0ff6 Mailbox 59 API calls 97178->97179 97180 da77e8 97179->97180 97181 dc0ff6 Mailbox 59 API calls 97180->97181 97182 da72b1 97181->97182 97183 da4864 97182->97183 97239 dd1b90 97183->97239 97186 da7f41 59 API calls 97187 da4897 97186->97187 97241 da48ae 97187->97241 97189 da48a1 Mailbox 97189->97149 97191 dd1b90 __ftell_nolock 97190->97191 97192 dc075c GetFullPathNameW 97191->97192 97193 dc077e 97192->97193 97194 da7d2c 59 API calls 97193->97194 97195 da72c5 97194->97195 97196 da7e0b 97195->97196 97197 da7e1f 97196->97197 97198 ddf173 97196->97198 97263 da7db0 97197->97263 97268 da8189 59 API calls Mailbox 97198->97268 97201 da72d3 97203 da3f84 97201->97203 97202 ddf17e __NMSG_WRITE _memmove 97204 da3f92 97203->97204 97208 da3fb4 _memmove 97203->97208 97206 dc0ff6 Mailbox 59 API calls 97204->97206 97205 dc0ff6 Mailbox 59 API calls 97207 da3fc8 97205->97207 97206->97208 97207->97156 97208->97205 97210 da7f06 97209->97210 97212 da7ef9 97209->97212 97211 dc0ff6 Mailbox 59 API calls 97210->97211 97211->97212 97212->97159 97215 dc0ffe 97213->97215 97216 dc1018 97215->97216 97218 dc101c std::exception::exception 97215->97218 97270 dc594c 97215->97270 97287 dc35e1 DecodePointer 97215->97287 97216->97165 97288 dc87db RaiseException 97218->97288 97220 dc1046 97289 dc8711 58 API calls _free 97220->97289 97222 dc1058 97222->97165 97224 dc0ff6 Mailbox 59 API calls 97223->97224 97225 da53a0 RegQueryValueExW 97224->97225 97225->97169 97225->97171 97227 da7d38 __NMSG_WRITE 97226->97227 97228 da7da5 97226->97228 97230 da7d4e 97227->97230 97231 da7d73 97227->97231 97229 da7e8c 59 API calls 97228->97229 97234 da7d56 _memmove 97229->97234 97304 da8087 59 API calls Mailbox 97230->97304 97305 da8189 59 API calls Mailbox 97231->97305 97234->97171 97236 da7f50 __NMSG_WRITE _memmove 97235->97236 97237 dc0ff6 Mailbox 59 API calls 97236->97237 97238 da7f8e 97237->97238 97238->97174 97240 da4871 GetModuleFileNameW 97239->97240 97240->97186 97242 dd1b90 __ftell_nolock 97241->97242 97243 da48bb GetFullPathNameW 97242->97243 97244 da48da 97243->97244 97245 da48f7 97243->97245 97247 da7d2c 59 API calls 97244->97247 97246 da7eec 59 API calls 97245->97246 97248 da48e6 97246->97248 97247->97248 97251 da7886 97248->97251 97252 da7894 97251->97252 97255 da7e8c 97252->97255 97254 da48f2 97254->97189 97256 da7e9a 97255->97256 97258 da7ea3 _memmove 97255->97258 97256->97258 97259 da7faf 97256->97259 97258->97254 97260 da7fc2 97259->97260 97262 da7fbf _memmove 97259->97262 97261 dc0ff6 Mailbox 59 API calls 97260->97261 97261->97262 97262->97258 97264 da7dbf __NMSG_WRITE 97263->97264 97266 da7dd0 _memmove 97264->97266 97269 da8189 59 API calls Mailbox 97264->97269 97266->97201 97267 ddf130 _memmove 97268->97202 97269->97267 97271 dc59c7 97270->97271 97278 dc5958 97270->97278 97298 dc35e1 DecodePointer 97271->97298 97273 dc59cd 97299 dc8d68 58 API calls __getptd_noexit 97273->97299 97276 dc598b RtlAllocateHeap 97276->97278 97286 dc59bf 97276->97286 97278->97276 97279 dc5963 97278->97279 97280 dc59b3 97278->97280 97284 dc59b1 97278->97284 97295 dc35e1 DecodePointer 97278->97295 97279->97278 97290 dca3ab 58 API calls __NMSG_WRITE 97279->97290 97291 dca408 58 API calls 5 library calls 97279->97291 97292 dc32df 97279->97292 97296 dc8d68 58 API calls __getptd_noexit 97280->97296 97297 dc8d68 58 API calls __getptd_noexit 97284->97297 97286->97215 97287->97215 97288->97220 97289->97222 97290->97279 97291->97279 97300 dc32ab GetModuleHandleExW 97292->97300 97295->97278 97296->97284 97297->97286 97298->97273 97299->97286 97301 dc32db ExitProcess 97300->97301 97302 dc32c4 GetProcAddress 97300->97302 97302->97301 97303 dc32d6 97302->97303 97303->97301 97304->97234 97305->97234 97307 dc2e90 __wsopen_helper 97306->97307 97314 dc3457 97307->97314 97313 dc2eb7 __wsopen_helper 97313->97177 97331 dc9e4b 97314->97331 97316 dc2e99 97317 dc2ec8 DecodePointer DecodePointer 97316->97317 97318 dc2ef5 97317->97318 97319 dc2ea5 97317->97319 97318->97319 97376 dc89e4 59 API calls 2 library calls 97318->97376 97328 dc2ec2 97319->97328 97321 dc2f58 EncodePointer EncodePointer 97321->97319 97322 dc2f07 97322->97321 97323 dc2f2c 97322->97323 97377 dc8aa4 61 API calls 2 library calls 97322->97377 97323->97319 97326 dc2f46 EncodePointer 97323->97326 97378 dc8aa4 61 API calls 2 library calls 97323->97378 97326->97321 97327 dc2f40 97327->97319 97327->97326 97379 dc3460 97328->97379 97332 dc9e5c 97331->97332 97333 dc9e6f EnterCriticalSection 97331->97333 97338 dc9ed3 97332->97338 97333->97316 97335 dc9e62 97335->97333 97362 dc32f5 58 API calls 3 library calls 97335->97362 97339 dc9edf __wsopen_helper 97338->97339 97340 dc9ee8 97339->97340 97341 dc9f00 97339->97341 97363 dca3ab 58 API calls __NMSG_WRITE 97340->97363 97350 dc9f21 __wsopen_helper 97341->97350 97365 dc8a5d 58 API calls 2 library calls 97341->97365 97343 dc9eed 97364 dca408 58 API calls 5 library calls 97343->97364 97346 dc9f15 97348 dc9f1c 97346->97348 97349 dc9f2b 97346->97349 97347 dc9ef4 97352 dc32df __mtinitlocknum 3 API calls 97347->97352 97366 dc8d68 58 API calls __getptd_noexit 97348->97366 97351 dc9e4b __lock 58 API calls 97349->97351 97350->97335 97354 dc9f32 97351->97354 97355 dc9efe 97352->97355 97356 dc9f3f 97354->97356 97357 dc9f57 97354->97357 97355->97341 97367 dca06b InitializeCriticalSectionAndSpinCount 97356->97367 97368 dc2f95 97357->97368 97360 dc9f4b 97374 dc9f73 LeaveCriticalSection _doexit 97360->97374 97363->97343 97364->97347 97365->97346 97366->97350 97367->97360 97369 dc2f9e RtlFreeHeap 97368->97369 97370 dc2fc7 __dosmaperr 97368->97370 97369->97370 97371 dc2fb3 97369->97371 97370->97360 97375 dc8d68 58 API calls __getptd_noexit 97371->97375 97373 dc2fb9 GetLastError 97373->97370 97374->97350 97375->97373 97376->97322 97377->97323 97378->97327 97382 dc9fb5 LeaveCriticalSection 97379->97382 97381 dc2ec7 97381->97313 97382->97381 97383 da3633 97384 da366a 97383->97384 97385 da3688 97384->97385 97386 da36e7 97384->97386 97420 da36e5 97384->97420 97390 da375d PostQuitMessage 97385->97390 97391 da3695 97385->97391 97388 ddd31c 97386->97388 97389 da36ed 97386->97389 97387 da36ca DefWindowProcW 97425 da36d8 97387->97425 97394 db11d0 10 API calls 97388->97394 97395 da36f2 97389->97395 97396 da3715 SetTimer RegisterWindowMessageW 97389->97396 97390->97425 97392 ddd38f 97391->97392 97393 da36a0 97391->97393 97460 e02a16 71 API calls _memset 97392->97460 97397 da36a8 97393->97397 97398 da3767 97393->97398 97401 ddd343 97394->97401 97402 ddd2bf 97395->97402 97403 da36f9 KillTimer 97395->97403 97399 da373e CreatePopupMenu 97396->97399 97396->97425 97404 ddd374 97397->97404 97405 da36b3 97397->97405 97428 da4531 97398->97428 97399->97425 97445 db11f3 97401->97445 97409 ddd2f8 MoveWindow 97402->97409 97410 ddd2c4 97402->97410 97435 da44cb Shell_NotifyIconW _memset 97403->97435 97404->97387 97459 df817e 59 API calls Mailbox 97404->97459 97412 da374b 97405->97412 97422 da36be 97405->97422 97406 ddd3a1 97406->97387 97406->97425 97409->97425 97413 ddd2c8 97410->97413 97414 ddd2e7 SetFocus 97410->97414 97437 da45df 81 API calls _memset 97412->97437 97417 ddd2d1 97413->97417 97413->97422 97414->97425 97415 da370c 97436 da3114 DeleteObject DestroyWindow Mailbox 97415->97436 97438 db11d0 97417->97438 97420->97387 97421 da375b 97421->97425 97422->97387 97457 da44cb Shell_NotifyIconW _memset 97422->97457 97426 ddd368 97458 da43db 68 API calls _memset 97426->97458 97429 da45ca 97428->97429 97430 da4548 _memset 97428->97430 97429->97425 97461 da410d 97430->97461 97432 da45b3 KillTimer SetTimer 97432->97429 97433 da456f 97433->97432 97434 ddd6c0 Shell_NotifyIconW 97433->97434 97434->97432 97435->97415 97436->97425 97437->97421 97491 dc012c 97438->97491 97440 db11dd 97441 db11ee 97440->97441 97443 de6156 97440->97443 97441->97425 97495 e074d2 7 API calls Mailbox 97443->97495 97496 e074d2 7 API calls Mailbox 97443->97496 97446 da7f41 59 API calls 97445->97446 97447 db121d 97446->97447 97498 da8b13 97447->97498 97449 db1232 Mailbox 97450 da7f41 59 API calls 97449->97450 97451 db125f 97450->97451 97452 da8b13 69 API calls 97451->97452 97455 db1270 Mailbox 97452->97455 97453 db1294 97453->97422 97455->97453 97514 da9fbd 60 API calls 97455->97514 97515 df68bf 258 API calls 97455->97515 97457->97426 97458->97420 97459->97420 97460->97406 97462 da4129 97461->97462 97482 da4200 Mailbox 97461->97482 97483 da7b76 59 API calls Mailbox 97462->97483 97464 da4137 97465 ddd5dd LoadStringW 97464->97465 97466 da4144 97464->97466 97469 ddd5f7 97465->97469 97467 da7d2c 59 API calls 97466->97467 97468 da4159 97467->97468 97468->97469 97470 da416a 97468->97470 97489 da7c8e 59 API calls Mailbox 97469->97489 97472 da4174 97470->97472 97473 da4205 97470->97473 97484 da7c8e 59 API calls Mailbox 97472->97484 97485 da81a7 97473->97485 97476 ddd601 97477 da7e0b 59 API calls 97476->97477 97479 da417e _memset _wcscpy 97476->97479 97478 ddd623 97477->97478 97481 da7e0b 59 API calls 97478->97481 97480 da41e6 Shell_NotifyIconW 97479->97480 97480->97482 97481->97479 97482->97433 97483->97464 97484->97479 97486 da81ba 97485->97486 97487 da81b2 97485->97487 97486->97479 97490 da80d7 59 API calls 2 library calls 97487->97490 97489->97476 97490->97486 97493 dc0137 97491->97493 97492 dc013f 97492->97440 97493->97492 97497 e129da InternetCloseHandle InternetCloseHandle WaitForSingleObject 97493->97497 97495->97440 97496->97440 97497->97493 97516 da88a0 97498->97516 97500 da8b23 97501 da8b9d 97500->97501 97502 da8b2d 97500->97502 97525 da9e9c 60 API calls Mailbox 97501->97525 97503 dc0ff6 Mailbox 59 API calls 97502->97503 97506 da8b3e 97503->97506 97505 da8b8d 97505->97449 97507 da8b4c 97506->97507 97508 da77c7 59 API calls 97506->97508 97509 da8b5b 97507->97509 97523 da80d7 59 API calls 2 library calls 97507->97523 97508->97507 97511 dc0ff6 Mailbox 59 API calls 97509->97511 97512 da8b65 97511->97512 97524 da87c0 68 API calls 97512->97524 97514->97455 97515->97455 97517 da88b3 97516->97517 97518 da8a81 97516->97518 97519 da77c7 59 API calls 97517->97519 97522 da88c4 97517->97522 97518->97500 97520 da8ae3 97519->97520 97521 dc2f80 __cinit 67 API calls 97520->97521 97521->97522 97522->97500 97523->97509 97524->97505 97525->97505 97526 da1066 97531 daf8cf 97526->97531 97528 da106c 97529 dc2f80 __cinit 67 API calls 97528->97529 97530 da1076 97529->97530 97532 daf8f0 97531->97532 97564 dc0143 97532->97564 97536 daf937 97537 da77c7 59 API calls 97536->97537 97538 daf941 97537->97538 97539 da77c7 59 API calls 97538->97539 97540 daf94b 97539->97540 97541 da77c7 59 API calls 97540->97541 97542 daf955 97541->97542 97543 da77c7 59 API calls 97542->97543 97544 daf993 97543->97544 97545 da77c7 59 API calls 97544->97545 97546 dafa5e 97545->97546 97574 db60e7 97546->97574 97550 dafa90 97551 da77c7 59 API calls 97550->97551 97552 dafa9a 97551->97552 97602 dbffde 97552->97602 97554 dafae1 97555 dafaf1 GetStdHandle 97554->97555 97556 dafb3d 97555->97556 97557 de49d5 97555->97557 97558 dafb45 OleInitialize 97556->97558 97557->97556 97559 de49de 97557->97559 97558->97528 97609 e06dda 64 API calls Mailbox 97559->97609 97561 de49e5 97610 e074a9 CreateThread 97561->97610 97563 de49f1 CloseHandle 97563->97558 97611 dc021c 97564->97611 97567 dc021c 59 API calls 97568 dc0185 97567->97568 97569 da77c7 59 API calls 97568->97569 97570 dc0191 97569->97570 97571 da7d2c 59 API calls 97570->97571 97572 daf8f6 97571->97572 97573 dc03a2 6 API calls 97572->97573 97573->97536 97575 da77c7 59 API calls 97574->97575 97576 db60f7 97575->97576 97577 da77c7 59 API calls 97576->97577 97578 db60ff 97577->97578 97618 db5bfd 97578->97618 97581 db5bfd 59 API calls 97582 db610f 97581->97582 97583 da77c7 59 API calls 97582->97583 97584 db611a 97583->97584 97585 dc0ff6 Mailbox 59 API calls 97584->97585 97586 dafa68 97585->97586 97587 db6259 97586->97587 97588 db6267 97587->97588 97589 da77c7 59 API calls 97588->97589 97590 db6272 97589->97590 97591 da77c7 59 API calls 97590->97591 97592 db627d 97591->97592 97593 da77c7 59 API calls 97592->97593 97594 db6288 97593->97594 97595 da77c7 59 API calls 97594->97595 97596 db6293 97595->97596 97597 db5bfd 59 API calls 97596->97597 97598 db629e 97597->97598 97599 dc0ff6 Mailbox 59 API calls 97598->97599 97600 db62a5 RegisterWindowMessageW 97599->97600 97600->97550 97603 dbffee 97602->97603 97604 df5cc3 97602->97604 97606 dc0ff6 Mailbox 59 API calls 97603->97606 97621 e09d71 60 API calls 97604->97621 97608 dbfff6 97606->97608 97607 df5cce 97608->97554 97609->97561 97610->97563 97622 e0748f 65 API calls 97610->97622 97612 da77c7 59 API calls 97611->97612 97613 dc0227 97612->97613 97614 da77c7 59 API calls 97613->97614 97615 dc022f 97614->97615 97616 da77c7 59 API calls 97615->97616 97617 dc017b 97616->97617 97617->97567 97619 da77c7 59 API calls 97618->97619 97620 db5c05 97619->97620 97620->97581 97621->97607 97623 da1016 97628 da4ad2 97623->97628 97626 dc2f80 __cinit 67 API calls 97627 da1025 97626->97627 97629 dc0ff6 Mailbox 59 API calls 97628->97629 97630 da4ada 97629->97630 97631 da101b 97630->97631 97635 da4a94 97630->97635 97631->97626 97636 da4a9d 97635->97636 97637 da4aaf 97635->97637 97638 dc2f80 __cinit 67 API calls 97636->97638 97639 da4afe 97637->97639 97638->97637 97640 da77c7 59 API calls 97639->97640 97641 da4b16 GetVersionExW 97640->97641 97642 da7d2c 59 API calls 97641->97642 97643 da4b59 97642->97643 97644 da7e8c 59 API calls 97643->97644 97649 da4b86 97643->97649 97645 da4b7a 97644->97645 97646 da7886 59 API calls 97645->97646 97646->97649 97647 da4bf1 GetCurrentProcess IsWow64Process 97648 da4c0a 97647->97648 97651 da4c89 GetSystemInfo 97648->97651 97652 da4c20 97648->97652 97649->97647 97650 dddc8d 97649->97650 97654 da4c56 97651->97654 97663 da4c95 97652->97663 97654->97631 97656 da4c7d GetSystemInfo 97659 da4c47 97656->97659 97657 da4c32 97658 da4c95 2 API calls 97657->97658 97660 da4c3a GetNativeSystemInfo 97658->97660 97659->97654 97661 da4c4d FreeLibrary 97659->97661 97660->97659 97661->97654 97664 da4c2e 97663->97664 97665 da4c9e LoadLibraryA 97663->97665 97664->97656 97664->97657 97665->97664 97666 da4caf GetProcAddress 97665->97666 97666->97664 97667 dc7e93 97668 dc7e9f __wsopen_helper 97667->97668 97704 dca048 GetStartupInfoW 97668->97704 97671 dc7ea4 97706 dc8dbc GetProcessHeap 97671->97706 97672 dc7efc 97673 dc7f07 97672->97673 97792 dc7fe3 58 API calls 3 library calls 97672->97792 97707 dc9d26 97673->97707 97676 dc7f0d 97677 dc7f18 __RTC_Initialize 97676->97677 97793 dc7fe3 58 API calls 3 library calls 97676->97793 97728 dcd812 97677->97728 97680 dc7f27 97681 dc7f33 GetCommandLineW 97680->97681 97794 dc7fe3 58 API calls 3 library calls 97680->97794 97747 dd5173 GetEnvironmentStringsW 97681->97747 97684 dc7f32 97684->97681 97687 dc7f4d 97688 dc7f58 97687->97688 97795 dc32f5 58 API calls 3 library calls 97687->97795 97757 dd4fa8 97688->97757 97691 dc7f5e 97694 dc7f69 97691->97694 97796 dc32f5 58 API calls 3 library calls 97691->97796 97771 dc332f 97694->97771 97695 dc7f71 97696 dc7f7c __wwincmdln 97695->97696 97797 dc32f5 58 API calls 3 library calls 97695->97797 97777 da492e 97696->97777 97699 dc7f90 97700 dc7f9f 97699->97700 97789 dc3598 97699->97789 97798 dc3320 58 API calls _doexit 97700->97798 97703 dc7fa4 __wsopen_helper 97705 dca05e 97704->97705 97705->97671 97706->97672 97799 dc33c7 36 API calls 2 library calls 97707->97799 97709 dc9d2b 97800 dc9f7c InitializeCriticalSectionAndSpinCount __mtinitlocknum 97709->97800 97711 dc9d30 97712 dc9d34 97711->97712 97802 dc9fca TlsAlloc 97711->97802 97801 dc9d9c 61 API calls 2 library calls 97712->97801 97715 dc9d46 97715->97712 97717 dc9d51 97715->97717 97716 dc9d39 97716->97676 97803 dc8a15 97717->97803 97720 dc9d93 97811 dc9d9c 61 API calls 2 library calls 97720->97811 97723 dc9d72 97723->97720 97725 dc9d78 97723->97725 97724 dc9d98 97724->97676 97810 dc9c73 58 API calls 4 library calls 97725->97810 97727 dc9d80 GetCurrentThreadId 97727->97676 97729 dcd81e __wsopen_helper 97728->97729 97730 dc9e4b __lock 58 API calls 97729->97730 97731 dcd825 97730->97731 97732 dc8a15 __calloc_crt 58 API calls 97731->97732 97733 dcd836 97732->97733 97734 dcd8a1 GetStartupInfoW 97733->97734 97735 dcd841 __wsopen_helper @_EH4_CallFilterFunc@8 97733->97735 97741 dcd8b6 97734->97741 97744 dcd9e5 97734->97744 97735->97680 97736 dcdaad 97825 dcdabd LeaveCriticalSection _doexit 97736->97825 97738 dc8a15 __calloc_crt 58 API calls 97738->97741 97739 dcda32 GetStdHandle 97739->97744 97740 dcda45 GetFileType 97740->97744 97741->97738 97743 dcd904 97741->97743 97741->97744 97742 dcd938 GetFileType 97742->97743 97743->97742 97743->97744 97823 dca06b InitializeCriticalSectionAndSpinCount 97743->97823 97744->97736 97744->97739 97744->97740 97824 dca06b InitializeCriticalSectionAndSpinCount 97744->97824 97748 dc7f43 97747->97748 97749 dd5184 97747->97749 97753 dd4d6b GetModuleFileNameW 97748->97753 97826 dc8a5d 58 API calls 2 library calls 97749->97826 97751 dd51c0 FreeEnvironmentStringsW 97751->97748 97752 dd51aa _memmove 97752->97751 97755 dd4d9f _wparse_cmdline 97753->97755 97754 dd4ddf _wparse_cmdline 97754->97687 97755->97754 97827 dc8a5d 58 API calls 2 library calls 97755->97827 97758 dd4fc1 __NMSG_WRITE 97757->97758 97762 dd4fb9 97757->97762 97759 dc8a15 __calloc_crt 58 API calls 97758->97759 97767 dd4fea __NMSG_WRITE 97759->97767 97760 dd5041 97761 dc2f95 _free 58 API calls 97760->97761 97761->97762 97762->97691 97763 dc8a15 __calloc_crt 58 API calls 97763->97767 97764 dd5066 97765 dc2f95 _free 58 API calls 97764->97765 97765->97762 97767->97760 97767->97762 97767->97763 97767->97764 97768 dd507d 97767->97768 97828 dd4857 58 API calls 2 library calls 97767->97828 97829 dc9006 IsProcessorFeaturePresent 97768->97829 97770 dd5089 97770->97691 97773 dc333b __IsNonwritableInCurrentImage 97771->97773 97852 dca711 97773->97852 97774 dc3359 __initterm_e 97775 dc2f80 __cinit 67 API calls 97774->97775 97776 dc3378 _doexit __IsNonwritableInCurrentImage 97774->97776 97775->97776 97776->97695 97778 da4948 97777->97778 97788 da49e7 97777->97788 97779 da4982 IsThemeActive 97778->97779 97855 dc35ac 97779->97855 97783 da49ae 97867 da4a5b SystemParametersInfoW SystemParametersInfoW 97783->97867 97785 da49ba 97868 da3b4c 97785->97868 97787 da49c2 SystemParametersInfoW 97787->97788 97788->97699 99018 dc3469 97789->99018 97791 dc35a7 97791->97700 97792->97673 97793->97677 97794->97684 97798->97703 97799->97709 97800->97711 97801->97716 97802->97715 97806 dc8a1c 97803->97806 97805 dc8a57 97805->97720 97809 dca026 TlsSetValue 97805->97809 97806->97805 97807 dc8a3a 97806->97807 97812 dd5446 97806->97812 97807->97805 97807->97806 97820 dca372 Sleep 97807->97820 97809->97723 97810->97727 97811->97724 97813 dd5451 97812->97813 97818 dd546c 97812->97818 97814 dd545d 97813->97814 97813->97818 97821 dc8d68 58 API calls __getptd_noexit 97814->97821 97816 dd547c RtlAllocateHeap 97817 dd5462 97816->97817 97816->97818 97817->97806 97818->97816 97818->97817 97822 dc35e1 DecodePointer 97818->97822 97820->97807 97821->97817 97822->97818 97823->97743 97824->97744 97825->97735 97826->97752 97827->97754 97828->97767 97830 dc9011 97829->97830 97835 dc8e99 97830->97835 97834 dc902c 97834->97770 97836 dc8eb3 _memset __call_reportfault 97835->97836 97837 dc8ed3 IsDebuggerPresent 97836->97837 97843 dca395 SetUnhandledExceptionFilter UnhandledExceptionFilter 97837->97843 97840 dc8f97 __call_reportfault 97844 dcc836 97840->97844 97841 dc8fba 97842 dca380 GetCurrentProcess TerminateProcess 97841->97842 97842->97834 97843->97840 97845 dcc83e 97844->97845 97846 dcc840 IsProcessorFeaturePresent 97844->97846 97845->97841 97848 dd5b5a 97846->97848 97851 dd5b09 5 API calls 2 library calls 97848->97851 97850 dd5c3d 97850->97841 97851->97850 97853 dca714 EncodePointer 97852->97853 97853->97853 97854 dca72e 97853->97854 97854->97774 97856 dc9e4b __lock 58 API calls 97855->97856 97857 dc35b7 DecodePointer EncodePointer 97856->97857 97920 dc9fb5 LeaveCriticalSection 97857->97920 97859 da49a7 97860 dc3614 97859->97860 97861 dc361e 97860->97861 97862 dc3638 97860->97862 97861->97862 97921 dc8d68 58 API calls __getptd_noexit 97861->97921 97862->97783 97864 dc3628 97922 dc8ff6 9 API calls __vswprintf_l 97864->97922 97866 dc3633 97866->97783 97867->97785 97869 da3b59 __ftell_nolock 97868->97869 97870 da77c7 59 API calls 97869->97870 97871 da3b63 GetCurrentDirectoryW 97870->97871 97923 da3778 97871->97923 97873 da3b8c IsDebuggerPresent 97874 ddd4ad MessageBoxA 97873->97874 97875 da3b9a 97873->97875 97877 ddd4c7 97874->97877 97875->97877 97878 da3bb7 97875->97878 97907 da3c73 97875->97907 97876 da3c7a SetCurrentDirectoryW 97881 da3c87 Mailbox 97876->97881 98121 da7373 59 API calls Mailbox 97877->98121 98004 da73e5 97878->98004 97881->97787 97882 ddd4d7 97888 ddd4ed SetCurrentDirectoryW 97882->97888 97884 da3bd5 GetFullPathNameW 97885 da7d2c 59 API calls 97884->97885 97886 da3c10 97885->97886 98020 db0a8d 97886->98020 97888->97881 97890 da3c2e 97891 da3c38 97890->97891 98122 e04c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 97890->98122 98036 da3a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 97891->98036 97894 ddd50a 97894->97891 97897 ddd51b 97894->97897 97899 da4864 61 API calls 97897->97899 97898 da3c42 97900 da3c55 97898->97900 98119 da43db 68 API calls _memset 97898->98119 97901 ddd523 97899->97901 98044 db0b30 97900->98044 97904 da7f41 59 API calls 97901->97904 97906 ddd530 97904->97906 97905 da3c60 97905->97907 98120 da44cb Shell_NotifyIconW _memset 97905->98120 97908 ddd55f 97906->97908 97909 ddd53a 97906->97909 97907->97876 97911 da7e0b 59 API calls 97908->97911 97912 da7e0b 59 API calls 97909->97912 97913 ddd55b GetForegroundWindow ShellExecuteW 97911->97913 97914 ddd545 97912->97914 97917 ddd58f Mailbox 97913->97917 98123 da7c8e 59 API calls Mailbox 97914->98123 97917->97907 97918 ddd552 97919 da7e0b 59 API calls 97918->97919 97919->97913 97920->97859 97921->97864 97922->97866 97924 da77c7 59 API calls 97923->97924 97925 da378e 97924->97925 98124 da3d43 97925->98124 97927 da37ac 97928 da4864 61 API calls 97927->97928 97929 da37c0 97928->97929 97930 da7f41 59 API calls 97929->97930 97931 da37cd 97930->97931 98138 da4f3d 97931->98138 97934 ddd3ae 98205 e097e5 97934->98205 97935 da37ee Mailbox 97939 da81a7 59 API calls 97935->97939 97938 ddd3cd 97941 dc2f95 _free 58 API calls 97938->97941 97942 da3801 97939->97942 97943 ddd3da 97941->97943 98162 da93ea 97942->98162 97945 da4faa 84 API calls 97943->97945 97947 ddd3e3 97945->97947 97951 da3ee2 59 API calls 97947->97951 97948 da7f41 59 API calls 97949 da381a 97948->97949 98165 da8620 97949->98165 97953 ddd3fe 97951->97953 97952 da382c Mailbox 97954 da7f41 59 API calls 97952->97954 97955 da3ee2 59 API calls 97953->97955 97956 da3852 97954->97956 97957 ddd41a 97955->97957 97958 da8620 69 API calls 97956->97958 97959 da4864 61 API calls 97957->97959 97960 da3861 Mailbox 97958->97960 97961 ddd43f 97959->97961 97964 da77c7 59 API calls 97960->97964 97962 da3ee2 59 API calls 97961->97962 97963 ddd44b 97962->97963 97965 da81a7 59 API calls 97963->97965 97966 da387f 97964->97966 97967 ddd459 97965->97967 98169 da3ee2 97966->98169 97969 da3ee2 59 API calls 97967->97969 97971 ddd468 97969->97971 97977 da81a7 59 API calls 97971->97977 97973 da3899 97973->97947 97974 da38a3 97973->97974 97975 dc313d _W_store_winword 60 API calls 97974->97975 97976 da38ae 97975->97976 97976->97953 97978 da38b8 97976->97978 97979 ddd48a 97977->97979 97980 dc313d _W_store_winword 60 API calls 97978->97980 97981 da3ee2 59 API calls 97979->97981 97982 da38c3 97980->97982 97983 ddd497 97981->97983 97982->97957 97984 da38cd 97982->97984 97983->97983 97985 dc313d _W_store_winword 60 API calls 97984->97985 97986 da38d8 97985->97986 97986->97971 97987 da3919 97986->97987 97989 da3ee2 59 API calls 97986->97989 97987->97971 97988 da3926 97987->97988 98185 da942e 97988->98185 97991 da38fc 97989->97991 97993 da81a7 59 API calls 97991->97993 97995 da390a 97993->97995 97997 da3ee2 59 API calls 97995->97997 97997->97987 97999 da93ea 59 API calls 98001 da3961 97999->98001 98000 da9040 60 API calls 98000->98001 98001->97999 98001->98000 98002 da3ee2 59 API calls 98001->98002 98003 da39a7 Mailbox 98001->98003 98002->98001 98003->97873 98005 da73f2 __ftell_nolock 98004->98005 98006 da740b 98005->98006 98007 ddee4b _memset 98005->98007 98008 da48ae 60 API calls 98006->98008 98009 ddee67 GetOpenFileNameW 98007->98009 98010 da7414 98008->98010 98011 ddeeb6 98009->98011 98709 dc09d5 98010->98709 98014 da7d2c 59 API calls 98011->98014 98016 ddeecb 98014->98016 98016->98016 98017 da7429 98727 da69ca 98017->98727 98021 db0a9a __ftell_nolock 98020->98021 98901 da6ee0 98021->98901 98023 db0a9f 98024 da3c26 98023->98024 98912 db12fe 89 API calls 98023->98912 98024->97882 98024->97890 98026 db0aac 98026->98024 98913 db4047 91 API calls Mailbox 98026->98913 98028 db0ab5 98028->98024 98029 db0ab9 GetFullPathNameW 98028->98029 98030 da7d2c 59 API calls 98029->98030 98031 db0ae5 98030->98031 98032 da7d2c 59 API calls 98031->98032 98033 db0af2 98032->98033 98034 de50d5 _wcscat 98033->98034 98035 da7d2c 59 API calls 98033->98035 98035->98024 98037 ddd49c 98036->98037 98038 da3ac2 LoadImageW RegisterClassExW 98036->98038 98919 da48fe LoadImageW EnumResourceNamesW 98037->98919 98918 da3041 7 API calls 98038->98918 98041 da3b46 98043 da39e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98041->98043 98042 ddd4a5 98043->97898 98045 de50ed 98044->98045 98058 db0b55 98044->98058 98945 e0a0b5 89 API calls 4 library calls 98045->98945 98047 db0e5a 98047->97905 98048 db11d0 10 API calls 98049 db1044 98048->98049 98049->98047 98052 db11f3 231 API calls 98049->98052 98051 db0bab PeekMessageW 98083 db0b65 Mailbox 98051->98083 98053 db1058 LockWindowUpdate DestroyWindow GetMessageW 98052->98053 98053->98047 98056 db108a 98053->98056 98055 de52ab Sleep 98055->98083 98059 de6082 TranslateMessage DispatchMessageW GetMessageW 98056->98059 98057 db0e44 98057->98047 98057->98048 98058->98083 98946 da9fbd 60 API calls 98058->98946 98947 df68bf 258 API calls 98058->98947 98059->98047 98059->98059 98061 db0fbf TranslateMessage DispatchMessageW 98062 db0fa3 PeekMessageW 98061->98062 98062->98083 98063 de517a TranslateAcceleratorW 98063->98062 98063->98083 98064 db0e73 timeGetTime 98064->98083 98065 de5c49 WaitForSingleObject 98067 de5c66 GetExitCodeProcess CloseHandle 98065->98067 98065->98083 98072 db10f5 98067->98072 98068 db0fdd Sleep 98090 db0fee Mailbox 98068->98090 98069 da81a7 59 API calls 98069->98083 98070 da77c7 59 API calls 98070->98090 98071 dc0ff6 59 API calls Mailbox 98071->98083 98072->97905 98073 de5f22 Sleep 98073->98090 98076 dc0719 timeGetTime 98076->98090 98077 db10ae timeGetTime 98944 da9fbd 60 API calls 98077->98944 98081 de5fb9 GetExitCodeProcess 98088 de5fcf WaitForSingleObject 98081->98088 98089 de5fe5 CloseHandle 98081->98089 98083->98051 98083->98055 98083->98057 98083->98061 98083->98062 98083->98063 98083->98064 98083->98065 98083->98068 98083->98069 98083->98071 98083->98072 98083->98073 98083->98077 98084 dab89c 231 API calls 98083->98084 98083->98090 98098 da9fbd 60 API calls 98083->98098 98101 daa000 231 API calls 98083->98101 98106 e0a0b5 89 API calls 98083->98106 98108 da8620 69 API calls 98083->98108 98109 da9df0 59 API calls Mailbox 98083->98109 98111 df66f4 59 API calls Mailbox 98083->98111 98112 de59ff VariantClear 98083->98112 98113 da8e34 59 API calls Mailbox 98083->98113 98114 df7405 59 API calls 98083->98114 98115 de5a95 VariantClear 98083->98115 98116 de5843 VariantClear 98083->98116 98117 da7f41 59 API calls 98083->98117 98118 da8b13 69 API calls 98083->98118 98920 daf5c0 98083->98920 98936 da31ce 98083->98936 98941 dae580 258 API calls 98083->98941 98942 dae800 258 API calls 2 library calls 98083->98942 98943 dafe40 258 API calls 2 library calls 98083->98943 98948 e2629f 59 API calls 98083->98948 98949 e09c9f 59 API calls Mailbox 98083->98949 98950 dfd9e3 59 API calls 98083->98950 98951 da9997 98083->98951 98969 df6665 59 API calls 2 library calls 98083->98969 98970 da8561 59 API calls 98083->98970 98971 da843f 59 API calls Mailbox 98083->98971 98084->98083 98086 e261ac 110 API calls 98086->98090 98087 dab93d 109 API calls 98087->98090 98088->98083 98088->98089 98089->98090 98090->98070 98090->98072 98090->98076 98090->98081 98090->98083 98090->98086 98090->98087 98091 de5c9e 98090->98091 98092 de6041 Sleep 98090->98092 98093 de54a2 Sleep 98090->98093 98095 da7f41 59 API calls 98090->98095 98100 da8b13 69 API calls 98090->98100 98972 e028f7 60 API calls 98090->98972 98973 da9fbd 60 API calls 98090->98973 98974 dab89c 258 API calls 98090->98974 98975 df6a50 60 API calls 98090->98975 98976 e054e6 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98090->98976 98977 e03e91 66 API calls Mailbox 98090->98977 98091->98072 98092->98083 98093->98083 98095->98090 98098->98083 98100->98090 98101->98083 98106->98083 98108->98083 98109->98083 98111->98083 98112->98083 98113->98083 98114->98083 98115->98083 98116->98083 98117->98083 98118->98083 98119->97900 98120->97907 98121->97882 98122->97894 98123->97918 98125 da3d50 __ftell_nolock 98124->98125 98126 da3eb6 Mailbox 98125->98126 98127 da7d2c 59 API calls 98125->98127 98126->97927 98129 da3d82 98127->98129 98137 da3db8 Mailbox 98129->98137 98246 da7b52 98129->98246 98130 da7b52 59 API calls 98130->98137 98131 da3e89 98131->98126 98132 da7f41 59 API calls 98131->98132 98133 da3eaa 98132->98133 98135 da3f84 59 API calls 98133->98135 98134 da7f41 59 API calls 98134->98137 98135->98126 98136 da3f84 59 API calls 98136->98137 98137->98126 98137->98130 98137->98131 98137->98134 98137->98136 98249 da4d13 98138->98249 98143 dddd0f 98145 da4faa 84 API calls 98143->98145 98144 da4f68 LoadLibraryExW 98259 da4cc8 98144->98259 98147 dddd16 98145->98147 98149 da4cc8 3 API calls 98147->98149 98151 dddd1e 98149->98151 98285 da506b 98151->98285 98152 da4f8f 98152->98151 98153 da4f9b 98152->98153 98155 da4faa 84 API calls 98153->98155 98157 da37e6 98155->98157 98157->97934 98157->97935 98159 dddd45 98291 da5027 98159->98291 98161 dddd52 98163 dc0ff6 Mailbox 59 API calls 98162->98163 98164 da380d 98163->98164 98164->97948 98166 da862b 98165->98166 98167 da8b13 69 API calls 98166->98167 98168 da8652 98166->98168 98167->98168 98168->97952 98170 da3eec 98169->98170 98171 da3f05 98169->98171 98172 da81a7 59 API calls 98170->98172 98173 da7d2c 59 API calls 98171->98173 98174 da388b 98172->98174 98173->98174 98175 dc313d 98174->98175 98176 dc31be 98175->98176 98177 dc3149 98175->98177 98519 dc31d0 60 API calls 4 library calls 98176->98519 98184 dc316e 98177->98184 98517 dc8d68 58 API calls __getptd_noexit 98177->98517 98180 dc31cb 98180->97973 98181 dc3155 98518 dc8ff6 9 API calls __vswprintf_l 98181->98518 98183 dc3160 98183->97973 98184->97973 98186 da9436 98185->98186 98187 dc0ff6 Mailbox 59 API calls 98186->98187 98188 da9444 98187->98188 98190 da3936 98188->98190 98520 da935c 59 API calls Mailbox 98188->98520 98191 da91b0 98190->98191 98521 da92c0 98191->98521 98193 dc0ff6 Mailbox 59 API calls 98195 da3944 98193->98195 98194 da91bf 98194->98193 98194->98195 98196 da9040 98195->98196 98197 ddf5a5 98196->98197 98199 da9057 98196->98199 98197->98199 98531 da8d3b 59 API calls Mailbox 98197->98531 98200 da9158 98199->98200 98201 da91a0 98199->98201 98204 da915f 98199->98204 98203 dc0ff6 Mailbox 59 API calls 98200->98203 98530 da9e9c 60 API calls Mailbox 98201->98530 98203->98204 98204->98001 98532 da5045 85 API calls _fseek 98205->98532 98207 e09854 98533 e099be 96 API calls 2 library calls 98207->98533 98209 e09866 98210 da506b 74 API calls 98209->98210 98238 ddd3c1 98209->98238 98211 e09881 98210->98211 98212 da506b 74 API calls 98211->98212 98213 e09891 98212->98213 98214 da506b 74 API calls 98213->98214 98215 e098ac 98214->98215 98216 da506b 74 API calls 98215->98216 98217 e098c7 98216->98217 98534 da5045 85 API calls _fseek 98217->98534 98219 e098de 98220 dc594c std::exception::_Copy_str 58 API calls 98219->98220 98221 e098e5 98220->98221 98222 dc594c std::exception::_Copy_str 58 API calls 98221->98222 98223 e098ef 98222->98223 98224 da506b 74 API calls 98223->98224 98225 e09903 98224->98225 98535 e09393 GetSystemTimeAsFileTime 98225->98535 98227 e09916 98228 e09940 98227->98228 98229 e0992b 98227->98229 98231 e099a5 98228->98231 98232 e09946 98228->98232 98230 dc2f95 _free 58 API calls 98229->98230 98233 e09931 98230->98233 98235 dc2f95 _free 58 API calls 98231->98235 98536 e08d90 98232->98536 98236 dc2f95 _free 58 API calls 98233->98236 98235->98238 98236->98238 98238->97938 98240 da4faa 98238->98240 98239 dc2f95 _free 58 API calls 98239->98238 98241 da4fb4 98240->98241 98245 da4fbb 98240->98245 98242 dc55d6 __fcloseall 83 API calls 98241->98242 98242->98245 98243 da4fca 98243->97938 98244 da4fdb FreeLibrary 98244->98243 98245->98243 98245->98244 98247 da7faf 59 API calls 98246->98247 98248 da7b5d 98247->98248 98248->98129 98296 da4d61 98249->98296 98252 da4d3a 98253 da4d4a FreeLibrary 98252->98253 98254 da4d53 98252->98254 98253->98254 98256 dc548b 98254->98256 98255 da4d61 2 API calls 98255->98252 98300 dc54a0 98256->98300 98258 da4f5c 98258->98143 98258->98144 98460 da4d94 98259->98460 98262 da4ced 98264 da4d08 98262->98264 98265 da4cff FreeLibrary 98262->98265 98263 da4d94 2 API calls 98263->98262 98266 da4dd0 98264->98266 98265->98264 98267 dc0ff6 Mailbox 59 API calls 98266->98267 98268 da4de5 98267->98268 98269 da538e 59 API calls 98268->98269 98270 da4df1 _memmove 98269->98270 98271 da4e2c 98270->98271 98273 da4ee9 98270->98273 98274 da4f21 98270->98274 98272 da5027 69 API calls 98271->98272 98281 da4e35 98272->98281 98464 da4fe9 CreateStreamOnHGlobal 98273->98464 98471 e09ba5 95 API calls 98274->98471 98277 da506b 74 API calls 98277->98281 98279 da4ec9 98279->98152 98280 dddcd0 98472 da5045 85 API calls _fseek 98280->98472 98281->98277 98281->98279 98281->98280 98470 da5045 85 API calls _fseek 98281->98470 98283 dddce4 98284 da506b 74 API calls 98283->98284 98284->98279 98286 da507d 98285->98286 98287 ddddf6 98285->98287 98473 dc5812 98286->98473 98290 e09393 GetSystemTimeAsFileTime 98290->98159 98292 ddddb9 98291->98292 98293 da5036 98291->98293 98499 dc5e90 98293->98499 98295 da503e 98295->98161 98297 da4d2e 98296->98297 98298 da4d6a LoadLibraryA 98296->98298 98297->98252 98297->98255 98298->98297 98299 da4d7b GetProcAddress 98298->98299 98299->98297 98303 dc54ac __wsopen_helper 98300->98303 98301 dc54bf 98349 dc8d68 58 API calls __getptd_noexit 98301->98349 98303->98301 98305 dc54f0 98303->98305 98304 dc54c4 98350 dc8ff6 9 API calls __vswprintf_l 98304->98350 98319 dd0738 98305->98319 98308 dc54f5 98309 dc54fe 98308->98309 98310 dc550b 98308->98310 98351 dc8d68 58 API calls __getptd_noexit 98309->98351 98312 dc5535 98310->98312 98313 dc5515 98310->98313 98334 dd0857 98312->98334 98352 dc8d68 58 API calls __getptd_noexit 98313->98352 98315 dc54cf __wsopen_helper @_EH4_CallFilterFunc@8 98315->98258 98320 dd0744 __wsopen_helper 98319->98320 98321 dc9e4b __lock 58 API calls 98320->98321 98332 dd0752 98321->98332 98322 dd07c6 98354 dd084e 98322->98354 98323 dd07cd 98359 dc8a5d 58 API calls 2 library calls 98323->98359 98326 dd0843 __wsopen_helper 98326->98308 98327 dd07d4 98327->98322 98360 dca06b InitializeCriticalSectionAndSpinCount 98327->98360 98329 dc9ed3 __mtinitlocknum 58 API calls 98329->98332 98331 dd07fa EnterCriticalSection 98331->98322 98332->98322 98332->98323 98332->98329 98357 dc6e8d 59 API calls __lock 98332->98357 98358 dc6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 98332->98358 98335 dd0877 __wopenfile 98334->98335 98336 dd0891 98335->98336 98348 dd0a4c 98335->98348 98367 dc3a0b 60 API calls 3 library calls 98335->98367 98365 dc8d68 58 API calls __getptd_noexit 98336->98365 98338 dd0896 98366 dc8ff6 9 API calls __vswprintf_l 98338->98366 98340 dc5540 98353 dc5562 LeaveCriticalSection LeaveCriticalSection __wfsopen 98340->98353 98341 dd0aaf 98362 dd87f1 98341->98362 98344 dd0a45 98344->98348 98368 dc3a0b 60 API calls 3 library calls 98344->98368 98346 dd0a64 98346->98348 98369 dc3a0b 60 API calls 3 library calls 98346->98369 98348->98336 98348->98341 98349->98304 98350->98315 98351->98315 98352->98315 98353->98315 98361 dc9fb5 LeaveCriticalSection 98354->98361 98356 dd0855 98356->98326 98357->98332 98358->98332 98359->98327 98360->98331 98361->98356 98370 dd7fd5 98362->98370 98364 dd880a 98364->98340 98365->98338 98366->98340 98367->98344 98368->98346 98369->98348 98371 dd7fe1 __wsopen_helper 98370->98371 98372 dd7ff7 98371->98372 98374 dd802d 98371->98374 98457 dc8d68 58 API calls __getptd_noexit 98372->98457 98381 dd809e 98374->98381 98375 dd7ffc 98458 dc8ff6 9 API calls __vswprintf_l 98375->98458 98378 dd8049 98459 dd8072 LeaveCriticalSection __unlock_fhandle 98378->98459 98380 dd8006 __wsopen_helper 98380->98364 98382 dd80be 98381->98382 98383 dc471a __wsopen_nolock 58 API calls 98382->98383 98387 dd80da 98383->98387 98384 dd8211 98385 dc9006 __invoke_watson 8 API calls 98384->98385 98386 dd87f0 98385->98386 98388 dd7fd5 __wsopen_helper 103 API calls 98386->98388 98387->98384 98389 dd8114 98387->98389 98396 dd8137 98387->98396 98390 dd880a 98388->98390 98391 dc8d34 __dosmaperr 58 API calls 98389->98391 98390->98378 98392 dd8119 98391->98392 98393 dc8d68 __tolower_l 58 API calls 98392->98393 98394 dd8126 98393->98394 98395 dc8ff6 __vswprintf_l 9 API calls 98394->98395 98398 dd8130 98395->98398 98397 dd81f5 98396->98397 98404 dd81d3 98396->98404 98399 dc8d34 __dosmaperr 58 API calls 98397->98399 98398->98378 98400 dd81fa 98399->98400 98401 dc8d68 __tolower_l 58 API calls 98400->98401 98402 dd8207 98401->98402 98403 dc8ff6 __vswprintf_l 9 API calls 98402->98403 98403->98384 98405 dcd4d4 __alloc_osfhnd 61 API calls 98404->98405 98406 dd82a1 98405->98406 98407 dd82ce 98406->98407 98408 dd82ab 98406->98408 98409 dd7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98407->98409 98410 dc8d34 __dosmaperr 58 API calls 98408->98410 98419 dd82f0 98409->98419 98411 dd82b0 98410->98411 98413 dc8d68 __tolower_l 58 API calls 98411->98413 98412 dd836e GetFileType 98414 dd8379 GetLastError 98412->98414 98415 dd83bb 98412->98415 98417 dd82ba 98413->98417 98418 dc8d47 __dosmaperr 58 API calls 98414->98418 98427 dcd76a __set_osfhnd 59 API calls 98415->98427 98416 dd833c GetLastError 98420 dc8d47 __dosmaperr 58 API calls 98416->98420 98421 dc8d68 __tolower_l 58 API calls 98417->98421 98422 dd83a0 CloseHandle 98418->98422 98419->98412 98419->98416 98423 dd7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98419->98423 98424 dd8361 98420->98424 98421->98398 98422->98424 98425 dd83ae 98422->98425 98426 dd8331 98423->98426 98429 dc8d68 __tolower_l 58 API calls 98424->98429 98428 dc8d68 __tolower_l 58 API calls 98425->98428 98426->98412 98426->98416 98432 dd83d9 98427->98432 98430 dd83b3 98428->98430 98429->98384 98430->98424 98431 dd8594 98431->98384 98434 dd8767 CloseHandle 98431->98434 98432->98431 98433 dd1b11 __lseeki64_nolock 60 API calls 98432->98433 98449 dd845a 98432->98449 98435 dd8443 98433->98435 98436 dd7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98434->98436 98438 dc8d34 __dosmaperr 58 API calls 98435->98438 98454 dd8462 98435->98454 98437 dd878e 98436->98437 98440 dd861e 98437->98440 98441 dd8796 GetLastError 98437->98441 98438->98449 98439 dd10ab 70 API calls __read_nolock 98439->98454 98440->98384 98442 dc8d47 __dosmaperr 58 API calls 98441->98442 98443 dd87a2 98442->98443 98445 dcd67d __free_osfhnd 59 API calls 98443->98445 98444 dd0d2d __close_nolock 61 API calls 98444->98454 98445->98440 98446 dd99f2 __chsize_nolock 82 API calls 98446->98454 98447 dcdac6 __write 78 API calls 98447->98449 98448 dd1b11 60 API calls __lseeki64_nolock 98448->98449 98449->98431 98449->98447 98449->98448 98449->98454 98450 dd8611 98452 dd0d2d __close_nolock 61 API calls 98450->98452 98451 dd85fa 98451->98431 98453 dd8618 98452->98453 98456 dc8d68 __tolower_l 58 API calls 98453->98456 98454->98439 98454->98444 98454->98446 98454->98449 98454->98450 98454->98451 98455 dd1b11 60 API calls __lseeki64_nolock 98454->98455 98455->98454 98456->98440 98457->98375 98458->98380 98459->98380 98461 da4ce1 98460->98461 98462 da4d9d LoadLibraryA 98460->98462 98461->98262 98461->98263 98462->98461 98463 da4dae GetProcAddress 98462->98463 98463->98461 98465 da5003 FindResourceExW 98464->98465 98466 da5020 98464->98466 98465->98466 98467 dddd5c LoadResource 98465->98467 98466->98271 98467->98466 98468 dddd71 SizeofResource 98467->98468 98468->98466 98469 dddd85 LockResource 98468->98469 98469->98466 98470->98281 98471->98271 98472->98283 98476 dc582d 98473->98476 98475 da508e 98475->98290 98477 dc5839 __wsopen_helper 98476->98477 98478 dc5874 __wsopen_helper 98477->98478 98479 dc587c 98477->98479 98480 dc584f _memset 98477->98480 98478->98475 98491 dc6e4e 98479->98491 98489 dc8d68 58 API calls __getptd_noexit 98480->98489 98482 dc5882 98497 dc564d 72 API calls 7 library calls 98482->98497 98485 dc5869 98490 dc8ff6 9 API calls __vswprintf_l 98485->98490 98487 dc5898 98498 dc58b6 LeaveCriticalSection LeaveCriticalSection __wfsopen 98487->98498 98489->98485 98490->98478 98492 dc6e5e 98491->98492 98493 dc6e80 EnterCriticalSection 98491->98493 98492->98493 98495 dc6e66 98492->98495 98494 dc6e76 98493->98494 98494->98482 98496 dc9e4b __lock 58 API calls 98495->98496 98496->98494 98497->98487 98498->98478 98500 dc5e9c __wsopen_helper 98499->98500 98501 dc5eae 98500->98501 98502 dc5ec3 98500->98502 98513 dc8d68 58 API calls __getptd_noexit 98501->98513 98504 dc6e4e __lock_file 59 API calls 98502->98504 98506 dc5ec9 98504->98506 98505 dc5eb3 98514 dc8ff6 9 API calls __vswprintf_l 98505->98514 98515 dc5b00 67 API calls 7 library calls 98506->98515 98509 dc5ed4 98516 dc5ef4 LeaveCriticalSection LeaveCriticalSection __wfsopen 98509->98516 98511 dc5ee6 98512 dc5ebe __wsopen_helper 98511->98512 98512->98295 98513->98505 98514->98512 98515->98509 98516->98511 98517->98181 98518->98183 98519->98180 98520->98190 98522 da92c9 Mailbox 98521->98522 98523 ddf5c8 98522->98523 98528 da92d3 98522->98528 98524 dc0ff6 Mailbox 59 API calls 98523->98524 98526 ddf5d4 98524->98526 98525 da92da 98525->98194 98528->98525 98529 da9df0 59 API calls Mailbox 98528->98529 98529->98528 98530->98204 98531->98199 98532->98207 98533->98209 98534->98219 98535->98227 98537 e08da9 98536->98537 98538 e08d9b 98536->98538 98540 e08dee 98537->98540 98541 dc548b 115 API calls 98537->98541 98559 e08db2 98537->98559 98539 dc548b 115 API calls 98538->98539 98539->98537 98567 e0901b 74 API calls 3 library calls 98540->98567 98543 e08dd3 98541->98543 98543->98540 98545 e08ddc 98543->98545 98544 e08e32 98546 e08e36 98544->98546 98547 e08e57 98544->98547 98545->98559 98577 dc55d6 98545->98577 98548 e08e43 98546->98548 98551 dc55d6 __fcloseall 83 API calls 98546->98551 98568 e08c33 98547->98568 98553 dc55d6 __fcloseall 83 API calls 98548->98553 98548->98559 98551->98548 98553->98559 98554 e08e85 98590 e08eb5 90 API calls 98554->98590 98555 e08e65 98556 e08e72 98555->98556 98558 dc55d6 __fcloseall 83 API calls 98555->98558 98556->98559 98561 dc55d6 __fcloseall 83 API calls 98556->98561 98558->98556 98559->98239 98560 e08e8c 98591 e08f97 58 API calls _free 98560->98591 98561->98559 98563 e08e93 98564 e08ea0 98563->98564 98565 dc55d6 __fcloseall 83 API calls 98563->98565 98564->98559 98566 dc55d6 __fcloseall 83 API calls 98564->98566 98565->98564 98566->98559 98567->98544 98569 dc594c std::exception::_Copy_str 58 API calls 98568->98569 98570 e08c42 98569->98570 98571 dc594c std::exception::_Copy_str 58 API calls 98570->98571 98572 e08c56 98571->98572 98573 dc594c std::exception::_Copy_str 58 API calls 98572->98573 98574 e08c6a 98573->98574 98576 e08c7d 98574->98576 98592 e08f97 58 API calls _free 98574->98592 98576->98554 98576->98555 98578 dc55e2 __wsopen_helper 98577->98578 98579 dc560e 98578->98579 98580 dc55f6 98578->98580 98582 dc6e4e __lock_file 59 API calls 98579->98582 98586 dc5606 __wsopen_helper 98579->98586 98609 dc8d68 58 API calls __getptd_noexit 98580->98609 98585 dc5620 98582->98585 98583 dc55fb 98610 dc8ff6 9 API calls __vswprintf_l 98583->98610 98593 dc556a 98585->98593 98586->98559 98590->98560 98591->98563 98592->98576 98594 dc558d 98593->98594 98595 dc5579 98593->98595 98602 dc5589 98594->98602 98612 dc4c6d 98594->98612 98655 dc8d68 58 API calls __getptd_noexit 98595->98655 98597 dc557e 98656 dc8ff6 9 API calls __vswprintf_l 98597->98656 98611 dc5645 LeaveCriticalSection LeaveCriticalSection __wfsopen 98602->98611 98605 dc55a7 98629 dd0c52 98605->98629 98607 dc55ad 98607->98602 98608 dc2f95 _free 58 API calls 98607->98608 98608->98602 98609->98583 98610->98586 98611->98586 98613 dc4c80 98612->98613 98617 dc4ca4 98612->98617 98614 dc4916 __fflush_nolock 58 API calls 98613->98614 98613->98617 98615 dc4c9d 98614->98615 98657 dcdac6 78 API calls 7 library calls 98615->98657 98618 dd0dc7 98617->98618 98619 dc55a1 98618->98619 98620 dd0dd4 98618->98620 98622 dc4916 98619->98622 98620->98619 98621 dc2f95 _free 58 API calls 98620->98621 98621->98619 98623 dc4935 98622->98623 98624 dc4920 98622->98624 98623->98605 98658 dc8d68 58 API calls __getptd_noexit 98624->98658 98626 dc4925 98659 dc8ff6 9 API calls __vswprintf_l 98626->98659 98628 dc4930 98628->98605 98630 dd0c5e __wsopen_helper 98629->98630 98631 dd0c6b 98630->98631 98632 dd0c82 98630->98632 98684 dc8d34 58 API calls __getptd_noexit 98631->98684 98634 dd0d0d 98632->98634 98636 dd0c92 98632->98636 98689 dc8d34 58 API calls __getptd_noexit 98634->98689 98635 dd0c70 98685 dc8d68 58 API calls __getptd_noexit 98635->98685 98639 dd0cba 98636->98639 98640 dd0cb0 98636->98640 98660 dcd446 98639->98660 98686 dc8d34 58 API calls __getptd_noexit 98640->98686 98641 dd0cb5 98690 dc8d68 58 API calls __getptd_noexit 98641->98690 98645 dd0cc0 98647 dd0cde 98645->98647 98648 dd0cd3 98645->98648 98646 dd0d19 98691 dc8ff6 9 API calls __vswprintf_l 98646->98691 98687 dc8d68 58 API calls __getptd_noexit 98647->98687 98669 dd0d2d 98648->98669 98651 dd0c77 __wsopen_helper 98651->98607 98653 dd0cd9 98688 dd0d05 LeaveCriticalSection __unlock_fhandle 98653->98688 98655->98597 98656->98602 98657->98617 98658->98626 98659->98628 98661 dcd452 __wsopen_helper 98660->98661 98662 dcd4a1 EnterCriticalSection 98661->98662 98663 dc9e4b __lock 58 API calls 98661->98663 98664 dcd4c7 __wsopen_helper 98662->98664 98665 dcd477 98663->98665 98664->98645 98666 dcd48f 98665->98666 98692 dca06b InitializeCriticalSectionAndSpinCount 98665->98692 98693 dcd4cb LeaveCriticalSection _doexit 98666->98693 98694 dcd703 98669->98694 98671 dd0d91 98707 dcd67d 59 API calls 2 library calls 98671->98707 98672 dd0d3b 98672->98671 98674 dcd703 __chsize_nolock 58 API calls 98672->98674 98683 dd0d6f 98672->98683 98677 dd0d66 98674->98677 98675 dcd703 __chsize_nolock 58 API calls 98678 dd0d7b FindCloseChangeNotification 98675->98678 98676 dd0d99 98680 dd0dbb 98676->98680 98708 dc8d47 58 API calls 2 library calls 98676->98708 98681 dcd703 __chsize_nolock 58 API calls 98677->98681 98678->98671 98682 dd0d87 GetLastError 98678->98682 98680->98653 98681->98683 98682->98671 98683->98671 98683->98675 98684->98635 98685->98651 98686->98641 98687->98653 98688->98651 98689->98641 98690->98646 98691->98651 98692->98666 98693->98662 98695 dcd70e 98694->98695 98696 dcd723 98694->98696 98697 dc8d34 __dosmaperr 58 API calls 98695->98697 98699 dc8d34 __dosmaperr 58 API calls 98696->98699 98701 dcd748 98696->98701 98698 dcd713 98697->98698 98700 dc8d68 __tolower_l 58 API calls 98698->98700 98702 dcd752 98699->98702 98705 dcd71b 98700->98705 98701->98672 98703 dc8d68 __tolower_l 58 API calls 98702->98703 98704 dcd75a 98703->98704 98706 dc8ff6 __vswprintf_l 9 API calls 98704->98706 98705->98672 98706->98705 98707->98676 98708->98680 98710 dc09e2 __ftell_nolock 98709->98710 98711 dc09f1 GetLongPathNameW 98710->98711 98712 da7d2c 59 API calls 98711->98712 98713 da741d 98712->98713 98714 da716b 98713->98714 98715 da77c7 59 API calls 98714->98715 98716 da717d 98715->98716 98717 da48ae 60 API calls 98716->98717 98718 da7188 98717->98718 98719 da7193 98718->98719 98723 ddecae 98718->98723 98721 da3f84 59 API calls 98719->98721 98722 da719f 98721->98722 98761 da34c2 98722->98761 98725 ddecc8 98723->98725 98767 da7a68 61 API calls 98723->98767 98726 da71b2 Mailbox 98726->98017 98728 da4f3d 136 API calls 98727->98728 98729 da69ef 98728->98729 98730 dde45a 98729->98730 98732 da4f3d 136 API calls 98729->98732 98731 e097e5 122 API calls 98730->98731 98733 dde46f 98731->98733 98734 da6a03 98732->98734 98735 dde490 98733->98735 98736 dde473 98733->98736 98734->98730 98737 da6a0b 98734->98737 98739 dc0ff6 Mailbox 59 API calls 98735->98739 98738 da4faa 84 API calls 98736->98738 98740 dde47b 98737->98740 98741 da6a17 98737->98741 98738->98740 98760 dde4d5 Mailbox 98739->98760 98861 e04534 90 API calls _wprintf 98740->98861 98768 da6bec 98741->98768 98744 dde489 98744->98735 98746 dde689 98747 dc2f95 _free 58 API calls 98746->98747 98748 dde691 98747->98748 98749 da4faa 84 API calls 98748->98749 98754 dde69a 98749->98754 98753 dc2f95 _free 58 API calls 98753->98754 98754->98753 98756 da4faa 84 API calls 98754->98756 98867 dffcb1 89 API calls 4 library calls 98754->98867 98756->98754 98757 da7f41 59 API calls 98757->98760 98760->98746 98760->98754 98760->98757 98862 dffc4d 59 API calls 2 library calls 98760->98862 98863 dffb6e 61 API calls 2 library calls 98760->98863 98864 e07621 59 API calls Mailbox 98760->98864 98865 da766f 59 API calls 2 library calls 98760->98865 98866 da74bd 59 API calls Mailbox 98760->98866 98762 da34d4 98761->98762 98766 da34f3 _memmove 98761->98766 98765 dc0ff6 Mailbox 59 API calls 98762->98765 98763 dc0ff6 Mailbox 59 API calls 98764 da350a 98763->98764 98764->98726 98765->98766 98766->98763 98767->98723 98769 dde847 98768->98769 98770 da6c15 98768->98770 98887 dffcb1 89 API calls 4 library calls 98769->98887 98873 da5906 60 API calls Mailbox 98770->98873 98773 da6c37 98874 da5956 67 API calls 98773->98874 98774 dde85a 98888 dffcb1 89 API calls 4 library calls 98774->98888 98776 da6c4c 98776->98774 98778 da6c54 98776->98778 98780 da77c7 59 API calls 98778->98780 98779 dde876 98782 da6cc1 98779->98782 98781 da6c60 98780->98781 98875 dc0b9b 60 API calls __ftell_nolock 98781->98875 98784 dde889 98782->98784 98785 da6ccf 98782->98785 98787 da5dcf CloseHandle 98784->98787 98788 da77c7 59 API calls 98785->98788 98786 da6c6c 98789 da77c7 59 API calls 98786->98789 98791 dde895 98787->98791 98792 da6cd8 98788->98792 98790 da6c78 98789->98790 98793 da48ae 60 API calls 98790->98793 98794 da4f3d 136 API calls 98791->98794 98795 da77c7 59 API calls 98792->98795 98796 da6c86 98793->98796 98797 dde8b1 98794->98797 98798 da6ce1 98795->98798 98876 da59b0 ReadFile SetFilePointerEx 98796->98876 98800 dde8da 98797->98800 98803 e097e5 122 API calls 98797->98803 98878 da46f9 59 API calls Mailbox 98798->98878 98889 dffcb1 89 API calls 4 library calls 98800->98889 98802 da6cb2 98877 da5c4e SetFilePointerEx SetFilePointerEx 98802->98877 98808 dde8cd 98803->98808 98804 da6cf8 98879 da7c8e 59 API calls Mailbox 98804->98879 98806 dde8f1 98839 da6e6c Mailbox 98806->98839 98810 dde8d5 98808->98810 98811 dde8f6 98808->98811 98814 da4faa 84 API calls 98810->98814 98813 da4faa 84 API calls 98811->98813 98812 da6d09 SetCurrentDirectoryW 98817 da6d1c Mailbox 98812->98817 98815 dde8fb 98813->98815 98814->98800 98816 dc0ff6 Mailbox 59 API calls 98815->98816 98823 dde92f 98816->98823 98819 dc0ff6 Mailbox 59 API calls 98817->98819 98821 da6d2f 98819->98821 98820 da3bcd 98820->97884 98820->97907 98822 da538e 59 API calls 98821->98822 98850 da6d3a Mailbox __NMSG_WRITE 98822->98850 98890 da766f 59 API calls 2 library calls 98823->98890 98825 da6e47 98826 da5dcf CloseHandle 98825->98826 98829 da6e53 SetCurrentDirectoryW 98826->98829 98828 ddeb69 98896 e07581 59 API calls Mailbox 98828->98896 98829->98839 98832 ddeb8b 98897 e0f835 59 API calls 2 library calls 98832->98897 98835 ddeb98 98837 dc2f95 _free 58 API calls 98835->98837 98836 ddec02 98900 dffcb1 89 API calls 4 library calls 98836->98900 98837->98839 98868 da5934 98839->98868 98842 ddec1b 98842->98825 98844 ddebfa 98899 dffb07 59 API calls 4 library calls 98844->98899 98847 da7f41 59 API calls 98847->98850 98850->98825 98850->98836 98850->98844 98850->98847 98880 da59cd 67 API calls _wcscpy 98850->98880 98881 da70bd GetStringTypeW 98850->98881 98882 da702c 60 API calls __wcsnicmp 98850->98882 98883 da710a GetStringTypeW __NMSG_WRITE 98850->98883 98884 dc387d GetStringTypeW _iswctype 98850->98884 98885 da6a3c 165 API calls 3 library calls 98850->98885 98886 da7373 59 API calls Mailbox 98850->98886 98851 da7f41 59 API calls 98858 dde978 Mailbox 98851->98858 98855 ddebbb 98898 dffcb1 89 API calls 4 library calls 98855->98898 98857 ddebd4 98859 dc2f95 _free 58 API calls 98857->98859 98858->98828 98858->98851 98858->98855 98891 dffc4d 59 API calls 2 library calls 98858->98891 98892 dffb6e 61 API calls 2 library calls 98858->98892 98893 e07621 59 API calls Mailbox 98858->98893 98894 da766f 59 API calls 2 library calls 98858->98894 98895 da7373 59 API calls Mailbox 98858->98895 98860 ddebe7 98859->98860 98860->98839 98861->98744 98862->98760 98863->98760 98864->98760 98865->98760 98866->98760 98867->98754 98869 da5dcf CloseHandle 98868->98869 98870 da593c Mailbox 98869->98870 98871 da5dcf CloseHandle 98870->98871 98872 da594b 98871->98872 98872->98820 98873->98773 98874->98776 98875->98786 98876->98802 98877->98782 98878->98804 98879->98812 98880->98850 98881->98850 98882->98850 98883->98850 98884->98850 98885->98850 98886->98850 98887->98774 98888->98779 98889->98806 98890->98858 98891->98858 98892->98858 98893->98858 98894->98858 98895->98858 98896->98832 98897->98835 98898->98857 98899->98836 98900->98842 98902 da6ef5 98901->98902 98907 da7009 98901->98907 98903 dc0ff6 Mailbox 59 API calls 98902->98903 98902->98907 98905 da6f1c 98903->98905 98904 dc0ff6 Mailbox 59 API calls 98911 da6f91 98904->98911 98905->98904 98907->98023 98911->98907 98914 da63a0 94 API calls 2 library calls 98911->98914 98915 da74bd 59 API calls Mailbox 98911->98915 98916 df6ac9 59 API calls Mailbox 98911->98916 98917 da766f 59 API calls 2 library calls 98911->98917 98912->98026 98913->98028 98914->98911 98915->98911 98916->98911 98917->98911 98918->98041 98919->98042 98921 daf61a 98920->98921 98922 daf7b0 98920->98922 98923 de4848 98921->98923 98924 daf626 98921->98924 98925 da7f41 59 API calls 98922->98925 98983 e1bf80 258 API calls Mailbox 98923->98983 98981 daf3f0 258 API calls 2 library calls 98924->98981 98931 daf6ec Mailbox 98925->98931 98928 de4856 98932 daf790 98928->98932 98984 e0a0b5 89 API calls 4 library calls 98928->98984 98930 daf65d 98930->98928 98930->98931 98930->98932 98978 e1f64b 98931->98978 98932->98083 98934 daf743 98934->98932 98982 da9df0 59 API calls Mailbox 98934->98982 98937 da3212 98936->98937 98938 da31e0 98936->98938 98937->98083 98938->98937 98939 da3205 IsDialogMessageW 98938->98939 98940 ddd182 GetClassLongW 98938->98940 98939->98937 98939->98938 98940->98938 98940->98939 98941->98083 98942->98083 98943->98083 98944->98083 98945->98058 98946->98058 98947->98058 98948->98083 98949->98083 98950->98083 98952 da99b1 98951->98952 98964 da99ab 98951->98964 98953 ddf9fc __i64tow 98952->98953 98954 da99f9 98952->98954 98956 da99b7 __itow 98952->98956 98960 ddf903 98952->98960 99016 dc38d8 83 API calls 4 library calls 98954->99016 98959 dc0ff6 Mailbox 59 API calls 98956->98959 98957 ddf97b Mailbox _wcscpy 99017 dc38d8 83 API calls 4 library calls 98957->99017 98961 da99d1 98959->98961 98960->98957 98962 dc0ff6 Mailbox 59 API calls 98960->98962 98963 da7f41 59 API calls 98961->98963 98961->98964 98965 ddf948 98962->98965 98963->98964 98964->98083 98966 dc0ff6 Mailbox 59 API calls 98965->98966 98967 ddf96e 98966->98967 98967->98957 98968 da7f41 59 API calls 98967->98968 98968->98957 98969->98083 98970->98083 98971->98083 98972->98090 98973->98090 98974->98090 98975->98090 98976->98090 98977->98090 98985 e1f732 98978->98985 98980 e1f65f 98980->98934 98981->98930 98982->98934 98983->98928 98984->98932 98986 da77c7 59 API calls 98985->98986 98987 e1f746 _memset 98986->98987 98988 e1f79f 98987->98988 98989 da9997 84 API calls 98987->98989 98990 e1f7be 98988->98990 98992 da9997 84 API calls 98988->98992 98991 e1f77c 98989->98991 98993 e1f804 98990->98993 98995 da9997 84 API calls 98990->98995 98991->98988 98996 da9997 84 API calls 98991->98996 98994 e1f7b4 98992->98994 98997 e1f816 _memset 98993->98997 99015 da9c9c 59 API calls 98993->99015 99014 dbfec6 59 API calls 3 library calls 98994->99014 99004 e1f7d3 98995->99004 98999 e1f795 98996->98999 99002 da9997 84 API calls 98997->99002 99013 dbfec6 59 API calls 3 library calls 98999->99013 99003 e1f84c ShellExecuteExW 99002->99003 99008 e1f876 99003->99008 99004->98993 99005 da9997 84 API calls 99004->99005 99006 e1f7f9 99005->99006 99007 da81a7 59 API calls 99006->99007 99007->98993 99009 e1f88c Mailbox 99008->99009 99010 e1f8de GetProcessId 99008->99010 99009->98980 99011 e1f8f1 99010->99011 99012 e1f901 CloseHandle 99011->99012 99012->99009 99013->98988 99014->98990 99015->98997 99016->98956 99017->98953 99019 dc3475 __wsopen_helper 99018->99019 99020 dc9e4b __lock 51 API calls 99019->99020 99021 dc347c 99020->99021 99022 dc34aa DecodePointer 99021->99022 99024 dc3535 _doexit 99021->99024 99022->99024 99025 dc34c1 DecodePointer 99022->99025 99038 dc3583 99024->99038 99031 dc34d1 99025->99031 99027 dc3592 __wsopen_helper 99027->97791 99029 dc34de EncodePointer 99029->99031 99030 dc357a 99032 dc32df __mtinitlocknum 3 API calls 99030->99032 99031->99024 99031->99029 99033 dc34ee DecodePointer EncodePointer 99031->99033 99034 dc3583 99032->99034 99036 dc3500 DecodePointer DecodePointer 99033->99036 99035 dc3590 99034->99035 99043 dc9fb5 LeaveCriticalSection 99034->99043 99035->97791 99036->99031 99039 dc3589 99038->99039 99040 dc3563 99038->99040 99044 dc9fb5 LeaveCriticalSection 99039->99044 99040->99027 99042 dc9fb5 LeaveCriticalSection 99040->99042 99042->99030 99043->99035 99044->99040 99045 da1055 99050 da2649 99045->99050 99048 dc2f80 __cinit 67 API calls 99049 da1064 99048->99049 99051 da77c7 59 API calls 99050->99051 99052 da26b7 99051->99052 99057 da3582 99052->99057 99055 da2754 99056 da105a 99055->99056 99060 da3416 59 API calls 2 library calls 99055->99060 99056->99048 99061 da35b0 99057->99061 99060->99055 99062 da35a1 99061->99062 99063 da35bd 99061->99063 99062->99055 99063->99062 99064 da35c4 RegOpenKeyExW 99063->99064 99064->99062 99065 da35de RegQueryValueExW 99064->99065 99066 da35ff 99065->99066 99067 da3614 RegCloseKey 99065->99067 99066->99067 99067->99062

    Control-flow Graph

    APIs
    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DA3B7A
    • IsDebuggerPresent.KERNEL32 ref: 00DA3B8C
    • GetFullPathNameW.KERNEL32(00007FFF,?,?,00E662F8,00E662E0,?,?), ref: 00DA3BFD
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
      • Part of subcall function 00DB0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00DA3C26,00E662F8,?,?,?), ref: 00DB0ACE
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00DA3C81
    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00E593F0,00000010), ref: 00DDD4BC
    • SetCurrentDirectoryW.KERNEL32(?,00E662F8,?,?,?), ref: 00DDD4F4
    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00E55D40,00E662F8,?,?,?), ref: 00DDD57A
    • ShellExecuteW.SHELL32(00000000,?,?), ref: 00DDD581
      • Part of subcall function 00DA3A58: GetSysColorBrush.USER32(0000000F), ref: 00DA3A62
      • Part of subcall function 00DA3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00DA3A71
      • Part of subcall function 00DA3A58: LoadIconW.USER32(00000063), ref: 00DA3A88
      • Part of subcall function 00DA3A58: LoadIconW.USER32(000000A4), ref: 00DA3A9A
      • Part of subcall function 00DA3A58: LoadIconW.USER32(000000A2), ref: 00DA3AAC
      • Part of subcall function 00DA3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00DA3AD2
      • Part of subcall function 00DA3A58: RegisterClassExW.USER32(?), ref: 00DA3B28
      • Part of subcall function 00DA39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DA3A15
      • Part of subcall function 00DA39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DA3A36
      • Part of subcall function 00DA39E7: ShowWindow.USER32(00000000,?,?), ref: 00DA3A4A
      • Part of subcall function 00DA39E7: ShowWindow.USER32(00000000,?,?), ref: 00DA3A53
      • Part of subcall function 00DA43DB: _memset.LIBCMT ref: 00DA4401
      • Part of subcall function 00DA43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DA44A6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
    • String ID: This is a third-party compiled AutoIt script.$runas$%
    • API String ID: 529118366-3343222573
    • Opcode ID: 075ed5fe2b5b8b7b97ba18a1744e7ff8db564549687f2571b3bd52b5fce818d6
    • Instruction ID: b50d7afd3a9e5f15e9136dcc1c54067b858e7daa3a87f0ed9d90a162c05f9cf7
    • Opcode Fuzzy Hash: 075ed5fe2b5b8b7b97ba18a1744e7ff8db564549687f2571b3bd52b5fce818d6
    • Instruction Fuzzy Hash: 75511731944248BECF11EBB5EC16DEE7B7AEB46750F044075F461721B1DAB48A0ACB31

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1004 da4afe-da4b5e call da77c7 GetVersionExW call da7d2c 1009 da4c69-da4c6b 1004->1009 1010 da4b64 1004->1010 1011 dddb90-dddb9c 1009->1011 1012 da4b67-da4b6c 1010->1012 1015 dddb9d-dddba1 1011->1015 1013 da4b72 1012->1013 1014 da4c70-da4c71 1012->1014 1018 da4b73-da4baa call da7e8c call da7886 1013->1018 1014->1018 1016 dddba4-dddbb0 1015->1016 1017 dddba3 1015->1017 1016->1015 1019 dddbb2-dddbb7 1016->1019 1017->1016 1027 dddc8d-dddc90 1018->1027 1028 da4bb0-da4bb1 1018->1028 1019->1012 1021 dddbbd-dddbc4 1019->1021 1021->1011 1023 dddbc6 1021->1023 1026 dddbcb-dddbce 1023->1026 1029 dddbd4-dddbf2 1026->1029 1030 da4bf1-da4c08 GetCurrentProcess IsWow64Process 1026->1030 1031 dddca9-dddcad 1027->1031 1032 dddc92 1027->1032 1028->1026 1033 da4bb7-da4bc2 1028->1033 1029->1030 1034 dddbf8-dddbfe 1029->1034 1040 da4c0a 1030->1040 1041 da4c0d-da4c1e 1030->1041 1038 dddcaf-dddcb8 1031->1038 1039 dddc98-dddca1 1031->1039 1035 dddc95 1032->1035 1036 da4bc8-da4bca 1033->1036 1037 dddc13-dddc19 1033->1037 1042 dddc08-dddc0e 1034->1042 1043 dddc00-dddc03 1034->1043 1035->1039 1044 dddc2e-dddc3a 1036->1044 1045 da4bd0-da4bd3 1036->1045 1046 dddc1b-dddc1e 1037->1046 1047 dddc23-dddc29 1037->1047 1038->1035 1048 dddcba-dddcbd 1038->1048 1039->1031 1040->1041 1049 da4c89-da4c93 GetSystemInfo 1041->1049 1050 da4c20-da4c30 call da4c95 1041->1050 1042->1030 1043->1030 1055 dddc3c-dddc3f 1044->1055 1056 dddc44-dddc4a 1044->1056 1052 da4bd9-da4be8 1045->1052 1053 dddc5a-dddc5d 1045->1053 1046->1030 1047->1030 1048->1039 1054 da4c56-da4c66 1049->1054 1061 da4c7d-da4c87 GetSystemInfo 1050->1061 1062 da4c32-da4c3f call da4c95 1050->1062 1059 dddc4f-dddc55 1052->1059 1060 da4bee 1052->1060 1053->1030 1058 dddc63-dddc78 1053->1058 1055->1030 1056->1030 1063 dddc7a-dddc7d 1058->1063 1064 dddc82-dddc88 1058->1064 1059->1030 1060->1030 1066 da4c47-da4c4b 1061->1066 1069 da4c41-da4c45 GetNativeSystemInfo 1062->1069 1070 da4c76-da4c7b 1062->1070 1063->1030 1064->1030 1066->1054 1068 da4c4d-da4c50 FreeLibrary 1066->1068 1068->1054 1069->1066 1070->1069
    APIs
    • GetVersionExW.KERNEL32(?), ref: 00DA4B2B
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    • GetCurrentProcess.KERNEL32(?,00E2FAEC,00000000,00000000,?), ref: 00DA4BF8
    • IsWow64Process.KERNEL32(00000000), ref: 00DA4BFF
    • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00DA4C45
    • FreeLibrary.KERNEL32(00000000), ref: 00DA4C50
    • GetSystemInfo.KERNEL32(00000000), ref: 00DA4C81
    • GetSystemInfo.KERNEL32(00000000), ref: 00DA4C8D
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
    • String ID:
    • API String ID: 1986165174-0
    • Opcode ID: 1b81703ced6131569cc3a4ca30cf9008557baeb10dd76d1a4d2730730144f52f
    • Instruction ID: 197417d63abce05140a8867d6e5e0647020cd231b0cfe222480521598db0d9e3
    • Opcode Fuzzy Hash: 1b81703ced6131569cc3a4ca30cf9008557baeb10dd76d1a4d2730730144f52f
    • Instruction Fuzzy Hash: 2791C33154A7C0DECB31CB7885515AAFFF5AF6A300F4849AED0CA93B41D260E908C779

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1137 da4fe9-da5001 CreateStreamOnHGlobal 1138 da5003-da501a FindResourceExW 1137->1138 1139 da5021-da5026 1137->1139 1140 dddd5c-dddd6b LoadResource 1138->1140 1141 da5020 1138->1141 1140->1141 1142 dddd71-dddd7f SizeofResource 1140->1142 1141->1139 1142->1141 1143 dddd85-dddd90 LockResource 1142->1143 1143->1141 1144 dddd96-ddddb4 1143->1144 1144->1141
    APIs
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00DA4EEE,?,?,00000000,00000000), ref: 00DA4FF9
    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00DA4EEE,?,?,00000000,00000000), ref: 00DA5010
    • LoadResource.KERNEL32(?,00000000,?,?,00DA4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F8F), ref: 00DDDD60
    • SizeofResource.KERNEL32(?,00000000,?,?,00DA4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F8F), ref: 00DDDD75
    • LockResource.KERNEL32(00DA4EEE,?,?,00DA4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F8F,00000000), ref: 00DDDD88
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
    • String ID: SCRIPT
    • API String ID: 3051347437-3967369404
    • Opcode ID: 76d83ba345d17c5e4a218a64c94a5b4b3411b632a9f73ba86763ee8dedddb89f
    • Instruction ID: 53bd3fa69cf3bb26ad0f7e92dc9df841399c5a830e4d83752a19bf0999085be6
    • Opcode Fuzzy Hash: 76d83ba345d17c5e4a218a64c94a5b4b3411b632a9f73ba86763ee8dedddb89f
    • Instruction Fuzzy Hash: 61115E75200700AFDB318B66EC58F6B7BB9EBCAB12F144178F50596260DB61E8058671
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DB0BBB
    • timeGetTime.WINMM ref: 00DB0E76
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DB0FB3
    • TranslateMessage.USER32(?), ref: 00DB0FC7
    • DispatchMessageW.USER32(?), ref: 00DB0FD5
    • Sleep.KERNEL32(0000000A), ref: 00DB0FDF
    • LockWindowUpdate.USER32(00000000,?,?), ref: 00DB105A
    • DestroyWindow.USER32 ref: 00DB1066
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DB1080
    • Sleep.KERNEL32(0000000A,?,?), ref: 00DE52AD
    • TranslateMessage.USER32(?), ref: 00DE608A
    • DispatchMessageW.USER32(?), ref: 00DE6098
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DE60AC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pr$pr$pr$pr
    • API String ID: 4003667617-1825247661
    • Opcode ID: 85942c08aaf2e74849a97ab8512215cef131cd6b6ad3426c4e79bc19677b3881
    • Instruction ID: fc9bbb58e186e4345a9d7e98c1467a201f5813380c12d61dd709d3ce7921a1bf
    • Opcode Fuzzy Hash: 85942c08aaf2e74849a97ab8512215cef131cd6b6ad3426c4e79bc19677b3881
    • Instruction Fuzzy Hash: 22B2B070608781DFD724DF25D894BAABBE4FF84348F18491DE49A972A1D770E844CBB2

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 00DA3074
    • RegisterClassExW.USER32(00000030), ref: 00DA309E
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA30AF
    • InitCommonControlsEx.COMCTL32(?), ref: 00DA30CC
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DA30DC
    • LoadIconW.USER32(000000A9), ref: 00DA30F2
    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DA3101
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
    • API String ID: 2914291525-1005189915
    • Opcode ID: 52544e1365089f15d6b8cb75cc675b32b98f6a49817fe5dd398152f0a88229a6
    • Instruction ID: 5a630d34db39304ff29f005e26dc7fda14aae045d6978df2862dbc6a71072b4e
    • Opcode Fuzzy Hash: 52544e1365089f15d6b8cb75cc675b32b98f6a49817fe5dd398152f0a88229a6
    • Instruction Fuzzy Hash: 2A3134B1861309AFDB509FA5E889ADABBF4FB09310F10456AE580B62A0E7B50549CF91

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 00DA3074
    • RegisterClassExW.USER32(00000030), ref: 00DA309E
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA30AF
    • InitCommonControlsEx.COMCTL32(?), ref: 00DA30CC
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DA30DC
    • LoadIconW.USER32(000000A9), ref: 00DA30F2
    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DA3101
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
    • API String ID: 2914291525-1005189915
    • Opcode ID: 683a6b8fcd7a02bc437d74803b1207772d32fc217c1642da189c285612221d42
    • Instruction ID: aea2c393ba239f133f039c20416c966c32d79832e815f5c9b2f83344e7363c54
    • Opcode Fuzzy Hash: 683a6b8fcd7a02bc437d74803b1207772d32fc217c1642da189c285612221d42
    • Instruction Fuzzy Hash: 8121C4B1D20218AFDB10DFA6ED89B9EBBF4FB08740F00412AF911B72A0D7B145498F95

    Control-flow Graph

    APIs
      • Part of subcall function 00DA4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E662F8,?,00DA37C0,?), ref: 00DA4882
      • Part of subcall function 00DC074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00DA72C5), ref: 00DC0771
    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00DA7308
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DDECF1
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00DDED32
    • RegCloseKey.ADVAPI32(?), ref: 00DDED70
    • _wcscat.LIBCMT ref: 00DDEDC9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
    • API String ID: 2673923337-2727554177
    • Opcode ID: 7fbdf136103cc2cd7c913c0646f097cb540e83f9c8422e8171a1ce16c366bc38
    • Instruction ID: e7b62921b09e2763b3ebabc1843ac0b57a9b38943a02e0903d9dc921756f68ca
    • Opcode Fuzzy Hash: 7fbdf136103cc2cd7c913c0646f097cb540e83f9c8422e8171a1ce16c366bc38
    • Instruction Fuzzy Hash: D0715CB14083019EC714EF66EC9195BBBE8FF95784B44092EF485A72B0EB709948CB71

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 663 da3633-da3681 665 da3683-da3686 663->665 666 da36e1-da36e3 663->666 668 da3688-da368f 665->668 669 da36e7 665->669 666->665 667 da36e5 666->667 670 da36ca-da36d2 DefWindowProcW 667->670 673 da375d-da3765 PostQuitMessage 668->673 674 da3695-da369a 668->674 671 ddd31c-ddd34a call db11d0 call db11f3 669->671 672 da36ed-da36f0 669->672 678 da36d8-da36de 670->678 707 ddd34f-ddd356 671->707 680 da36f2-da36f3 672->680 681 da3715-da373c SetTimer RegisterWindowMessageW 672->681 679 da3711-da3713 673->679 675 ddd38f-ddd3a3 call e02a16 674->675 676 da36a0-da36a2 674->676 675->679 699 ddd3a9 675->699 682 da36a8-da36ad 676->682 683 da3767-da3771 call da4531 676->683 679->678 687 ddd2bf-ddd2c2 680->687 688 da36f9-da370c KillTimer call da44cb call da3114 680->688 681->679 684 da373e-da3749 CreatePopupMenu 681->684 689 ddd374-ddd37b 682->689 690 da36b3-da36b8 682->690 701 da3776 683->701 684->679 694 ddd2f8-ddd317 MoveWindow 687->694 695 ddd2c4-ddd2c6 687->695 688->679 689->670 705 ddd381-ddd38a call df817e 689->705 697 da374b-da375b call da45df 690->697 698 da36be-da36c4 690->698 694->679 702 ddd2c8-ddd2cb 695->702 703 ddd2e7-ddd2f3 SetFocus 695->703 697->679 698->670 698->707 699->670 701->679 702->698 708 ddd2d1-ddd2e2 call db11d0 702->708 703->679 705->670 707->670 713 ddd35c-ddd36f call da44cb call da43db 707->713 708->679 713->670
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00DA36D2
    • KillTimer.USER32(?,00000001), ref: 00DA36FC
    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DA371F
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA372A
    • CreatePopupMenu.USER32 ref: 00DA373E
    • PostQuitMessage.USER32(00000000), ref: 00DA375F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
    • String ID: TaskbarCreated$%
    • API String ID: 129472671-3835587964
    • Opcode ID: ed85f5be6e375c798ad2b06c99f7380ec73f7fa6640bc9ba24507eed1e0aef3b
    • Instruction ID: e66d5dc9bb327e72c1e29b8717dbef9febb2059e6976370319093aae534ab0bb
    • Opcode Fuzzy Hash: ed85f5be6e375c798ad2b06c99f7380ec73f7fa6640bc9ba24507eed1e0aef3b
    • Instruction Fuzzy Hash: 664107B2210105BFDF246F69EC09B7A3767E742380F1C0129F542A62F1CAE4DE1993B1

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 00DA3A62
    • LoadCursorW.USER32(00000000,00007F00), ref: 00DA3A71
    • LoadIconW.USER32(00000063), ref: 00DA3A88
    • LoadIconW.USER32(000000A4), ref: 00DA3A9A
    • LoadIconW.USER32(000000A2), ref: 00DA3AAC
    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00DA3AD2
    • RegisterClassExW.USER32(?), ref: 00DA3B28
      • Part of subcall function 00DA3041: GetSysColorBrush.USER32(0000000F), ref: 00DA3074
      • Part of subcall function 00DA3041: RegisterClassExW.USER32(00000030), ref: 00DA309E
      • Part of subcall function 00DA3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA30AF
      • Part of subcall function 00DA3041: InitCommonControlsEx.COMCTL32(?), ref: 00DA30CC
      • Part of subcall function 00DA3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DA30DC
      • Part of subcall function 00DA3041: LoadIconW.USER32(000000A9), ref: 00DA30F2
      • Part of subcall function 00DA3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DA3101
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
    • String ID: #$0$AutoIt v3
    • API String ID: 423443420-4155596026
    • Opcode ID: 6429322b33c853a4761cee1b61cfacde431b0b937cc71dfea892865de79f29d6
    • Instruction ID: 16b4bafa6d7d7bc6e6558cfac1dfeb345369d3fb0120f72b1eb5df9470c07828
    • Opcode Fuzzy Hash: 6429322b33c853a4761cee1b61cfacde431b0b937cc71dfea892865de79f29d6
    • Instruction Fuzzy Hash: E2213971920304AFEB109FA6FC19B9E7FB5EB08750F00012AF504BA2B0D7F656588F94

    Control-flow Graph

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$b
    • API String ID: 1825951767-3834736419
    • Opcode ID: 2a0cb4113827d5419d787242e3376e749dbb1ea3c76495a303e6186723f9a31d
    • Instruction ID: 0fd7d51fbad16bddab074e9b62778c055ac769c59d0c05d5582d80cee654d246
    • Opcode Fuzzy Hash: 2a0cb4113827d5419d787242e3376e749dbb1ea3c76495a303e6186723f9a31d
    • Instruction Fuzzy Hash: 12A13F71910229AACF04EBA0DC92EEEB779FF56300F54052AF416B7191EF749A09CB70

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 845 dafbbd-dafbf6 846 de49ff-de4a00 DestroyWindow 845->846 847 dafbfc-dafc12 mciSendStringW 845->847 850 de4a0b-de4a18 846->850 848 dafc18-dafc20 847->848 849 dafde5-dafdf2 847->849 848->850 853 dafc26-dafc35 call db12ad 848->853 851 dafe17-dafe1e 849->851 852 dafdf4-dafe0f UnregisterHotKey 849->852 854 de4a1a-de4a1d 850->854 855 de4a47-de4a4e 850->855 851->848 857 dafe24 851->857 852->851 856 dafe11-dafe12 call dc0de1 852->856 864 dafc3b-dafc43 853->864 865 de4a55-de4a61 853->865 859 de4a1f-de4a27 call da5dcf 854->859 860 de4a29-de4a2c FindClose 854->860 855->850 862 de4a50 855->862 856->851 857->849 867 de4a32-de4a3f 859->867 860->867 862->865 868 dafc49-dafc6e call da9a20 864->868 869 de4a79-de4a86 864->869 872 de4a6b-de4a72 865->872 873 de4a63-de4a65 FreeLibrary 865->873 867->855 871 de4a41-de4a42 call e09e34 867->871 882 dafc70 868->882 883 dafca5-dafcb0 OleUninitialize 868->883 876 de4aad-de4ab4 869->876 877 de4a88-de4aa5 VirtualFree 869->877 871->855 872->865 874 de4a74 872->874 873->872 874->869 876->869 881 de4ab6 876->881 877->876 880 de4aa7-de4aa8 call e09e8e 877->880 880->876 886 de4abb-de4abe 881->886 885 dafc73-dafca3 call dbff13 call dbffa8 882->885 883->886 887 dafcb6-dafcbb 883->887 885->883 886->887 889 de4ac4-de4aca 886->889 890 de4acf-de4adc call e09e68 887->890 891 dafcc1-dafccb 887->891 889->887 901 de4ade 890->901 893 dafcd1-dafd47 call da5a64 call db61fe call db6181 call db608e call da5a64 call da9a20 call dc0999 call dc0b5f * 3 891->893 894 dafe26-dafe33 call dc0acc 891->894 908 de4ae3-de4af0 call dfcf23 893->908 938 dafd4d-dafd60 call da3569 893->938 894->893 906 dafe39 894->906 901->908 906->894 914 de4af2 908->914 917 de4af7-de4b04 call dbfbe6 914->917 923 de4b06 917->923 926 de4b0b-de4b18 call df6b8e 923->926 932 de4b1a 926->932 935 de4b1f-de4b2c call e09e4c 932->935 941 de4b2e 935->941 938->917 943 dafd66-dafd6e 938->943 944 de4b33-de4b40 call e09e4c 941->944 943->926 945 dafd74-dafd92 call da5a64 call da8408 943->945 950 de4b42 944->950 945->935 953 dafd98-dafda6 945->953 950->950 953->944 954 dafdac-dafde4 call da5a64 * 3 call dc01a9 953->954
    APIs
    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00DAFC06
    • OleUninitialize.OLE32(?,00000000), ref: 00DAFCA5
    • UnregisterHotKey.USER32(?), ref: 00DAFDFC
    • DestroyWindow.USER32(?), ref: 00DE4A00
    • FreeLibrary.KERNEL32(?), ref: 00DE4A65
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00DE4A92
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
    • String ID: close all
    • API String ID: 469580280-3243417748
    • Opcode ID: 27fd3b73fd0ace69879e45a788ea0a1eb6b88a5222fcbda8afd3e080d151cffe
    • Instruction ID: 745fd00ae155e76967d02c29c14ac6bcd63c95b637a61ce5fc359acb3003c09f
    • Opcode Fuzzy Hash: 27fd3b73fd0ace69879e45a788ea0a1eb6b88a5222fcbda8afd3e080d151cffe
    • Instruction Fuzzy Hash: 57A14A31701212CFCB29EF55C495A69F7A4EF05714F1842ADE84AAB262DB30ED16CF74

    Control-flow Graph

    APIs
      • Part of subcall function 00DC03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DC03D3
      • Part of subcall function 00DC03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00DC03DB
      • Part of subcall function 00DC03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DC03E6
      • Part of subcall function 00DC03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DC03F1
      • Part of subcall function 00DC03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00DC03F9
      • Part of subcall function 00DC03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00DC0401
      • Part of subcall function 00DB6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00DAFA90), ref: 00DB62B4
    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00DAFB2D
    • OleInitialize.OLE32(00000000), ref: 00DAFBAA
    • CloseHandle.KERNEL32(00000000), ref: 00DE49F2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
    • String ID: <g$\d$%$c
    • API String ID: 1986988660-619945097
    • Opcode ID: 3a241dbd9cc95ddda95e60842248d3bcd9d6a5b3bb8fd7fe366f2dde89137f66
    • Instruction ID: 0210cee82493d8311c05f824bbe9b5a1f4deb8b253ac17d151c204567dac9ce1
    • Opcode Fuzzy Hash: 3a241dbd9cc95ddda95e60842248d3bcd9d6a5b3bb8fd7fe366f2dde89137f66
    • Instruction Fuzzy Hash: 3281BBB09602509FC784DF2BB9566167BF4FB98388710953ED029E7362EBB1940DCFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1071 e1f732-e1f76d call da77c7 call dc3020 1076 e1f7a2-e1f7a5 1071->1076 1077 e1f76f-e1f786 call da9997 1071->1077 1079 e1f7c1-e1f7c4 1076->1079 1080 e1f7a7-e1f7be call da9997 call dbfec6 1076->1080 1077->1076 1085 e1f788-e1f79f call da9997 call dbfec6 1077->1085 1083 e1f804 1079->1083 1084 e1f7c6-e1f7dd call da9997 1079->1084 1080->1079 1086 e1f806-e1f809 1083->1086 1084->1086 1094 e1f7df-e1f7f0 call da9dae 1084->1094 1085->1076 1091 e1f80b-e1f819 call da9c9c 1086->1091 1092 e1f81c-e1f874 call dc3020 call da9997 ShellExecuteExW 1086->1092 1091->1092 1108 e1f876-e1f87c call dc106c 1092->1108 1109 e1f87d-e1f87f 1092->1109 1094->1083 1107 e1f7f2-e1f7ff call da9997 call da81a7 1094->1107 1107->1083 1108->1109 1112 e1f881-e1f887 call dc106c 1109->1112 1113 e1f888-e1f88a 1109->1113 1112->1113 1118 e1f8b1-e1f8b5 1113->1118 1119 e1f88c-e1f8af call df6aa3 call da9a20 1113->1119 1120 e1f8c5-e1f8dc call da9a20 1118->1120 1121 e1f8b7-e1f8c3 1118->1121 1124 e1f916-e1f926 call da5a64 1119->1124 1120->1124 1130 e1f8de-e1f8ef GetProcessId 1120->1130 1121->1124 1133 e1f8f1 1130->1133 1134 e1f8f7-e1f910 call da9a20 CloseHandle 1130->1134 1133->1134 1134->1124
    APIs
    • _memset.LIBCMT ref: 00E1F75C
    • _memset.LIBCMT ref: 00E1F825
    • ShellExecuteExW.SHELL32(?), ref: 00E1F86A
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
      • Part of subcall function 00DBFEC6: _wcscpy.LIBCMT ref: 00DBFEE9
    • GetProcessId.KERNEL32(00000000), ref: 00E1F8E1
    • CloseHandle.KERNEL32(00000000), ref: 00E1F910
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
    • String ID: @
    • API String ID: 3522835683-2766056989
    • Opcode ID: 5b056568bfbce53d0b6839f66c8d4d73ea5f973ceaaf1179602f74d6de46540d
    • Instruction ID: ae6eb09230c76906cb73b844b6db27cfc2b03a73e0505d9ee237d462772e5c89
    • Opcode Fuzzy Hash: 5b056568bfbce53d0b6839f66c8d4d73ea5f973ceaaf1179602f74d6de46540d
    • Instruction Fuzzy Hash: 8B617D75A00619DFCB14EF64C4919AEFBF5FF49314B148469E856BB361CB30AD81CBA0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1147 da39e7-da3a57 CreateWindowExW * 2 ShowWindow * 2
    APIs
    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DA3A15
    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DA3A36
    • ShowWindow.USER32(00000000,?,?), ref: 00DA3A4A
    • ShowWindow.USER32(00000000,?,?), ref: 00DA3A53
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$CreateShow
    • String ID: AutoIt v3$edit
    • API String ID: 1584632944-3779509399
    • Opcode ID: 0532e674b5618fb76c9a09851865f1ac196662737aed2b91c155baff1ded70ef
    • Instruction ID: c66f7e3baa1eb16ead0ed81bbbae8f4ca95f31156a347f9ee0b90dda10dae806
    • Opcode Fuzzy Hash: 0532e674b5618fb76c9a09851865f1ac196662737aed2b91c155baff1ded70ef
    • Instruction Fuzzy Hash: 13F0DA716612907EEB3117277C59E672E7DD7C6F90B00413AF904B6170C6E51855DAB0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1148 da69ca-da69f1 call da4f3d 1151 dde45a-dde46a call e097e5 1148->1151 1152 da69f7-da6a05 call da4f3d 1148->1152 1155 dde46f-dde471 1151->1155 1152->1151 1159 da6a0b-da6a11 1152->1159 1157 dde490-dde4d8 call dc0ff6 1155->1157 1158 dde473-dde476 call da4faa 1155->1158 1168 dde4fd 1157->1168 1169 dde4da-dde4e4 1157->1169 1162 dde47b-dde48a call e04534 1158->1162 1159->1162 1163 da6a17-da6a39 call da6bec 1159->1163 1162->1157 1171 dde4ff-dde512 1168->1171 1172 dde4f8-dde4f9 1169->1172 1173 dde689-dde69a call dc2f95 call da4faa 1171->1173 1174 dde518 1171->1174 1175 dde4fb 1172->1175 1176 dde4e6-dde4f5 1172->1176 1185 dde69c-dde6ac call da7776 call da5efb 1173->1185 1177 dde51f-dde522 call da75e0 1174->1177 1175->1171 1176->1172 1182 dde527-dde549 call da5f12 call e0768b 1177->1182 1192 dde55d-dde567 call e07675 1182->1192 1193 dde54b-dde558 1182->1193 1199 dde6b1-dde6e1 call dffcb1 call dc106c call dc2f95 call da4faa 1185->1199 1201 dde569-dde57c 1192->1201 1202 dde581-dde58b call e0765f 1192->1202 1195 dde650-dde660 call da766f 1193->1195 1195->1182 1205 dde666-dde683 call da74bd 1195->1205 1199->1185 1201->1195 1209 dde58d-dde59a 1202->1209 1210 dde59f-dde5a9 call da5f8a 1202->1210 1205->1173 1205->1177 1209->1195 1210->1195 1217 dde5af-dde5c7 call dffc4d 1210->1217 1223 dde5c9-dde5e8 call da7f41 call da5a64 1217->1223 1224 dde5ea-dde5ed 1217->1224 1247 dde60b-dde619 call da5f12 1223->1247 1225 dde5ef-dde60a call da7f41 call da6999 call da5a64 1224->1225 1226 dde61b-dde61e 1224->1226 1225->1247 1230 dde63e-dde641 call e07621 1226->1230 1231 dde620-dde629 call dffb6e 1226->1231 1236 dde646-dde64f call dc106c 1230->1236 1231->1199 1242 dde62f-dde639 call dc106c 1231->1242 1236->1195 1242->1182 1247->1236
    APIs
      • Part of subcall function 00DA4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DA4F6F
    • _free.LIBCMT ref: 00DDE68C
    • _free.LIBCMT ref: 00DDE6D3
      • Part of subcall function 00DA6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00DA6D0D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _free$CurrentDirectoryLibraryLoad
    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
    • API String ID: 2861923089-1757145024
    • Opcode ID: dd78552da8bb0ae1e9ebebd29e22604a6431c819bfe3c5b972fff5e2c486c6f6
    • Instruction ID: a6a267efbe60971c9e0b83f75d073a59f375a9f5458f1ba15b3e4be801c1e1cb
    • Opcode Fuzzy Hash: dd78552da8bb0ae1e9ebebd29e22604a6431c819bfe3c5b972fff5e2c486c6f6
    • Instruction Fuzzy Hash: 84912871910219AFCF04EFA4D8919EDB7B4FF19314F14446AF816AB2A1EB70E945CB70

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1252 da35b0-da35bb 1253 da362f-da3631 1252->1253 1254 da35bd-da35c2 1252->1254 1255 da3620-da3625 1253->1255 1254->1253 1256 da35c4-da35dc RegOpenKeyExW 1254->1256 1256->1253 1257 da35de-da35fd RegQueryValueExW 1256->1257 1258 da35ff-da360a 1257->1258 1259 da3614-da361f RegCloseKey 1257->1259 1260 da360c-da360e 1258->1260 1261 da3626-da362d 1258->1261 1259->1255 1262 da3612 1260->1262 1261->1262 1262->1259
    APIs
    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00DA35A1,SwapMouseButtons,00000004,?), ref: 00DA35D4
    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00DA35A1,SwapMouseButtons,00000004,?,?,?,?,00DA2754), ref: 00DA35F5
    • RegCloseKey.KERNELBASE(00000000,?,?,00DA35A1,SwapMouseButtons,00000004,?,?,?,?,00DA2754), ref: 00DA3617
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID: Control Panel\Mouse
    • API String ID: 3677997916-824357125
    • Opcode ID: 4aa4e3dffc817fbc4dcd01c0a930fa06db6c354f5152cd77bbf676b161d580b7
    • Instruction ID: c27f24639c2fa4994f001f2226c20e7c4a4ab4ca51a6684d8c73f938012d3afa
    • Opcode Fuzzy Hash: 4aa4e3dffc817fbc4dcd01c0a930fa06db6c354f5152cd77bbf676b161d580b7
    • Instruction Fuzzy Hash: 08115A71910208BFDB208FA5DC40DAFB7B9EF05740F08446AF805E7210E2719F459B70
    APIs
    • _memset.LIBCMT ref: 00DA4560
      • Part of subcall function 00DA410D: _memset.LIBCMT ref: 00DA418D
      • Part of subcall function 00DA410D: _wcscpy.LIBCMT ref: 00DA41E1
      • Part of subcall function 00DA410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DA41F1
    • KillTimer.USER32(?,00000001,?,?), ref: 00DA45B5
    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DA45C4
    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DDD6CE
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
    • String ID:
    • API String ID: 1378193009-0
    • Opcode ID: 8e6426b2dd3c526d16681202d0ef579bd22d90c8e5de5d960335e59ce4d06a30
    • Instruction ID: 55df0af632422c429582a0011ad48be433f317e1bcb4f71945ebdbdc2f6ad7fa
    • Opcode Fuzzy Hash: 8e6426b2dd3c526d16681202d0ef579bd22d90c8e5de5d960335e59ce4d06a30
    • Instruction Fuzzy Hash: D321DA71904788AFEB328B24DC55BE7BBED9F41304F04009EE69E56241C7B49A898BA1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: AU3!P/$EA06
    • API String ID: 4104443479-182974850
    • Opcode ID: 276a265f5d0add7f2ae853984b00a37ec5bcaefe59d01e005819beecc5a9ccd5
    • Instruction ID: d1fbb1d4816359846db48b07ac4916c98be283c20c0df6fc052571e15e887192
    • Opcode Fuzzy Hash: 276a265f5d0add7f2ae853984b00a37ec5bcaefe59d01e005819beecc5a9ccd5
    • Instruction Fuzzy Hash: CF415C61A041549BDF219F64D8517BE7FA6EF87300F2C4065F882AB286D6E1DE4487F1
    APIs
    • _memset.LIBCMT ref: 00DDEE62
    • GetOpenFileNameW.COMDLG32(?), ref: 00DDEEAC
      • Part of subcall function 00DA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA48A1,?,?,00DA37C0,?), ref: 00DA48CE
      • Part of subcall function 00DC09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DC09F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Name$Path$FileFullLongOpen_memset
    • String ID: X
    • API String ID: 3777226403-3081909835
    • Opcode ID: a30642397d2677d24bcaac997ff9337bb401ff8d7b689d2deaa0f2b0904862d6
    • Instruction ID: e8644643d7f60d6ad0b1d191826839b480d1a2b316d80baf41fe8d51be41d65c
    • Opcode Fuzzy Hash: a30642397d2677d24bcaac997ff9337bb401ff8d7b689d2deaa0f2b0904862d6
    • Instruction Fuzzy Hash: 7E219F31A002589BCB119F94DC45BEE7BF8DF49311F04401AE808BB242DBB8998E8FB1
    APIs
    • __FF_MSGBANNER.LIBCMT ref: 00DC5963
      • Part of subcall function 00DCA3AB: __NMSG_WRITE.LIBCMT ref: 00DCA3D2
      • Part of subcall function 00DCA3AB: __NMSG_WRITE.LIBCMT ref: 00DCA3DC
    • __NMSG_WRITE.LIBCMT ref: 00DC596A
      • Part of subcall function 00DCA408: GetModuleFileNameW.KERNEL32(00000000,00E643BA,00000104,?,00000001,00000000), ref: 00DCA49A
      • Part of subcall function 00DCA408: ___crtMessageBoxW.LIBCMT ref: 00DCA548
      • Part of subcall function 00DC32DF: ___crtCorExitProcess.LIBCMT ref: 00DC32E5
      • Part of subcall function 00DC32DF: ExitProcess.KERNEL32 ref: 00DC32EE
      • Part of subcall function 00DC8D68: __getptd_noexit.LIBCMT ref: 00DC8D68
    • RtlAllocateHeap.NTDLL(00FB0000,00000000,00000001,00000000,?,?,?,00DC1013,?), ref: 00DC598F
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
    • String ID:
    • API String ID: 1372826849-0
    • Opcode ID: 1be77a670a02820f5dc4b7c42f58bc4b26dba4b6700bdf45f4dc27f949507d3a
    • Instruction ID: 953e61f3b071ec51b0c234323737a2f015ca3a992095910644838a4d4ba27434
    • Opcode Fuzzy Hash: 1be77a670a02820f5dc4b7c42f58bc4b26dba4b6700bdf45f4dc27f949507d3a
    • Instruction Fuzzy Hash: 7401D231201A17DEEA217B65F852F2E7258CF52B70F1401AEF402AB1D1DEB0AD818B70
    APIs
    • IsThemeActive.UXTHEME ref: 00DA4992
      • Part of subcall function 00DC35AC: __lock.LIBCMT ref: 00DC35B2
      • Part of subcall function 00DC35AC: DecodePointer.KERNEL32(00000001,?,00DA49A7,00DF81BC), ref: 00DC35BE
      • Part of subcall function 00DC35AC: EncodePointer.KERNEL32(?,?,00DA49A7,00DF81BC), ref: 00DC35C9
      • Part of subcall function 00DA4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00DA4A73
      • Part of subcall function 00DA4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00DA4A88
      • Part of subcall function 00DA3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DA3B7A
      • Part of subcall function 00DA3B4C: IsDebuggerPresent.KERNEL32 ref: 00DA3B8C
      • Part of subcall function 00DA3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00E662F8,00E662E0,?,?), ref: 00DA3BFD
      • Part of subcall function 00DA3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00DA3C81
    • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00DA49D2
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
    • String ID:
    • API String ID: 1438897964-0
    • Opcode ID: eadb1a4908d97f6030c2c9f120fc931c8ad881fd220a65901bc83158afe6d6f4
    • Instruction ID: 8e815eac677ea39f2d88bdc73ca7b21f19cc2baa9b3f0829ffaf61174c140923
    • Opcode Fuzzy Hash: eadb1a4908d97f6030c2c9f120fc931c8ad881fd220a65901bc83158afe6d6f4
    • Instruction Fuzzy Hash: 9A116A719283119FC700EF2AE80590BFFF8EB95750F00852EF095A72B1DBB09559CBA2
    APIs
      • Part of subcall function 00DC594C: __FF_MSGBANNER.LIBCMT ref: 00DC5963
      • Part of subcall function 00DC594C: __NMSG_WRITE.LIBCMT ref: 00DC596A
      • Part of subcall function 00DC594C: RtlAllocateHeap.NTDLL(00FB0000,00000000,00000001,00000000,?,?,?,00DC1013,?), ref: 00DC598F
    • std::exception::exception.LIBCMT ref: 00DC102C
    • __CxxThrowException@8.LIBCMT ref: 00DC1041
      • Part of subcall function 00DC87DB: RaiseException.KERNEL32(?,?,?,00E5BAF8,00000000,?,?,?,?,00DC1046,?,00E5BAF8,?,00000001), ref: 00DC8830
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
    • String ID:
    • API String ID: 3902256705-0
    • Opcode ID: 68197a932870fc28e9bcb75ecb3b06a33097359e9f04d707cb9eb1ab98dfcb73
    • Instruction ID: b3abb4a509677c13facc2b6fb3f014f7829579ecaf5a37726b52e70e922ca53e
    • Opcode Fuzzy Hash: 68197a932870fc28e9bcb75ecb3b06a33097359e9f04d707cb9eb1ab98dfcb73
    • Instruction Fuzzy Hash: C9F0A93950021BA6C720AA94EC06FDF7BA8DF01351F50045EFD04A7592EF719A84E6F0
    APIs
      • Part of subcall function 00DC8D68: __getptd_noexit.LIBCMT ref: 00DC8D68
    • __lock_file.LIBCMT ref: 00DC561B
      • Part of subcall function 00DC6E4E: __lock.LIBCMT ref: 00DC6E71
    • __fclose_nolock.LIBCMT ref: 00DC5626
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
    • String ID:
    • API String ID: 2800547568-0
    • Opcode ID: 7ce9487a680a35e84fb5ebf6566038baa888897c3de6632bb549b09bdc9defd7
    • Instruction ID: e1d8cdcb638481c20a87daaea7594575af09d50a260f1f32a602695cf957ca0c
    • Opcode Fuzzy Hash: 7ce9487a680a35e84fb5ebf6566038baa888897c3de6632bb549b09bdc9defd7
    • Instruction Fuzzy Hash: 4DF0F031840A039AD720AF749802F6E66A1EF81334F54820DE411AB1C5CF7CA981AB79
    APIs
    • ___crtCorExitProcess.LIBCMT ref: 00DC32E5
      • Part of subcall function 00DC32AB: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,00DC32EA,00000000,?,00DC9EFE,000000FF,0000001E,00E5BE28,00000008,00DC9E62,00000000,00000000), ref: 00DC32BA
      • Part of subcall function 00DC32AB: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 00DC32CC
    • ExitProcess.KERNEL32 ref: 00DC32EE
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ExitProcess$AddressHandleModuleProc___crt
    • String ID:
    • API String ID: 2427264223-0
    • Opcode ID: ac68c7d481303444318fd2981b131504c7ae9a249e2c9b2b7df9314d7350f52e
    • Instruction ID: e19b58ab8112ebcd7ff9624d99794aae8cd0d7ac10cbd264014fabbd5e649270
    • Opcode Fuzzy Hash: ac68c7d481303444318fd2981b131504c7ae9a249e2c9b2b7df9314d7350f52e
    • Instruction Fuzzy Hash: EAB09230000208BFCF012F12DC0AC487F39FF00A90B108034F80409031DB72AA92DAA8
    APIs
      • Part of subcall function 00DA4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00DA4D4D
      • Part of subcall function 00DC548B: __wfsopen.LIBCMT ref: 00DC5496
    • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DA4F6F
      • Part of subcall function 00DA4CC8: FreeLibrary.KERNEL32(00000000), ref: 00DA4D02
      • Part of subcall function 00DA4DD0: _memmove.LIBCMT ref: 00DA4E1A
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Library$Free$Load__wfsopen_memmove
    • String ID:
    • API String ID: 1396898556-0
    • Opcode ID: 87fe63cc51b469c833470eb8040bdbb78f30b88cc0aabff086ccd7ab294314f6
    • Instruction ID: a4488a4419e5f62d484b9d0ac721b33933a1241963b3fbbc438214a17a6e2e05
    • Opcode Fuzzy Hash: 87fe63cc51b469c833470eb8040bdbb78f30b88cc0aabff086ccd7ab294314f6
    • Instruction Fuzzy Hash: 2E11E732600305AECF14AF70DC02F6E77A5DFC1711F108839F541A62C1DAB19A059B70
    APIs
    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DC09F4
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LongNamePath
    • String ID:
    • API String ID: 82841172-0
    • Opcode ID: fc4831c5b9fe0a17e60dedba01d7d320620ea650522a6126a09f7d384d45b55f
    • Instruction ID: 64e35a576dd293890f9d33314a64e64a686c23de95f25fc2e0db51e52a8d9e1a
    • Opcode Fuzzy Hash: fc4831c5b9fe0a17e60dedba01d7d320620ea650522a6126a09f7d384d45b55f
    • Instruction Fuzzy Hash: F8017C3218D145CFD722CBE5D8A97D17BB4FF0732831841CBDC458B83AEA62552AEB60
    APIs
    • FreeLibrary.KERNEL32(?,?,00E662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DA4FDE
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FreeLibrary
    • String ID:
    • API String ID: 3664257935-0
    • Opcode ID: bb0f0c291d5d13b393742b8e028b5a67b081f982baa26a80e8ecab7532766b02
    • Instruction ID: 55663afac1e26e21801fc504bb08fe8e76749dcc9e7ca632ed6a400d49d872e1
    • Opcode Fuzzy Hash: bb0f0c291d5d13b393742b8e028b5a67b081f982baa26a80e8ecab7532766b02
    • Instruction Fuzzy Hash: 12F03972105712CFCB349F64E494812BBF1BF4632A3249A3EE1D682610C7B1A894DF60
    APIs
    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DC09F4
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LongNamePath_memmove
    • String ID:
    • API String ID: 2514874351-0
    • Opcode ID: e74b85ba91e88f5685817f3b59f3f281aac72161c358c7f94499667ba5a11e31
    • Instruction ID: 6aa75a1ac0974523348dbeaf84580813fc72abd75d870270b08f8e908dbd923d
    • Opcode Fuzzy Hash: e74b85ba91e88f5685817f3b59f3f281aac72161c358c7f94499667ba5a11e31
    • Instruction Fuzzy Hash: DEE086379042289BC720D6989C05FFA77ADDF89690F0501B6FC4CD7214D9A09C8586A1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __wfsopen
    • String ID:
    • API String ID: 197181222-0
    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
    • Instruction ID: bec64cde0ff6573baf9e6dc2d48aa8758604500a7fa3d996531549fc9e44fc8e
    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
    • Instruction Fuzzy Hash: FCB0927684420C77DE012E82FC02F593B199B40679F808020FB0C19162A673A6A096A9
    APIs
    • _doexit.LIBCMT ref: 00DC35A2
      • Part of subcall function 00DC3469: __lock.LIBCMT ref: 00DC3477
      • Part of subcall function 00DC3469: DecodePointer.KERNEL32(00E5BB70,0000001C,00DC33C2,00000000,00000001,00000000,?,00DC3310,000000FF,?,00DC9E6E,00000011,00000000,?,00DC9CBC,0000000D), ref: 00DC34B6
      • Part of subcall function 00DC3469: DecodePointer.KERNEL32(?,00DC3310,000000FF,?,00DC9E6E,00000011,00000000,?,00DC9CBC,0000000D), ref: 00DC34C7
      • Part of subcall function 00DC3469: EncodePointer.KERNEL32(00000000,?,00DC3310,000000FF,?,00DC9E6E,00000011,00000000,?,00DC9CBC,0000000D), ref: 00DC34E0
      • Part of subcall function 00DC3469: DecodePointer.KERNEL32(-00000004,?,00DC3310,000000FF,?,00DC9E6E,00000011,00000000,?,00DC9CBC,0000000D), ref: 00DC34F0
      • Part of subcall function 00DC3469: EncodePointer.KERNEL32(00000000,?,00DC3310,000000FF,?,00DC9E6E,00000011,00000000,?,00DC9CBC,0000000D), ref: 00DC34F6
      • Part of subcall function 00DC3469: DecodePointer.KERNEL32(?,00DC3310,000000FF,?,00DC9E6E,00000011,00000000,?,00DC9CBC,0000000D), ref: 00DC350C
      • Part of subcall function 00DC3469: DecodePointer.KERNEL32(?,00DC3310,000000FF,?,00DC9E6E,00000011,00000000,?,00DC9CBC,0000000D), ref: 00DC3517
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Pointer$Decode$Encode$__lock_doexit
    • String ID:
    • API String ID: 2158581194-0
    • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
    • Instruction ID: 838aa4fa79968e20e6c08bab9238e84cd19d8fb297dae8f399ca6e424c4961b2
    • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
    • Instruction Fuzzy Hash: 3CB0123158430C73D9112A85EC03F153B1C8740B50F104020FA0C5D1E1A5D3767044E9
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E2CE50
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E2CE91
    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E2CED6
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E2CF00
    • SendMessageW.USER32 ref: 00E2CF29
    • _wcsncpy.LIBCMT ref: 00E2CFA1
    • GetKeyState.USER32(00000011), ref: 00E2CFC2
    • GetKeyState.USER32(00000009), ref: 00E2CFCF
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E2CFE5
    • GetKeyState.USER32(00000010), ref: 00E2CFEF
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E2D018
    • SendMessageW.USER32 ref: 00E2D03F
    • SendMessageW.USER32(?,00001030,?,00E2B602), ref: 00E2D145
    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E2D15B
    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E2D16E
    • SetCapture.USER32(?), ref: 00E2D177
    • ClientToScreen.USER32(?,?), ref: 00E2D1DC
    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E2D1E9
    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E2D203
    • ReleaseCapture.USER32 ref: 00E2D20E
    • GetCursorPos.USER32(?), ref: 00E2D248
    • ScreenToClient.USER32(?,?), ref: 00E2D255
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E2D2B1
    • SendMessageW.USER32 ref: 00E2D2DF
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E2D31C
    • SendMessageW.USER32 ref: 00E2D34B
    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E2D36C
    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E2D37B
    • GetCursorPos.USER32(?), ref: 00E2D39B
    • ScreenToClient.USER32(?,?), ref: 00E2D3A8
    • GetParent.USER32(?), ref: 00E2D3C8
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E2D431
    • SendMessageW.USER32 ref: 00E2D462
    • ClientToScreen.USER32(?,?), ref: 00E2D4C0
    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E2D4F0
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E2D51A
    • SendMessageW.USER32 ref: 00E2D53D
    • ClientToScreen.USER32(?,?), ref: 00E2D58F
    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E2D5C3
      • Part of subcall function 00DA25DB: GetWindowLongW.USER32(?,000000EB), ref: 00DA25EC
    • GetWindowLongW.USER32(?,000000F0), ref: 00E2D65F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
    • String ID: @GUI_DRAGID$F$pr
    • API String ID: 3977979337-1436871235
    • Opcode ID: c279ce00fa3103b4062e9ec4abca22b6bdce88c244fb56785a6d07ba570dfda8
    • Instruction ID: baf7ae64ac377b482dea3e091b08afcd56f09790f6ff6311a612b375c559f651
    • Opcode Fuzzy Hash: c279ce00fa3103b4062e9ec4abca22b6bdce88c244fb56785a6d07ba570dfda8
    • Instruction Fuzzy Hash: 7A42CF30208250AFD725CF28E844FAABBF5FF49318F24152DF695A72A0CB71D855CB92
    APIs
    • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00E2873F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: %d/%02d/%02d
    • API String ID: 3850602802-328681919
    • Opcode ID: 361e101a948983c0770a92eb460564dcfdb1e7d19c1deecc8c808f4c51ceec8b
    • Instruction ID: 5a17b0b46bdf9f9c93380f75185814a37489170e885f3f198136d7cdd8fdbe3b
    • Opcode Fuzzy Hash: 361e101a948983c0770a92eb460564dcfdb1e7d19c1deecc8c808f4c51ceec8b
    • Instruction Fuzzy Hash: 8712E171501228AFEB248F25ED49FAE7BB8EF49314F205129F915FA2A1DF708945CB60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memmove$_memset
    • String ID: 0w$DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
    • API String ID: 1357608183-3460961967
    • Opcode ID: a0c926712e765589b7c74a1d716b5945469f631416309ed379385fd02bb49ce0
    • Instruction ID: e82ec3157d7be00222d281e6648b62384d1db888dc14e4d4aee9c3e5bb3df905
    • Opcode Fuzzy Hash: a0c926712e765589b7c74a1d716b5945469f631416309ed379385fd02bb49ce0
    • Instruction Fuzzy Hash: 13937175A04219DBDB24CF58C8817FDB7B1FF48710F2A816AEA55EB280D7709E81DB60
    APIs
    • GetForegroundWindow.USER32(00000000,?), ref: 00DA4A3D
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DDDA8E
    • IsIconic.USER32(?), ref: 00DDDA97
    • ShowWindow.USER32(?,00000009), ref: 00DDDAA4
    • SetForegroundWindow.USER32(?), ref: 00DDDAAE
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DDDAC4
    • GetCurrentThreadId.KERNEL32 ref: 00DDDACB
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DDDAD7
    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DDDAE8
    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DDDAF0
    • AttachThreadInput.USER32(00000000,?,00000001), ref: 00DDDAF8
    • SetForegroundWindow.USER32(?), ref: 00DDDAFB
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DDDB10
    • keybd_event.USER32(00000012,00000000), ref: 00DDDB1B
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DDDB25
    • keybd_event.USER32(00000012,00000000), ref: 00DDDB2A
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DDDB33
    • keybd_event.USER32(00000012,00000000), ref: 00DDDB38
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DDDB42
    • keybd_event.USER32(00000012,00000000), ref: 00DDDB47
    • SetForegroundWindow.USER32(?), ref: 00DDDB4A
    • AttachThreadInput.USER32(?,?,00000000), ref: 00DDDB71
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
    • String ID: Shell_TrayWnd
    • API String ID: 4125248594-2988720461
    • Opcode ID: 692497d331c8a97d6484feccdc3586d1ed9d73ef4f045855ece50cfb501de222
    • Instruction ID: fd5abd2f84323184d90ee9fe3b90836565cc5e970e15d014410f1579d305297d
    • Opcode Fuzzy Hash: 692497d331c8a97d6484feccdc3586d1ed9d73ef4f045855ece50cfb501de222
    • Instruction Fuzzy Hash: DB315271A80318BEEF316F629C49F7E3E7DEB44B50F154036FA04BA1D1C6B09D11AAA0
    APIs
      • Part of subcall function 00DF8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DF8D0D
      • Part of subcall function 00DF8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DF8D3A
      • Part of subcall function 00DF8CC3: GetLastError.KERNEL32 ref: 00DF8D47
    • _memset.LIBCMT ref: 00DF889B
    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00DF88ED
    • CloseHandle.KERNEL32(?), ref: 00DF88FE
    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00DF8915
    • GetProcessWindowStation.USER32 ref: 00DF892E
    • SetProcessWindowStation.USER32(00000000), ref: 00DF8938
    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00DF8952
      • Part of subcall function 00DF8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DF8851), ref: 00DF8728
      • Part of subcall function 00DF8713: CloseHandle.KERNEL32(?,?,00DF8851), ref: 00DF873A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
    • String ID: $default$winsta0
    • API String ID: 2063423040-1027155976
    • Opcode ID: d4bbe1ffdedb84b7fdfead5baa75e1200d397ae6c17d5e1be11a8f6405d61564
    • Instruction ID: 38fa3ce25283a3376b43dea3ea8a8c29223e46adc54dd3c2a93c5f10ed444787
    • Opcode Fuzzy Hash: d4bbe1ffdedb84b7fdfead5baa75e1200d397ae6c17d5e1be11a8f6405d61564
    • Instruction Fuzzy Hash: 9B81297190024DAFDF21DFA4DC45AFE7BB8EF04305F09816AFA10B6161DB318A15AB71
    APIs
    • OpenClipboard.USER32(00E2F910), ref: 00E14284
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E14292
    • GetClipboardData.USER32(0000000D), ref: 00E1429A
    • CloseClipboard.USER32 ref: 00E142A6
    • GlobalLock.KERNEL32(00000000), ref: 00E142C2
    • CloseClipboard.USER32 ref: 00E142CC
    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00E142E1
    • IsClipboardFormatAvailable.USER32(00000001), ref: 00E142EE
    • GetClipboardData.USER32(00000001), ref: 00E142F6
    • GlobalLock.KERNEL32(00000000), ref: 00E14303
    • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00E14337
    • CloseClipboard.USER32 ref: 00E14447
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
    • String ID:
    • API String ID: 3222323430-0
    • Opcode ID: 3b2b5218d1b0dc12f08d636866aad85e1a213382b54e20de67096e3d208fb02c
    • Instruction ID: c40b3f8923d441042e16d51588bd201fda28cf770248e4ed3b40cf9afa1975be
    • Opcode Fuzzy Hash: 3b2b5218d1b0dc12f08d636866aad85e1a213382b54e20de67096e3d208fb02c
    • Instruction Fuzzy Hash: F1519E71204205AFD320AB61EC95FAE77B8EB84B00F104539F556E22F1DB70D94A8B72
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00E0C9F8
    • FindClose.KERNEL32(00000000), ref: 00E0CA4C
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E0CA71
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E0CA88
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E0CAAF
    • __swprintf.LIBCMT ref: 00E0CAFB
    • __swprintf.LIBCMT ref: 00E0CB3E
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • __swprintf.LIBCMT ref: 00E0CB92
      • Part of subcall function 00DC38D8: __woutput_l.LIBCMT ref: 00DC3931
    • __swprintf.LIBCMT ref: 00E0CBE0
      • Part of subcall function 00DC38D8: __flsbuf.LIBCMT ref: 00DC3953
      • Part of subcall function 00DC38D8: __flsbuf.LIBCMT ref: 00DC396B
    • __swprintf.LIBCMT ref: 00E0CC2F
    • __swprintf.LIBCMT ref: 00E0CC7E
    • __swprintf.LIBCMT ref: 00E0CCCD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
    • API String ID: 3953360268-2428617273
    • Opcode ID: 6afd34c20312301057af45e3d20b0c14ea779604041f2874f89485b7938f590e
    • Instruction ID: 52531faa26ca779c302d9dd03f2e495cf1ee74c04e468387857555025f5ee119
    • Opcode Fuzzy Hash: 6afd34c20312301057af45e3d20b0c14ea779604041f2874f89485b7938f590e
    • Instruction Fuzzy Hash: 30A13CB2508305ABC710EB64C896DAFB7ECEF95700F40492DF586D7191EA34EA49CB72
    APIs
    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00E0F221
    • _wcscmp.LIBCMT ref: 00E0F236
    • _wcscmp.LIBCMT ref: 00E0F24D
    • GetFileAttributesW.KERNEL32(?), ref: 00E0F25F
    • SetFileAttributesW.KERNEL32(?,?), ref: 00E0F279
    • FindNextFileW.KERNEL32(00000000,?), ref: 00E0F291
    • FindClose.KERNEL32(00000000), ref: 00E0F29C
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00E0F2B8
    • _wcscmp.LIBCMT ref: 00E0F2DF
    • _wcscmp.LIBCMT ref: 00E0F2F6
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0F308
    • SetCurrentDirectoryW.KERNEL32(00E5A5A0), ref: 00E0F326
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E0F330
    • FindClose.KERNEL32(00000000), ref: 00E0F33D
    • FindClose.KERNEL32(00000000), ref: 00E0F34F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
    • String ID: *.*
    • API String ID: 1803514871-438819550
    • Opcode ID: 931df7274167e616107182218f458f8b4820b2963cadcdba5d7463f9315c0aac
    • Instruction ID: 109dfd5ec62fcb8c8ee83005e1726faf8a474c48a0b1b10fff720d52a70d787a
    • Opcode Fuzzy Hash: 931df7274167e616107182218f458f8b4820b2963cadcdba5d7463f9315c0aac
    • Instruction Fuzzy Hash: 2D31B176500219AFDB30DBB4EC58EDE73ACAF09365F145275E800F30E0EB34DA998A60
    APIs
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E20BDE
    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E2F910,00000000,?,00000000,?,?), ref: 00E20C4C
    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00E20C94
    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00E20D1D
    • RegCloseKey.ADVAPI32(?), ref: 00E2103D
    • RegCloseKey.ADVAPI32(00000000), ref: 00E2104A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Close$ConnectCreateRegistryValue
    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
    • API String ID: 536824911-966354055
    • Opcode ID: 3e2764c0aa70d3ae01edbf6f2dcd19d1aab06906231adedbba9c397ae2f61213
    • Instruction ID: bc8abea6bbcf99dfb296ae15087a31e7f61386c4a2fd8aa30257aa56e790dccd
    • Opcode Fuzzy Hash: 3e2764c0aa70d3ae01edbf6f2dcd19d1aab06906231adedbba9c397ae2f61213
    • Instruction Fuzzy Hash: C6025D752006119FCB14DF24D891E2AB7E5FF89714F04985DF88AAB3A2DB30ED45CBA1
    APIs
    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00E0F37E
    • _wcscmp.LIBCMT ref: 00E0F393
    • _wcscmp.LIBCMT ref: 00E0F3AA
      • Part of subcall function 00E045C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E045DC
    • FindNextFileW.KERNEL32(00000000,?), ref: 00E0F3D9
    • FindClose.KERNEL32(00000000), ref: 00E0F3E4
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00E0F400
    • _wcscmp.LIBCMT ref: 00E0F427
    • _wcscmp.LIBCMT ref: 00E0F43E
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0F450
    • SetCurrentDirectoryW.KERNEL32(00E5A5A0), ref: 00E0F46E
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E0F478
    • FindClose.KERNEL32(00000000), ref: 00E0F485
    • FindClose.KERNEL32(00000000), ref: 00E0F497
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
    • String ID: *.*
    • API String ID: 1824444939-438819550
    • Opcode ID: 13df4cf70ffd24ad2bf8921c79d135b2e9a36e1d529621835d3ae2845c3b4bba
    • Instruction ID: 1aa80c0eb2ee250eb0880a658fafb60bd39c01faedc6e06bd0dbcb7bb7a1b563
    • Opcode Fuzzy Hash: 13df4cf70ffd24ad2bf8921c79d135b2e9a36e1d529621835d3ae2845c3b4bba
    • Instruction Fuzzy Hash: 6231D3725012196FCB30AF64EC88EDE77AC9F49325F145275EC50B34E0EB74DA99CA60
    APIs
      • Part of subcall function 00DF874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DF8766
      • Part of subcall function 00DF874A: GetLastError.KERNEL32(?,00DF822A,?,?,?), ref: 00DF8770
      • Part of subcall function 00DF874A: GetProcessHeap.KERNEL32(00000008,?,?,00DF822A,?,?,?), ref: 00DF877F
      • Part of subcall function 00DF874A: HeapAlloc.KERNEL32(00000000,?,00DF822A,?,?,?), ref: 00DF8786
      • Part of subcall function 00DF874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DF879D
      • Part of subcall function 00DF87E7: GetProcessHeap.KERNEL32(00000008,00DF8240,00000000,00000000,?,00DF8240,?), ref: 00DF87F3
      • Part of subcall function 00DF87E7: HeapAlloc.KERNEL32(00000000,?,00DF8240,?), ref: 00DF87FA
      • Part of subcall function 00DF87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00DF8240,?), ref: 00DF880B
    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DF825B
    • _memset.LIBCMT ref: 00DF8270
    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DF828F
    • GetLengthSid.ADVAPI32(?), ref: 00DF82A0
    • GetAce.ADVAPI32(?,00000000,?), ref: 00DF82DD
    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DF82F9
    • GetLengthSid.ADVAPI32(?), ref: 00DF8316
    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00DF8325
    • HeapAlloc.KERNEL32(00000000), ref: 00DF832C
    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DF834D
    • CopySid.ADVAPI32(00000000), ref: 00DF8354
    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DF8385
    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DF83AB
    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DF83BF
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
    • String ID:
    • API String ID: 3996160137-0
    • Opcode ID: 5aafedacf34bee7f001cb7b3f9bbab273de5cf08c093c197b24d04cc4d98e92e
    • Instruction ID: 876325edd0853902f9f1699a8058c18567a60349dfbb8b3a4f330318bebe4e35
    • Opcode Fuzzy Hash: 5aafedacf34bee7f001cb7b3f9bbab273de5cf08c093c197b24d04cc4d98e92e
    • Instruction Fuzzy Hash: FE616771900219AFCF109FA5DC84EFEBBB9FF04700F048129EA15E72A1DB319A05DB62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$PJ$UCP)$UTF)$UTF16)
    • API String ID: 0-1624373025
    • Opcode ID: 7bb0dcbdf314b5390f0022637b08fb79884d0db46d997be4b95c8540f129f0a2
    • Instruction ID: c80d42c27d3f87e3c2e0d739e6c5539208a0662fe4908f1809e680791e7c74cf
    • Opcode Fuzzy Hash: 7bb0dcbdf314b5390f0022637b08fb79884d0db46d997be4b95c8540f129f0a2
    • Instruction Fuzzy Hash: D0726E75E00219DBDB14CF59C8807FEB7B5EF48310F19816AE94AEB290DB74D981CBA0
    APIs
      • Part of subcall function 00E210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E20038,?,?), ref: 00E210BC
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E20737
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00E207D6
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00E2086E
    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00E20AAD
    • RegCloseKey.ADVAPI32(00000000), ref: 00E20ABA
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
    • String ID:
    • API String ID: 1240663315-0
    • Opcode ID: 686f04269789612c89117ca532020cc753e86d7648c8f1b58e26e367519bb5dc
    • Instruction ID: 63a8126d18a88d9573cadf6ad94e491e8d0b19aa5114c568cc5645c030da5a24
    • Opcode Fuzzy Hash: 686f04269789612c89117ca532020cc753e86d7648c8f1b58e26e367519bb5dc
    • Instruction Fuzzy Hash: E7E14C71204310AFCB14DF25D895E6BBBF4FF89714B04956DF84AEB2A2DA30E905CB61
    APIs
    • GetKeyboardState.USER32(?), ref: 00E00241
    • GetAsyncKeyState.USER32(000000A0), ref: 00E002C2
    • GetKeyState.USER32(000000A0), ref: 00E002DD
    • GetAsyncKeyState.USER32(000000A1), ref: 00E002F7
    • GetKeyState.USER32(000000A1), ref: 00E0030C
    • GetAsyncKeyState.USER32(00000011), ref: 00E00324
    • GetKeyState.USER32(00000011), ref: 00E00336
    • GetAsyncKeyState.USER32(00000012), ref: 00E0034E
    • GetKeyState.USER32(00000012), ref: 00E00360
    • GetAsyncKeyState.USER32(0000005B), ref: 00E00378
    • GetKeyState.USER32(0000005B), ref: 00E0038A
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: 269a72f65c4b26586d44c325ebd0addf6c52087e37295ff88b24e9afd0beef63
    • Instruction ID: ba3b4d423962c5ff0453766280430dabb4158ea23b15638a2794ae42b6f355e9
    • Opcode Fuzzy Hash: 269a72f65c4b26586d44c325ebd0addf6c52087e37295ff88b24e9afd0beef63
    • Instruction Fuzzy Hash: D3419B345447CA6FFF329A6488083B5BFA06F12348F0851ADD5C6761C3EBA85DC887A2
    APIs
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • CoInitialize.OLE32 ref: 00E18718
    • CoUninitialize.OLE32 ref: 00E18723
    • CoCreateInstance.OLE32(?,00000000,00000017,00E32BEC,?), ref: 00E18783
    • IIDFromString.OLE32(?,?), ref: 00E187F6
    • VariantInit.OLEAUT32(?), ref: 00E18890
    • VariantClear.OLEAUT32(?), ref: 00E188F1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
    • API String ID: 834269672-1287834457
    • Opcode ID: 48bbdd81a70c2dfbc5ecd5e1c286b50f0b5f7ac7dcb534d7f0e0060bd62336a9
    • Instruction ID: 510fe4aea94a8114ad900668b9a41957821ce81125851fe2b75c1e77e947a22d
    • Opcode Fuzzy Hash: 48bbdd81a70c2dfbc5ecd5e1c286b50f0b5f7ac7dcb534d7f0e0060bd62336a9
    • Instruction Fuzzy Hash: 3861AF706083019FD714DF24CA48BAABBE4EF45714F54591EF985AB291CB70ED88CBA2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
    • String ID:
    • API String ID: 1737998785-0
    • Opcode ID: c98f7fe2a41c862c5f6b80ea3d986a84fcad280b30b8dd94e91e3c62b5a72b74
    • Instruction ID: ef212151e7bb440b60dc4a2f06aeeebe3e7f807478fb1867497d7b3646c766fa
    • Opcode Fuzzy Hash: c98f7fe2a41c862c5f6b80ea3d986a84fcad280b30b8dd94e91e3c62b5a72b74
    • Instruction Fuzzy Hash: CA21A3753002109FDB209F21EC19FAA77B8EF04714F10802AF946EB2B1DB74AC01CBA5
    APIs
      • Part of subcall function 00DA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA48A1,?,?,00DA37C0,?), ref: 00DA48CE
      • Part of subcall function 00E04CD3: GetFileAttributesW.KERNEL32(?,00E03947), ref: 00E04CD4
    • FindFirstFileW.KERNEL32(?,?), ref: 00E03ADF
    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00E03B87
    • MoveFileW.KERNEL32(?,?), ref: 00E03B9A
    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00E03BB7
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E03BD9
    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00E03BF5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
    • String ID: \*.*
    • API String ID: 4002782344-1173974218
    • Opcode ID: 3b37d12cbca6928a1b340b606e4b429ac4e4c7a324a7ad1a0e613531bdff813a
    • Instruction ID: 1fdaca6ee56b95ee8addac1a0d4a81bbbcae85b2fc6d181542c661b10c8d69a8
    • Opcode Fuzzy Hash: 3b37d12cbca6928a1b340b606e4b429ac4e4c7a324a7ad1a0e613531bdff813a
    • Instruction Fuzzy Hash: 6D516C31901249AECF15EBA0DE929EDB7B9AF15304F6451A9E442770D2EF306F49CBB0
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00E0F6AB
    • Sleep.KERNEL32(0000000A), ref: 00E0F6DB
    • _wcscmp.LIBCMT ref: 00E0F6EF
    • _wcscmp.LIBCMT ref: 00E0F70A
    • FindNextFileW.KERNEL32(?,?), ref: 00E0F7A8
    • FindClose.KERNEL32(00000000), ref: 00E0F7BE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
    • String ID: *.*
    • API String ID: 713712311-438819550
    • Opcode ID: 67175a9ef44472ace43ce16e5a03a888938c6240387aade43e720ebcae66b67b
    • Instruction ID: f30b42f18cfa8e9749b7bc89697d483d60249e392829f7a65c8cb5bd8149a5f8
    • Opcode Fuzzy Hash: 67175a9ef44472ace43ce16e5a03a888938c6240387aade43e720ebcae66b67b
    • Instruction Fuzzy Hash: B7418E7190020A9FCF21DF64CC85AEEBBB4FF05314F184566E814B32A0EB309E94CBA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
    • API String ID: 0-1546025612
    • Opcode ID: b95c48cb7d62803eb8ca619ddbc6a5b9ec1c0ee1df4b5947ec0880033c483aa2
    • Instruction ID: 3ce6a01d4a69034f81c4223ef8c71f0775d5524da5aa554732951b36bfc4a839
    • Opcode Fuzzy Hash: b95c48cb7d62803eb8ca619ddbc6a5b9ec1c0ee1df4b5947ec0880033c483aa2
    • Instruction Fuzzy Hash: 34A2B074E0425ACBDF24DF59C9807EDB7B1BF55314F1881AAD84AA7281DB309E81DFA0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 96914e21bf8fc990d26df89d1b99d0d2927fb996d0a2ba40a0835d16a036de7b
    • Instruction ID: 4ca1b0a7c275847f959c2b9479f314005b6fa8c90b27fb5982d3ba4cd5069953
    • Opcode Fuzzy Hash: 96914e21bf8fc990d26df89d1b99d0d2927fb996d0a2ba40a0835d16a036de7b
    • Instruction Fuzzy Hash: 66129A70A00609DFDF04DFA5E981AEEB7F5FF48300F148669E846A7255EB35A911CB70
    APIs
      • Part of subcall function 00DA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA48A1,?,?,00DA37C0,?), ref: 00DA48CE
      • Part of subcall function 00E04CD3: GetFileAttributesW.KERNEL32(?,00E03947), ref: 00E04CD4
    • FindFirstFileW.KERNEL32(?,?), ref: 00E03DC5
    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E03E15
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E03E26
    • FindClose.KERNEL32(00000000), ref: 00E03E3D
    • FindClose.KERNEL32(00000000), ref: 00E03E46
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
    • String ID: \*.*
    • API String ID: 2649000838-1173974218
    • Opcode ID: db920eafdad9f37d071cb92b1787cb03d5103fcacd0b74b4c49553269d844af2
    • Instruction ID: c619f0de413e0f37f4df5075f7d61eabc1513904c3cf7d15fea00963d278548a
    • Opcode Fuzzy Hash: db920eafdad9f37d071cb92b1787cb03d5103fcacd0b74b4c49553269d844af2
    • Instruction Fuzzy Hash: 96312B31009385ABC211EB64DC958AFB7E8AF96704F445E2DF4D5A21D1EB209A0EC7B2
    APIs
      • Part of subcall function 00DF8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DF8D0D
      • Part of subcall function 00DF8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DF8D3A
      • Part of subcall function 00DF8CC3: GetLastError.KERNEL32 ref: 00DF8D47
    • ExitWindowsEx.USER32(?,00000000), ref: 00E0549B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
    • String ID: $@$SeShutdownPrivilege
    • API String ID: 2234035333-194228
    • Opcode ID: 54d21ce128acefb4b7131487d29e8791cd1c2641037feb4f8937650bd7e2b30c
    • Instruction ID: 445b4c55f71ed526dbd9bb978601915740cbfde030cd5219469096748c829242
    • Opcode Fuzzy Hash: 54d21ce128acefb4b7131487d29e8791cd1c2641037feb4f8937650bd7e2b30c
    • Instruction Fuzzy Hash: 6D012433654A156EE7386674AC4AFFB7268EB05343F242531FD27F20D2DAA00CC089A0
    APIs
    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E165EF
    • WSAGetLastError.WSOCK32(00000000), ref: 00E165FE
    • bind.WSOCK32(00000000,?,00000010), ref: 00E1661A
    • listen.WSOCK32(00000000,00000005), ref: 00E16629
    • WSAGetLastError.WSOCK32(00000000), ref: 00E16643
    • closesocket.WSOCK32(00000000,00000000), ref: 00E16657
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorLast$bindclosesocketlistensocket
    • String ID:
    • API String ID: 1279440585-0
    • Opcode ID: c59b6ccb54ce9323ea1b38291e80d1f32c028be748805e5674e24c3399b502d3
    • Instruction ID: 3444d01e691e8cc164265295e225260cca48c5118eb57cc45b6a18649e6beb5b
    • Opcode Fuzzy Hash: c59b6ccb54ce9323ea1b38291e80d1f32c028be748805e5674e24c3399b502d3
    • Instruction Fuzzy Hash: CD219E312006049FCB14EF24C945AAEB7B9EF49724F14816AF956B72E1CB70AD458B61
    APIs
      • Part of subcall function 00DC0FF6: std::exception::exception.LIBCMT ref: 00DC102C
      • Part of subcall function 00DC0FF6: __CxxThrowException@8.LIBCMT ref: 00DC1041
    • _memmove.LIBCMT ref: 00DF062F
    • _memmove.LIBCMT ref: 00DF0744
    • _memmove.LIBCMT ref: 00DF07EB
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memmove$Exception@8Throwstd::exception::exception
    • String ID:
    • API String ID: 1300846289-0
    • Opcode ID: 47ffbf2cd29b716db05fbf42588670a5f107097d4eec06e7ff1064ed1662f98b
    • Instruction ID: 877aae534a8d67831aeaa70534d314eabaeebc913d4459b64b9677d2da62d5e0
    • Opcode Fuzzy Hash: 47ffbf2cd29b716db05fbf42588670a5f107097d4eec06e7ff1064ed1662f98b
    • Instruction Fuzzy Hash: 6A027FB0E00209DBDF04DF64D981ABEBBB5EF44300F1580A9E946DB256EB31D955CBB1
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DA19FA
    • GetSysColor.USER32(0000000F), ref: 00DA1A4E
    • SetBkColor.GDI32(?,00000000), ref: 00DA1A61
      • Part of subcall function 00DA1290: DefDlgProcW.USER32(?,00000020,?), ref: 00DA12D8
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ColorProc$LongWindow
    • String ID:
    • API String ID: 3744519093-0
    • Opcode ID: 75d868a41a243dee581aa483c9e0c63aa89e8c3cb2c6cb9269025aa1ef1727cc
    • Instruction ID: 4f5e128ce227ea1ab8c5f40369e7dbb306d78768fb4b0638347b2c85d6ef12b7
    • Opcode Fuzzy Hash: 75d868a41a243dee581aa483c9e0c63aa89e8c3cb2c6cb9269025aa1ef1727cc
    • Instruction Fuzzy Hash: E4A19979116555FED638AB39AC45EBF359CEB43395F2D011BF042E6292CE20DC02C2B2
    APIs
      • Part of subcall function 00E180A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E180CB
    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00E16AB1
    • WSAGetLastError.WSOCK32(00000000), ref: 00E16ADA
    • bind.WSOCK32(00000000,?,00000010), ref: 00E16B13
    • WSAGetLastError.WSOCK32(00000000), ref: 00E16B20
    • closesocket.WSOCK32(00000000,00000000), ref: 00E16B34
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorLast$bindclosesocketinet_addrsocket
    • String ID:
    • API String ID: 99427753-0
    • Opcode ID: b025a47617e33dbdef6a9744a421ca72732f8f3e39369f929ab4ce9575db5b83
    • Instruction ID: f9206ad2811ec1937af1e0cb088a21ddfea61e1a4ea14514afe7080ba347e1bd
    • Opcode Fuzzy Hash: b025a47617e33dbdef6a9744a421ca72732f8f3e39369f929ab4ce9575db5b83
    • Instruction Fuzzy Hash: 5C41D475B00214AFEB10AF24DC96F6EB7A8DF09710F04845DF91AAB3D2DA709D018BB1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$EnabledForegroundIconicVisibleZoomed
    • String ID:
    • API String ID: 292994002-0
    • Opcode ID: 771bd2aafd5f947e1a9ffde7d268cab43b0bc407d1ceadaaa6965c35b6b7c5da
    • Instruction ID: 1b0838f3cdffde267437229aa7f3bfe569bf68bd74859b82313fa1a04127187d
    • Opcode Fuzzy Hash: 771bd2aafd5f947e1a9ffde7d268cab43b0bc407d1ceadaaa6965c35b6b7c5da
    • Instruction Fuzzy Hash: 1B11C432740920AFE7211F26ED44B6FB7A9FF45721B454439F806E7251CB70DD028AB5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID: Dt$Dt$Dt$Dt$Variable must be of type 'Object'.
    • API String ID: 0-3952547859
    • Opcode ID: 9a37678ed27112791f5188a2eccd10a01e130b3b31abceca0887d92f0f9b90a8
    • Instruction ID: cb75daa954566aec475598d41126cf0373865bd21a3e6e254a4a69bedeae1cbe
    • Opcode Fuzzy Hash: 9a37678ed27112791f5188a2eccd10a01e130b3b31abceca0887d92f0f9b90a8
    • Instruction Fuzzy Hash: 5EA2B174A04205CFCB24DF98C484AAEB7B1FF4A314F288069E956AB351D775ED42CBB1
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00DE1D88,?), ref: 00E1C312
    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E1C324
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetSystemWow64DirectoryW$kernel32.dll
    • API String ID: 2574300362-1816364905
    • Opcode ID: 5676ed312dccb3208e49304e21f3443f7da2eee1d354a8fe18b4513915922db5
    • Instruction ID: c4988edc203d0963fafc8cbb1eb2eae13b9d3ca20546cdd70285342103dbcb00
    • Opcode Fuzzy Hash: 5676ed312dccb3208e49304e21f3443f7da2eee1d354a8fe18b4513915922db5
    • Instruction Fuzzy Hash: FCE01274641713DFDB304F26D808A8676E4EF08759B90E47AE8A5F2250E770D896CB60
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __itow__swprintf
    • String ID:
    • API String ID: 674341424-0
    • Opcode ID: 599d5be8c3aee9f0eccb5e3648260ad09577d4ccaec8daa6430dff46313b9091
    • Instruction ID: a4c6099d9b61a2a7f7cc6e8bf2a4350f869cdfb5652c1dd0cc5a4cb51f88055b
    • Opcode Fuzzy Hash: 599d5be8c3aee9f0eccb5e3648260ad09577d4ccaec8daa6430dff46313b9091
    • Instruction Fuzzy Hash: 2B227871608341DFC724EF24C891BAAB7E4EF85704F14492DF99A97291DB70EA04DBB2
    APIs
    • CreateToolhelp32Snapshot.KERNEL32 ref: 00E1F151
    • Process32FirstW.KERNEL32(00000000,?), ref: 00E1F15F
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • Process32NextW.KERNEL32(00000000,?), ref: 00E1F21F
    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00E1F22E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
    • String ID:
    • API String ID: 2576544623-0
    • Opcode ID: 374898830aa2e1e22d29def3f1749b512f70a853d30e191dd2a55a2eaa18a43a
    • Instruction ID: 1a4555f624b0d13ebda495f2056b0a24260df6849dcbdace6df47888a9938441
    • Opcode Fuzzy Hash: 374898830aa2e1e22d29def3f1749b512f70a853d30e191dd2a55a2eaa18a43a
    • Instruction Fuzzy Hash: 5C515E71504300AFD310EF24DC85EABB7E8FF95710F54492DF595972A2EB70AA09CBA2
    APIs
    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E040D1
    • _memset.LIBCMT ref: 00E040F2
    • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00E04144
    • CloseHandle.KERNEL32(00000000), ref: 00E0414D
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CloseControlCreateDeviceFileHandle_memset
    • String ID:
    • API String ID: 1157408455-0
    • Opcode ID: 5920189c26fa2ab60ff3d8c192e07f32cd1a532cd6c722473c32deb4fc6acb46
    • Instruction ID: 8df762af5d7250aa272400c1ade2f923c4b32289fb9774395457711c3ddc2e12
    • Opcode Fuzzy Hash: 5920189c26fa2ab60ff3d8c192e07f32cd1a532cd6c722473c32deb4fc6acb46
    • Instruction Fuzzy Hash: 4A11EBB59012287AD7309BA59C4DFEBBB7CEF44764F1041AAF908F71C0D6744E848BA4
    APIs
    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00DFEB19
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: lstrlen
    • String ID: ($|
    • API String ID: 1659193697-1631851259
    • Opcode ID: 4a260aeaf72265fbb5481365e489f4fe33ef3aac765280d8dc63c5adadcdf935
    • Instruction ID: 8dc87856f94bd1ce028131f4e5223aac6922915b7214eb38c743ad96fa975b57
    • Opcode Fuzzy Hash: 4a260aeaf72265fbb5481365e489f4fe33ef3aac765280d8dc63c5adadcdf935
    • Instruction Fuzzy Hash: 2F322575A007059FD728CF19C481A6AB7F1FF48310B16C56EE99ADB3A1EB70E981CB50
    APIs
    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00E126D5
    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00E1270C
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Internet$AvailableDataFileQueryRead
    • String ID:
    • API String ID: 599397726-0
    • Opcode ID: 4b16dfa752fa59e9b1d90a790225a79b8f08f131da47de04bb4cfaac74f4bb2b
    • Instruction ID: a7c290dbdc23bb19e94a3e54dd45bac9da89c29d01e811e942a3577904645ed9
    • Opcode Fuzzy Hash: 4b16dfa752fa59e9b1d90a790225a79b8f08f131da47de04bb4cfaac74f4bb2b
    • Instruction Fuzzy Hash: A841C371900209BFEB20DA95DC85EFBB7BCEB40718F10506EFB01B6180EA719EE19664
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00E0B5AE
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E0B608
    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00E0B655
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID:
    • API String ID: 1682464887-0
    • Opcode ID: 2f336ba2b8e1ce2b47f96435138543b85089a401fa960173594e68323ace0833
    • Instruction ID: 20ae0dd15407420de3a8a04297ea6e1384665370154be27c244495032a184474
    • Opcode Fuzzy Hash: 2f336ba2b8e1ce2b47f96435138543b85089a401fa960173594e68323ace0833
    • Instruction Fuzzy Hash: A1216075A00518EFCB00EF65D881AADFBB8FF49310F1480A9E905AB361DB31A956CB61
    APIs
      • Part of subcall function 00DC0FF6: std::exception::exception.LIBCMT ref: 00DC102C
      • Part of subcall function 00DC0FF6: __CxxThrowException@8.LIBCMT ref: 00DC1041
    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DF8D0D
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DF8D3A
    • GetLastError.KERNEL32 ref: 00DF8D47
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
    • String ID:
    • API String ID: 1922334811-0
    • Opcode ID: 23c7deef3dbcebad48b53c2a9f4e39afa4c40f36815ee84c689ed55bd203e837
    • Instruction ID: 5b8c0b977575bfec25fa7b3e6d59938bbb7f04e022e6f41d8d49beb20afa6dc9
    • Opcode Fuzzy Hash: 23c7deef3dbcebad48b53c2a9f4e39afa4c40f36815ee84c689ed55bd203e837
    • Instruction Fuzzy Hash: B5116DB1414209AFD7289F54DC85D6BB7FCEF44710B25852EF85693241EF30A8418A70
    APIs
    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00E04C2C
    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E04C43
    • FreeSid.ADVAPI32(?), ref: 00E04C53
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AllocateCheckFreeInitializeMembershipToken
    • String ID:
    • API String ID: 3429775523-0
    • Opcode ID: 1ce1485bf496a7ebc5bcdbc48f91354ef100a9752d57da5e7f56849cfbf93ff2
    • Instruction ID: 5f5909c3d16103c827008398ef75e5865476525b5d37c1e1c5edcfcf02c3c43d
    • Opcode Fuzzy Hash: 1ce1485bf496a7ebc5bcdbc48f91354ef100a9752d57da5e7f56849cfbf93ff2
    • Instruction Fuzzy Hash: 96F03C75911308BFDB04DFE09D89EADB7B8EB08201F004469E501E2181D6705A448B50
    APIs
    • GetFileAttributesW.KERNEL32(?,00DDE7C1), ref: 00E046A6
    • FindFirstFileW.KERNEL32(?,?), ref: 00E046B7
    • FindClose.KERNEL32(00000000), ref: 00E046C7
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FileFind$AttributesCloseFirst
    • String ID:
    • API String ID: 48322524-0
    • Opcode ID: 031894f6c3bec1fa557202deae3e51520d518383e90c5cf72168ad9720214354
    • Instruction ID: 7bc1958ead47062887c88f5c3a49be43c20d71a350692d5b38e7f6ff2ead16a0
    • Opcode Fuzzy Hash: 031894f6c3bec1fa557202deae3e51520d518383e90c5cf72168ad9720214354
    • Instruction Fuzzy Hash: A7E0D8B28104009F8220A738FD4D8EA776C9F17335F100725F975E10F0F7B059948595
    APIs
    • __time64.LIBCMT ref: 00E08B25
      • Part of subcall function 00DC543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00E091F8,00000000,?,?,?,?,00E093A9,00000000,?), ref: 00DC5443
      • Part of subcall function 00DC543A: __aulldiv.LIBCMT ref: 00DC5463
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Time$FileSystem__aulldiv__time64
    • String ID: 0u
    • API String ID: 2893107130-1339160046
    • Opcode ID: 591856db8eae3c687833eda60a7ebd44b3a56ed66f230d0138e83e4d912a136f
    • Instruction ID: 11234162a23c181c07e4275e921db3218de77fcc134ab32d33909cab93196e61
    • Opcode Fuzzy Hash: 591856db8eae3c687833eda60a7ebd44b3a56ed66f230d0138e83e4d912a136f
    • Instruction Fuzzy Hash: 6021E4726356108FC329CF25E441A52B3E1EBA5321B289E6CD0E6DB2D0CA74B949CB94
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 767df49ac9d63ff105b518bb759f6e49200995c1d0bc8567253f9d605b8ace64
    • Instruction ID: 9449563fd212ecbfd0ac95816196285ef60ade38d61edadc8edd4ca983717df3
    • Opcode Fuzzy Hash: 767df49ac9d63ff105b518bb759f6e49200995c1d0bc8567253f9d605b8ace64
    • Instruction Fuzzy Hash: E7229D74A00216CFDB24DF54C494ABEB7F4FF0A300F188569E896AB351E774E985CBA1
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00E0C966
    • FindClose.KERNEL32(00000000), ref: 00E0C996
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: a7103606816c046f2ad6a5c821c7fac064b3d25cb90552bb835acf7ec30648a9
    • Instruction ID: 59880ab165dcb1aeb3efe39091240f0ffe55000a5619e5d054bf07f98daceaaf
    • Opcode Fuzzy Hash: a7103606816c046f2ad6a5c821c7fac064b3d25cb90552bb835acf7ec30648a9
    • Instruction Fuzzy Hash: CE11C8326006009FD710DF29C85592AF7E5FF85324F00851EF9A5D72A1DB30EC05CB91
    APIs
    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00E1977D,?,00E2FB84,?), ref: 00E0A302
    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00E1977D,?,00E2FB84,?), ref: 00E0A314
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorFormatLastMessage
    • String ID:
    • API String ID: 3479602957-0
    • Opcode ID: b761342d44a2a334527ec5754b6048396477e01421b9796178ff8f5720d92feb
    • Instruction ID: d2c1f34d8048b3ffeea40abb19848317e5560339807a4e615c4e681784171056
    • Opcode Fuzzy Hash: b761342d44a2a334527ec5754b6048396477e01421b9796178ff8f5720d92feb
    • Instruction Fuzzy Hash: DDF05E3554522DABDB209EA4CC48FEA776DEF09761F004166F908A6191DA309944CBB1
    APIs
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DF8851), ref: 00DF8728
    • CloseHandle.KERNEL32(?,?,00DF8851), ref: 00DF873A
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AdjustCloseHandlePrivilegesToken
    • String ID:
    • API String ID: 81990902-0
    • Opcode ID: ff649cb895045a8604a2662cf35655cea02357bb35f2d97e7378dd4eaa98ab2f
    • Instruction ID: 4ff0c7c8d85707855ae32ed8beaa9b36456e0cbd30461a341c617dc4f8272098
    • Opcode Fuzzy Hash: ff649cb895045a8604a2662cf35655cea02357bb35f2d97e7378dd4eaa98ab2f
    • Instruction Fuzzy Hash: 9CE0B676010611EEE7352B61EC09E777BA9EB04751B24883DF99681471DB62AC91EB20
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00DC8F97,?,?,?,00000001), ref: 00DCA39A
    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00DCA3A3
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: a77c2c5be1f8501aeaf2e4fbd623c9460b72c25bbec20e481157cbbbd778875c
    • Instruction ID: f4e5196703f84dbbeadd9ff93849c4bbe074edab2fc277d1b4e5bf9f3bcae39c
    • Opcode Fuzzy Hash: a77c2c5be1f8501aeaf2e4fbd623c9460b72c25bbec20e481157cbbbd778875c
    • Instruction Fuzzy Hash: ADB09231054208EFCA106B92EC09B883F78FB44AA2F404030F60D94060CB6254568A91
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2dd4395e69c1fd6ad12903eb8b5b5661b4c5cca1798596aa27600a8b5a2d8c0a
    • Instruction ID: d68dbbf0300cff8b0b35ba34ae33404dad3299c702d6d273a55389c59a7e8b64
    • Opcode Fuzzy Hash: 2dd4395e69c1fd6ad12903eb8b5b5661b4c5cca1798596aa27600a8b5a2d8c0a
    • Instruction Fuzzy Hash: 3F325862D29F0A4DD7235635C876335A69AAFB73C4F14D73BF859B69A5EB28C4830100
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4679146e7c556cc12c0dbe9dbc4b5fe9c08a4960789dcc603c113d1117418ac6
    • Instruction ID: 58e92d78a310b0b0b577c7a767e183a2188420948b9ac216d3e778cb120cdac5
    • Opcode Fuzzy Hash: 4679146e7c556cc12c0dbe9dbc4b5fe9c08a4960789dcc603c113d1117418ac6
    • Instruction Fuzzy Hash: B4B1F020D2AF454DD223963A8835336BA8CAFBB2C5F55D72BFC6670D22EB2285C74141
    APIs
    • BlockInput.USER32(00000001), ref: 00E14218
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BlockInput
    • String ID:
    • API String ID: 3456056419-0
    • Opcode ID: 3f1393a7013bf625149d109b75bb99d60c9da386dfccb508ca954e25e7cdd4ee
    • Instruction ID: e95110db0edf26130a5e72663af53d8ba6f790498884946a8bcb1265b59cf78a
    • Opcode Fuzzy Hash: 3f1393a7013bf625149d109b75bb99d60c9da386dfccb508ca954e25e7cdd4ee
    • Instruction Fuzzy Hash: FAE048712401145FC710DF59D844A9AF7E8EF55760F008026FC49D7361DA70E881CBB1
    APIs
    • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00E04F18
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: mouse_event
    • String ID:
    • API String ID: 2434400541-0
    • Opcode ID: 7b6dea2a614d8d09e170106ff9ba2d638631f4f7151bbc9f1511d61a3ef307e5
    • Instruction ID: b92d1c055fac5ebfadcd1a826c3c9ccbf77f105eb564a38f8f17d469d2479aed
    • Opcode Fuzzy Hash: 7b6dea2a614d8d09e170106ff9ba2d638631f4f7151bbc9f1511d61a3ef307e5
    • Instruction Fuzzy Hash: FCD05EF03642073CFC284B60AE0FFB60108F340785F8479897301F94D198E56CD1A035
    APIs
    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00DF88D1), ref: 00DF8CB3
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LogonUser
    • String ID:
    • API String ID: 1244722697-0
    • Opcode ID: e13b840651e647c5ec9dafb257fc63777f7fbc4bb89dbe6db6c197274dcb20e4
    • Instruction ID: cbf5db747e9a6e93c5ed254fbc155770e4f9b51445b5cc4aa9abc077a6504c7e
    • Opcode Fuzzy Hash: e13b840651e647c5ec9dafb257fc63777f7fbc4bb89dbe6db6c197274dcb20e4
    • Instruction Fuzzy Hash: 0AD05E3226050EAFEF018EA4DD01EAE3B69EB04B01F408121FE15D50A1C775D835AB60
    APIs
    • GetUserNameW.ADVAPI32(?,?), ref: 00DE2242
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: NameUser
    • String ID:
    • API String ID: 2645101109-0
    • Opcode ID: b668a332513a2b7d6c0b631c4d851f7b40fb90dc72d32a741679684edd3d8a13
    • Instruction ID: ff02447a81d2480ac3212dfa9d69d119eeca702bf523e11c77d0c244f1c2aa85
    • Opcode Fuzzy Hash: b668a332513a2b7d6c0b631c4d851f7b40fb90dc72d32a741679684edd3d8a13
    • Instruction Fuzzy Hash: B3C048F5C00109DBEB15EBA1DA88DEFB7BCAB08304F2040A6E142F2100E7749B488A71
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00DCA36A
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: d7beded5301d1b8d71a9f87a1e79a84a63fbc12fc4a6027aa0874b86279d6073
    • Instruction ID: 189d982b38a1115094de461dff23aeaaa34af3acd748be5b7e348605988dc46e
    • Opcode Fuzzy Hash: d7beded5301d1b8d71a9f87a1e79a84a63fbc12fc4a6027aa0874b86279d6073
    • Instruction Fuzzy Hash: 26A0113000020CEB8A002B82EC08888BFACEB002A0B008030F80C800228B32A8228A80
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 61246d783e58cc91362cb0d725d5356a9c6e9f924312178d197eadef678b28f9
    • Instruction ID: 9669cb217405be79e4fa1cfef60495bd1904a0d89c7f1efa2a53fa8aa47866f1
    • Opcode Fuzzy Hash: 61246d783e58cc91362cb0d725d5356a9c6e9f924312178d197eadef678b28f9
    • Instruction Fuzzy Hash: 4322597050161ADBCF288F28D4946FD7BA5EB41300F2D846ADA939B295DF30DD81EBB4
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction ID: effc06800418c74eca8d85c00b6b56f24d17d9af0cae2cf5888272a7be26bd50
    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction Fuzzy Hash: 12C16F362051A30ADF2D86399474A3EBAE15EA27B131E076DE4B3CB5C5EF20D534E630
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction ID: 3c308b1745d201093a3b68ab323245a404c08a31075c44ef8484844f47afb68c
    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction Fuzzy Hash: 56C18F372051A309DF2D463A8474A3EBAE15EA37B131E076DE4B2DB5C5EF20D934A630
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction ID: 9c7768ad4e9edf6cde8b0553242cbb99a99082c7a5565cc4e45d627b7ffd1ef0
    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction Fuzzy Hash: 1AC15E3B2051B309DF2D463A9434A3EBAA15EA37B131E076DE4B3CB5D6EF20D5249630
    APIs
    • DeleteObject.GDI32(00000000), ref: 00E17B70
    • DeleteObject.GDI32(00000000), ref: 00E17B82
    • DestroyWindow.USER32 ref: 00E17B90
    • GetDesktopWindow.USER32 ref: 00E17BAA
    • GetWindowRect.USER32(00000000), ref: 00E17BB1
    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00E17CF2
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00E17D02
    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17D4A
    • GetClientRect.USER32(00000000,?), ref: 00E17D56
    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E17D90
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17DB2
    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17DC5
    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17DD0
    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17DD9
    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17DE8
    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17DF1
    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17DF8
    • GlobalFree.KERNEL32(00000000), ref: 00E17E03
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17E15
    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00E32CAC,00000000), ref: 00E17E2B
    • GlobalFree.KERNEL32(00000000), ref: 00E17E3B
    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00E17E61
    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00E17E80
    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E17EA2
    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E1808F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
    • String ID: $AutoIt v3$DISPLAY$static
    • API String ID: 2211948467-2373415609
    • Opcode ID: 8c6a0e96c3a09bbf6ccf1cdd404339b1baa4558f293c21a0c00c450d14679823
    • Instruction ID: 8841de43aa2b96e9e65fc7d4646912c32a836a501356e245a10fb5736c5e47e3
    • Opcode Fuzzy Hash: 8c6a0e96c3a09bbf6ccf1cdd404339b1baa4558f293c21a0c00c450d14679823
    • Instruction Fuzzy Hash: DE029C71A00108EFDB14DF65DD99EAFBBB9FB49710F108168F905AB2A1CB70AD45CB60
    APIs
    • CharUpperBuffW.USER32(?,?,00E2F910), ref: 00E238AF
    • IsWindowVisible.USER32(?), ref: 00E238D3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharUpperVisibleWindow
    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
    • API String ID: 4105515805-45149045
    • Opcode ID: 9413df594d5fa1eb0330c57d73aabb719409f720c0783eb22a896db4dd0737a8
    • Instruction ID: 64b9efc1e3be92cfd871be4a5f81c0ac0cc1a3bec7e0a5297dd5bdf2efc6ebae
    • Opcode Fuzzy Hash: 9413df594d5fa1eb0330c57d73aabb719409f720c0783eb22a896db4dd0737a8
    • Instruction Fuzzy Hash: E0D19330204319DBCB14EF20D452A6ABBA1EF95344F11585CB8867B7A2DB35EE4ACF71
    APIs
    • SetTextColor.GDI32(?,00000000), ref: 00E2A89F
    • GetSysColorBrush.USER32(0000000F), ref: 00E2A8D0
    • GetSysColor.USER32(0000000F), ref: 00E2A8DC
    • SetBkColor.GDI32(?,000000FF), ref: 00E2A8F6
    • SelectObject.GDI32(?,?), ref: 00E2A905
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00E2A930
    • GetSysColor.USER32(00000010), ref: 00E2A938
    • CreateSolidBrush.GDI32(00000000), ref: 00E2A93F
    • FrameRect.USER32(?,?,00000000), ref: 00E2A94E
    • DeleteObject.GDI32(00000000), ref: 00E2A955
    • InflateRect.USER32(?,000000FE,000000FE), ref: 00E2A9A0
    • FillRect.USER32(?,?,?), ref: 00E2A9D2
    • GetWindowLongW.USER32(?,000000F0), ref: 00E2A9FD
      • Part of subcall function 00E2AB60: GetSysColor.USER32(00000012), ref: 00E2AB99
      • Part of subcall function 00E2AB60: SetTextColor.GDI32(?,?), ref: 00E2AB9D
      • Part of subcall function 00E2AB60: GetSysColorBrush.USER32(0000000F), ref: 00E2ABB3
      • Part of subcall function 00E2AB60: GetSysColor.USER32(0000000F), ref: 00E2ABBE
      • Part of subcall function 00E2AB60: GetSysColor.USER32(00000011), ref: 00E2ABDB
      • Part of subcall function 00E2AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E2ABE9
      • Part of subcall function 00E2AB60: SelectObject.GDI32(?,00000000), ref: 00E2ABFA
      • Part of subcall function 00E2AB60: SetBkColor.GDI32(?,00000000), ref: 00E2AC03
      • Part of subcall function 00E2AB60: SelectObject.GDI32(?,?), ref: 00E2AC10
      • Part of subcall function 00E2AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00E2AC2F
      • Part of subcall function 00E2AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E2AC46
      • Part of subcall function 00E2AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00E2AC5B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
    • String ID:
    • API String ID: 4124339563-0
    • Opcode ID: f96abdcf7a3d37356b4797c003992b563b25916d8b3bc4e37091a98c69a09b5d
    • Instruction ID: 84e1d964026def92ee5230a438a652c089a4f4439b29aa135bacae98217fa5e8
    • Opcode Fuzzy Hash: f96abdcf7a3d37356b4797c003992b563b25916d8b3bc4e37091a98c69a09b5d
    • Instruction Fuzzy Hash: 2EA19F72008311EFD7209F65EC08E6B7BB9FF88325F145A39F962A61A1D734D849CB52
    APIs
    • DestroyWindow.USER32(?,?,?), ref: 00DA2CA2
    • DeleteObject.GDI32(00000000), ref: 00DA2CE8
    • DeleteObject.GDI32(00000000), ref: 00DA2CF3
    • DestroyIcon.USER32(00000000,?,?,?), ref: 00DA2CFE
    • DestroyWindow.USER32(00000000,?,?,?), ref: 00DA2D09
    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00DDC68B
    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00DDC6C4
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00DDCAED
      • Part of subcall function 00DA1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DA2036,?,00000000,?,?,?,?,00DA16CB,00000000,?), ref: 00DA1B9A
    • SendMessageW.USER32(?,00001053), ref: 00DDCB2A
    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00DDCB41
    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00DDCB57
    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00DDCB62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
    • String ID: 0
    • API String ID: 464785882-4108050209
    • Opcode ID: 06bb474989c554f642fca2274c8a27d1e7b4ba020a80cd6b91824f1f0e0e550f
    • Instruction ID: 568816ec34b6840ea703452b74df6576532ce0e2b89e90dae411530dfd0d8972
    • Opcode Fuzzy Hash: 06bb474989c554f642fca2274c8a27d1e7b4ba020a80cd6b91824f1f0e0e550f
    • Instruction Fuzzy Hash: 97129C30610202EFDB21CF29C884BA9B7E5FF45311F58557AE885DB662CB31EC46DBA0
    APIs
    • DestroyWindow.USER32(00000000), ref: 00E177F1
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00E178B0
    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00E178EE
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00E17900
    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00E17946
    • GetClientRect.USER32(00000000,?), ref: 00E17952
    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00E17996
    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E179A5
    • GetStockObject.GDI32(00000011), ref: 00E179B5
    • SelectObject.GDI32(00000000,00000000), ref: 00E179B9
    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00E179C9
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E179D2
    • DeleteDC.GDI32(00000000), ref: 00E179DB
    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E17A07
    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E17A1E
    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00E17A59
    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E17A6D
    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E17A7E
    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00E17AAE
    • GetStockObject.GDI32(00000011), ref: 00E17AB9
    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E17AC4
    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00E17ACE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
    • API String ID: 2910397461-517079104
    • Opcode ID: 9cbe4b7162ed30f01dcd3e4143d81ecc914164c99b24cbb98948b959ec7f4eb1
    • Instruction ID: 8aa4e24881ac86c03ffa9a1191fb2b4c58b0defc08ed4f0494a9951bcd6df1e7
    • Opcode Fuzzy Hash: 9cbe4b7162ed30f01dcd3e4143d81ecc914164c99b24cbb98948b959ec7f4eb1
    • Instruction Fuzzy Hash: 3BA17E71A50215BFEB149BA5DC4AFAFBBB9EB44710F004624FA15B72E0C7B0AD45CB60
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00E0AF89
    • GetDriveTypeW.KERNEL32(?,00E2FAC0,?,\\.\,00E2F910), ref: 00E0B066
    • SetErrorMode.KERNEL32(00000000,00E2FAC0,?,\\.\,00E2F910), ref: 00E0B1C4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorMode$DriveType
    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
    • API String ID: 2907320926-4222207086
    • Opcode ID: 639c812db3e816dd960cbb8259b85bb0985a0fcb6227bc800083eb6db997930d
    • Instruction ID: 0ad076ca2e8a8108019314014cda11e54cc1fcf72d163126de23a628dc08dba4
    • Opcode Fuzzy Hash: 639c812db3e816dd960cbb8259b85bb0985a0fcb6227bc800083eb6db997930d
    • Instruction Fuzzy Hash: 7451B330681305EBCB00DB10C9A2DBD77B0FF1A746B286526F80AB72D1D7759D85DB62
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
    • API String ID: 1038674560-86951937
    • Opcode ID: 61a955d37076db13e540002ac675e0be594d9219085b2b1390cb5e0d0aa48294
    • Instruction ID: b38fba0a825ea37b32281055a6d82ebaaa077faa0d1bb35d93b0764551258428
    • Opcode Fuzzy Hash: 61a955d37076db13e540002ac675e0be594d9219085b2b1390cb5e0d0aa48294
    • Instruction Fuzzy Hash: 7981D871640356FACB21BB60DD83FAE7769EF16700F0C8029FD46AB182EB60DA55D271
    APIs
    • GetSysColor.USER32(00000012), ref: 00E2AB99
    • SetTextColor.GDI32(?,?), ref: 00E2AB9D
    • GetSysColorBrush.USER32(0000000F), ref: 00E2ABB3
    • GetSysColor.USER32(0000000F), ref: 00E2ABBE
    • CreateSolidBrush.GDI32(?), ref: 00E2ABC3
    • GetSysColor.USER32(00000011), ref: 00E2ABDB
    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E2ABE9
    • SelectObject.GDI32(?,00000000), ref: 00E2ABFA
    • SetBkColor.GDI32(?,00000000), ref: 00E2AC03
    • SelectObject.GDI32(?,?), ref: 00E2AC10
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00E2AC2F
    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E2AC46
    • GetWindowLongW.USER32(00000000,000000F0), ref: 00E2AC5B
    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E2ACA7
    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E2ACCE
    • InflateRect.USER32(?,000000FD,000000FD), ref: 00E2ACEC
    • DrawFocusRect.USER32(?,?), ref: 00E2ACF7
    • GetSysColor.USER32(00000011), ref: 00E2AD05
    • SetTextColor.GDI32(?,00000000), ref: 00E2AD0D
    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00E2AD21
    • SelectObject.GDI32(?,00E2A869), ref: 00E2AD38
    • DeleteObject.GDI32(?), ref: 00E2AD43
    • SelectObject.GDI32(?,?), ref: 00E2AD49
    • DeleteObject.GDI32(?), ref: 00E2AD4E
    • SetTextColor.GDI32(?,?), ref: 00E2AD54
    • SetBkColor.GDI32(?,?), ref: 00E2AD5E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
    • String ID:
    • API String ID: 1996641542-0
    • Opcode ID: 41b4073ce2ebd13daea9055a484b9b7f58939d20fd12c2cd88eaf4db25f1ae01
    • Instruction ID: 559a6ec749435e067574b311f65e478090dbc3f3edae6b8d4e977f99b45741c9
    • Opcode Fuzzy Hash: 41b4073ce2ebd13daea9055a484b9b7f58939d20fd12c2cd88eaf4db25f1ae01
    • Instruction Fuzzy Hash: AF618C71900218EFDF219FA5DC48EAEBB79FB08320F144135F911BB2A1D6719D41CB90
    APIs
    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E28D34
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E28D45
    • CharNextW.USER32(0000014E), ref: 00E28D74
    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E28DB5
    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E28DCB
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E28DDC
    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00E28DF9
    • SetWindowTextW.USER32(?,0000014E), ref: 00E28E45
    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00E28E5B
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E28E8C
    • _memset.LIBCMT ref: 00E28EB1
    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00E28EFA
    • _memset.LIBCMT ref: 00E28F59
    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E28F83
    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E28FDB
    • SendMessageW.USER32(?,0000133D,?,?), ref: 00E29088
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00E290AA
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E290F4
    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E29121
    • DrawMenuBar.USER32(?), ref: 00E29130
    • SetWindowTextW.USER32(?,0000014E), ref: 00E29158
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
    • String ID: 0
    • API String ID: 1073566785-4108050209
    • Opcode ID: bed4d4f21ab8a08cf3405ba36e843f58ccd10b85722755f0d3cc3cb88ff52879
    • Instruction ID: 60cd5a9f9396b5ac859b290d1da0696e86326dd9d3d6f67ba974b2b515fb6586
    • Opcode Fuzzy Hash: bed4d4f21ab8a08cf3405ba36e843f58ccd10b85722755f0d3cc3cb88ff52879
    • Instruction Fuzzy Hash: B9E1B370901229AFDF209F51DC84EEE7BB9EF05714F00916AF915BB291DB708A85DF60
    APIs
    • GetCursorPos.USER32(?), ref: 00E24C51
    • GetDesktopWindow.USER32 ref: 00E24C66
    • GetWindowRect.USER32(00000000), ref: 00E24C6D
    • GetWindowLongW.USER32(?,000000F0), ref: 00E24CCF
    • DestroyWindow.USER32(?), ref: 00E24CFB
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E24D24
    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E24D42
    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00E24D68
    • SendMessageW.USER32(?,00000421,?,?), ref: 00E24D7D
    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00E24D90
    • IsWindowVisible.USER32(?), ref: 00E24DB0
    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00E24DCB
    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00E24DDF
    • GetWindowRect.USER32(?,?), ref: 00E24DF7
    • MonitorFromPoint.USER32(?,?,00000002), ref: 00E24E1D
    • GetMonitorInfoW.USER32(00000000,?), ref: 00E24E37
    • CopyRect.USER32(?,?), ref: 00E24E4E
    • SendMessageW.USER32(?,00000412,00000000), ref: 00E24EB9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
    • String ID: ($0$tooltips_class32
    • API String ID: 698492251-4156429822
    • Opcode ID: 25478bb10ce56a98f3519a19e86d0ed0feb6f1e106b4fceae2d727b6a6af31e4
    • Instruction ID: 2d9645e9c4e9f6e99d3d1bd4eb50e4a51eac0955a1b463e408e90412fff7f4bd
    • Opcode Fuzzy Hash: 25478bb10ce56a98f3519a19e86d0ed0feb6f1e106b4fceae2d727b6a6af31e4
    • Instruction Fuzzy Hash: F6B18BB1604350AFDB14DF25D845B6ABBE4FF89714F00892CF599AB2A1D770EC05CBA1
    APIs
    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DA28BC
    • GetSystemMetrics.USER32(00000007), ref: 00DA28C4
    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DA28EF
    • GetSystemMetrics.USER32(00000008), ref: 00DA28F7
    • GetSystemMetrics.USER32(00000004), ref: 00DA291C
    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00DA2939
    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00DA2949
    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00DA297C
    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00DA2990
    • GetClientRect.USER32(00000000,000000FF), ref: 00DA29AE
    • GetStockObject.GDI32(00000011), ref: 00DA29CA
    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA29D5
      • Part of subcall function 00DA2344: GetCursorPos.USER32(?), ref: 00DA2357
      • Part of subcall function 00DA2344: ScreenToClient.USER32(00E667B0,?), ref: 00DA2374
      • Part of subcall function 00DA2344: GetAsyncKeyState.USER32(00000001), ref: 00DA2399
      • Part of subcall function 00DA2344: GetAsyncKeyState.USER32(00000002), ref: 00DA23A7
    • SetTimer.USER32(00000000,00000000,00000028,00DA1256), ref: 00DA29FC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
    • String ID: AutoIt v3 GUI
    • API String ID: 1458621304-248962490
    • Opcode ID: 2acc52a1300055179bd4476e011408ebec03fb21d673ff9349e9c3c6bb499611
    • Instruction ID: 45cc8124cc64ad49f20377c55e2bf4776f3047de72307a43923f3ba088b64244
    • Opcode Fuzzy Hash: 2acc52a1300055179bd4476e011408ebec03fb21d673ff9349e9c3c6bb499611
    • Instruction Fuzzy Hash: AFB17E71A5020AEFDB14DFADDC45BAE7BB5FB08711F108129FA15A7290CB74E845CBA0
    APIs
    • CharUpperBuffW.USER32(?,?), ref: 00E240F6
    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E241B6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharMessageSendUpper
    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
    • API String ID: 3974292440-719923060
    • Opcode ID: 849093df78615bf439863a338123b30be6c22cd6a58a05b224dd9a7ee4e44d14
    • Instruction ID: 0bf8dd318b2029253ba39d41d07c02beda04fb0845b3da44341b78c6399081e8
    • Opcode Fuzzy Hash: 849093df78615bf439863a338123b30be6c22cd6a58a05b224dd9a7ee4e44d14
    • Instruction Fuzzy Hash: 9FA1AF70214315DBCB14EF20D852E6AB7A5FF85314F14986CB896AB6E2DB30ED09CB71
    APIs
    • LoadCursorW.USER32(00000000,00007F89), ref: 00E15309
    • LoadCursorW.USER32(00000000,00007F8A), ref: 00E15314
    • LoadCursorW.USER32(00000000,00007F00), ref: 00E1531F
    • LoadCursorW.USER32(00000000,00007F03), ref: 00E1532A
    • LoadCursorW.USER32(00000000,00007F8B), ref: 00E15335
    • LoadCursorW.USER32(00000000,00007F01), ref: 00E15340
    • LoadCursorW.USER32(00000000,00007F81), ref: 00E1534B
    • LoadCursorW.USER32(00000000,00007F88), ref: 00E15356
    • LoadCursorW.USER32(00000000,00007F80), ref: 00E15361
    • LoadCursorW.USER32(00000000,00007F86), ref: 00E1536C
    • LoadCursorW.USER32(00000000,00007F83), ref: 00E15377
    • LoadCursorW.USER32(00000000,00007F85), ref: 00E15382
    • LoadCursorW.USER32(00000000,00007F82), ref: 00E1538D
    • LoadCursorW.USER32(00000000,00007F84), ref: 00E15398
    • LoadCursorW.USER32(00000000,00007F04), ref: 00E153A3
    • LoadCursorW.USER32(00000000,00007F02), ref: 00E153AE
    • GetCursorInfo.USER32(?), ref: 00E153BE
    • GetLastError.KERNEL32(00000001,00000000), ref: 00E153E9
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Cursor$Load$ErrorInfoLast
    • String ID:
    • API String ID: 3215588206-0
    • Opcode ID: 14d76d9662842c15da4f3333a50a700ffb1589bc47c9975f71e1f76d3fb276cd
    • Instruction ID: 7dcc968287e3484c265564cc33e455f61fa54c1c67d94a3e2c714a2e8113e6f2
    • Opcode Fuzzy Hash: 14d76d9662842c15da4f3333a50a700ffb1589bc47c9975f71e1f76d3fb276cd
    • Instruction Fuzzy Hash: 9A417470E04319AADB109FB68C498AEFFB8EF91B10B10452FE519E7290DAB89441CE61
    APIs
    • GetClassNameW.USER32(?,?,00000100), ref: 00DFAAA5
    • __swprintf.LIBCMT ref: 00DFAB46
    • _wcscmp.LIBCMT ref: 00DFAB59
    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00DFABAE
    • _wcscmp.LIBCMT ref: 00DFABEA
    • GetClassNameW.USER32(?,?,00000400), ref: 00DFAC21
    • GetDlgCtrlID.USER32(?), ref: 00DFAC73
    • GetWindowRect.USER32(?,?), ref: 00DFACA9
    • GetParent.USER32(?), ref: 00DFACC7
    • ScreenToClient.USER32(00000000), ref: 00DFACCE
    • GetClassNameW.USER32(?,?,00000100), ref: 00DFAD48
    • _wcscmp.LIBCMT ref: 00DFAD5C
    • GetWindowTextW.USER32(?,?,00000400), ref: 00DFAD82
    • _wcscmp.LIBCMT ref: 00DFAD96
      • Part of subcall function 00DC386C: _iswctype.LIBCMT ref: 00DC3874
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
    • String ID: %s%u
    • API String ID: 3744389584-679674701
    • Opcode ID: 964c40bd0cf726208129d0cacb7fb8c394a1341a38bfe4ba5ea8633900d1219f
    • Instruction ID: e87ea3cde2979bc4f2ec1a7523ffec136cecc05962d0a80cb395f3cb55f41801
    • Opcode Fuzzy Hash: 964c40bd0cf726208129d0cacb7fb8c394a1341a38bfe4ba5ea8633900d1219f
    • Instruction Fuzzy Hash: 6FA1A3B120430AAFD714DF68C884BBAB7E8FF04315F058629FA9D92550E730E945CBB2
    APIs
    • GetClassNameW.USER32(00000008,?,00000400), ref: 00DFB3DB
    • _wcscmp.LIBCMT ref: 00DFB3EC
    • GetWindowTextW.USER32(00000001,?,00000400), ref: 00DFB414
    • CharUpperBuffW.USER32(?,00000000), ref: 00DFB431
    • _wcscmp.LIBCMT ref: 00DFB44F
    • _wcsstr.LIBCMT ref: 00DFB460
    • GetClassNameW.USER32(00000018,?,00000400), ref: 00DFB498
    • _wcscmp.LIBCMT ref: 00DFB4A8
    • GetWindowTextW.USER32(00000002,?,00000400), ref: 00DFB4CF
    • GetClassNameW.USER32(00000018,?,00000400), ref: 00DFB518
    • _wcscmp.LIBCMT ref: 00DFB528
    • GetClassNameW.USER32(00000010,?,00000400), ref: 00DFB550
    • GetWindowRect.USER32(00000004,?), ref: 00DFB5B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
    • String ID: @$ThumbnailClass
    • API String ID: 1788623398-1539354611
    • Opcode ID: eb37be6c9913fc0714e245e83922375b9226c718042e6cc74c524297f6cce882
    • Instruction ID: cc57f7e61cd2c7d7469e8c9df22cd1e541957cd10baaa183125f86f7561f0093
    • Opcode Fuzzy Hash: eb37be6c9913fc0714e245e83922375b9226c718042e6cc74c524297f6cce882
    • Instruction Fuzzy Hash: 4E816C710082499FDB14DF10C985FBA7BE8EF44724F08C56AEE899A192DB34DD49CBB1
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • DragQueryPoint.SHELL32(?,?), ref: 00E2C917
      • Part of subcall function 00E2ADF1: ClientToScreen.USER32(?,?), ref: 00E2AE1A
      • Part of subcall function 00E2ADF1: GetWindowRect.USER32(?,?), ref: 00E2AE90
      • Part of subcall function 00E2ADF1: PtInRect.USER32(?,?,00E2C304), ref: 00E2AEA0
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00E2C980
    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E2C98B
    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E2C9AE
    • _wcscat.LIBCMT ref: 00E2C9DE
    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E2C9F5
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00E2CA0E
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00E2CA25
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00E2CA47
    • DragFinish.SHELL32(?), ref: 00E2CA4E
    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E2CB41
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pr
    • API String ID: 169749273-2073472848
    • Opcode ID: 3b528748ebf1b6692fa6b3adfd1b02287b2f5c0123854b45013fa77c07d5c57b
    • Instruction ID: 579b6ef94959aa07a5179f0091216ec2101bb99c8d8418d3dc17081558f137e2
    • Opcode Fuzzy Hash: 3b528748ebf1b6692fa6b3adfd1b02287b2f5c0123854b45013fa77c07d5c57b
    • Instruction Fuzzy Hash: C0614771108301AFC711EF65DC85D9FBBF8EF89750F100A2EF591A61A1DB709A49CBA2
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
    • API String ID: 1038674560-1810252412
    • Opcode ID: 038edcd38d94aaf5931758ea3ea49195247564a7dd5b0af11e5656c948b0e0bc
    • Instruction ID: c9c32e1736ece0290d738e284b1cbac971a0c2b2ae78775f213d28543124a5d3
    • Opcode Fuzzy Hash: 038edcd38d94aaf5931758ea3ea49195247564a7dd5b0af11e5656c948b0e0bc
    • Instruction Fuzzy Hash: 5031EF31A4430AE6DB14FA60CD43EFE77A4DF25761F64482AF941720D2EF61AE08C6B5
    APIs
    • LoadIconW.USER32(00000063), ref: 00DFC4D4
    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00DFC4E6
    • SetWindowTextW.USER32(?,?), ref: 00DFC4FD
    • GetDlgItem.USER32(?,000003EA), ref: 00DFC512
    • SetWindowTextW.USER32(00000000,?), ref: 00DFC518
    • GetDlgItem.USER32(?,000003E9), ref: 00DFC528
    • SetWindowTextW.USER32(00000000,?), ref: 00DFC52E
    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00DFC54F
    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00DFC569
    • GetWindowRect.USER32(?,?), ref: 00DFC572
    • SetWindowTextW.USER32(?,?), ref: 00DFC5DD
    • GetDesktopWindow.USER32 ref: 00DFC5E3
    • GetWindowRect.USER32(00000000), ref: 00DFC5EA
    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00DFC636
    • GetClientRect.USER32(?,?), ref: 00DFC643
    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00DFC668
    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00DFC693
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
    • String ID:
    • API String ID: 3869813825-0
    • Opcode ID: c3f0f91fcfb8170a507c8e0d7fb2cc8b0649f749a7b4117a66a4c0b6041a16e6
    • Instruction ID: f63be6d6223c12acc4c0bb560906cc6fff75499cec281782f74fb3327be0d29f
    • Opcode Fuzzy Hash: c3f0f91fcfb8170a507c8e0d7fb2cc8b0649f749a7b4117a66a4c0b6041a16e6
    • Instruction Fuzzy Hash: 70516F7090070DAFDB209FA9DE85B6EBBB5FF04704F014929E686A26A0C774A915CB60
    APIs
    • _memset.LIBCMT ref: 00E2A4C8
    • DestroyWindow.USER32(00000000,?), ref: 00E2A542
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E2A5BC
    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E2A5DE
    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E2A5F1
    • DestroyWindow.USER32(00000000), ref: 00E2A613
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00DA0000,00000000), ref: 00E2A64A
    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E2A663
    • GetDesktopWindow.USER32 ref: 00E2A67C
    • GetWindowRect.USER32(00000000), ref: 00E2A683
    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E2A69B
    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E2A6B3
      • Part of subcall function 00DA25DB: GetWindowLongW.USER32(?,000000EB), ref: 00DA25EC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
    • String ID: 0$tooltips_class32
    • API String ID: 1297703922-3619404913
    • Opcode ID: 0581726ec165d07b2b39ffce2e97ec1197959454446037c331f3221fb1848144
    • Instruction ID: afbefabdc545f74342f430d9733541b6dcc961c1d2dbfed7cf1ce4c83e5f142f
    • Opcode Fuzzy Hash: 0581726ec165d07b2b39ffce2e97ec1197959454446037c331f3221fb1848144
    • Instruction Fuzzy Hash: B6717C71140205AFD724CF29DC49F6677F6FB88704F08492DF986A72A0D7B1E94ACB62
    APIs
    • CharUpperBuffW.USER32(?,?), ref: 00E246AB
    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E246F6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharMessageSendUpper
    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
    • API String ID: 3974292440-4258414348
    • Opcode ID: 32d95bea196af74aa5bb68183764f90ce0c60b513db7d0993e60a8d72d1f62e4
    • Instruction ID: b0a03a409ae6e825b382aef5db78578e94e81229a40c1cdc383072a806010597
    • Opcode Fuzzy Hash: 32d95bea196af74aa5bb68183764f90ce0c60b513db7d0993e60a8d72d1f62e4
    • Instruction Fuzzy Hash: F091A174204716DFCB14EF20C451A6ABBE1EF85314F04985DF8966B7A2DB30ED4ACBA1
    APIs
    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E2BB6E
    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00E26D80,?), ref: 00E2BBCA
    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E2BC03
    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00E2BC46
    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E2BC7D
    • FreeLibrary.KERNEL32(?), ref: 00E2BC89
    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E2BC99
    • DestroyIcon.USER32(?), ref: 00E2BCA8
    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E2BCC5
    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E2BCD1
      • Part of subcall function 00DC313D: __wcsicmp_l.LIBCMT ref: 00DC31C6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
    • String ID: .dll$.exe$.icl
    • API String ID: 1212759294-1154884017
    • Opcode ID: 10903b84103b52ffe8700ac3d55c770c3c9c4b896b1657c117b8a1471d0b8474
    • Instruction ID: 4003b059dc6814c3b59048add2499391da9fb196dd39eb1960e731dacc051656
    • Opcode Fuzzy Hash: 10903b84103b52ffe8700ac3d55c770c3c9c4b896b1657c117b8a1471d0b8474
    • Instruction Fuzzy Hash: 8361D071500629BEEB24DF64DC46FBAB7B8FB08710F10412AF915E61D0DB749A94CBA0
    APIs
    • GetLocalTime.KERNEL32(?), ref: 00E0DF47
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E0DF57
    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E0DF63
    • __wsplitpath.LIBCMT ref: 00E0DFC1
    • _wcscat.LIBCMT ref: 00E0DFD9
    • _wcscat.LIBCMT ref: 00E0DFEB
    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E0E000
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0E014
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0E046
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0E067
    • _wcscpy.LIBCMT ref: 00E0E073
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E0E0B2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
    • String ID: *.*
    • API String ID: 3566783562-438819550
    • Opcode ID: 992cb4a449ed7c0781948532462d14f5897d2de7d9ec2ed775dfdf71c1e48f7c
    • Instruction ID: 560b0fca0848ed20afba3fa4906a857214e21a4e42615e651f707aceb8d33999
    • Opcode Fuzzy Hash: 992cb4a449ed7c0781948532462d14f5897d2de7d9ec2ed775dfdf71c1e48f7c
    • Instruction Fuzzy Hash: C7614C765083059FC710EF60C8549AEB7E8FF89314F04892EF989A7291DB35E945CB62
    APIs
    • LoadStringW.USER32(00000066,?,00000FFF,00E2FB78), ref: 00E0A0FC
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • LoadStringW.USER32(?,?,00000FFF,?), ref: 00E0A11E
    • __swprintf.LIBCMT ref: 00E0A177
    • __swprintf.LIBCMT ref: 00E0A190
    • _wprintf.LIBCMT ref: 00E0A246
    • _wprintf.LIBCMT ref: 00E0A264
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LoadString__swprintf_wprintf$_memmove
    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%
    • API String ID: 311963372-1048875529
    • Opcode ID: be919bdfd54b7377914e844637b8018a8c66b1ebcf313189cb22a9ad0a4170e5
    • Instruction ID: ec81889614635f6981dbd62d89c904c08490e57fd78920b9dfde325a3693a03b
    • Opcode Fuzzy Hash: be919bdfd54b7377914e844637b8018a8c66b1ebcf313189cb22a9ad0a4170e5
    • Instruction Fuzzy Hash: 7D515A7290020AAACF15EBE0DD86EEEB779EF05300F144565F505720A2EB316F99DBB1
    APIs
    • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00E09EEA
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E09F0B
    • __swprintf.LIBCMT ref: 00E09F64
    • __swprintf.LIBCMT ref: 00E09F7D
    • _wprintf.LIBCMT ref: 00E0A024
    • _wprintf.LIBCMT ref: 00E0A042
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LoadString__swprintf_wprintf$_memmove
    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
    • API String ID: 311963372-3080491070
    • Opcode ID: 57603f353d1fd16290e3558d3cd6039ec33c068591bec4ac886687ece140fd51
    • Instruction ID: 360f0129218909058d9c33df19d65823eefc2adf5ad0a8494f99d4e7f653bfd2
    • Opcode Fuzzy Hash: 57603f353d1fd16290e3558d3cd6039ec33c068591bec4ac886687ece140fd51
    • Instruction Fuzzy Hash: DE517F7190020AAACF15EBE0DD82EEEB779EF05300F140565F505720A2EB752F99DB71
    APIs
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • CharLowerBuffW.USER32(?,?), ref: 00E0A636
    • GetDriveTypeW.KERNEL32 ref: 00E0A683
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E0A6CB
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E0A702
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E0A730
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
    • API String ID: 2698844021-4113822522
    • Opcode ID: 9d6f4263929d98b48a40e635d3acc913382fcce560bdcf8da147a08199dd2144
    • Instruction ID: dfd5950e1783ec8f4e8f2558aac2ad71d692dad0c660435c519800cfb24c079e
    • Opcode Fuzzy Hash: 9d6f4263929d98b48a40e635d3acc913382fcce560bdcf8da147a08199dd2144
    • Instruction Fuzzy Hash: 54514E711043059FC700EF20C89196AB7F4FF95718F18996DF896672A1DB31EE0ACBA2
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000001,?,00DDE452,00000001,0000138C,00000001,00000001,00000001,?,00000000,00000001), ref: 00DFFDEF
    • LoadStringW.USER32(00000000,?,00DDE452,00000001), ref: 00DFFDF8
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,00DDE452,00000001,0000138C,00000001,00000001,00000001,?,00000000,00000001,00000001), ref: 00DFFE1A
    • LoadStringW.USER32(00000000,?,00DDE452,00000001), ref: 00DFFE1D
    • __swprintf.LIBCMT ref: 00DFFE6D
    • __swprintf.LIBCMT ref: 00DFFE7E
    • _wprintf.LIBCMT ref: 00DFFF27
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00DFFF3E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
    • API String ID: 984253442-2268648507
    • Opcode ID: cf5a9d2def3e63c3cfb2d077b18d633a40c38a397a84cb8605f7a207822d26bc
    • Instruction ID: 8f17ed518a8519537ea28e465548eebb1c5f902cf33d55116c7282f371c4bf4b
    • Opcode Fuzzy Hash: cf5a9d2def3e63c3cfb2d077b18d633a40c38a397a84cb8605f7a207822d26bc
    • Instruction Fuzzy Hash: 69412A7290420EAACF15EBE0DD86DEEB778EF15700F500565F605B20A2EA316F49CBB1
    APIs
    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E0A47A
    • __swprintf.LIBCMT ref: 00E0A49C
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E0A4D9
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00E0A4FE
    • _memset.LIBCMT ref: 00E0A51D
    • _wcsncpy.LIBCMT ref: 00E0A559
    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00E0A58E
    • CloseHandle.KERNEL32(00000000), ref: 00E0A599
    • RemoveDirectoryW.KERNEL32(?), ref: 00E0A5A2
    • CloseHandle.KERNEL32(00000000), ref: 00E0A5AC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
    • String ID: :$\$\??\%s
    • API String ID: 2733774712-3457252023
    • Opcode ID: 825122e8d914630bf500e56a33079df21e8bb511ca877ea8d597da0f185ec92b
    • Instruction ID: 4318197f9f77acdf524e5524dc3953ce86b4be9522745f2a1903a03786c6fb5c
    • Opcode Fuzzy Hash: 825122e8d914630bf500e56a33079df21e8bb511ca877ea8d597da0f185ec92b
    • Instruction Fuzzy Hash: CB31807650020AABDB21DFA1DC49FEB73BCEF89705F1441B6F908E21A0E67096858B35
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
    • String ID:
    • API String ID: 884005220-0
    • Opcode ID: 8e15ee2c7eb46dd0ddd1c058db17e2ca2e4034833fd4e0ae290ef60322e0be74
    • Instruction ID: 77c9087e7705ab7db0b83e9e37f66308bb99bbcc80362947a93e95e17acd643b
    • Opcode Fuzzy Hash: 8e15ee2c7eb46dd0ddd1c058db17e2ca2e4034833fd4e0ae290ef60322e0be74
    • Instruction Fuzzy Hash: 6E610572501206AFDB205F2CE841F6A77A9EF12371F19811BE801AB3D1EB75D842C7B2
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00E2BD10
    • GetFileSize.KERNEL32(00000000,00000000), ref: 00E2BD27
    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00E2BD32
    • CloseHandle.KERNEL32(00000000), ref: 00E2BD3F
    • GlobalLock.KERNEL32(00000000), ref: 00E2BD48
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00E2BD57
    • GlobalUnlock.KERNEL32(00000000), ref: 00E2BD60
    • CloseHandle.KERNEL32(00000000), ref: 00E2BD67
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00E2BD78
    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E32CAC,?), ref: 00E2BD91
    • GlobalFree.KERNEL32(00000000), ref: 00E2BDA1
    • GetObjectW.GDI32(?,00000018,000000FF), ref: 00E2BDC5
    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 00E2BDF0
    • DeleteObject.GDI32(00000000), ref: 00E2BE18
    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E2BE2E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
    • String ID:
    • API String ID: 3840717409-0
    • Opcode ID: 77dbe33fceffad81f3e19f239a738da0d41aa03f4ede4d62fe24120d610e88b8
    • Instruction ID: c1966a693a1d82eda0173e79e0be65432f266da6817379db640b642af10dd44d
    • Opcode Fuzzy Hash: 77dbe33fceffad81f3e19f239a738da0d41aa03f4ede4d62fe24120d610e88b8
    • Instruction Fuzzy Hash: 7E412A75600218EFDB219F66DC48EABBBB8FF89715F104068F905E7260D770AD46CB60
    APIs
    • __wsplitpath.LIBCMT ref: 00E0DC7B
    • _wcscat.LIBCMT ref: 00E0DC93
    • _wcscat.LIBCMT ref: 00E0DCA5
    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E0DCBA
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0DCCE
    • GetFileAttributesW.KERNEL32(?), ref: 00E0DCE6
    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00E0DD00
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0DD12
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
    • String ID: *.*
    • API String ID: 34673085-438819550
    • Opcode ID: c8bbe32b9393a9b1e59b97766de0b310f8d4d9fddc8b7c8b7f2153407bda3931
    • Instruction ID: 80fbb4a3ecf2580081006c0c265c390785db0bad35b62b52095ea20fd456edea
    • Opcode Fuzzy Hash: c8bbe32b9393a9b1e59b97766de0b310f8d4d9fddc8b7c8b7f2153407bda3931
    • Instruction Fuzzy Hash: E481A2715083459FCB20DFA4CC859AAB7E8FF89314F15982EF885E7290E630DD85CB62
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E2C4EC
    • GetFocus.USER32 ref: 00E2C4FC
    • GetDlgCtrlID.USER32(00000000), ref: 00E2C507
    • _memset.LIBCMT ref: 00E2C632
    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00E2C65D
    • GetMenuItemCount.USER32(?), ref: 00E2C67D
    • GetMenuItemID.USER32(?,00000000), ref: 00E2C690
    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00E2C6C4
    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E2C70C
    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E2C744
    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00E2C779
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
    • String ID: 0
    • API String ID: 1296962147-4108050209
    • Opcode ID: b9b1782c225fd5fdc7b8483c2b9421ff67cdcfc8586bfe865535f20f3434612b
    • Instruction ID: e516abd62e50b9e4167a4eec32add8db3d9a4666fe2df67f5dbb3025caa728c6
    • Opcode Fuzzy Hash: b9b1782c225fd5fdc7b8483c2b9421ff67cdcfc8586bfe865535f20f3434612b
    • Instruction Fuzzy Hash: 83819E701083219FD720CF25E984A6FBBE8FB88758F20152EF995A3291D771D945CBA2
    APIs
      • Part of subcall function 00DF874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DF8766
      • Part of subcall function 00DF874A: GetLastError.KERNEL32(?,00DF822A,?,?,?), ref: 00DF8770
      • Part of subcall function 00DF874A: GetProcessHeap.KERNEL32(00000008,?,?,00DF822A,?,?,?), ref: 00DF877F
      • Part of subcall function 00DF874A: HeapAlloc.KERNEL32(00000000,?,00DF822A,?,?,?), ref: 00DF8786
      • Part of subcall function 00DF874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DF879D
      • Part of subcall function 00DF87E7: GetProcessHeap.KERNEL32(00000008,00DF8240,00000000,00000000,?,00DF8240,?), ref: 00DF87F3
      • Part of subcall function 00DF87E7: HeapAlloc.KERNEL32(00000000,?,00DF8240,?), ref: 00DF87FA
      • Part of subcall function 00DF87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00DF8240,?), ref: 00DF880B
    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DF8458
    • _memset.LIBCMT ref: 00DF846D
    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DF848C
    • GetLengthSid.ADVAPI32(?), ref: 00DF849D
    • GetAce.ADVAPI32(?,00000000,?), ref: 00DF84DA
    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DF84F6
    • GetLengthSid.ADVAPI32(?), ref: 00DF8513
    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00DF8522
    • HeapAlloc.KERNEL32(00000000), ref: 00DF8529
    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DF854A
    • CopySid.ADVAPI32(00000000), ref: 00DF8551
    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DF8582
    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DF85A8
    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DF85BC
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
    • String ID:
    • API String ID: 3996160137-0
    • Opcode ID: 61c93a56b8d32a901146b614c5e9dc5a50c7d9935048e099ca623ccd338c0354
    • Instruction ID: b3293bfe7981391cca183b641d0dd1b3cfeab99e730be9555075eebed7c1bd34
    • Opcode Fuzzy Hash: 61c93a56b8d32a901146b614c5e9dc5a50c7d9935048e099ca623ccd338c0354
    • Instruction Fuzzy Hash: FA614571A0020AAFDF10DFA5DC45EBEBBB9FF05300F148169EA15AB291DB319A05DF61
    APIs
    • GetDC.USER32(00000000), ref: 00E176A2
    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00E176AE
    • CreateCompatibleDC.GDI32(?), ref: 00E176BA
    • SelectObject.GDI32(00000000,?), ref: 00E176C7
    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00E1771B
    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00E17757
    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00E1777B
    • SelectObject.GDI32(00000006,?), ref: 00E17783
    • DeleteObject.GDI32(?), ref: 00E1778C
    • DeleteDC.GDI32(00000006), ref: 00E17793
    • ReleaseDC.USER32(00000000,?), ref: 00E1779E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
    • String ID: (
    • API String ID: 2598888154-3887548279
    • Opcode ID: 66aff1b4a83a6cf5348101337e8372728c6e7fe1c4e8487c18c4e20c71085822
    • Instruction ID: e54fe355e749f22df6be44d03ef879cc94a8e918e0ec141dbcff46596e4ad949
    • Opcode Fuzzy Hash: 66aff1b4a83a6cf5348101337e8372728c6e7fe1c4e8487c18c4e20c71085822
    • Instruction Fuzzy Hash: 6C516B75904209EFCB25CFA9CC84EEEBBB9EF48710F14852DF989A7210D731A845CB60
    APIs
      • Part of subcall function 00E091E9: __time64.LIBCMT ref: 00E091F3
      • Part of subcall function 00DA5045: _fseek.LIBCMT ref: 00DA505D
    • __wsplitpath.LIBCMT ref: 00E094BE
      • Part of subcall function 00DC432E: __wsplitpath_helper.LIBCMT ref: 00DC436E
    • _wcscpy.LIBCMT ref: 00E094D1
    • _wcscat.LIBCMT ref: 00E094E4
    • __wsplitpath.LIBCMT ref: 00E09509
    • _wcscat.LIBCMT ref: 00E0951F
    • _wcscat.LIBCMT ref: 00E09532
      • Part of subcall function 00E0922F: _memmove.LIBCMT ref: 00E09268
      • Part of subcall function 00E0922F: _memmove.LIBCMT ref: 00E09277
    • _wcscmp.LIBCMT ref: 00E09479
      • Part of subcall function 00E099BE: _wcscmp.LIBCMT ref: 00E09AAE
      • Part of subcall function 00E099BE: _wcscmp.LIBCMT ref: 00E09AC1
    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00E096DC
    • _wcsncpy.LIBCMT ref: 00E0974F
    • DeleteFileW.KERNEL32(?,?), ref: 00E09785
    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E0979B
    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E097AC
    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E097BE
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
    • String ID:
    • API String ID: 1500180987-0
    • Opcode ID: 67f3b4a8dea324878566ae2a671ee3d5df679a2c19951ea39ac5c4451baea942
    • Instruction ID: 35391fc416b6abf5e7f2d4a055c95e47a67d14ec0c3ddc5c2e272b10cd94061e
    • Opcode Fuzzy Hash: 67f3b4a8dea324878566ae2a671ee3d5df679a2c19951ea39ac5c4451baea942
    • Instruction Fuzzy Hash: D7C11AB1900219AADF21DF95DC85EDEB7BDEF45310F0040AAF609F7192DB709A848F65
    APIs
      • Part of subcall function 00DC0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00DA6C6C,?,00008000), ref: 00DC0BB7
      • Part of subcall function 00DA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA48A1,?,?,00DA37C0,?), ref: 00DA48CE
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00DA6D0D
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00DA6E5A
      • Part of subcall function 00DA59CD: _wcscpy.LIBCMT ref: 00DA5A05
      • Part of subcall function 00DC387D: _iswctype.LIBCMT ref: 00DC3885
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
    • API String ID: 537147316-1018226102
    • Opcode ID: a3bb9c55212625a4162577a17b71acb633b11eea5ae33b56d42e700e10c41fad
    • Instruction ID: b087474402b6438d44d5cd8630b23900a8995dfae7503c9666b6e9eec35f79f3
    • Opcode Fuzzy Hash: a3bb9c55212625a4162577a17b71acb633b11eea5ae33b56d42e700e10c41fad
    • Instruction Fuzzy Hash: 6D025E711083419FC724EF24C891AAFBBE5EF96354F08491EF496972A1DB30D949CB72
    APIs
    • _memset.LIBCMT ref: 00DA45F9
    • GetMenuItemCount.USER32(00E66890), ref: 00DDD7CD
    • GetMenuItemCount.USER32(00E66890), ref: 00DDD87D
    • GetCursorPos.USER32(?), ref: 00DDD8C1
    • SetForegroundWindow.USER32(00000000), ref: 00DDD8CA
    • TrackPopupMenuEx.USER32(00E66890,00000000,?,00000000,00000000,00000000), ref: 00DDD8DD
    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DDD8E9
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
    • String ID:
    • API String ID: 2751501086-0
    • Opcode ID: c407387739e90e293c5ae1479b946a12642342774861f24092f4dbf49092806c
    • Instruction ID: 05a7dc5dcaf9f1d448b711e9ade43c9afe31b827d4297e8c48d45b8357f4e4a6
    • Opcode Fuzzy Hash: c407387739e90e293c5ae1479b946a12642342774861f24092f4dbf49092806c
    • Instruction Fuzzy Hash: 7C71F470640205BEEF318F65DC49FAABFA5FF45364F280226F515662E0C7B1AC50DBA1
    APIs
    • VariantInit.OLEAUT32(?), ref: 00E18BEC
    • CoInitialize.OLE32(00000000), ref: 00E18C19
    • CoUninitialize.OLE32 ref: 00E18C23
    • GetRunningObjectTable.OLE32(00000000,?), ref: 00E18D23
    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00E18E50
    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00E32C0C), ref: 00E18E84
    • CoGetObject.OLE32(?,00000000,00E32C0C,?), ref: 00E18EA7
    • SetErrorMode.KERNEL32(00000000), ref: 00E18EBA
    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00E18F3A
    • VariantClear.OLEAUT32(?), ref: 00E18F4A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
    • String ID: ,,
    • API String ID: 2395222682-1556401989
    • Opcode ID: e27ef84fbba10fc0a1631d12d12f1456bfb122c39b9fb7ee4d5b1beb7691ece0
    • Instruction ID: 3f101b7daf14d3c316d1290aa92f8770dc961a3a2960897f274344d97eb39ba6
    • Opcode Fuzzy Hash: e27ef84fbba10fc0a1631d12d12f1456bfb122c39b9fb7ee4d5b1beb7691ece0
    • Instruction Fuzzy Hash: 44C15670204305AFC704DF24C9849ABBBE9FF89308F00596DF58AAB251DB31ED46CB62
    APIs
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    • _memset.LIBCMT ref: 00DF7DB3
    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00DF7DE8
    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00DF7E04
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00DF7E20
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00DF7E4A
    • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00DF7E72
    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DF7E7D
    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DF7E82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
    • API String ID: 1411258926-22481851
    • Opcode ID: 30a2c0e7a7c32eec77045442fd935775c14c923fc3bafc177288bb11a660f022
    • Instruction ID: 3f74d9088745008b8d2dc189507007d25fc84cca14b910220be54be1c672d360
    • Opcode Fuzzy Hash: 30a2c0e7a7c32eec77045442fd935775c14c923fc3bafc177288bb11a660f022
    • Instruction Fuzzy Hash: 0041F672C1422DABDB21EBA4DC85DEEB778FF08700B444569F915A7161EA305E09CBA0
    APIs
    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E20038,?,?), ref: 00E210BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharUpper
    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
    • API String ID: 3964851224-909552448
    • Opcode ID: 3d8dbda77b76c0f3c3d48d85c2c7b5e91a9714301e13450f783d34703b537915
    • Instruction ID: 7a047e1218a2b9cd4dbca002fa0788b93cc80446d684d372a80fe031c6d84780
    • Opcode Fuzzy Hash: 3d8dbda77b76c0f3c3d48d85c2c7b5e91a9714301e13450f783d34703b537915
    • Instruction Fuzzy Hash: 17415E3110125ACBCF11EF90ED91AEA3724EF61344F505498FC926B692DB70AF1ACB70
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DDE6C9,00000010,?,Bad directive syntax error,00E2F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00DFFCD2
    • LoadStringW.USER32(00000000,?,00DDE6C9,00000010), ref: 00DFFCD9
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • _wprintf.LIBCMT ref: 00DFFD0C
    • __swprintf.LIBCMT ref: 00DFFD2E
    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00DFFD9D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
    • API String ID: 1506413516-4153970271
    • Opcode ID: b65d6eb5c03defddeb53fe30233697972877eda0c5b52ded2b560484ffcc8436
    • Instruction ID: bbe1a423bd2880eef1c81fadda730dda0b9e541caccb0a78aa26a5bba71939d2
    • Opcode Fuzzy Hash: b65d6eb5c03defddeb53fe30233697972877eda0c5b52ded2b560484ffcc8436
    • Instruction Fuzzy Hash: AE215C3294021EEBCF22EB90CC46EEE7779FF14300F044869F505660A2EA719A59DB70
    APIs
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
      • Part of subcall function 00DA7A84: _memmove.LIBCMT ref: 00DA7B0D
    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E055D2
    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E055E8
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E055F9
    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E0560B
    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E0561C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: SendString$_memmove
    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
    • API String ID: 2279737902-1007645807
    • Opcode ID: 453e9ddc37eb3929e15c0fa7111adec9b43c51bca0d3eff1530c5a51db4cc1ef
    • Instruction ID: e3ea4d0a1a8e925967a5727295f102a5e4056e7c7bd1d09554c6b182d1f39688
    • Opcode Fuzzy Hash: 453e9ddc37eb3929e15c0fa7111adec9b43c51bca0d3eff1530c5a51db4cc1ef
    • Instruction Fuzzy Hash: 5911C42169026979D720B761DC4ADFF7B7CEF92B04F481979B801B20D1EE611E49C9B1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
    • String ID: 0.0.0.0
    • API String ID: 208665112-3771769585
    • Opcode ID: abac8fed05c0a7c6e263cbb34cfb4f2a7eef1d90d2a52c4c7cce8a0b21348d71
    • Instruction ID: f0bb5ddbcad792a0e82404107c5be0b557c50dab105c23603f18df0e63d72738
    • Opcode Fuzzy Hash: abac8fed05c0a7c6e263cbb34cfb4f2a7eef1d90d2a52c4c7cce8a0b21348d71
    • Instruction Fuzzy Hash: FD11F3B190421AAFCB24AB619D4AEEB77BCDF81710F04017AF504B20D1EF709AC59AB1
    APIs
    • timeGetTime.WINMM ref: 00E0521C
      • Part of subcall function 00DC0719: timeGetTime.WINMM(?,75C0B400,00DB0FF9), ref: 00DC071D
    • Sleep.KERNEL32(0000000A), ref: 00E05248
    • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00E0526C
    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00E0528E
    • SetActiveWindow.USER32 ref: 00E052AD
    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E052BB
    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E052DA
    • Sleep.KERNEL32(000000FA), ref: 00E052E5
    • IsWindow.USER32 ref: 00E052F1
    • EndDialog.USER32(00000000), ref: 00E05302
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
    • String ID: BUTTON
    • API String ID: 1194449130-3405671355
    • Opcode ID: c6720094ae48506f108455e1bb85977d2b7e1243988969083fef315021b1a158
    • Instruction ID: 833022680c8c1badac9a5d0b9e1267ef129bbbbeb697451d6cf1208fae10f80e
    • Opcode Fuzzy Hash: c6720094ae48506f108455e1bb85977d2b7e1243988969083fef315021b1a158
    • Instruction Fuzzy Hash: F8218E71204705AFE7105B62FD89E273B7AEB4538EF042478F402B11F1DBA59C898A61
    APIs
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • CoInitialize.OLE32(00000000), ref: 00E0D855
    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E0D8E8
    • SHGetDesktopFolder.SHELL32(?), ref: 00E0D8FC
    • CoCreateInstance.OLE32(00E32D7C,00000000,00000001,00E5A89C,?), ref: 00E0D948
    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E0D9B7
    • CoTaskMemFree.OLE32(?,?), ref: 00E0DA0F
    • _memset.LIBCMT ref: 00E0DA4C
    • SHBrowseForFolderW.SHELL32(?), ref: 00E0DA88
    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E0DAAB
    • CoTaskMemFree.OLE32(00000000), ref: 00E0DAB2
    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00E0DAE9
    • CoUninitialize.OLE32(00000001,00000000), ref: 00E0DAEB
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
    • String ID:
    • API String ID: 1246142700-0
    • Opcode ID: bf2352c2e41ccb91c33a4ca80be53e54a73cf7f2214fb239fae2c271efd1c711
    • Instruction ID: a7a3e730b328faf8dbea06e561268c0e0e1c2bdb51141dbf460dd18918f06672
    • Opcode Fuzzy Hash: bf2352c2e41ccb91c33a4ca80be53e54a73cf7f2214fb239fae2c271efd1c711
    • Instruction Fuzzy Hash: 6DB1FB75A00109AFDB14DFA4CC98DAEBBB9FF49314B048469F909EB261DB30ED45CB60
    APIs
    • GetKeyboardState.USER32(?), ref: 00E005A7
    • SetKeyboardState.USER32(?), ref: 00E00612
    • GetAsyncKeyState.USER32(000000A0), ref: 00E00632
    • GetKeyState.USER32(000000A0), ref: 00E00649
    • GetAsyncKeyState.USER32(000000A1), ref: 00E00678
    • GetKeyState.USER32(000000A1), ref: 00E00689
    • GetAsyncKeyState.USER32(00000011), ref: 00E006B5
    • GetKeyState.USER32(00000011), ref: 00E006C3
    • GetAsyncKeyState.USER32(00000012), ref: 00E006EC
    • GetKeyState.USER32(00000012), ref: 00E006FA
    • GetAsyncKeyState.USER32(0000005B), ref: 00E00723
    • GetKeyState.USER32(0000005B), ref: 00E00731
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: d78861ca4b1d0b5fe977bd6b7e4f167cd635ba03cc1d015ab70d3ac5ac696098
    • Instruction ID: ef134e9990d86f391fc77e391946a96d61d4fa41d6d0a197c1bce5bc77a6d19a
    • Opcode Fuzzy Hash: d78861ca4b1d0b5fe977bd6b7e4f167cd635ba03cc1d015ab70d3ac5ac696098
    • Instruction Fuzzy Hash: 98511B30A0478429FB35EBB088547EABFF59F11384F08559AD5C27B5C2DA649BCCCB62
    APIs
    • GetDlgItem.USER32(?,00000001), ref: 00DFC746
    • GetWindowRect.USER32(00000000,?), ref: 00DFC758
    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00DFC7B6
    • GetDlgItem.USER32(?,00000002), ref: 00DFC7C1
    • GetWindowRect.USER32(00000000,?), ref: 00DFC7D3
    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00DFC827
    • GetDlgItem.USER32(?,000003E9), ref: 00DFC835
    • GetWindowRect.USER32(00000000,?), ref: 00DFC846
    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00DFC889
    • GetDlgItem.USER32(?,000003EA), ref: 00DFC897
    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00DFC8B4
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00DFC8C1
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$ItemMoveRect$Invalidate
    • String ID:
    • API String ID: 3096461208-0
    • Opcode ID: b9e423c703ea8b626ebf004fe66a19c11e40265cc47d7b06d23285d1b39cbdf2
    • Instruction ID: a6e2d96d68d212cc4c6ee2deced2fca9fa0dde1780cc6751dda59f5f2ff85460
    • Opcode Fuzzy Hash: b9e423c703ea8b626ebf004fe66a19c11e40265cc47d7b06d23285d1b39cbdf2
    • Instruction Fuzzy Hash: 9F515071B10209AFDB18CF69DD89AAEBBB6FB88710F14813DF615E7290D7709D048B50
    APIs
      • Part of subcall function 00DA1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DA2036,?,00000000,?,?,?,?,00DA16CB,00000000,?), ref: 00DA1B9A
    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00DA20D3
    • KillTimer.USER32(-00000001,?,?,?,?,00DA16CB,00000000,?,?,00DA1AE2,?,?), ref: 00DA216E
    • DestroyAcceleratorTable.USER32(00000000), ref: 00DDBEF6
    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DA16CB,00000000,?,?,00DA1AE2,?,?), ref: 00DDBF27
    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DA16CB,00000000,?,?,00DA1AE2,?,?), ref: 00DDBF3E
    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DA16CB,00000000,?,?,00DA1AE2,?,?), ref: 00DDBF5A
    • DeleteObject.GDI32(00000000), ref: 00DDBF6C
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
    • String ID:
    • API String ID: 641708696-0
    • Opcode ID: e4eb8ec7209be542e6dae67dcb72566e6d9c13981bba81b675074bbeb5f24530
    • Instruction ID: 176ac3907f4a177db144097c0c94629d4f6e586b0b7b7073f56a891f3c88ee8f
    • Opcode Fuzzy Hash: e4eb8ec7209be542e6dae67dcb72566e6d9c13981bba81b675074bbeb5f24530
    • Instruction Fuzzy Hash: D0618930110710DFCB399F2AED48B3AB7B1FF41316F14442AE58267A60C7B2A895DFA0
    APIs
      • Part of subcall function 00DA25DB: GetWindowLongW.USER32(?,000000EB), ref: 00DA25EC
    • GetSysColor.USER32(0000000F), ref: 00DA21D3
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ColorLongWindow
    • String ID:
    • API String ID: 259745315-0
    • Opcode ID: 7407d2042c586e427d9b2844fa7cde70789c72cb78c87ff41492d0566029efce
    • Instruction ID: 97da7114eacf09d9db23e95c213854d84b74380769a008e049438c79429f0095
    • Opcode Fuzzy Hash: 7407d2042c586e427d9b2844fa7cde70789c72cb78c87ff41492d0566029efce
    • Instruction Fuzzy Hash: 3541AF31000250AEDB255F2EEC88BB93B76EB07331F584266FD659A2E2C7318C46DB75
    APIs
    • CharLowerBuffW.USER32(?,?,00E2F910), ref: 00E0AB76
    • GetDriveTypeW.KERNEL32(00000061,00E5A620,00000061), ref: 00E0AC40
    • _wcscpy.LIBCMT ref: 00E0AC6A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharDriveLowerType_wcscpy
    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
    • API String ID: 2820617543-1000479233
    • Opcode ID: 05bb415b594b27f22d7fc68049f544ea956a31861c1ae5209a3f07aeb53bb29a
    • Instruction ID: 3fe68109006f85a23db6b4a0a6cc24c82f905954004fd92519fc29334115c5d5
    • Opcode Fuzzy Hash: 05bb415b594b27f22d7fc68049f544ea956a31861c1ae5209a3f07aeb53bb29a
    • Instruction Fuzzy Hash: 8D519E311083059BC710EF14C892EAAB7A5EF95305F18592DF496672E2DB31DE89CB63
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
      • Part of subcall function 00DA2344: GetCursorPos.USER32(?), ref: 00DA2357
      • Part of subcall function 00DA2344: ScreenToClient.USER32(00E667B0,?), ref: 00DA2374
      • Part of subcall function 00DA2344: GetAsyncKeyState.USER32(00000001), ref: 00DA2399
      • Part of subcall function 00DA2344: GetAsyncKeyState.USER32(00000002), ref: 00DA23A7
    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00E2C2E4
    • ImageList_EndDrag.COMCTL32 ref: 00E2C2EA
    • ReleaseCapture.USER32 ref: 00E2C2F0
    • SetWindowTextW.USER32(?,00000000), ref: 00E2C39A
    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E2C3AD
    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00E2C48F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
    • String ID: @GUI_DRAGFILE$@GUI_DROPID$pr$pr
    • API String ID: 1924731296-488423084
    • Opcode ID: c43ca060155e51ffc77a36ed0c7023cbd4f1fac15e39a9c636ca2128b8134736
    • Instruction ID: fe311d3d4645d0df071c879ab0e6cb70bc47f54018a6e7869754589153529755
    • Opcode Fuzzy Hash: c43ca060155e51ffc77a36ed0c7023cbd4f1fac15e39a9c636ca2128b8134736
    • Instruction Fuzzy Hash: 8651AC70204304AFD714EF24EC56F6B7BE5EB88314F10492DF991AB2E1DB70A948CB62
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __i64tow__itow__swprintf
    • String ID: %.15g$0x%p$False$True
    • API String ID: 421087845-2263619337
    • Opcode ID: cb41cb106d90ca519aec4fed7852c35c5f65956e890ca3f45a137296fe90c033
    • Instruction ID: 5063a59a3a907cceead6de09bfc788af62a3d35995f387df5b85bfaea458ee93
    • Opcode Fuzzy Hash: cb41cb106d90ca519aec4fed7852c35c5f65956e890ca3f45a137296fe90c033
    • Instruction Fuzzy Hash: 0B41B471A04206AEDB249B74DC52F7AB7E8EF45300F24486FF58AD7291EA71D9428F31
    APIs
    • _memset.LIBCMT ref: 00E273D9
    • CreateMenu.USER32 ref: 00E273F4
    • SetMenu.USER32(?,00000000), ref: 00E27403
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E27490
    • IsMenu.USER32(?), ref: 00E274A6
    • CreatePopupMenu.USER32 ref: 00E274B0
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E274DD
    • DrawMenuBar.USER32 ref: 00E274E5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
    • String ID: 0$F
    • API String ID: 176399719-3044882817
    • Opcode ID: a7eed64dfe781c32da2551ef16336b640a279ae477ce2f861e5be01aec5800b7
    • Instruction ID: 2b0fec9b036f1e1fe7429fa04ca34e55b0f94f2dc564d506bbc7438592a33b92
    • Opcode Fuzzy Hash: a7eed64dfe781c32da2551ef16336b640a279ae477ce2f861e5be01aec5800b7
    • Instruction Fuzzy Hash: A9416874A00215EFDB20EF65E884E9ABBB9FF49305F144029E955A7360D730AD14CB60
    APIs
    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00E277CD
    • CreateCompatibleDC.GDI32(00000000), ref: 00E277D4
    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00E277E7
    • SelectObject.GDI32(00000000,00000000), ref: 00E277EF
    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E277FA
    • DeleteDC.GDI32(00000000), ref: 00E27803
    • GetWindowLongW.USER32(?,000000EC), ref: 00E2780D
    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00E27821
    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00E2782D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
    • String ID: static
    • API String ID: 2559357485-2160076837
    • Opcode ID: afc592e8e233d629e17d4ad09360043c5190dd355f78f608bf0ccb3eab13de3d
    • Instruction ID: 895e8f32a47957a26f9c429fda923c7355bfbc01ba32748af2ca16b98ef6872e
    • Opcode Fuzzy Hash: afc592e8e233d629e17d4ad09360043c5190dd355f78f608bf0ccb3eab13de3d
    • Instruction Fuzzy Hash: 54318A32105225AFDF269FA5EC08FDA3B79FF09725F100225FA55B60A0C771D826DBA4
    APIs
    • _memset.LIBCMT ref: 00DC707B
      • Part of subcall function 00DC8D68: __getptd_noexit.LIBCMT ref: 00DC8D68
    • __gmtime64_s.LIBCMT ref: 00DC7114
    • __gmtime64_s.LIBCMT ref: 00DC714A
    • __gmtime64_s.LIBCMT ref: 00DC7167
    • __allrem.LIBCMT ref: 00DC71BD
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DC71D9
    • __allrem.LIBCMT ref: 00DC71F0
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DC720E
    • __allrem.LIBCMT ref: 00DC7225
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DC7243
    • __invoke_watson.LIBCMT ref: 00DC72B4
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
    • String ID:
    • API String ID: 384356119-0
    • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
    • Instruction ID: a41ef6f5b1172ee23da77fb4910e8d639b9f7bf6b9845ea26cdc11fb0fbc11b3
    • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
    • Instruction Fuzzy Hash: 1E718171A04717ABD7149EB9CC42F5AB3B8EF14324F18422EF914E7281E770D9409BB4
    APIs
    • _memset.LIBCMT ref: 00E02A31
    • GetMenuItemInfoW.USER32(00E66890,000000FF,00000000,00000030), ref: 00E02A92
    • SetMenuItemInfoW.USER32(00E66890,00000004,00000000,00000030), ref: 00E02AC8
    • Sleep.KERNEL32(000001F4), ref: 00E02ADA
    • GetMenuItemCount.USER32(?), ref: 00E02B1E
    • GetMenuItemID.USER32(?,00000000), ref: 00E02B3A
    • GetMenuItemID.USER32(?,-00000001), ref: 00E02B64
    • GetMenuItemID.USER32(?,?), ref: 00E02BA9
    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E02BEF
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E02C03
    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E02C24
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
    • String ID:
    • API String ID: 4176008265-0
    • Opcode ID: 15dd2c451c87ebff82e9db6234328e25b4ad35fd3e27b9a6f86b90c374a66f1e
    • Instruction ID: 50ad492079984903d47f93e242f95fee9c0cd48e2ce28ad678d52cbfc2962484
    • Opcode Fuzzy Hash: 15dd2c451c87ebff82e9db6234328e25b4ad35fd3e27b9a6f86b90c374a66f1e
    • Instruction Fuzzy Hash: 096193B0900249AFDB21CF54DC8CEAEBBF8EB41348F14556DE941B7291D771AD89DB20
    APIs
    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E27214
    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E27217
    • GetWindowLongW.USER32(?,000000F0), ref: 00E2723B
    • _memset.LIBCMT ref: 00E2724C
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E2725E
    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E272D6
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$LongWindow_memset
    • String ID:
    • API String ID: 830647256-0
    • Opcode ID: 8e7bcdc3aa7d8f9bc94e676018754f4f6bd7abb1cd3fc7474e266c9106694ad5
    • Instruction ID: 811881aae3768013b56d1e9c045bcb68593fb4b5c4bd8d04aca19e032dc6f5d2
    • Opcode Fuzzy Hash: 8e7bcdc3aa7d8f9bc94e676018754f4f6bd7abb1cd3fc7474e266c9106694ad5
    • Instruction Fuzzy Hash: 60617975A00218AFDB10DFA4DC81EEE77F8EB09704F14016AFA55B72A1C770AD45DBA0
    APIs
    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00DF7135
    • SafeArrayAllocData.OLEAUT32(?), ref: 00DF718E
    • VariantInit.OLEAUT32(?), ref: 00DF71A0
    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00DF71C0
    • VariantCopy.OLEAUT32(?,?), ref: 00DF7213
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00DF7227
    • VariantClear.OLEAUT32(?), ref: 00DF723C
    • SafeArrayDestroyData.OLEAUT32(?), ref: 00DF7249
    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DF7252
    • VariantClear.OLEAUT32(?), ref: 00DF7264
    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DF726F
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
    • String ID:
    • API String ID: 2706829360-0
    • Opcode ID: 2564069eceb59684666df93146efb5557474a3c4621ed0ed10c2273bf1c77368
    • Instruction ID: 2e3ed7ede0fd29145869ff9233bc9aee55022197012a0ed3a4a5b44dc60c070e
    • Opcode Fuzzy Hash: 2564069eceb59684666df93146efb5557474a3c4621ed0ed10c2273bf1c77368
    • Instruction Fuzzy Hash: A3414235A0421DAFCB10EF65D8449EEBBB9FF08354F018075F955A7261DB70AA46CBA0
    APIs
    • WSAStartup.WSOCK32(00000101,?), ref: 00E15AA6
    • inet_addr.WSOCK32(?,?,?), ref: 00E15AEB
    • gethostbyname.WSOCK32(?), ref: 00E15AF7
    • IcmpCreateFile.IPHLPAPI ref: 00E15B05
    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E15B75
    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E15B8B
    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00E15C00
    • WSACleanup.WSOCK32 ref: 00E15C06
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
    • String ID: Ping
    • API String ID: 1028309954-2246546115
    • Opcode ID: d8962ba1b456aab070b044952a7029cd256009c1a5274a6e0d90bbbaca531a33
    • Instruction ID: a28eb98e2da0a39a0a5c18afaeda55ce6f42387bf254af16599037c1af05a728
    • Opcode Fuzzy Hash: d8962ba1b456aab070b044952a7029cd256009c1a5274a6e0d90bbbaca531a33
    • Instruction Fuzzy Hash: FC519032608700DFDB209F25DC45FAAB7E4EF85714F14892AF556EB2A1DB70E844CB61
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00E0B73B
    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E0B7B1
    • GetLastError.KERNEL32 ref: 00E0B7BB
    • SetErrorMode.KERNEL32(00000000,READY), ref: 00E0B828
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Error$Mode$DiskFreeLastSpace
    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
    • API String ID: 4194297153-14809454
    • Opcode ID: 35b61ccb0e9f24e06db709d92008d73b642568d86cf71b18158e6b816158f8bd
    • Instruction ID: 27ab4a18c9107c35cac1ebda6682e0cd0ac6c463bcc3ba8982b74d8ed407ec01
    • Opcode Fuzzy Hash: 35b61ccb0e9f24e06db709d92008d73b642568d86cf71b18158e6b816158f8bd
    • Instruction Fuzzy Hash: 85318335A002059FDB14EF64C885AAEB7B4FF45704F18912AE902F72D1DB719986C761
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00DFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00DFB0E7
    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00DF94F6
    • GetDlgCtrlID.USER32 ref: 00DF9501
    • GetParent.USER32 ref: 00DF951D
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DF9520
    • GetDlgCtrlID.USER32(?), ref: 00DF9529
    • GetParent.USER32(?), ref: 00DF9545
    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00DF9548
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$ClassName_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 1536045017-1403004172
    • Opcode ID: 8fab58faf4baf67fd56f9cc964193efdce0ba08192371503ecfe7a11b42e055f
    • Instruction ID: 2875d11cebcc301c13e290b58df63d648f760598114f71e2ff17e4ccd665c3ea
    • Opcode Fuzzy Hash: 8fab58faf4baf67fd56f9cc964193efdce0ba08192371503ecfe7a11b42e055f
    • Instruction Fuzzy Hash: A521A170E00208AFCF05AB65CC95EFEBB74EF45310F114125FA61A72A2DB7599199B70
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00DFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00DFB0E7
    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00DF95DF
    • GetDlgCtrlID.USER32 ref: 00DF95EA
    • GetParent.USER32 ref: 00DF9606
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DF9609
    • GetDlgCtrlID.USER32(?), ref: 00DF9612
    • GetParent.USER32(?), ref: 00DF962E
    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00DF9631
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$ClassName_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 1536045017-1403004172
    • Opcode ID: 0ccc25e1afda433c71b61b160e700f462918f3458ed904c154466f00a9cd9d84
    • Instruction ID: ae19a44c37defe96829a797046b1f5dde077dcc82ecfd5388ade9903ab0b16a1
    • Opcode Fuzzy Hash: 0ccc25e1afda433c71b61b160e700f462918f3458ed904c154466f00a9cd9d84
    • Instruction Fuzzy Hash: AB219074A00208AFDF11AB61CC95EFEBB78EF49300F114126FA51A72A1DB75995D9A30
    APIs
    • GetParent.USER32 ref: 00DF9651
    • GetClassNameW.USER32(00000000,?,00000100), ref: 00DF9666
    • _wcscmp.LIBCMT ref: 00DF9678
    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00DF96F3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClassMessageNameParentSend_wcscmp
    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
    • API String ID: 1704125052-3381328864
    • Opcode ID: d8d76d9a8cc192284b17165c98366d3e2bb7e595c0524d3026a2db43edd1d09d
    • Instruction ID: 002dbd816f0196535875e155acae3524a2af25501922438d029070013d98ef16
    • Opcode Fuzzy Hash: d8d76d9a8cc192284b17165c98366d3e2bb7e595c0524d3026a2db43edd1d09d
    • Instruction Fuzzy Hash: 6D110A7A64830BBEFA152621DC16FF6B79CDB04761B21812AFF00F60D2FE51A9154978
    APIs
    • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00E07CF6
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ArraySafeVartype
    • String ID:
    • API String ID: 1725837607-0
    • Opcode ID: bc3c5513a0ea180794ee51808422e15d391bc70b5ccc73345e01974e6eff9f17
    • Instruction ID: a9641a6eb074e3e4ece38431450b7cead927e3c514e78a95fd221b5f6493d5a8
    • Opcode Fuzzy Hash: bc3c5513a0ea180794ee51808422e15d391bc70b5ccc73345e01974e6eff9f17
    • Instruction Fuzzy Hash: C7B15D71E0821A9FDB10DF94C484BBEB7B4EF09315F145069EA91F7291D774A981CBA0
    APIs
    • __swprintf.LIBCMT ref: 00E0419D
    • __swprintf.LIBCMT ref: 00E041AA
      • Part of subcall function 00DC38D8: __woutput_l.LIBCMT ref: 00DC3931
    • FindResourceW.KERNEL32(?,?,0000000E), ref: 00E041D4
    • LoadResource.KERNEL32(?,00000000), ref: 00E041E0
    • LockResource.KERNEL32(00000000), ref: 00E041ED
    • FindResourceW.KERNEL32(?,?,00000003), ref: 00E0420D
    • LoadResource.KERNEL32(?,00000000), ref: 00E0421F
    • SizeofResource.KERNEL32(?,00000000), ref: 00E0422E
    • LockResource.KERNEL32(?), ref: 00E0423A
    • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00E0429B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
    • String ID:
    • API String ID: 1433390588-0
    • Opcode ID: 0be6ca4cad17da1d915e432a6af123eb9f9c5a035781bf5b2e149cfb1c97fa49
    • Instruction ID: 8f6643b02a70e3fad0060fc983b4344238a411798b0cb8cb5c972bf4572fbc12
    • Opcode Fuzzy Hash: 0be6ca4cad17da1d915e432a6af123eb9f9c5a035781bf5b2e149cfb1c97fa49
    • Instruction Fuzzy Hash: 7C3191F160521AAFCB119FA1DE44EBB7BB8EF05345F004525F901F21A0D770DA928BB0
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00E01700
    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00E00778,?,00000001), ref: 00E01714
    • GetWindowThreadProcessId.USER32(00000000), ref: 00E0171B
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E00778,?,00000001), ref: 00E0172A
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E0173C
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E00778,?,00000001), ref: 00E01755
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E00778,?,00000001), ref: 00E01767
    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00E00778,?,00000001), ref: 00E017AC
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00E00778,?,00000001), ref: 00E017C1
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00E00778,?,00000001), ref: 00E017CC
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
    • String ID:
    • API String ID: 2156557900-0
    • Opcode ID: 18472fd179a6e5c9cb48b1968f7c9e84527d082de76d87ee73027c5f9fcd5503
    • Instruction ID: a17877a44b9e91e8553e0bb44891ea83ae8f393963342d51d6581ac0e69b5b9c
    • Opcode Fuzzy Hash: 18472fd179a6e5c9cb48b1968f7c9e84527d082de76d87ee73027c5f9fcd5503
    • Instruction Fuzzy Hash: 4331C375600204BFEB219F16ED84F7A37F9EB16759F1440AAF800FA2E0D7B49D888B50
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Variant$ClearInit$_memset
    • String ID: ,,$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
    • API String ID: 2862541840-218231672
    • Opcode ID: ac7c5de2c3985e4f841f55f9b812fdc90bd2944b471dac01a5b45af3d4326bc0
    • Instruction ID: 7a96c6e1004ae45474648536058ccc9a91213a6a2477f18365cf4d01a02de46d
    • Opcode Fuzzy Hash: ac7c5de2c3985e4f841f55f9b812fdc90bd2944b471dac01a5b45af3d4326bc0
    • Instruction Fuzzy Hash: BC91BC71A00205ABDF24DFA1C858FEEBBB8EF85314F109529F515BB282D7709985CBA0
    APIs
    • EnumChildWindows.USER32(?,00DFAA64), ref: 00DFA9A2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ChildEnumWindows
    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
    • API String ID: 3555792229-1603158881
    • Opcode ID: eb3350456952a75536a57f20e39f62eaa00da3c694df014479d99dcffe09f0d3
    • Instruction ID: 659625bdbb26736e5f9d4f6dcb2e1ab7c08ffae20208e0743dbdc192d7848c78
    • Opcode Fuzzy Hash: eb3350456952a75536a57f20e39f62eaa00da3c694df014479d99dcffe09f0d3
    • Instruction Fuzzy Hash: 7D9193B060020AEADB08DF64C482BF9FB74FF04344F55C129DA9EA7151DB70AA59CBB1
    APIs
    • SetWindowLongW.USER32(?,000000EB), ref: 00DA2EAE
      • Part of subcall function 00DA1DB3: GetClientRect.USER32(?,?), ref: 00DA1DDC
      • Part of subcall function 00DA1DB3: GetWindowRect.USER32(?,?), ref: 00DA1E1D
      • Part of subcall function 00DA1DB3: ScreenToClient.USER32(?,?), ref: 00DA1E45
    • GetDC.USER32 ref: 00DDCF82
    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00DDCF95
    • SelectObject.GDI32(00000000,00000000), ref: 00DDCFA3
    • SelectObject.GDI32(00000000,00000000), ref: 00DDCFB8
    • ReleaseDC.USER32(?,00000000), ref: 00DDCFC0
    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00DDD04B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
    • String ID: U
    • API String ID: 4009187628-3372436214
    • Opcode ID: ab0de9f4ef920cb15b5aeeaa3efbef96d0bdf272f7eed44688645a4560643c26
    • Instruction ID: 210c3c48aafc8ff15213a9ccaa44bb2db3d1f64fd26e8d6376315395d37b37aa
    • Opcode Fuzzy Hash: ab0de9f4ef920cb15b5aeeaa3efbef96d0bdf272f7eed44688645a4560643c26
    • Instruction Fuzzy Hash: 4E719130500205DFCF259F68C884AFA7BB6FF49350F18426AFD956A2A6C7318D86DB70
    APIs
    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E11D44
    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E11D70
    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00E11DB2
    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E11DC7
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E11DD4
    • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00E11E04
    • InternetCloseHandle.WININET(00000000), ref: 00E11E4B
      • Part of subcall function 00E12777: GetLastError.KERNEL32(?,?,00E11B0B,00000000,00000000,00000001), ref: 00E1278C
      • Part of subcall function 00E12777: SetEvent.KERNEL32(?,?,00E11B0B,00000000,00000000,00000001), ref: 00E127A1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
    • String ID:
    • API String ID: 2603140658-3916222277
    • Opcode ID: b33072fc18fdc7dd0cae2444b5a02da986adcf7acaa7314a7ac6ba983f76396e
    • Instruction ID: d017cca3c007820c8b8f4b03c06e7df5761b291fffee6b262019af76da5621a7
    • Opcode Fuzzy Hash: b33072fc18fdc7dd0cae2444b5a02da986adcf7acaa7314a7ac6ba983f76396e
    • Instruction Fuzzy Hash: EB415BB1510208BFEB129F50CC89FFB77ACFF08754F00516AFA05AA281D7709E859BA1
    APIs
    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00E2F910), ref: 00E1903D
    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00E2F910), ref: 00E19071
    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00E191EB
    • SysFreeString.OLEAUT32(?), ref: 00E19215
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Free$FileLibraryModuleNamePathQueryStringType
    • String ID:
    • API String ID: 560350794-0
    • Opcode ID: 6f4a05e569a7f4123f70b1be68123d001c04566ee221a38ffec9db9b8a2744a8
    • Instruction ID: 595a43e4b7b779c580c305ba44a7e089cd2aed27d8ce80579b57aec7fec5bd67
    • Opcode Fuzzy Hash: 6f4a05e569a7f4123f70b1be68123d001c04566ee221a38ffec9db9b8a2744a8
    • Instruction Fuzzy Hash: 06F11971A00209EFDB14DF94C898EEEB7B9FF49314F108059F516AB251DB31AE86CB60
    APIs
    • _memset.LIBCMT ref: 00E1F9C9
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E1FB5C
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E1FB80
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E1FBC0
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E1FBE2
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E1FD5E
    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00E1FD90
    • CloseHandle.KERNEL32(?), ref: 00E1FDBF
    • CloseHandle.KERNEL32(?), ref: 00E1FE36
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
    • String ID:
    • API String ID: 4090791747-0
    • Opcode ID: 4ca56c54e1270e81991db26575cdc763fb652f1d29a4209081452107499a6256
    • Instruction ID: 6cdcbbbdee234e13edba0c3e3435e2b89ee59e7463ea1d6cb012f8c01ac4c7de
    • Opcode Fuzzy Hash: 4ca56c54e1270e81991db26575cdc763fb652f1d29a4209081452107499a6256
    • Instruction Fuzzy Hash: 0DE1A531204341DFC714EF24C491BAABBE1EF85354F14956DF899AB2A2DB31DC85CBA2
    APIs
      • Part of subcall function 00E048AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E038D3,?), ref: 00E048C7
      • Part of subcall function 00E048AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E038D3,?), ref: 00E048E0
      • Part of subcall function 00E04CD3: GetFileAttributesW.KERNEL32(?,00E03947), ref: 00E04CD4
    • lstrcmpiW.KERNEL32(?,?), ref: 00E04FE2
    • _wcscmp.LIBCMT ref: 00E04FFC
    • MoveFileW.KERNEL32(?,?), ref: 00E05017
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
    • String ID:
    • API String ID: 793581249-0
    • Opcode ID: a02d09a3b3647f42caa91319993d3b82844b90e98b62dc49d9f53d9d65cac313
    • Instruction ID: bb8199907cdf700c8b1aafc639090a741cb9e3c9ce4442ff4beeb86593b2770f
    • Opcode Fuzzy Hash: a02d09a3b3647f42caa91319993d3b82844b90e98b62dc49d9f53d9d65cac313
    • Instruction Fuzzy Hash: F95155F21087859BD724EB50D8819DFB7ECEF85341F00592EF285E3191EE74A6888B76
    APIs
    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E2896E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: InvalidateRect
    • String ID:
    • API String ID: 634782764-0
    • Opcode ID: 24b40a00ca459392260a2010aa7c29ce06d7a8095136039233337c29b4275b3a
    • Instruction ID: 932d68043c7b5add974649a81ab863bbf650463aa0cca8bab8d294ff31d968a1
    • Opcode Fuzzy Hash: 24b40a00ca459392260a2010aa7c29ce06d7a8095136039233337c29b4275b3a
    • Instruction Fuzzy Hash: 27510670502228BFDF389F29EE85BAA3B75FB05354F605122F515F65A1CF70A980CB91
    APIs
    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00DDC547
    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00DDC569
    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00DDC581
    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00DDC59F
    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00DDC5C0
    • DestroyIcon.USER32(00000000), ref: 00DDC5CF
    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00DDC5EC
    • DestroyIcon.USER32(?), ref: 00DDC5FB
      • Part of subcall function 00E2A71E: DeleteObject.GDI32(00000000), ref: 00E2A757
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
    • String ID:
    • API String ID: 2819616528-0
    • Opcode ID: af173869c62cd9cf4b89bf67f457b8beaf79de2694c3e8ed7db9117cc9e5a25c
    • Instruction ID: fb18d59496a89238270c6bc88b25f8a47b9e472fbe09403ff05b543ab79b78e8
    • Opcode Fuzzy Hash: af173869c62cd9cf4b89bf67f457b8beaf79de2694c3e8ed7db9117cc9e5a25c
    • Instruction Fuzzy Hash: F7516A7061020AAFDB24DF2ADC45FBA77B5EB45350F140529F942A72A0DBB0ED91DB70
    APIs
      • Part of subcall function 00DFAE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DFAE77
      • Part of subcall function 00DFAE57: GetCurrentThreadId.KERNEL32 ref: 00DFAE7E
      • Part of subcall function 00DFAE57: AttachThreadInput.USER32(00000000,?,00DF9B65,?,00000001), ref: 00DFAE85
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DF9B70
    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00DF9B8D
    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00DF9B90
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DF9B99
    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00DF9BB7
    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00DF9BBA
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DF9BC3
    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00DF9BDA
    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00DF9BDD
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
    • String ID:
    • API String ID: 2014098862-0
    • Opcode ID: b73420929397b9a9215d6143a3798db0456b291bfaf4c68f91f982e46ef3f8b7
    • Instruction ID: 73796b27b37b5ebb2a87caaa4bd1bac7d4280c242c176a1ce0edce09d8fbad81
    • Opcode Fuzzy Hash: b73420929397b9a9215d6143a3798db0456b291bfaf4c68f91f982e46ef3f8b7
    • Instruction Fuzzy Hash: 1511E571950218BEF6206B65DC89F6A7B2DEB4C751F510425F344AB0A1CAF25C21DAB4
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00DF8A84,00000B00,?,?), ref: 00DF8E0C
    • HeapAlloc.KERNEL32(00000000,?,00DF8A84,00000B00,?,?), ref: 00DF8E13
    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DF8A84,00000B00,?,?), ref: 00DF8E28
    • GetCurrentProcess.KERNEL32(?,00000000,?,00DF8A84,00000B00,?,?), ref: 00DF8E30
    • DuplicateHandle.KERNEL32(00000000,?,00DF8A84,00000B00,?,?), ref: 00DF8E33
    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00DF8A84,00000B00,?,?), ref: 00DF8E43
    • GetCurrentProcess.KERNEL32(00DF8A84,00000000,?,00DF8A84,00000B00,?,?), ref: 00DF8E4B
    • DuplicateHandle.KERNEL32(00000000,?,00DF8A84,00000B00,?,?), ref: 00DF8E4E
    • CreateThread.KERNEL32(00000000,00000000,00DF8E74,00000000,00000000,00000000), ref: 00DF8E68
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
    • String ID:
    • API String ID: 1957940570-0
    • Opcode ID: 615765fe32a44b20540f474a290c86c481820b987c9ebb44744a8fd4af58e8ab
    • Instruction ID: 68e1e1c3352afe35dc3951d213f0fc4504766c35d4322f1afa0dcc6d6320b578
    • Opcode Fuzzy Hash: 615765fe32a44b20540f474a290c86c481820b987c9ebb44744a8fd4af58e8ab
    • Instruction Fuzzy Hash: 4F01BF75641308FFE720AB65DD4EF6B3B6CEB89711F414421FA05DB1A2CA71D815CB20
    APIs
      • Part of subcall function 00DF7652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?,?,?,00DF799D), ref: 00DF766F
      • Part of subcall function 00DF7652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?,?), ref: 00DF768A
      • Part of subcall function 00DF7652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?,?), ref: 00DF7698
      • Part of subcall function 00DF7652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?), ref: 00DF76A8
    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00E19B1B
    • _memset.LIBCMT ref: 00E19B28
    • _memset.LIBCMT ref: 00E19C6B
    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00E19C97
    • CoTaskMemFree.OLE32(?), ref: 00E19CA2
    Strings
    • NULL Pointer assignment, xrefs: 00E19CF0
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
    • String ID: NULL Pointer assignment
    • API String ID: 1300414916-2785691316
    • Opcode ID: 11d43410763bc8cd8deb805b31463006a0187ece6c6909fb1b02d2001d97fab8
    • Instruction ID: b5fee1ece08714ecdd38ed548ead0bf93ce6b1d436f7fce404009ed3bb17c2a7
    • Opcode Fuzzy Hash: 11d43410763bc8cd8deb805b31463006a0187ece6c6909fb1b02d2001d97fab8
    • Instruction Fuzzy Hash: 03912971D00219ABDB10DFA5DC91EDEBBB8EF09710F20416AF519B7281DB71AA45CFA0
    APIs
    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E27093
    • SendMessageW.USER32(?,00001036,00000000,?), ref: 00E270A7
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E270C1
    • _wcscat.LIBCMT ref: 00E2711C
    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E27133
    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E27161
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$Window_wcscat
    • String ID: SysListView32
    • API String ID: 307300125-78025650
    • Opcode ID: 4dbb811c60b818be43d299818057fdb60936ef916620129277fc424a15959144
    • Instruction ID: 343450697aba94edd23bdc673d57146a7ded6e111fbbbc62e700965ac444c8b5
    • Opcode Fuzzy Hash: 4dbb811c60b818be43d299818057fdb60936ef916620129277fc424a15959144
    • Instruction Fuzzy Hash: C241A370904318AFEB219FA4DC85FEE77B8EF08354F10146AF984B7191D7719D888B60
    APIs
      • Part of subcall function 00E03E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00E03EB6
      • Part of subcall function 00E03E91: Process32FirstW.KERNEL32(00000000,?), ref: 00E03EC4
      • Part of subcall function 00E03E91: CloseHandle.KERNEL32(00000000), ref: 00E03F8E
    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E1ECB8
    • GetLastError.KERNEL32 ref: 00E1ECCB
    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E1ECFA
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E1ED77
    • GetLastError.KERNEL32(00000000), ref: 00E1ED82
    • CloseHandle.KERNEL32(00000000), ref: 00E1EDB7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
    • String ID: SeDebugPrivilege
    • API String ID: 2533919879-2896544425
    • Opcode ID: a3f192757d20132d1c9d90aea0ddc20dc70c92c2381f22fc25f50f70f3d54dbd
    • Instruction ID: 5dea35154ab1aebc57a4a74f872d69873372bdfe609c680a008e06c005f9be1c
    • Opcode Fuzzy Hash: a3f192757d20132d1c9d90aea0ddc20dc70c92c2381f22fc25f50f70f3d54dbd
    • Instruction Fuzzy Hash: A641AD702002009FDB20EF24CC95FBEB7A5EF45714F088459F942AB3D2DB75A848CBA2
    APIs
    • LoadIconW.USER32(00000000,00007F03), ref: 00E032C5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: IconLoad
    • String ID: blank$info$question$stop$warning
    • API String ID: 2457776203-404129466
    • Opcode ID: f7f1a05cdb0cc857163ba252ac4886ab81765a04c04f527b7fc600fc62c65a57
    • Instruction ID: 8ce8d30278b52939b73efc86aa1dde16b8889bb2eeb3fc5656c26a11b88b5392
    • Opcode Fuzzy Hash: f7f1a05cdb0cc857163ba252ac4886ab81765a04c04f527b7fc600fc62c65a57
    • Instruction Fuzzy Hash: 97113635208747BFE7056B65DC43DAAB79CEF19374F24103AF900B61D1E6B15B8046B5
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E0454E
    • LoadStringW.USER32(00000000), ref: 00E04555
    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E0456B
    • LoadStringW.USER32(00000000), ref: 00E04572
    • _wprintf.LIBCMT ref: 00E04598
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E045B6
    Strings
    • %s (%d) : ==> %s: %s %s, xrefs: 00E04593
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HandleLoadModuleString$Message_wprintf
    • String ID: %s (%d) : ==> %s: %s %s
    • API String ID: 3648134473-3128320259
    • Opcode ID: dfddbc8ea280db842446c22977356407aee3f55f21c3c7d47f67c876d3153947
    • Instruction ID: e7450ab3dcc585696f4715c7d1c29c759cc8fce203f779e6c326df7294ec2469
    • Opcode Fuzzy Hash: dfddbc8ea280db842446c22977356407aee3f55f21c3c7d47f67c876d3153947
    • Instruction Fuzzy Hash: 670121F2500208BFE72197A5DD89EE6777CE708301F4005B5FB46F2051EA749E894B70
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • GetSystemMetrics.USER32(0000000F), ref: 00E2D78A
    • GetSystemMetrics.USER32(0000000F), ref: 00E2D7AA
    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00E2D9E5
    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00E2DA03
    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00E2DA24
    • ShowWindow.USER32(00000003,00000000), ref: 00E2DA43
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00E2DA68
    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00E2DA8B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
    • String ID:
    • API String ID: 1211466189-0
    • Opcode ID: 781a088d97b215e7dad9780c631acb45cd24f613162a8982c551ba45360f6c87
    • Instruction ID: 69939b54fe2664b0fc2721929b047e886468d70470ad859df52c95593ead5710
    • Opcode Fuzzy Hash: 781a088d97b215e7dad9780c631acb45cd24f613162a8982c551ba45360f6c87
    • Instruction Fuzzy Hash: 45B1DA71604225EFDF18CF29D985BBD7BB1FF44704F089069EE48AB295DB70A990CB90
    APIs
    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00DDC417,00000004,00000000,00000000,00000000), ref: 00DA2ACF
    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00DDC417,00000004,00000000,00000000,00000000,000000FF), ref: 00DA2B17
    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00DDC417,00000004,00000000,00000000,00000000), ref: 00DDC46A
    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00DDC417,00000004,00000000,00000000,00000000), ref: 00DDC4D6
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ShowWindow
    • String ID:
    • API String ID: 1268545403-0
    • Opcode ID: 0ef0ca2378142446dea92ea9fc36b2850092e620b90921f8940b1c67b854ebf3
    • Instruction ID: 8a8062aa9b370dd9a162c7aed8021eacdeebb6b9e2e15b358a81b2c561399a6e
    • Opcode Fuzzy Hash: 0ef0ca2378142446dea92ea9fc36b2850092e620b90921f8940b1c67b854ebf3
    • Instruction Fuzzy Hash: 794119312186809FC7358B2F9D9CB7B7BA2AF87310F1C842EE08796660C675E846D771
    APIs
    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E0737F
      • Part of subcall function 00DC0FF6: std::exception::exception.LIBCMT ref: 00DC102C
      • Part of subcall function 00DC0FF6: __CxxThrowException@8.LIBCMT ref: 00DC1041
    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00E073B6
    • EnterCriticalSection.KERNEL32(?), ref: 00E073D2
    • _memmove.LIBCMT ref: 00E07420
    • _memmove.LIBCMT ref: 00E0743D
    • LeaveCriticalSection.KERNEL32(?), ref: 00E0744C
    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00E07461
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E07480
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
    • String ID:
    • API String ID: 256516436-0
    • Opcode ID: 442894e62747416054bd7200cae6c950301be28aaf0f88ac2f97305e6e79c18c
    • Instruction ID: 3ea29ccdb5958d0304d720fdb2f9baa57dd0ca3b6f355db3aed5eb5af098c406
    • Opcode Fuzzy Hash: 442894e62747416054bd7200cae6c950301be28aaf0f88ac2f97305e6e79c18c
    • Instruction Fuzzy Hash: E831CD32900206EFCB10DF65DC85EAE7BB8EF45300B1440B9F900AB286DB30DA54CBB0
    APIs
    • DeleteObject.GDI32(00000000), ref: 00E2645A
    • GetDC.USER32(00000000), ref: 00E26462
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E2646D
    • ReleaseDC.USER32(00000000,00000000), ref: 00E26479
    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E264B5
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E264C6
    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E29299,?,?,000000FF,00000000,?,000000FF,?), ref: 00E26500
    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E26520
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
    • String ID:
    • API String ID: 3864802216-0
    • Opcode ID: b96e5a46e8ffaf6db131d7902cf92492b24fce32a5b1140d9fb975e29b752766
    • Instruction ID: 9c15382e09be79178a727de96aaf1f5c5b5eb73594e1fd29b1f025451600bdbb
    • Opcode Fuzzy Hash: b96e5a46e8ffaf6db131d7902cf92492b24fce32a5b1140d9fb975e29b752766
    • Instruction Fuzzy Hash: E3319F72241214BFEF208F51DC4AFEB3FA9EF09765F040165FE08AA191C6B59C46CBA4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memcmp
    • String ID:
    • API String ID: 2931989736-0
    • Opcode ID: 0e14850c55fe8fab25d5a6ff21a95928f3fcfe24c32305a7167916c6d50bdebd
    • Instruction ID: c9aac8ec2a282effb49629502a7d2ae33a656b9a4c10b8c67968d89aeda8d9e9
    • Opcode Fuzzy Hash: 0e14850c55fe8fab25d5a6ff21a95928f3fcfe24c32305a7167916c6d50bdebd
    • Instruction Fuzzy Hash: 6421D37565031EB7D610B5208E56FBB275CEE11394F09A028FF49A7283EB11DD32C1B5
    APIs
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
      • Part of subcall function 00DBFEC6: _wcscpy.LIBCMT ref: 00DBFEE9
    • _wcstok.LIBCMT ref: 00E0EEFF
    • _wcscpy.LIBCMT ref: 00E0EF8E
    • _memset.LIBCMT ref: 00E0EFC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
    • String ID: X
    • API String ID: 774024439-3081909835
    • Opcode ID: 4a6d3a0d8f7f7723ae87d30460ebf73da432d31ec301603403b3648ad0d0173e
    • Instruction ID: a1e17f4006b09274bdc2d2a989c472bdeabe21bba87cdb65ef346fc68e834170
    • Opcode Fuzzy Hash: 4a6d3a0d8f7f7723ae87d30460ebf73da432d31ec301603403b3648ad0d0173e
    • Instruction Fuzzy Hash: 95C18271608301DFC724EF24D891A9AB7E4FF85314F14496DF899A72A2DB30ED45CBA2
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 784372a4ad374de156bf510ddab3eca030758d428c273a45ef7a46a2b75858d6
    • Instruction ID: 2e5c7db73b1062fb0da9c7cedd4f0708c6216be733fee5424451136bb440b2f3
    • Opcode Fuzzy Hash: 784372a4ad374de156bf510ddab3eca030758d428c273a45ef7a46a2b75858d6
    • Instruction Fuzzy Hash: CD716B38904109EFCB148F99CC49EBEBB79FF8A324F148159F915AA251C770AA51CFB4
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0e4d3abfc6df62b43ee425d068d68d1f4ed95021a744a2d67bf4aae8e5d32db6
    • Instruction ID: 451af026c8e905f6628346c4187141173cc27789437d899267bed51e0c50bd46
    • Opcode Fuzzy Hash: 0e4d3abfc6df62b43ee425d068d68d1f4ed95021a744a2d67bf4aae8e5d32db6
    • Instruction Fuzzy Hash: A261AE71508700AFC710EB24CC91EABB7E9EF89B14F104A1DF585A7292DB71AE45C7B2
    APIs
    • IsWindow.USER32(00FC60D0), ref: 00E2B6A5
    • IsWindowEnabled.USER32(00FC60D0), ref: 00E2B6B1
    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00E2B795
    • SendMessageW.USER32(00FC60D0,000000B0,?,?), ref: 00E2B7CC
    • IsDlgButtonChecked.USER32(?,?), ref: 00E2B809
    • GetWindowLongW.USER32(00FC60D0,000000EC), ref: 00E2B82B
    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00E2B843
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
    • String ID:
    • API String ID: 4072528602-0
    • Opcode ID: b70c753429e16afd5213bdfaaa5b0faed810d0197421750dab9d015a1de800c7
    • Instruction ID: 1339f6c46b75c4ac63d84c0888ac6818dbfa213ae638d4f91dec5a63cca517ac
    • Opcode Fuzzy Hash: b70c753429e16afd5213bdfaaa5b0faed810d0197421750dab9d015a1de800c7
    • Instruction Fuzzy Hash: C4710F34600224AFDB24DF65E894FBA7BB9FF89304F04516AF946B72A1C731AC41CB50
    APIs
    • GetParent.USER32(?), ref: 00E0149C
    • GetKeyboardState.USER32(?), ref: 00E014B1
    • SetKeyboardState.USER32(?), ref: 00E01512
    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E01540
    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E0155F
    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E015A5
    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E015C8
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: f0b330c35788060dafbd146036b22aad4fd724f6951ae9f0491e6f9ae8fa0d7d
    • Instruction ID: dbd1e9c39ebee6e9231178b391f0d24cd2d184a6132dd6477db6a52a3684d773
    • Opcode Fuzzy Hash: f0b330c35788060dafbd146036b22aad4fd724f6951ae9f0491e6f9ae8fa0d7d
    • Instruction Fuzzy Hash: A251D1A0A047D53EFB3646348C45BBABEE96B46308F0C95C9E1D56E8D2C299ECC8D750
    APIs
    • GetParent.USER32(00000000), ref: 00E012B5
    • GetKeyboardState.USER32(?), ref: 00E012CA
    • SetKeyboardState.USER32(?), ref: 00E0132B
    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E01357
    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E01374
    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E013B8
    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E013D9
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: 61df71078690c50040d9f67c93eca4c8b475d46932c1cfd6002047cab3bf1aa1
    • Instruction ID: b3d11ddc88ef058bb5fe237916361fbb16a90488da4d0f762957691dfdda4448
    • Opcode Fuzzy Hash: 61df71078690c50040d9f67c93eca4c8b475d46932c1cfd6002047cab3bf1aa1
    • Instruction Fuzzy Hash: 245106A09047D53EFB3687248C45B7A7FA9AF06308F0895C9E1D46E8D2D398ECD8E751
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _wcsncpy$LocalTime
    • String ID:
    • API String ID: 2945705084-0
    • Opcode ID: b7b44bff5fc94b61430977de2db25066c1ca291dee842f620892ae65cb9bfe1c
    • Instruction ID: 34d21c232ea98ef57745d81e35f53afddf60b5010cb6ff45281f943d871025f7
    • Opcode Fuzzy Hash: b7b44bff5fc94b61430977de2db25066c1ca291dee842f620892ae65cb9bfe1c
    • Instruction Fuzzy Hash: 19418E6AC2061976CB10EBB48886ECFB3ACDF04310F50996AF518F3161E634E755C7B9
    APIs
    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00DFDAC5
    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00DFDAFB
    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00DFDB0C
    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00DFDB8E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorMode$AddressCreateInstanceProc
    • String ID: ,,$DllGetClassObject
    • API String ID: 753597075-2867008933
    • Opcode ID: f817ae62076b4b58d6149afc1d9e98d9876d84bb4184f39a575a053cae2618e7
    • Instruction ID: 0cb867f13956e8f06d29462b5f23065c86536f3f02fd4efa6a6bbcf4125d6733
    • Opcode Fuzzy Hash: f817ae62076b4b58d6149afc1d9e98d9876d84bb4184f39a575a053cae2618e7
    • Instruction Fuzzy Hash: B5416071600208EFDB15CF55C884AAABBBBEF48310F16C1A9EE059F206D7B1D944CBB0
    APIs
      • Part of subcall function 00E048AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E038D3,?), ref: 00E048C7
      • Part of subcall function 00E048AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E038D3,?), ref: 00E048E0
    • lstrcmpiW.KERNEL32(?,?), ref: 00E038F3
    • _wcscmp.LIBCMT ref: 00E0390F
    • MoveFileW.KERNEL32(?,?), ref: 00E03927
    • _wcscat.LIBCMT ref: 00E0396F
    • SHFileOperationW.SHELL32(?), ref: 00E039DB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
    • String ID: \*.*
    • API String ID: 1377345388-1173974218
    • Opcode ID: 97b43b7bf01d0a84a18bca614e046f3f4474eb3404bec082fd685ac4e5454fcb
    • Instruction ID: bdaf27d51b806450042ec9c831c14cb544ce3a82f79423ce24bcc373fa18441d
    • Opcode Fuzzy Hash: 97b43b7bf01d0a84a18bca614e046f3f4474eb3404bec082fd685ac4e5454fcb
    • Instruction Fuzzy Hash: EA4181B15083859ED751EF64C481AEFB7ECEF89340F40192EB489E3191EA74D688C762
    APIs
    • _memset.LIBCMT ref: 00E27519
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E275C0
    • IsMenu.USER32(?), ref: 00E275D8
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E27620
    • DrawMenuBar.USER32 ref: 00E27633
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Menu$Item$DrawInfoInsert_memset
    • String ID: 0
    • API String ID: 3866635326-4108050209
    • Opcode ID: b9a080cb0a07efbf4f7b9873d6de2b496123185ac12930f41e030333013831fc
    • Instruction ID: 5341cda6dd72b859dbd64f8b0fb3dd64050b28ad5188fbc0a9f957bed4c4ed46
    • Opcode Fuzzy Hash: b9a080cb0a07efbf4f7b9873d6de2b496123185ac12930f41e030333013831fc
    • Instruction Fuzzy Hash: 6B414571A04619EFDB20CF65E884E9ABBB8FB08354F048029FD95A7250D730AD54CFA0
    APIs
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00E2125C
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E21286
    • FreeLibrary.KERNEL32(00000000), ref: 00E2133D
      • Part of subcall function 00E2122D: RegCloseKey.ADVAPI32(?), ref: 00E212A3
      • Part of subcall function 00E2122D: FreeLibrary.KERNEL32(?), ref: 00E212F5
      • Part of subcall function 00E2122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00E21318
    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E212E0
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: EnumFreeLibrary$CloseDeleteOpen
    • String ID:
    • API String ID: 395352322-0
    • Opcode ID: cb3c2cfe056f38774e13e0fe221d131bf96814403d437b8443139cf492a49767
    • Instruction ID: 77bdf578d7384ea8ef94f099c5befb645a79b0024350c93a85adc042c3b18eb4
    • Opcode Fuzzy Hash: cb3c2cfe056f38774e13e0fe221d131bf96814403d437b8443139cf492a49767
    • Instruction Fuzzy Hash: 71311B71901119BFDB14DB91EC89EFFB7BCEB18304F0011B9E501F2151DA749F499AA0
    APIs
    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00E2655B
    • GetWindowLongW.USER32(00FC60D0,000000F0), ref: 00E2658E
    • GetWindowLongW.USER32(00FC60D0,000000F0), ref: 00E265C3
    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00E265F5
    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00E2661F
    • GetWindowLongW.USER32(?,000000F0), ref: 00E26630
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E2664A
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LongWindow$MessageSend
    • String ID:
    • API String ID: 2178440468-0
    • Opcode ID: 01ec5b0d3e921e3491d8adc55ad4a78cb7f2df063dde8c66e9c517935496c088
    • Instruction ID: 3da6e7260c3467113d581adb3600b5ea97e9c4bafa60957976dfbee82155c4df
    • Opcode Fuzzy Hash: 01ec5b0d3e921e3491d8adc55ad4a78cb7f2df063dde8c66e9c517935496c088
    • Instruction Fuzzy Hash: F4313730684160AFDB20CF29EC84F5537E5FB4A758F1812A8F501AB2B5CB71EC48DB81
    APIs
      • Part of subcall function 00E180A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E180CB
    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E164D9
    • WSAGetLastError.WSOCK32(00000000), ref: 00E164E8
    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00E16521
    • connect.WSOCK32(00000000,?,00000010), ref: 00E1652A
    • WSAGetLastError.WSOCK32 ref: 00E16534
    • closesocket.WSOCK32(00000000), ref: 00E1655D
    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00E16576
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
    • String ID:
    • API String ID: 910771015-0
    • Opcode ID: 8904f3ef9590bd8620b95f8ef9807f02a35e3e27e965fc42c22dbe5c778b64b7
    • Instruction ID: 71d0647a71a069aab3309c27e305f1aa796d0103dd52af1e907b442129f310fc
    • Opcode Fuzzy Hash: 8904f3ef9590bd8620b95f8ef9807f02a35e3e27e965fc42c22dbe5c778b64b7
    • Instruction Fuzzy Hash: FD31A171600118AFDB149F24CC85BFEBBB9EB45724F008069F915A7291DB70AD49CB61
    APIs
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DFE0FA
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DFE120
    • SysAllocString.OLEAUT32(00000000), ref: 00DFE123
    • SysAllocString.OLEAUT32 ref: 00DFE144
    • SysFreeString.OLEAUT32 ref: 00DFE14D
    • StringFromGUID2.OLE32(?,?,00000028), ref: 00DFE167
    • SysAllocString.OLEAUT32(?), ref: 00DFE175
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
    • String ID:
    • API String ID: 3761583154-0
    • Opcode ID: 462012626d4d452e294b125922932b4286b2d7a4892500afbff7cb0824237cff
    • Instruction ID: 9a608233b49eee2c29136b52dbbf19d729fca0cfd718f110427ed817d342b3e2
    • Opcode Fuzzy Hash: 462012626d4d452e294b125922932b4286b2d7a4892500afbff7cb0824237cff
    • Instruction Fuzzy Hash: A121903560021CAF9B20AFA9DC88DBB77ECEB09760B058235FA54DB261DA70DC418B70
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
    • API String ID: 1038674560-2734436370
    • Opcode ID: bf8dc0fdc3e72f4cdb49ef4e448953c0a1226db12b9bf8bd8f61e841e821cfff
    • Instruction ID: c61ecdd9e1f39d956a11d92039cb7acf8d78b5a0a0a20691426a34ea7d13576b
    • Opcode Fuzzy Hash: bf8dc0fdc3e72f4cdb49ef4e448953c0a1226db12b9bf8bd8f61e841e821cfff
    • Instruction Fuzzy Hash: 6C213732104269A6D230A724DC52FB77398DF51344F19C039FAC697141EB51E992D2B5
    APIs
      • Part of subcall function 00DA1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DA1D73
      • Part of subcall function 00DA1D35: GetStockObject.GDI32(00000011), ref: 00DA1D87
      • Part of subcall function 00DA1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA1D91
    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E278A1
    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E278AE
    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E278B9
    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E278C8
    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E278D4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$CreateObjectStockWindow
    • String ID: Msctls_Progress32
    • API String ID: 1025951953-3636473452
    • Opcode ID: a10f881cb13c506980046135c9d31636c19eca6e205759f01e814ea5fe293bd4
    • Instruction ID: 98f257f2c555fa19453fdc0405fbc44052841971496710997b9ad4bf5d97a56d
    • Opcode Fuzzy Hash: a10f881cb13c506980046135c9d31636c19eca6e205759f01e814ea5fe293bd4
    • Instruction Fuzzy Hash: 3D118EB2510229BFEF199F61DC85EE77F6DEF08798F015115FA44A2090C772AC21DBA0
    APIs
    • __init_pointers.LIBCMT ref: 00DC9D26
      • Part of subcall function 00DC33C7: EncodePointer.KERNEL32(00000000), ref: 00DC33CA
      • Part of subcall function 00DC33C7: __initp_misc_winsig.LIBCMT ref: 00DC33E5
      • Part of subcall function 00DC33C7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00DCA0E0
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00DCA0F4
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00DCA107
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00DCA11A
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00DCA12D
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00DCA140
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00DCA153
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00DCA166
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00DCA179
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00DCA18C
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00DCA19F
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00DCA1B2
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00DCA1C5
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00DCA1D8
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00DCA1EB
      • Part of subcall function 00DC33C7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00DCA1FE
    • __mtinitlocks.LIBCMT ref: 00DC9D2B
    • __mtterm.LIBCMT ref: 00DC9D34
      • Part of subcall function 00DC9D9C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00DC9D39,00DC7F0D,00E5BD38,00000014), ref: 00DC9E96
      • Part of subcall function 00DC9D9C: _free.LIBCMT ref: 00DC9E9D
      • Part of subcall function 00DC9D9C: DeleteCriticalSection.KERNEL32(0B,?,?,00DC9D39,00DC7F0D,00E5BD38,00000014), ref: 00DC9EBF
    • __calloc_crt.LIBCMT ref: 00DC9D59
    • __initptd.LIBCMT ref: 00DC9D7B
    • GetCurrentThreadId.KERNEL32 ref: 00DC9D82
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
    • String ID:
    • API String ID: 3567560977-0
    • Opcode ID: 93244d19eb595ff27af3f2281360899a7da1d02b742381ad39cbe23e77271387
    • Instruction ID: 81602fef2fa1cf1cfee056148a351c588295a4638f0c84deaada41f7db5ab3f6
    • Opcode Fuzzy Hash: 93244d19eb595ff27af3f2281360899a7da1d02b742381ad39cbe23e77271387
    • Instruction Fuzzy Hash: D3F062325157136DE6347775BC2AF86A690DF01731F154B2EF455E74D2EF1084424570
    APIs
    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00DC4292,?), ref: 00DC41E3
    • GetProcAddress.KERNEL32(00000000), ref: 00DC41EA
    • EncodePointer.KERNEL32(00000000), ref: 00DC41F6
    • DecodePointer.KERNEL32(00000001,00DC4292,?), ref: 00DC4213
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
    • String ID: RoInitialize$combase.dll
    • API String ID: 3489934621-340411864
    • Opcode ID: 37642835956a474ed348343d301d8f4f0bc15229c26870cf706d2f1fc3ec19ba
    • Instruction ID: a0fe3012d2252a4eff03c1949b5b3ab3f687e52aa2c654381397562ed48fd690
    • Opcode Fuzzy Hash: 37642835956a474ed348343d301d8f4f0bc15229c26870cf706d2f1fc3ec19ba
    • Instruction Fuzzy Hash: F3E0E5B0691301AFEB20ABB2FC0DB053AA4AB66B42F505438F591F60E0DBF5409ACB14
    APIs
    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00DC41B8), ref: 00DC42B8
    • GetProcAddress.KERNEL32(00000000), ref: 00DC42BF
    • EncodePointer.KERNEL32(00000000), ref: 00DC42CA
    • DecodePointer.KERNEL32(00DC41B8), ref: 00DC42E5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
    • String ID: RoUninitialize$combase.dll
    • API String ID: 3489934621-2819208100
    • Opcode ID: c498f7d31579dfbd2606f41667520adf94cca9c7b3a5bc19b4453702bdccf76c
    • Instruction ID: 31771b96a9ec701fcb56db161ee1102334696b3bdd2335c929e23a62622f6a85
    • Opcode Fuzzy Hash: c498f7d31579dfbd2606f41667520adf94cca9c7b3a5bc19b4453702bdccf76c
    • Instruction Fuzzy Hash: 7CE0BFB8542301EFEB209B62FD0DB063AB4BB16B86F545038F111F10E0CBB44559CB18
    APIs
    • GetClientRect.USER32(?,?), ref: 00DA1DDC
    • GetWindowRect.USER32(?,?), ref: 00DA1E1D
    • ScreenToClient.USER32(?,?), ref: 00DA1E45
    • GetClientRect.USER32(?,?), ref: 00DA1F74
    • GetWindowRect.USER32(?,?), ref: 00DA1F8D
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Rect$Client$Window$Screen
    • String ID:
    • API String ID: 1296646539-0
    • Opcode ID: b9480426241075d887f54add3225f2e23865383d1e6106a400290e621690ff7c
    • Instruction ID: 87c90f332f6b8c7138e8a5397b758ff65fa255d3e329e979f3c63483fd6e804d
    • Opcode Fuzzy Hash: b9480426241075d887f54add3225f2e23865383d1e6106a400290e621690ff7c
    • Instruction Fuzzy Hash: C8B15C7990024ADFDF10CFA9C5807EEB7B1FF09314F18952AED999B250DB30AA50CB65
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memmove$__itow__swprintf
    • String ID:
    • API String ID: 3253778849-0
    • Opcode ID: 332a0019674531f161066eb251dfbe9e1734f3fbe53b1b894ce2488a7b4617b0
    • Instruction ID: 3a2dacb25d329c35f6f285a745d76ce0607d66f97159b1df03ad7a5e34f066e3
    • Opcode Fuzzy Hash: 332a0019674531f161066eb251dfbe9e1734f3fbe53b1b894ce2488a7b4617b0
    • Instruction Fuzzy Hash: 3E61983050025AABDB15EF60C892FFE77A8EF46308F044519F85A6B292DB30E991DB70
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00E210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E20038,?,?), ref: 00E210BC
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E20548
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E20588
    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00E205AB
    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E205D4
    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E20617
    • RegCloseKey.ADVAPI32(00000000), ref: 00E20624
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
    • String ID:
    • API String ID: 4046560759-0
    • Opcode ID: a616a9712f79d4a0bd6d805286050a3f18747f8baef40fe6ec93af39bd446701
    • Instruction ID: 655bbb62418e53531e97685f1bc43f991939861d29c801a559fcb7e6b7cb2b3d
    • Opcode Fuzzy Hash: a616a9712f79d4a0bd6d805286050a3f18747f8baef40fe6ec93af39bd446701
    • Instruction Fuzzy Hash: 1B513831208210AFCB14EB64D885E6FBBE9FF89314F04496DF545A72A2DB31E905CB62
    APIs
    • GetMenu.USER32(?), ref: 00E25A82
    • GetMenuItemCount.USER32(00000000), ref: 00E25AB9
    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E25AE1
    • GetMenuItemID.USER32(?,?), ref: 00E25B50
    • GetSubMenu.USER32(?,?), ref: 00E25B5E
    • PostMessageW.USER32(?,00000111,?,00000000), ref: 00E25BAF
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Menu$Item$CountMessagePostString
    • String ID:
    • API String ID: 650687236-0
    • Opcode ID: ebe83c25cf6abb56e5ce2a5a4d51badff70b57440052306be16c3812002128b8
    • Instruction ID: e1330104563018a670cb6e2198c2c1883776ee99b82d5b638da43679440c159e
    • Opcode Fuzzy Hash: ebe83c25cf6abb56e5ce2a5a4d51badff70b57440052306be16c3812002128b8
    • Instruction Fuzzy Hash: F9517076A00625EFCF15EFA4D945AAEB7B4FF48320F1054A9F815B7351CB70AE418BA0
    APIs
    • VariantInit.OLEAUT32(?), ref: 00DFF3F7
    • VariantClear.OLEAUT32(00000013), ref: 00DFF469
    • VariantClear.OLEAUT32(00000000), ref: 00DFF4C4
    • _memmove.LIBCMT ref: 00DFF4EE
    • VariantClear.OLEAUT32(?), ref: 00DFF53B
    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00DFF569
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Variant$Clear$ChangeInitType_memmove
    • String ID:
    • API String ID: 1101466143-0
    • Opcode ID: f3241f9282e7ea2df7911dec1a1525897a1ab8b06923202336e36333bfeaada0
    • Instruction ID: acf07f73d5bcd504383db22f758e2ec381c0eccf1c038b05d5ddd698f1589e7e
    • Opcode Fuzzy Hash: f3241f9282e7ea2df7911dec1a1525897a1ab8b06923202336e36333bfeaada0
    • Instruction Fuzzy Hash: 63516AB5A00209EFCB10DF58D880AAAB7B9FF4C314B158569EA59DB300D730E952CBA0
    APIs
    • _memset.LIBCMT ref: 00E02747
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E02792
    • IsMenu.USER32(00000000), ref: 00E027B2
    • CreatePopupMenu.USER32 ref: 00E027E6
    • GetMenuItemCount.USER32(000000FF), ref: 00E02844
    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00E02875
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
    • String ID:
    • API String ID: 3311875123-0
    • Opcode ID: be562081382a39eb82b59219cd7fd9e6f6355e05e82cc39169f8c0eba44e2197
    • Instruction ID: a432c1c95775e8f323f7b872b85d32009014268c36fb999e10a0ea624c64a8dd
    • Opcode Fuzzy Hash: be562081382a39eb82b59219cd7fd9e6f6355e05e82cc39169f8c0eba44e2197
    • Instruction Fuzzy Hash: 7851A274900206DFDF29CF64D88CAADBBF4AF54318F14916EE611BB2D1D7708984CB61
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • BeginPaint.USER32(?,?,?,?,?,?), ref: 00DA179A
    • GetWindowRect.USER32(?,?), ref: 00DA17FE
    • ScreenToClient.USER32(?,?), ref: 00DA181B
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DA182C
    • EndPaint.USER32(?,?), ref: 00DA1876
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: PaintWindow$BeginClientLongRectScreenViewport
    • String ID:
    • API String ID: 1827037458-0
    • Opcode ID: 0f07418bf3ba04a90cd2dd3ca630ab82e655a580cbd3c83df1eb6c3e915b4967
    • Instruction ID: dba751730c21d10b1fd464773210cc4456314b58ef5b6d58fc4d3e8758f0c059
    • Opcode Fuzzy Hash: 0f07418bf3ba04a90cd2dd3ca630ab82e655a580cbd3c83df1eb6c3e915b4967
    • Instruction Fuzzy Hash: 9741BC34500200AFC720DF26DC84BBA7BF8EB4A764F140629F9A49B2A1C7709809DB72
    APIs
    • ShowWindow.USER32(00E667B0,00000000,00FC60D0,?,?,00E667B0,?,00E2B862,?,?), ref: 00E2B9CC
    • EnableWindow.USER32(?,00000000), ref: 00E2B9F0
    • ShowWindow.USER32(00E667B0,00000000,00FC60D0,?,?,00E667B0,?,00E2B862,?,?), ref: 00E2BA50
    • ShowWindow.USER32(?,00000004,?,00E2B862,?,?), ref: 00E2BA62
    • EnableWindow.USER32(?,00000001), ref: 00E2BA86
    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00E2BAA9
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$Show$Enable$MessageSend
    • String ID:
    • API String ID: 642888154-0
    • Opcode ID: 4d18e82df0ece471500275ca7b0a777c1708cdbf2d462b860e0f10d343e52277
    • Instruction ID: 9db5b151cf2131b97c4fdacdc5d3e109d429ac1c46106752f346a027065cf867
    • Opcode Fuzzy Hash: 4d18e82df0ece471500275ca7b0a777c1708cdbf2d462b860e0f10d343e52277
    • Instruction Fuzzy Hash: 3A418270601254AFDB21CF15E489B957BF0FF45318F1852B9FA58AF6A2C731E846CB50
    APIs
    • GetForegroundWindow.USER32(?,?,?,?,?,?,00E15134,?,?,00000000,00000001), ref: 00E173BF
      • Part of subcall function 00E13C94: GetWindowRect.USER32(?,?), ref: 00E13CA7
    • GetDesktopWindow.USER32 ref: 00E173E9
    • GetWindowRect.USER32(00000000), ref: 00E173F0
    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00E17422
      • Part of subcall function 00E054E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E0555E
    • GetCursorPos.USER32(?), ref: 00E1744E
    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E174AC
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
    • String ID:
    • API String ID: 4137160315-0
    • Opcode ID: 64402706d3830a24bb1161627c4f8d7ab3530c57f471ce0fd37184b092e2fbe5
    • Instruction ID: 9cc1200076c4a52e2b184fc28f8d5b1d1a3683abf0c998c247368b7a31c117b6
    • Opcode Fuzzy Hash: 64402706d3830a24bb1161627c4f8d7ab3530c57f471ce0fd37184b092e2fbe5
    • Instruction Fuzzy Hash: 7A31D272508315AFD720DF14D849E9BBBE9FF88714F001929F599A7191CA30E989CBD2
    APIs
      • Part of subcall function 00DF85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DF8608
      • Part of subcall function 00DF85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DF8612
      • Part of subcall function 00DF85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DF8621
      • Part of subcall function 00DF85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DF8628
      • Part of subcall function 00DF85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DF863E
    • GetLengthSid.ADVAPI32(?,00000000,00DF8977), ref: 00DF8DAC
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00DF8DB8
    • HeapAlloc.KERNEL32(00000000), ref: 00DF8DBF
    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00DF8DD8
    • GetProcessHeap.KERNEL32(00000000,00000000,00DF8977), ref: 00DF8DEC
    • HeapFree.KERNEL32(00000000), ref: 00DF8DF3
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
    • String ID:
    • API String ID: 3008561057-0
    • Opcode ID: a6a8f443b7cb7adbffa4d2677406f7009cb283f86ba9e7dc93ecd9fdd9b4b1c7
    • Instruction ID: 86f4380bb873ed026c2d5ccec090d68f6d56ac4fad750489d6d9f890a5fd8ee8
    • Opcode Fuzzy Hash: a6a8f443b7cb7adbffa4d2677406f7009cb283f86ba9e7dc93ecd9fdd9b4b1c7
    • Instruction Fuzzy Hash: A311DC31A01609FFDB208FA5CC09BBE7BB9EF40315F158029E945A7251CB369905EB71
    APIs
    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00DF8B2A
    • OpenProcessToken.ADVAPI32(00000000), ref: 00DF8B31
    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00DF8B40
    • CloseHandle.KERNEL32(00000004), ref: 00DF8B4B
    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00DF8B7A
    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00DF8B8E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
    • String ID:
    • API String ID: 1413079979-0
    • Opcode ID: 96dabfc279bb9d86f3768804439b2262c3aaf893d39f4b2794c4fd4553e04dbe
    • Instruction ID: 41bc073736fc5ff1d5d03a57f071f5bcd8aa4b76f3d0e7a87a0ef3ad44e0607f
    • Opcode Fuzzy Hash: 96dabfc279bb9d86f3768804439b2262c3aaf893d39f4b2794c4fd4553e04dbe
    • Instruction Fuzzy Hash: 3B1147B250020DAFDF118FA5ED49FEA7BB9EB08305F098065FE04A2160C7728D65AB61
    APIs
      • Part of subcall function 00DA12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DA134D
      • Part of subcall function 00DA12F3: SelectObject.GDI32(?,00000000), ref: 00DA135C
      • Part of subcall function 00DA12F3: BeginPath.GDI32(?), ref: 00DA1373
      • Part of subcall function 00DA12F3: SelectObject.GDI32(?,00000000), ref: 00DA139C
    • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00E2C1C4
    • LineTo.GDI32(00000000,00000003,?), ref: 00E2C1D8
    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E2C1E6
    • LineTo.GDI32(00000000,00000000,?), ref: 00E2C1F6
    • EndPath.GDI32(00000000), ref: 00E2C206
    • StrokePath.GDI32(00000000), ref: 00E2C216
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
    • String ID:
    • API String ID: 43455801-0
    • Opcode ID: 47a5f0327a6255d4083a32b95b60e7bb91bfc343efaed5e996c0fc257bad669d
    • Instruction ID: 4495918a1fb647d626d502f0fbcc5894266c930bdc547ad0ee77cfb88bd85a3b
    • Opcode Fuzzy Hash: 47a5f0327a6255d4083a32b95b60e7bb91bfc343efaed5e996c0fc257bad669d
    • Instruction Fuzzy Hash: FF111E7640010CFFDF119F91EC48F9A7FADEB04394F048025F918A6162C7B19D59DBA0
    APIs
    • GetDC.USER32(00000000), ref: 00DFBC78
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00DFBC89
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DFBC90
    • ReleaseDC.USER32(00000000,00000000), ref: 00DFBC98
    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00DFBCAF
    • MulDiv.KERNEL32(000009EC,?,?), ref: 00DFBCC1
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CapsDevice$Release
    • String ID:
    • API String ID: 1035833867-0
    • Opcode ID: d881899c456084d798ac1cc734c5926ebffd6ad0132f48875a597fc245161656
    • Instruction ID: 2454141b3221875625d42e1c57605afea21aecaefcf0d26c530b33633326ed44
    • Opcode Fuzzy Hash: d881899c456084d798ac1cc734c5926ebffd6ad0132f48875a597fc245161656
    • Instruction Fuzzy Hash: 59014875E00618BFEB105BB69D45E5EBFB8EB48761F044076FA08A7251D6709C15CFA0
    APIs
    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DC03D3
    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00DC03DB
    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DC03E6
    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DC03F1
    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00DC03F9
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DC0401
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Virtual
    • String ID:
    • API String ID: 4278518827-0
    • Opcode ID: f5378aed2a29ab36f47f77d2bc3cef4c623e691e6f08b5c86d8627d767bd4658
    • Instruction ID: 224070fdf7d67371fae4d4790c0fb652cc79b57400f43e75814e3b85c3235b82
    • Opcode Fuzzy Hash: f5378aed2a29ab36f47f77d2bc3cef4c623e691e6f08b5c86d8627d767bd4658
    • Instruction Fuzzy Hash: 9F0148B09027597DE3008F5A8C85A52FEA8FF19354F00411BA15847941C7B5A868CBE5
    APIs
    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E0569B
    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E056B1
    • GetWindowThreadProcessId.USER32(?,?), ref: 00E056C0
    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E056CF
    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E056D9
    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E056E0
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
    • String ID:
    • API String ID: 839392675-0
    • Opcode ID: f76c243624e3cb675e9be4c0dab8e88e1083273ecc1941fc013b67665cf994cb
    • Instruction ID: 8056b2af8b650dcf9874129887123d48f2fe5853851ddb15d9481ff4585ae8aa
    • Opcode Fuzzy Hash: f76c243624e3cb675e9be4c0dab8e88e1083273ecc1941fc013b67665cf994cb
    • Instruction Fuzzy Hash: 66F01D32641158BFE7315BA3EC0EEAB7B7CEBCAB11F000179FA05E109196A15A1686B5
    APIs
    • InterlockedExchange.KERNEL32(?,?), ref: 00E074E5
    • EnterCriticalSection.KERNEL32(?,?,00DB1044,?,?), ref: 00E074F6
    • TerminateThread.KERNEL32(00000000,000001F6,?,00DB1044,?,?), ref: 00E07503
    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00DB1044,?,?), ref: 00E07510
      • Part of subcall function 00E06ED7: CloseHandle.KERNEL32(00000000,?,00E0751D,?,00DB1044,?,?), ref: 00E06EE1
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E07523
    • LeaveCriticalSection.KERNEL32(?,?,00DB1044,?,?), ref: 00E0752A
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
    • String ID:
    • API String ID: 3495660284-0
    • Opcode ID: 0ab54482e2eca7d9131a05f315d8007fd8505646a7fd70bded416de59952f909
    • Instruction ID: 3d95a088c98ae066433dff05f443e22b484e06b295ac146cb564d5ff41c5ba0d
    • Opcode Fuzzy Hash: 0ab54482e2eca7d9131a05f315d8007fd8505646a7fd70bded416de59952f909
    • Instruction Fuzzy Hash: A0F05E3B940612EFDB211B65FD8CAEB773AEF46302B001531F642B10B5CB755956CB50
    APIs
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00DF8E7F
    • UnloadUserProfile.USERENV(?,?), ref: 00DF8E8B
    • CloseHandle.KERNEL32(?), ref: 00DF8E94
    • CloseHandle.KERNEL32(?), ref: 00DF8E9C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00DF8EA5
    • HeapFree.KERNEL32(00000000), ref: 00DF8EAC
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
    • String ID:
    • API String ID: 146765662-0
    • Opcode ID: 6d65e479fae9d35eb8d1adeb37e554f20ce337d26ef4128675ca51973f967698
    • Instruction ID: 040729fe3d3f3627c189c9ddce482a793ce5b62f892f5f310e41eebefbf7b637
    • Opcode Fuzzy Hash: 6d65e479fae9d35eb8d1adeb37e554f20ce337d26ef4128675ca51973f967698
    • Instruction Fuzzy Hash: B1E0C236004001FFDA115FE2ED0C91ABB79FB89322B508231F219A1071CB32943ADB50
    APIs
    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E32C7C,?), ref: 00DF7C32
    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E32C7C,?), ref: 00DF7C4A
    • CLSIDFromProgID.OLE32(?,?,00000000,00E2FB80,000000FF,?,00000000,00000800,00000000,?,00E32C7C,?), ref: 00DF7C6F
    • _memcmp.LIBCMT ref: 00DF7C90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FromProg$FreeTask_memcmp
    • String ID: ,,
    • API String ID: 314563124-1556401989
    • Opcode ID: 24a5e27459b52bf4214cd26b8c646a5a6d1a6d8c6b7fcd9aaaf929ceab98cb0a
    • Instruction ID: 7776e4b9420cfb5877fa421eb9c3dfee0d0f4eb915823e3359d7d115edf71296
    • Opcode Fuzzy Hash: 24a5e27459b52bf4214cd26b8c646a5a6d1a6d8c6b7fcd9aaaf929ceab98cb0a
    • Instruction Fuzzy Hash: 94810C75A00109EFCB04DF94C984EEEB7B9FF89315F258198F515AB250DB71AE06CB60
    APIs
    • VariantInit.OLEAUT32(?), ref: 00E18928
    • CharUpperBuffW.USER32(?,?), ref: 00E18A37
    • VariantClear.OLEAUT32(?), ref: 00E18BAF
      • Part of subcall function 00E07804: VariantInit.OLEAUT32(00000000), ref: 00E07844
      • Part of subcall function 00E07804: VariantCopy.OLEAUT32(00000000,?), ref: 00E0784D
      • Part of subcall function 00E07804: VariantClear.OLEAUT32(00000000), ref: 00E07859
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Variant$ClearInit$BuffCharCopyUpper
    • String ID: AUTOIT.ERROR$Incorrect Parameter format
    • API String ID: 4237274167-1221869570
    • Opcode ID: 92c62792ba069c7e117bcf2603c10f3813b81ab8c683393e6f59f1ffd8ea219a
    • Instruction ID: 7b5e406b7aa355ba8a50c8b837921f8a61bbbf39d82028bd7c2e33d115bc8da4
    • Opcode Fuzzy Hash: 92c62792ba069c7e117bcf2603c10f3813b81ab8c683393e6f59f1ffd8ea219a
    • Instruction Fuzzy Hash: 01917D756083019FC710DF24C5849ABBBF4EF89314F04996EF89A9B362DB31E945CB62
    APIs
      • Part of subcall function 00DBFEC6: _wcscpy.LIBCMT ref: 00DBFEE9
    • _memset.LIBCMT ref: 00E03077
    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E030A6
    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E03159
    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E03187
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ItemMenu$Info$Default_memset_wcscpy
    • String ID: 0
    • API String ID: 4152858687-4108050209
    • Opcode ID: 79cb2d5dc1a023c64d89e686648cf99454a47ea77686a2e6381d47836737e2b1
    • Instruction ID: 3d09edb3597169d73e83a270c6780465c025e649215c302777d6225ef614893c
    • Opcode Fuzzy Hash: 79cb2d5dc1a023c64d89e686648cf99454a47ea77686a2e6381d47836737e2b1
    • Instruction Fuzzy Hash: 4E51B03160A3019ED7259F38D845A6BB7E8EF99354F041A2EF895F31D1DB70CE8487A2
    APIs
    • _memset.LIBCMT ref: 00E02CAF
    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00E02CCB
    • DeleteMenu.USER32(?,00000007,00000000), ref: 00E02D11
    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00E66890,00000000), ref: 00E02D5A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Menu$Delete$InfoItem_memset
    • String ID: 0
    • API String ID: 1173514356-4108050209
    • Opcode ID: d72d6b5690f2d6b89be3ca424ef89cb08b2b5cfa2edff0c6a73556ca7ec99cd4
    • Instruction ID: 59ea5b4f3f30c9719f080323b31a1eb458f75df4d04f82502e104e4887b0d702
    • Opcode Fuzzy Hash: d72d6b5690f2d6b89be3ca424ef89cb08b2b5cfa2edff0c6a73556ca7ec99cd4
    • Instruction Fuzzy Hash: 5E4180312043029FD724DF24C889B5ABBE8EF85324F14466DFA65A72D1D770ED45CBA2
    APIs
    • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00E1DAD9
      • Part of subcall function 00DA79AB: _memmove.LIBCMT ref: 00DA79F9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharLower_memmove
    • String ID: cdecl$none$stdcall$winapi
    • API String ID: 3425801089-567219261
    • Opcode ID: 165092576dc8f8038060734417457f049264e220f0a8ed92b3dc576eb497b255
    • Instruction ID: 2295c5be0c5617aede080a1a5cc54ea5c93a2f45c44d560f17fe69ddfeed4e1e
    • Opcode Fuzzy Hash: 165092576dc8f8038060734417457f049264e220f0a8ed92b3dc576eb497b255
    • Instruction Fuzzy Hash: 5731947150861AEFCF10EF54CC81DEEB7B4FF45314B108A29E866A76D1DB31AA45CBA0
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00DFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00DFB0E7
    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00DF93F6
    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00DF9409
    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00DF9439
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$_memmove$ClassName
    • String ID: ComboBox$ListBox
    • API String ID: 365058703-1403004172
    • Opcode ID: 056614722287551f8d5af207f010a8d653e0cd3bc553f2620d6f83950f31cffb
    • Instruction ID: 910b283a7111549669f249f35d21afaa144c11df1c67ecda2f4e623f25aed9e7
    • Opcode Fuzzy Hash: 056614722287551f8d5af207f010a8d653e0cd3bc553f2620d6f83950f31cffb
    • Instruction Fuzzy Hash: 7721E471E00108AEDB14ABB0DC95DFFF778DF06360B158129FA25A71E1DB355A0A9670
    APIs
    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DDD5EC
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    • _memset.LIBCMT ref: 00DA418D
    • _wcscpy.LIBCMT ref: 00DA41E1
    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DA41F1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
    • String ID: Line:
    • API String ID: 3942752672-1585850449
    • Opcode ID: 086bfa691c83fb8a075b47f7901592a89eea719188f530cc9b3b67ab62e12347
    • Instruction ID: 762b7aed35ec24e04d216d3666d8f356fd256456c5a6b27490a48439cdcffa06
    • Opcode Fuzzy Hash: 086bfa691c83fb8a075b47f7901592a89eea719188f530cc9b3b67ab62e12347
    • Instruction Fuzzy Hash: A931D371008305AED721EB60EC56FDB77E8EF96310F14451EF185A20A1EBB0A64DC7B2
    APIs
    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E11B40
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E11B66
    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E11B96
    • InternetCloseHandle.WININET(00000000), ref: 00E11BDD
      • Part of subcall function 00E12777: GetLastError.KERNEL32(?,?,00E11B0B,00000000,00000000,00000001), ref: 00E1278C
      • Part of subcall function 00E12777: SetEvent.KERNEL32(?,?,00E11B0B,00000000,00000000,00000001), ref: 00E127A1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
    • String ID:
    • API String ID: 3113390036-3916222277
    • Opcode ID: d5e8f7ca34430618246ca722481c181055245e0c50236286d5a9df2c7b253d89
    • Instruction ID: 8c6ed29d27702e14acf41df8de95defeee0ce444ccde99d3a1ca8ac142dd60ce
    • Opcode Fuzzy Hash: d5e8f7ca34430618246ca722481c181055245e0c50236286d5a9df2c7b253d89
    • Instruction Fuzzy Hash: 1B21CFB1504208BFEB219F218CC5EFF76FCEB49B48F10516AF605B2240EA309D4997B1
    APIs
      • Part of subcall function 00DA1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DA1D73
      • Part of subcall function 00DA1D35: GetStockObject.GDI32(00000011), ref: 00DA1D87
      • Part of subcall function 00DA1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA1D91
    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E266D0
    • LoadLibraryW.KERNEL32(?), ref: 00E266D7
    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E266EC
    • DestroyWindow.USER32(?), ref: 00E266F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
    • String ID: SysAnimate32
    • API String ID: 4146253029-1011021900
    • Opcode ID: 0404790bfcb7dca3c4040b64a8d0f47b6061694da58a840c2796083ca7bc51c0
    • Instruction ID: 0d9f3a3b3ff32175d1b1cc0988a7b0abefcf55f36e2c214749dd197d4c93d132
    • Opcode Fuzzy Hash: 0404790bfcb7dca3c4040b64a8d0f47b6061694da58a840c2796083ca7bc51c0
    • Instruction Fuzzy Hash: 80216D7120021AAFEF104F64FC80EBB77ADEB59768F106729F911B61A0D7B1DC519760
    APIs
    • GetStdHandle.KERNEL32(0000000C), ref: 00E0705E
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E07091
    • GetStdHandle.KERNEL32(0000000C), ref: 00E070A3
    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00E070DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CreateHandle$FilePipe
    • String ID: nul
    • API String ID: 4209266947-2873401336
    • Opcode ID: 73c40cf722b937168ce91687852b38e6a38183d8e377e28e083f9493a891821d
    • Instruction ID: d1a004b4935c1405b6141d00a5a07fc558c5747f2db93b71338f2de5bbc81690
    • Opcode Fuzzy Hash: 73c40cf722b937168ce91687852b38e6a38183d8e377e28e083f9493a891821d
    • Instruction Fuzzy Hash: 85217F75A04209ABDB209F69DC05A9A77B8BF45724F205B29FCE0E72D0D770A891CB50
    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 00E0712B
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E0715D
    • GetStdHandle.KERNEL32(000000F6), ref: 00E0716E
    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00E071A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CreateHandle$FilePipe
    • String ID: nul
    • API String ID: 4209266947-2873401336
    • Opcode ID: 8a77bfefea10834af04d7e3a7082b21cbf74aca5bdbecdaf59ac0ea46d764fd6
    • Instruction ID: a8658f0f6a80d9f11c1caf3fbff9ee5e11ca47ea83e5dd81d5e504ba46f4dc7b
    • Opcode Fuzzy Hash: 8a77bfefea10834af04d7e3a7082b21cbf74aca5bdbecdaf59ac0ea46d764fd6
    • Instruction Fuzzy Hash: BE21A475A093069BDB209F699C04A9977E8AF55724F201619FDE0F32D0D770A8928750
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00E0AEBF
    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E0AF13
    • __swprintf.LIBCMT ref: 00E0AF2C
    • SetErrorMode.KERNEL32(00000000,00000001,00000000,00E2F910), ref: 00E0AF6A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume__swprintf
    • String ID: %lu
    • API String ID: 3164766367-685833217
    • Opcode ID: c38d97425d9822ae94d5f0760ee0be71c0defc22700fe9a5c5f921e630b2cc3a
    • Instruction ID: a4bc97154cbcf49d12dc51e9e9f4337d7a88c3666763b68ee6cc2fb1eaaf6a25
    • Opcode Fuzzy Hash: c38d97425d9822ae94d5f0760ee0be71c0defc22700fe9a5c5f921e630b2cc3a
    • Instruction Fuzzy Hash: EA218634600209AFCB10EF65CD85DAEBBB8EF49704B044079F905EB251DB31EA45CB31
    APIs
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
      • Part of subcall function 00DFA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00DFA399
      • Part of subcall function 00DFA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DFA3AC
      • Part of subcall function 00DFA37C: GetCurrentThreadId.KERNEL32 ref: 00DFA3B3
      • Part of subcall function 00DFA37C: AttachThreadInput.USER32(00000000), ref: 00DFA3BA
    • GetFocus.USER32 ref: 00DFA554
      • Part of subcall function 00DFA3C5: GetParent.USER32(?), ref: 00DFA3D3
    • GetClassNameW.USER32(?,?,00000100), ref: 00DFA59D
    • EnumChildWindows.USER32(?,00DFA615), ref: 00DFA5C5
    • __swprintf.LIBCMT ref: 00DFA5DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
    • String ID: %s%d
    • API String ID: 1941087503-1110647743
    • Opcode ID: 491b7541cc74870cca8d006af75a46a61d83ac99590a59693cff9ceda2acdd68
    • Instruction ID: a4dc3a9b142a7db1ead42cd5a54c767542a6b8174ff893d0d9c15e35a036982f
    • Opcode Fuzzy Hash: 491b7541cc74870cca8d006af75a46a61d83ac99590a59693cff9ceda2acdd68
    • Instruction Fuzzy Hash: 251160B1604209ABDF117FA8EC85FFA37B8DF49700F048075FA0CAA152DA7459498B76
    APIs
    • CharUpperBuffW.USER32(?,?), ref: 00E02048
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharUpper
    • String ID: APPEND$EXISTS$KEYS$REMOVE
    • API String ID: 3964851224-769500911
    • Opcode ID: 00ba811447a0f63de428428ac8ff74826edcef1b6645b19cd262eac6ca796ddd
    • Instruction ID: b0c8f8aa9cb47311fa1c1155db815970e42514d71a10a8c9023c73c0451a41c7
    • Opcode Fuzzy Hash: 00ba811447a0f63de428428ac8ff74826edcef1b6645b19cd262eac6ca796ddd
    • Instruction Fuzzy Hash: 62115E7090021ACFCF00EFA4D9519EEB7B4FF56304B109968D95677291EB326E0ACB60
    APIs
    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E1EF1B
    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E1EF4B
    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00E1F07E
    • CloseHandle.KERNEL32(?), ref: 00E1F0FF
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Process$CloseCountersHandleInfoMemoryOpen
    • String ID:
    • API String ID: 2364364464-0
    • Opcode ID: 87ec8b8a44fbddbf5fd9001e914a1c1b188da4fc17dba455188af537d39f902f
    • Instruction ID: 24b86c04d9744a2d2c1bbf2f34bf0c77615013b5f303ab2411163c469d3af35d
    • Opcode Fuzzy Hash: 87ec8b8a44fbddbf5fd9001e914a1c1b188da4fc17dba455188af537d39f902f
    • Instruction Fuzzy Hash: 258171B16043009FD720DF24C856F6AF7E5EF48720F14881DF995EB292DB71AD418BA2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
    • String ID:
    • API String ID: 1559183368-0
    • Opcode ID: fd1a262b7e6f1cb596d0076786feeeb097306c284ce0f321d4276a437e8c5e71
    • Instruction ID: c7cceca272f9b2f798a17956104480886dd47eb2b969799b78f20b2dc86f86e8
    • Opcode Fuzzy Hash: fd1a262b7e6f1cb596d0076786feeeb097306c284ce0f321d4276a437e8c5e71
    • Instruction Fuzzy Hash: 1C518534A00B07DBDB249E69A880F6E77A1EF40320F68872DF825972D4D770ADD19B70
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00E210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E20038,?,?), ref: 00E210BC
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E20388
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E203C7
    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E2040E
    • RegCloseKey.ADVAPI32(?,?), ref: 00E2043A
    • RegCloseKey.ADVAPI32(00000000), ref: 00E20447
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
    • String ID:
    • API String ID: 3440857362-0
    • Opcode ID: 31d1d5b966caff64ca209cd48a0722765c885c49d07c61dcdbd8e4f3afa4d4a4
    • Instruction ID: f2c2afb5b88a36c67c45c0e32bebee2f564d1fe3b57c4f7206b111af17b3ac7e
    • Opcode Fuzzy Hash: 31d1d5b966caff64ca209cd48a0722765c885c49d07c61dcdbd8e4f3afa4d4a4
    • Instruction Fuzzy Hash: 7C514A31208204AFD714EF64DC91E6EB7E8FF85714F04992DF595AB2A2DB30E905CB62
    APIs
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00E1DC3B
    • GetProcAddress.KERNEL32(00000000,?), ref: 00E1DCBE
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E1DCDA
    • GetProcAddress.KERNEL32(00000000,?), ref: 00E1DD1B
    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00E1DD35
      • Part of subcall function 00DA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E07B20,?,?,00000000), ref: 00DA5B8C
      • Part of subcall function 00DA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E07B20,?,?,00000000,?,?), ref: 00DA5BB0
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
    • String ID:
    • API String ID: 327935632-0
    • Opcode ID: 687d9eef2f7d6c1d96a6e82382d714142c33ff0882e342930964730bd5a19217
    • Instruction ID: 560e267e3abead5671d1886660590e7bc738e4c597d282aec38f1a468df3bfab
    • Opcode Fuzzy Hash: 687d9eef2f7d6c1d96a6e82382d714142c33ff0882e342930964730bd5a19217
    • Instruction Fuzzy Hash: D5512735A046059FCB00EF68D8949EDF7F4FF59324B058569E819AB322DB30ED85CBA1
    APIs
    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E0E88A
    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00E0E8B3
    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E0E8F2
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E0E917
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E0E91F
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
    • String ID:
    • API String ID: 1389676194-0
    • Opcode ID: 8d9217a9310a0e5f9cad310ad204c9e0aa7ff81b153d394b51fadda4e394b1b0
    • Instruction ID: 11da52734247805a0673322f500b7f5b22f531d99b0ce4d89585c40aecf217c8
    • Opcode Fuzzy Hash: 8d9217a9310a0e5f9cad310ad204c9e0aa7ff81b153d394b51fadda4e394b1b0
    • Instruction Fuzzy Hash: A8513B35A00205EFCB04EF64C991AAEBBF5EF09314B1484A9E849AB361CB31ED41DF60
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b6014a969f45e4c91a0907ac1361fffe73a09347cc3893e6651d318342ec2570
    • Instruction ID: f3e2b40771f9a0eba2ebe26694cfdbc92f5b4e0d59c958676dbdcf0f34b601cc
    • Opcode Fuzzy Hash: b6014a969f45e4c91a0907ac1361fffe73a09347cc3893e6651d318342ec2570
    • Instruction Fuzzy Hash: C641D035900224AFC724EF28EC48FADBBA9EB09310F1C1175E865B72E1D770AD45DA91
    APIs
    • GetCursorPos.USER32(?), ref: 00DA2357
    • ScreenToClient.USER32(00E667B0,?), ref: 00DA2374
    • GetAsyncKeyState.USER32(00000001), ref: 00DA2399
    • GetAsyncKeyState.USER32(00000002), ref: 00DA23A7
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AsyncState$ClientCursorScreen
    • String ID:
    • API String ID: 4210589936-0
    • Opcode ID: 024f7e3fe027943deaf285fa6425711311edccb5a0b42c18b7af04f8a73935ff
    • Instruction ID: 2a8fc0356726942e749251ea8e4cb1c2cac2cd03f0bda63508489200e325d921
    • Opcode Fuzzy Hash: 024f7e3fe027943deaf285fa6425711311edccb5a0b42c18b7af04f8a73935ff
    • Instruction Fuzzy Hash: 1D417F3150411AFFDF159FA9CC44AEEBBB4FF46324F24432AF869A2290C7349954DBA1
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DF695D
    • TranslateAcceleratorW.USER32(?,?,?), ref: 00DF69A9
    • TranslateMessage.USER32(?), ref: 00DF69D2
    • DispatchMessageW.USER32(?), ref: 00DF69DC
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DF69EB
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Message$PeekTranslate$AcceleratorDispatch
    • String ID:
    • API String ID: 2108273632-0
    • Opcode ID: e2dd13e32293c00503eabc765cc53605fff260e52ca32e6beca67b5f031623f2
    • Instruction ID: d577cc8e0dfc92d4cee0904814396dc7a89f938af3060613f65a8305cb4426f2
    • Opcode Fuzzy Hash: e2dd13e32293c00503eabc765cc53605fff260e52ca32e6beca67b5f031623f2
    • Instruction Fuzzy Hash: 2331043050024AAFCB208F719C44FB67BB8EB01350F198129E625E2861D7B1D98DCBB0
    APIs
    • GetWindowRect.USER32(?,?), ref: 00DF8F12
    • PostMessageW.USER32(?,00000201,00000001), ref: 00DF8FBC
    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00DF8FC4
    • PostMessageW.USER32(?,00000202,00000000), ref: 00DF8FD2
    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00DF8FDA
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessagePostSleep$RectWindow
    • String ID:
    • API String ID: 3382505437-0
    • Opcode ID: 5a9a36f35babc741564a2dc0b7058583edd89a0166796797dbe68d52209d5b29
    • Instruction ID: 262260ea30e053198e3aa0701550a60b468fbca8fc13cfc0acdc7594c1b96d31
    • Opcode Fuzzy Hash: 5a9a36f35babc741564a2dc0b7058583edd89a0166796797dbe68d52209d5b29
    • Instruction Fuzzy Hash: 2F31CF7190021DEFDB10CF68D948AAE7BB6FF04315F118229FA24A61D0C7709914DBA2
    APIs
    • IsWindowVisible.USER32(?), ref: 00DFB6C7
    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00DFB6E4
    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00DFB71C
    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00DFB742
    • _wcsstr.LIBCMT ref: 00DFB74C
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
    • String ID:
    • API String ID: 3902887630-0
    • Opcode ID: 7e864eb3b0bfb18346b2bd8f024c3a2df27447fcd8310928c31462511fce36a9
    • Instruction ID: ead02ce1e426d93abba558f1ed573e06580a26c0b0472d3492be4baa0b6fffc8
    • Opcode Fuzzy Hash: 7e864eb3b0bfb18346b2bd8f024c3a2df27447fcd8310928c31462511fce36a9
    • Instruction Fuzzy Hash: A9210731204208BEEB256B79DC49E7B7BADDF49720F15803EFD05DA1A1EB61DC4196B0
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • GetWindowLongW.USER32(?,000000F0), ref: 00E2B44C
    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00E2B471
    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E2B489
    • GetSystemMetrics.USER32(00000004), ref: 00E2B4B2
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00E11184,00000000), ref: 00E2B4D0
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$Long$MetricsSystem
    • String ID:
    • API String ID: 2294984445-0
    • Opcode ID: 161df28a6223d7c5d0c4e8e2a9a99b9f37d50a2e9b5227649a7a077ba78f3be9
    • Instruction ID: 928ef666baf71bacc0cae89f20e24d9b159e5f4981d683628967efb1e3f58c64
    • Opcode Fuzzy Hash: 161df28a6223d7c5d0c4e8e2a9a99b9f37d50a2e9b5227649a7a077ba78f3be9
    • Instruction Fuzzy Hash: 5F219131510266AFCB24AF39EC88A6A77A4FB05725F145738F936E31E2F7309811DB90
    APIs
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DF9802
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00DF9834
    • __itow.LIBCMT ref: 00DF984C
    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00DF9874
    • __itow.LIBCMT ref: 00DF9885
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$__itow$_memmove
    • String ID:
    • API String ID: 2983881199-0
    • Opcode ID: 72074d700e59bcb51149d170c3458baac2383c199ec1210d6c090e831cbc065e
    • Instruction ID: 71830636cb3011f4011d351891195bf8f927572a565ad1e079ed154cf0537acc
    • Opcode Fuzzy Hash: 72074d700e59bcb51149d170c3458baac2383c199ec1210d6c090e831cbc065e
    • Instruction Fuzzy Hash: 1521B871A0020CABDB109A658C96FFE7BA8DF4A750F098035FE04AB251D6708D4587F1
    APIs
    • IsWindow.USER32(00000000), ref: 00E15D81
    • GetForegroundWindow.USER32 ref: 00E15D98
    • GetDC.USER32(00000000), ref: 00E15DD4
    • GetPixel.GDI32(00000000,?,00000003), ref: 00E15DE0
    • ReleaseDC.USER32(00000000,00000003), ref: 00E15E1B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$ForegroundPixelRelease
    • String ID:
    • API String ID: 4156661090-0
    • Opcode ID: ae06100dad23a922b5ef281d0edb3dda4ece6a57a894bbdf55b21dea72d22de7
    • Instruction ID: 980d4a9399e2598220ef5695dfcbc15d32f5c1383e52600c045c36292d0dc758
    • Opcode Fuzzy Hash: ae06100dad23a922b5ef281d0edb3dda4ece6a57a894bbdf55b21dea72d22de7
    • Instruction Fuzzy Hash: F521A136A00104EFD714EF65DD88AAAB7F5EF89310F048479F84AA7261CA30AD45CBA0
    APIs
    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DA134D
    • SelectObject.GDI32(?,00000000), ref: 00DA135C
    • BeginPath.GDI32(?), ref: 00DA1373
    • SelectObject.GDI32(?,00000000), ref: 00DA139C
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ObjectSelect$BeginCreatePath
    • String ID:
    • API String ID: 3225163088-0
    • Opcode ID: de4d9c3b03bf074dd0fca0bcf02987a05b1f08e37f5e759050fec5572d36ed98
    • Instruction ID: ad9a09925793190e768cc4a36b461656d0ce02c457baededc9a464977ad584b5
    • Opcode Fuzzy Hash: de4d9c3b03bf074dd0fca0bcf02987a05b1f08e37f5e759050fec5572d36ed98
    • Instruction Fuzzy Hash: 8A213074810204EFDF159F66FC05B6E7FB8FB01361F188226F810A75A1D7B19999DBA0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memcmp
    • String ID:
    • API String ID: 2931989736-0
    • Opcode ID: f3324ec192a9712c996814861f54dda9eda55fb078a0b3d36ef8907d5ee13d7e
    • Instruction ID: 8d5fac67d3127b14bf4cde54906cc4f91577f99bbc6b54aa19fb01b43e6deb6d
    • Opcode Fuzzy Hash: f3324ec192a9712c996814861f54dda9eda55fb078a0b3d36ef8907d5ee13d7e
    • Instruction Fuzzy Hash: B501D67165431E3BD614B6205E56F7B675CDB11394F09D018FF04A7283E650EE31C2B0
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00E04D5C
    • __beginthreadex.LIBCMT ref: 00E04D7A
    • MessageBoxW.USER32(?,?,?,?), ref: 00E04D8F
    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E04DA5
    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E04DAC
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
    • String ID:
    • API String ID: 3824534824-0
    • Opcode ID: 164cd135712a8b6af964ffd5897d0bc0aaf9d5a8daaf3ad2d562900375ee657d
    • Instruction ID: 68a1defad6dfeac48b080b7d786828ddd86a8f5c6b4daf0af4e633b84f4bd78d
    • Opcode Fuzzy Hash: 164cd135712a8b6af964ffd5897d0bc0aaf9d5a8daaf3ad2d562900375ee657d
    • Instruction Fuzzy Hash: 5611E5B2904209BFC7119BA9AC04A9B7BACEB45324F144269F914F32E1D6B18D4887A0
    APIs
    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DF8766
    • GetLastError.KERNEL32(?,00DF822A,?,?,?), ref: 00DF8770
    • GetProcessHeap.KERNEL32(00000008,?,?,00DF822A,?,?,?), ref: 00DF877F
    • HeapAlloc.KERNEL32(00000000,?,00DF822A,?,?,?), ref: 00DF8786
    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DF879D
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
    • String ID:
    • API String ID: 842720411-0
    • Opcode ID: 1b81d422558397c8e4f87de8cfa4d7a2ee58f934a79094c8e422769fbad1e3c1
    • Instruction ID: 0987885d558474493524b66b68c1cf68321f4ae7b8621aba1d02b3b9fd65e060
    • Opcode Fuzzy Hash: 1b81d422558397c8e4f87de8cfa4d7a2ee58f934a79094c8e422769fbad1e3c1
    • Instruction Fuzzy Hash: 1D014B71601208EFDB205FA6DC89D6B7BBCEF897557204439F949D6260DA318C16DA70
    APIs
    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E05502
    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00E05510
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E05518
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00E05522
    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E0555E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: PerformanceQuery$CounterSleep$Frequency
    • String ID:
    • API String ID: 2833360925-0
    • Opcode ID: 08dd0ceae684f8430cedfe4b28c7cb9e0fbe576a17653f2e1f1f96e1f476304b
    • Instruction ID: a449af9cf80b9b20ff6735ff25d3951a8ef5a036ca25e1b26d5417839ae353c2
    • Opcode Fuzzy Hash: 08dd0ceae684f8430cedfe4b28c7cb9e0fbe576a17653f2e1f1f96e1f476304b
    • Instruction Fuzzy Hash: ED016D36D01A19DBCF10DFE9EC496EEBB79FB09711F410066E901B2180DB3096A5CBA1
    APIs
    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?,?,?,00DF799D), ref: 00DF766F
    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?,?), ref: 00DF768A
    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?,?), ref: 00DF7698
    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?), ref: 00DF76A8
    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00DF758C,80070057,?,?), ref: 00DF76B4
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: From$Prog$FreeStringTasklstrcmpi
    • String ID:
    • API String ID: 3897988419-0
    • Opcode ID: 0443af7fa29c12e65d57b9304c7d166d3c55adfacfa8cc4e0318430d1c5e2a4f
    • Instruction ID: c78ee6af3d7d4d31400417fa2331dd1a4f7935957b5ff6243ff68ac88dceb14c
    • Opcode Fuzzy Hash: 0443af7fa29c12e65d57b9304c7d166d3c55adfacfa8cc4e0318430d1c5e2a4f
    • Instruction Fuzzy Hash: 0F01D472600608BFDB248F19DC04BAABBBCEB44751F154038FE08E2211EB31DD0187B0
    APIs
    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DF8608
    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DF8612
    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DF8621
    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DF8628
    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DF863E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HeapInformationToken$AllocErrorLastProcess
    • String ID:
    • API String ID: 44706859-0
    • Opcode ID: e089b5f84cb7d868593149ddd3c04477fac6ac21ead498e28fe2f5019903bd49
    • Instruction ID: 4f304b5eca004039dbbee814093f9a6fd8b8b9afaa81ff3223579101917185be
    • Opcode Fuzzy Hash: e089b5f84cb7d868593149ddd3c04477fac6ac21ead498e28fe2f5019903bd49
    • Instruction Fuzzy Hash: 1FF03C31201208AFEB200FA6DC89E7B3BACEF89754B444435FA45D6150CB619D46EA71
    APIs
    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DF8669
    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DF8673
    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF8682
    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF8689
    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF869F
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: HeapInformationToken$AllocErrorLastProcess
    • String ID:
    • API String ID: 44706859-0
    • Opcode ID: 8098da8e6edc62774a0a24977b17e52a17f7455f8fbbf6b2bd9320c86fcb1073
    • Instruction ID: b5411ed1a94e2e7a2f92820ca3fdb680be1c2593f6f6798e750ecf6421feec4c
    • Opcode Fuzzy Hash: 8098da8e6edc62774a0a24977b17e52a17f7455f8fbbf6b2bd9320c86fcb1073
    • Instruction Fuzzy Hash: 5DF04F71201208AFEB211FA6EC88E773BBCEF89754B140035FA45D6150CB71D946EA71
    APIs
    • GetDlgItem.USER32(?,000003E9), ref: 00DFC6BA
    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00DFC6D1
    • MessageBeep.USER32(00000000), ref: 00DFC6E9
    • KillTimer.USER32(?,0000040A), ref: 00DFC705
    • EndDialog.USER32(?,00000001), ref: 00DFC71F
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BeepDialogItemKillMessageTextTimerWindow
    • String ID:
    • API String ID: 3741023627-0
    • Opcode ID: 56c67f2314a41281092556706126b3b5a720fc357b3a093ddbfb0cab8efcf4b1
    • Instruction ID: 9e40a33836922bb3c04771fc434183a735f83523f4a9d238834be71ccae7947f
    • Opcode Fuzzy Hash: 56c67f2314a41281092556706126b3b5a720fc357b3a093ddbfb0cab8efcf4b1
    • Instruction Fuzzy Hash: 2D01443051470C9BEB316B21DD4EFA67778FB00705F045569F682B14E1DBE4A9698E90
    APIs
    • EndPath.GDI32(?), ref: 00DA13BF
    • StrokeAndFillPath.GDI32(?,?,00DDBAD8,00000000,?), ref: 00DA13DB
    • SelectObject.GDI32(?,00000000), ref: 00DA13EE
    • DeleteObject.GDI32 ref: 00DA1401
    • StrokePath.GDI32(?), ref: 00DA141C
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Path$ObjectStroke$DeleteFillSelect
    • String ID:
    • API String ID: 2625713937-0
    • Opcode ID: 149b5c1c60f12dab93370d74f489e3bc2a6c4fdab0bb59f35c484dc175d65655
    • Instruction ID: 754fc2515fa1a2abf7a4cd2f205f14f5d105203654a1b04d5e310c9965ea23c0
    • Opcode Fuzzy Hash: 149b5c1c60f12dab93370d74f489e3bc2a6c4fdab0bb59f35c484dc175d65655
    • Instruction Fuzzy Hash: 54F0C934014208EFDB295F2BFD0CB593FB5A742366F088224E469A60F1C7B5899ADF60
    APIs
    • CoInitialize.OLE32(00000000), ref: 00E0C69D
    • CoCreateInstance.OLE32(00E32D6C,00000000,00000001,00E32BDC,?), ref: 00E0C6B5
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    • CoUninitialize.OLE32 ref: 00E0C922
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_memmove
    • String ID: .lnk
    • API String ID: 2683427295-24824748
    • Opcode ID: 43d712099d7304f605cf4a3b90068be03db6b352742cee6bc9e26d01bab351ce
    • Instruction ID: 20349023999828516c6f3be24de7840ff4669ac6e4c1096ce0d5a6f3f2423394
    • Opcode Fuzzy Hash: 43d712099d7304f605cf4a3b90068be03db6b352742cee6bc9e26d01bab351ce
    • Instruction Fuzzy Hash: 4EA13B71204305AFD704EF54C891EABB7E8EF95704F00492DF196971A2EB70EA49CB72
    APIs
      • Part of subcall function 00DC0FF6: std::exception::exception.LIBCMT ref: 00DC102C
      • Part of subcall function 00DC0FF6: __CxxThrowException@8.LIBCMT ref: 00DC1041
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00DA7BB1: _memmove.LIBCMT ref: 00DA7C0B
    • __swprintf.LIBCMT ref: 00DB302D
    Strings
    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00DB2EC6
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
    • API String ID: 1943609520-557222456
    • Opcode ID: 390ea8d89740673388ab0fc92a888ae7ccfd7d008850b431bbbe6a6c0f7100aa
    • Instruction ID: 2396043bbf88e7b985c41524f8a87b02a26f2f41a0d91c4be1481c6e0004372c
    • Opcode Fuzzy Hash: 390ea8d89740673388ab0fc92a888ae7ccfd7d008850b431bbbe6a6c0f7100aa
    • Instruction Fuzzy Hash: 5B916A71108341DFC728FF24D895DAEB7A4EF96750F04491DF4869B2A1EA20EE44DB72
    APIs
      • Part of subcall function 00DA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA48A1,?,?,00DA37C0,?), ref: 00DA48CE
    • CoInitialize.OLE32(00000000), ref: 00E0BC26
    • CoCreateInstance.OLE32(00E32D6C,00000000,00000001,00E32BDC,?), ref: 00E0BC3F
    • CoUninitialize.OLE32 ref: 00E0BC5C
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
    • String ID: .lnk
    • API String ID: 2126378814-24824748
    • Opcode ID: d6cc376e0f6a4cfcfe555c120608115e299e96d35c15b8f8f15b53fdfb10ce0e
    • Instruction ID: e4d19fd2b29f4eb64f27350f765c82c5a0483f4c6d69c2f3a569e7d4a0b963bd
    • Opcode Fuzzy Hash: d6cc376e0f6a4cfcfe555c120608115e299e96d35c15b8f8f15b53fdfb10ce0e
    • Instruction Fuzzy Hash: CEA167752043019FCB14DF24C494D6ABBE5FF89318F148998F899AB3A1CB31ED45CBA1
    APIs
    • OleSetContainedObject.OLE32(?,00000001), ref: 00DFB981
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ContainedObject
    • String ID: AutoIt3GUI$Container$%
    • API String ID: 3565006973-1286912533
    • Opcode ID: a39f355239cd30903ead1f1261e3ece23049c41379f0fc7b0e0121c37647b292
    • Instruction ID: 0b374a93e9bd57376b8a42440ee6e50de981e832ebc419f4a7ab928e9fef93a8
    • Opcode Fuzzy Hash: a39f355239cd30903ead1f1261e3ece23049c41379f0fc7b0e0121c37647b292
    • Instruction Fuzzy Hash: 37913A706006059FDB24DF64C885A7ABBF9FF48720F15856EFA49DB691DBB0E840CB60
    APIs
    • __startOneArgErrorHandling.LIBCMT ref: 00DC52DD
      • Part of subcall function 00DD0340: __87except.LIBCMT ref: 00DD037B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorHandling__87except__start
    • String ID: pow
    • API String ID: 2905807303-2276729525
    • Opcode ID: fe589550065c250218411c7b83d63788a65435de846633b8020c1686d46897b8
    • Instruction ID: 67bfee4d013ed2ac59758dc0b924819ac830d35e30889c766e49bc7f25b2a58b
    • Opcode Fuzzy Hash: fe589550065c250218411c7b83d63788a65435de846633b8020c1686d46897b8
    • Instruction Fuzzy Hash: 62516961A0CA078ACB117714E901B6F6FD4DB80350F28495EE4C5833EEEE74DCD89A7A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID: #$+
    • API String ID: 0-2552117581
    • Opcode ID: 6ef6cbb2583be982264502d870d516c2579347136ba2f86ae4345ca4cc0b0818
    • Instruction ID: 3e448a69f0ff2d9e8e1e9238effa2437fbcb914162c694aa8f64c779b7b03f5a
    • Opcode Fuzzy Hash: 6ef6cbb2583be982264502d870d516c2579347136ba2f86ae4345ca4cc0b0818
    • Instruction Fuzzy Hash: 1D51547510664ACFCF259F28E888BF97BA4EF16310F1C8059EA919B2A4D7349D42C770
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memset$_memmove
    • String ID: ERCP
    • API String ID: 2532777613-1384759551
    • Opcode ID: a14e1ef74fe5096ec05b7393ebe5146c00d41ad2e2ff156fd228fa336307cdb8
    • Instruction ID: 70a0afb315b7af952233956a8f9de69b812286edb1eab8acb4b16203aea3900b
    • Opcode Fuzzy Hash: a14e1ef74fe5096ec05b7393ebe5146c00d41ad2e2ff156fd228fa336307cdb8
    • Instruction Fuzzy Hash: BD51AD71904709DBDB24CF65C881BEABBE4EF04314F24856EEA8ADB241E775D684CB60
    APIs
      • Part of subcall function 00E019CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DF9778,?,?,00000034,00000800,?,00000034), ref: 00E019F6
    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00DF9D21
      • Part of subcall function 00E01997: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DF97A7,?,?,00000800,?,00001073,00000000,?,?), ref: 00E019C1
      • Part of subcall function 00E018EE: GetWindowThreadProcessId.USER32(?,?), ref: 00E01919
      • Part of subcall function 00E018EE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00DF973C,00000034,?,?,00001004,00000000,00000000), ref: 00E01929
      • Part of subcall function 00E018EE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00DF973C,00000034,?,?,00001004,00000000,00000000), ref: 00E0193F
    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DF9D8E
    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DF9DDB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
    • String ID: @
    • API String ID: 4150878124-2766056989
    • Opcode ID: 431aaf47cd95cd748e05e53d82d9709d3604f15a6a31f105c5a74892a24bc01e
    • Instruction ID: 0fe71c8d62a2287e76be5bc3c2da2d05d010da877d597a1e8d659ff9f4953e07
    • Opcode Fuzzy Hash: 431aaf47cd95cd748e05e53d82d9709d3604f15a6a31f105c5a74892a24bc01e
    • Instruction Fuzzy Hash: 75413C76D0121CAFDB14DBA4CC51BEEBBB8EB49300F104095FA45B7191DA706E89CBA0
    APIs
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E2F910,00000000,?,?,?,?), ref: 00E27C4E
    • GetWindowLongW.USER32 ref: 00E27C6B
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E27C7B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$Long
    • String ID: SysTreeView32
    • API String ID: 847901565-1698111956
    • Opcode ID: d75887f7b486b1c54a855dad100a137686e105fb28c9a9fffd3d188137a3a7f0
    • Instruction ID: b922b96f8b7524079bc19f7c01d8b3587564efd72b4b2a0cb04562f55693158a
    • Opcode Fuzzy Hash: d75887f7b486b1c54a855dad100a137686e105fb28c9a9fffd3d188137a3a7f0
    • Instruction Fuzzy Hash: A931B231204215AFDB158F38EC46BEB77A9EF59328F245725F8B5B22E0C731E8519B60
    APIs
    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00E276D0
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00E276E4
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E27708
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$Window
    • String ID: SysMonthCal32
    • API String ID: 2326795674-1439706946
    • Opcode ID: fa5ad2d7815f2c044440f1894315683359a55bdd51cdd68a439b4deb99a142d1
    • Instruction ID: 3dd13d1d659e72be7bb83192536e9d4e91250407965127feae1d3e68c0900748
    • Opcode Fuzzy Hash: fa5ad2d7815f2c044440f1894315683359a55bdd51cdd68a439b4deb99a142d1
    • Instruction Fuzzy Hash: C421BF32500229BBDF258F64DC46FEA3BB9EB48714F111214FE557B1D0D6B1A8558BA0
    APIs
    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E26FAA
    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E26FBA
    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E26FDF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend$MoveWindow
    • String ID: Listbox
    • API String ID: 3315199576-2633736733
    • Opcode ID: 958c715214e0df31d40ffa7b8b24b4bcee19d5d5f8aa469ed1b9a40bedd0b83b
    • Instruction ID: 23f5c03868159d557ae02e549256a5fb3cebcb8268e75e4afb89c3a45a5f2b47
    • Opcode Fuzzy Hash: 958c715214e0df31d40ffa7b8b24b4bcee19d5d5f8aa469ed1b9a40bedd0b83b
    • Instruction Fuzzy Hash: 582195327101287FEF158F54EC85EAB37AAEF89754F019224F914A7190C671AC5187A0
    APIs
    • __snwprintf.LIBCMT ref: 00E13D5A
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __snwprintf_memmove
    • String ID: , $$AUTOITCALLVARIABLE%d$%
    • API String ID: 3506404897-3879706725
    • Opcode ID: 3551720c57163fd9bef592087a1029c6398ceaf0bbce2ca99f33be1f6c2973c7
    • Instruction ID: 850c270ffac7cefc6debdb88a5d068de8bbf9d1b4dd806f2255774464bd24e1d
    • Opcode Fuzzy Hash: 3551720c57163fd9bef592087a1029c6398ceaf0bbce2ca99f33be1f6c2973c7
    • Instruction Fuzzy Hash: EC216F71640219AECF10EF64DC82AED77A5FF45700F4054A4F905BB182DB30EA45DBB2
    APIs
    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E279E1
    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E279F6
    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E27A03
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: msctls_trackbar32
    • API String ID: 3850602802-1010561917
    • Opcode ID: 17b52be7da283c7bfbcc69daedbd6e95a104d2042f9e6cd9bdebfa816027e3cf
    • Instruction ID: ccdc4d75362a9c3630054973afa5c7681b7f0d93546b6b115b18322dd879afe0
    • Opcode Fuzzy Hash: 17b52be7da283c7bfbcc69daedbd6e95a104d2042f9e6cd9bdebfa816027e3cf
    • Instruction Fuzzy Hash: 0411E372244218BFEF249F75DC05FEB37A9EF89768F020529FA41B6090D271A851CB60
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00DA4C2E), ref: 00DA4CA3
    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00DA4CB5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetNativeSystemInfo$kernel32.dll
    • API String ID: 2574300362-192647395
    • Opcode ID: e2165bb12f0b7e5db04905cd95a52c7be91d05f0134e8fd43be005504b8c71f8
    • Instruction ID: c4989feea630ee348efa8ad9c68ab05f8d1d3e53cd4ad2e76c085736ca8e9c5a
    • Opcode Fuzzy Hash: e2165bb12f0b7e5db04905cd95a52c7be91d05f0134e8fd43be005504b8c71f8
    • Instruction Fuzzy Hash: CDD05E30511733CFD7309F32EE1860676F5AF06BA1B19C83ED88AE6150EBB0D891CA60
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00DA4CE1,?), ref: 00DA4DA2
    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DA4DB4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
    • API String ID: 2574300362-1355242751
    • Opcode ID: 0b2e410c88bdd6f7370488aad4bdf99eaa6e3f1ab11144848ba1207ce50b6645
    • Instruction ID: fbdb8e811574d2c8bda7730431c43ee8e4278fdcd1aaaa3be560539f2da3d9c7
    • Opcode Fuzzy Hash: 0b2e410c88bdd6f7370488aad4bdf99eaa6e3f1ab11144848ba1207ce50b6645
    • Instruction Fuzzy Hash: E1D01231550713CFDB305F31D80864676E4AF05755B158839D8C6E6150DBB0D495C660
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00DA4D2E,?,00DA4F4F,?,00E662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DA4D6F
    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DA4D81
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
    • API String ID: 2574300362-3689287502
    • Opcode ID: 12847f7cd2c2062abff40d6d3435afc7427088eb97fba6eed9b3ce3f9f64c797
    • Instruction ID: 9bf020a50ae58596bb1454e5c94b37ce89021519f3b69fbea9bd48251ebf7093
    • Opcode Fuzzy Hash: 12847f7cd2c2062abff40d6d3435afc7427088eb97fba6eed9b3ce3f9f64c797
    • Instruction Fuzzy Hash: A4D01730510723CFDB309F32E80861676E8BF16752B59883AD886EA290E6B0D894CA60
    APIs
    • LoadLibraryA.KERNEL32(advapi32.dll,?,00E212C1), ref: 00E21080
    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E21092
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: RegDeleteKeyExW$advapi32.dll
    • API String ID: 2574300362-4033151799
    • Opcode ID: 0077a23de126a3b219ff4088009162e1024233b59d74a72c80329e2e7dce95f4
    • Instruction ID: dc3b6015285cdc3383e571b892d493cb8fe5fb258f042cfbe81a1acf72e7483b
    • Opcode Fuzzy Hash: 0077a23de126a3b219ff4088009162e1024233b59d74a72c80329e2e7dce95f4
    • Instruction Fuzzy Hash: 15D01234510722CFD7305F35E81892676F4BF15756F119C79E885F6560D770C4C4C650
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00E19009,?,00E2F910), ref: 00E19403
    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00E19415
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetModuleHandleExW$kernel32.dll
    • API String ID: 2574300362-199464113
    • Opcode ID: d884134aa8f398203cae49918aa4ef169d91ebb1307e4e36744ed7bf7a2ae732
    • Instruction ID: 7457d8120008ecc993b3736b367e58c6b838c3eca8aedb0f1d296558c95fa207
    • Opcode Fuzzy Hash: d884134aa8f398203cae49918aa4ef169d91ebb1307e4e36744ed7bf7a2ae732
    • Instruction Fuzzy Hash: 34D0C730500323CFC7309F32DA48243B6E4AF08342B04D83AE892F2552E670E8C4CA10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LocalTime__swprintf
    • String ID: %.3d$WIN_XPe
    • API String ID: 2070861257-2409531811
    • Opcode ID: 3935ec488719c502f783fdc467e42ccbde62d4917b199cef556feb39570c2965
    • Instruction ID: 8c51a8407097fd2aec30dd6b545e68879a1e46339c6503d96c0b253d9a536090
    • Opcode Fuzzy Hash: 3935ec488719c502f783fdc467e42ccbde62d4917b199cef556feb39570c2965
    • Instruction Fuzzy Hash: 47D012B9904159EACB54BA92CC44DFA737CAB06311F5406A2F946A2000F334DB899B31
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8874656f1541b07732125a389004ad5f550e1361d9e5d9ba151d4bf0d86bd351
    • Instruction ID: c26e8298a999bbd5e343a648d91d7d97424b1183938a89e87fb7a23cf7f5bd38
    • Opcode Fuzzy Hash: 8874656f1541b07732125a389004ad5f550e1361d9e5d9ba151d4bf0d86bd351
    • Instruction Fuzzy Hash: 4FC17E74A0421AEFCB14DF98C884EBEB7B5FF48710B168598E945EB251D770DE81CBA0
    APIs
    • CharLowerBuffW.USER32(?,?), ref: 00E1E3D2
    • CharLowerBuffW.USER32(?,?), ref: 00E1E415
      • Part of subcall function 00E1DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00E1DAD9
    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00E1E615
    • _memmove.LIBCMT ref: 00E1E628
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: BuffCharLower$AllocVirtual_memmove
    • String ID:
    • API String ID: 3659485706-0
    • Opcode ID: 8718d37e9a35585be2296c7bcdaec60a703f6e14b45cd235bd25ed6afe527086
    • Instruction ID: 880ddc5eda88da022ed6dde04626519c3dbbf10934104e3417c702eb6aa08dea
    • Opcode Fuzzy Hash: 8718d37e9a35585be2296c7bcdaec60a703f6e14b45cd235bd25ed6afe527086
    • Instruction Fuzzy Hash: 3EC15A716083019FC714DF28C4809AABBE5FF89718F14896DF899AB351D730E985CFA2
    APIs
    • CoInitialize.OLE32(00000000), ref: 00E183D8
    • CoUninitialize.OLE32 ref: 00E183E3
      • Part of subcall function 00DFDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00DFDAC5
    • VariantInit.OLEAUT32(?), ref: 00E183EE
    • VariantClear.OLEAUT32(?), ref: 00E186BF
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
    • String ID:
    • API String ID: 780911581-0
    • Opcode ID: 95f386196fba028f4a596d4da4664074c6cd18b73ab7ac6edea6a4a548c5e488
    • Instruction ID: 49fface29c8cccfe67db77d8c215ddc5c16536f55039d9f262779c7fdb80fdf1
    • Opcode Fuzzy Hash: 95f386196fba028f4a596d4da4664074c6cd18b73ab7ac6edea6a4a548c5e488
    • Instruction Fuzzy Hash: C6A136752047019FCB10DF24C591A6AB7E5FF89314F14945DF99AAB3A2CB30ED84CBA2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Variant$AllocClearCopyInitString
    • String ID:
    • API String ID: 2808897238-0
    • Opcode ID: 97d4ac02d353b0090c5399bc8cf7bbd5377d9c4a96318fb3a6451c67999a1223
    • Instruction ID: f69ae473813b6500e1bb1ef132722a1aa1301f8754bdf116ce558558f312b8f8
    • Opcode Fuzzy Hash: 97d4ac02d353b0090c5399bc8cf7bbd5377d9c4a96318fb3a6451c67999a1223
    • Instruction Fuzzy Hash: 17519831604305AADB20AF65D491A79F3F5EF49310F25C82FE696DB691DE70D8809B31
    APIs
      • Part of subcall function 00DA5045: _fseek.LIBCMT ref: 00DA505D
      • Part of subcall function 00E099BE: _wcscmp.LIBCMT ref: 00E09AAE
      • Part of subcall function 00E099BE: _wcscmp.LIBCMT ref: 00E09AC1
    • _free.LIBCMT ref: 00E0992C
    • _free.LIBCMT ref: 00E09933
    • _free.LIBCMT ref: 00E0999E
      • Part of subcall function 00DC2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00DC9C64), ref: 00DC2FA9
      • Part of subcall function 00DC2F95: GetLastError.KERNEL32(00000000,?,00DC9C64), ref: 00DC2FBB
    • _free.LIBCMT ref: 00E099A6
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
    • String ID:
    • API String ID: 1552873950-0
    • Opcode ID: 88e032742d06d326e4d6d5cc1431d5dcb2cd90c0f8f7e6ce6201bb629da5c016
    • Instruction ID: 21fb6acc1faef386893b9062e33a83d140a00ee0eeb0fb4140940397ab4814e3
    • Opcode Fuzzy Hash: 88e032742d06d326e4d6d5cc1431d5dcb2cd90c0f8f7e6ce6201bb629da5c016
    • Instruction Fuzzy Hash: EA5162B1D04218AFDF249F64DC41A9EBBB9EF48310F10449EF649A7282DB715D80CF68
    APIs
    • GetWindowRect.USER32(?,?), ref: 00E29AD2
    • ScreenToClient.USER32(00000002,00000002), ref: 00E29B05
    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00E29B72
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$ClientMoveRectScreen
    • String ID:
    • API String ID: 3880355969-0
    • Opcode ID: 4e4653bb9de09b1fe25bfdacad7d233ed713d8f949b01228d9f27190b460d7e8
    • Instruction ID: 5ef7d6c355cb2cb445a2f26be1a411363cfa04c76a43b62c30983174ddc88ac1
    • Opcode Fuzzy Hash: 4e4653bb9de09b1fe25bfdacad7d233ed713d8f949b01228d9f27190b460d7e8
    • Instruction Fuzzy Hash: E0518234A00219EFCF24CF68E8809AE7BF5FF54364F109269F815AB2A1D730AD41CB94
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
    • String ID:
    • API String ID: 2782032738-0
    • Opcode ID: 77f2016c9fe07f3f4c6b5a71a57f6989e74bda5ebcf982639f8c246fb637a88d
    • Instruction ID: fa55f9e0c2b7a80f7620f997e0f35755f810c5a7dc063ed3eb9b623bad36ab67
    • Opcode Fuzzy Hash: 77f2016c9fe07f3f4c6b5a71a57f6989e74bda5ebcf982639f8c246fb637a88d
    • Instruction Fuzzy Hash: 2841D670A006179BDF18CEA9C8A0FAF77A6EF80364B28823DE855C7640DB70DD408B74
    APIs
    • socket.WSOCK32(00000002,00000002,00000011), ref: 00E16CE4
    • WSAGetLastError.WSOCK32(00000000), ref: 00E16CF4
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E16D58
    • WSAGetLastError.WSOCK32(00000000), ref: 00E16D64
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ErrorLast$__itow__swprintfsocket
    • String ID:
    • API String ID: 2214342067-0
    • Opcode ID: fcd1512daf99383b911578879e8fd91c26333eddbfccd04b65d7a6d5587d0d5a
    • Instruction ID: 50c5a2e9fec0b6f7a5423ddc1ca2c3f6a5edab7c5854441dd3cacc51e5bc8bed
    • Opcode Fuzzy Hash: fcd1512daf99383b911578879e8fd91c26333eddbfccd04b65d7a6d5587d0d5a
    • Instruction Fuzzy Hash: E941B275740200AFEB20AF24DC96F7AB7E5DB05B14F448418FA59AF2D2DB719D018BB1
    APIs
    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00E2F910), ref: 00E167BA
    • _strlen.LIBCMT ref: 00E167EC
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _strlen
    • String ID:
    • API String ID: 4218353326-0
    • Opcode ID: 2e6c81bcdb250c770f868500fd3db67d95f65c8ef0b1bb70a5c5a2c8b7b6206b
    • Instruction ID: 5d930ad6f5c08665012fc1e99ecfc707b3c39ea379e77392ca6adb43b159f07d
    • Opcode Fuzzy Hash: 2e6c81bcdb250c770f868500fd3db67d95f65c8ef0b1bb70a5c5a2c8b7b6206b
    • Instruction Fuzzy Hash: 35417331A00504ABCB18EB64DCD5FEEB7A9EF49314F148169F915AB292DB30ED84C770
    APIs
    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E0BB09
    • GetLastError.KERNEL32(?,00000000), ref: 00E0BB2F
    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E0BB54
    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00E0BB80
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CreateHardLink$DeleteErrorFileLast
    • String ID:
    • API String ID: 3321077145-0
    • Opcode ID: 1157973f998e5e59d43c1d868c2215a6a698aeb964a7d33f6a576a3dcbf918b8
    • Instruction ID: 33335d901228c756c69157b33512494e69a2f4d60b7d1e1c99865e4021adf219
    • Opcode Fuzzy Hash: 1157973f998e5e59d43c1d868c2215a6a698aeb964a7d33f6a576a3dcbf918b8
    • Instruction Fuzzy Hash: 14411A39200610DFCB10EF25C594A5ABBF1EF4A314B099498E84AAB372CB34FD41CFA1
    APIs
    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E28B4D
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: InvalidateRect
    • String ID:
    • API String ID: 634782764-0
    • Opcode ID: 8b895be0d9f0f0c44c0f1f88ef2458e93ac70b6752a6ff5618100f4f08d71c8f
    • Instruction ID: 14e183eca22dacaddc4eff66e8a6e7088c062ba4e80c9ba9f1314b70843991ce
    • Opcode Fuzzy Hash: 8b895be0d9f0f0c44c0f1f88ef2458e93ac70b6752a6ff5618100f4f08d71c8f
    • Instruction Fuzzy Hash: D03108B8602224BFEF208F18EE55FE93765FB09314F14561AFA41F72A0CE30AD408B91
    APIs
    • ClientToScreen.USER32(?,?), ref: 00E2AE1A
    • GetWindowRect.USER32(?,?), ref: 00E2AE90
    • PtInRect.USER32(?,?,00E2C304), ref: 00E2AEA0
    • MessageBeep.USER32(00000000), ref: 00E2AF11
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Rect$BeepClientMessageScreenWindow
    • String ID:
    • API String ID: 1352109105-0
    • Opcode ID: 65c2fd47e6ec79d3eb745ff3f89e9f56cd4287a42395d3fd8c4d36bef1a5bb95
    • Instruction ID: b2d7bd0e0205a9ea8db7eaa9775b6877127b09dd47ec98856ec501f21d90144a
    • Opcode Fuzzy Hash: 65c2fd47e6ec79d3eb745ff3f89e9f56cd4287a42395d3fd8c4d36bef1a5bb95
    • Instruction Fuzzy Hash: 4B41C070600229DFCB11CF69E884AA9BBF5FB88340F1D90B9E414AB250C770A846CF92
    APIs
    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00E01037
    • SetKeyboardState.USER32(00000080,?,00000001), ref: 00E01053
    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00E010B9
    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00E0110B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: KeyboardState$InputMessagePostSend
    • String ID:
    • API String ID: 432972143-0
    • Opcode ID: 19b1d040bb58c07daf2945aa4a73974c8f0245971536a4a208ac7f7b139ab1f3
    • Instruction ID: 385244a3c27a0584450546e8be66b5693e913d81cbc49c08b6b0cfc7b7ea9428
    • Opcode Fuzzy Hash: 19b1d040bb58c07daf2945aa4a73974c8f0245971536a4a208ac7f7b139ab1f3
    • Instruction Fuzzy Hash: 83315830E40688AEFF348B668C05BFEBBB9AB45314F0863AAE5D07A1D1C3758DC59751
    APIs
    • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00E01176
    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E01192
    • PostMessageW.USER32(00000000,00000101,00000000), ref: 00E011F1
    • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00E01243
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: KeyboardState$InputMessagePostSend
    • String ID:
    • API String ID: 432972143-0
    • Opcode ID: ed1faaa6cd24130aca7895da83698b92a1cd93e300b5358fa1d0323ac766761b
    • Instruction ID: 7ec4df9352e4f871ee98bcd28411f8da00f249cfea179805099ad7dac2241649
    • Opcode Fuzzy Hash: ed1faaa6cd24130aca7895da83698b92a1cd93e300b5358fa1d0323ac766761b
    • Instruction Fuzzy Hash: 5E313A3094165C9EFF388A658C047FE7BBAAB49318F04639EF590BA1E1C3344DD59751
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00DD644B
    • __isleadbyte_l.LIBCMT ref: 00DD6479
    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00DD64A7
    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00DD64DD
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: 7a5837c8d382cddde78cd1d363e8937c950685d47cefdb144efae1a6a1db3afa
    • Instruction ID: b7a328faf2c75ee641937d699ab75b5edd9cd1dcb68f543faa694fd375f14d7a
    • Opcode Fuzzy Hash: 7a5837c8d382cddde78cd1d363e8937c950685d47cefdb144efae1a6a1db3afa
    • Instruction Fuzzy Hash: 2A31C13160824AAFDB218F75CC45BAA7BB5FF40310F19446AF85587291D731E851DBF0
    APIs
    • GetForegroundWindow.USER32 ref: 00E25189
      • Part of subcall function 00E0387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E03897
      • Part of subcall function 00E0387D: GetCurrentThreadId.KERNEL32 ref: 00E0389E
      • Part of subcall function 00E0387D: AttachThreadInput.USER32(00000000,?,00E052A7), ref: 00E038A5
    • GetCaretPos.USER32(?), ref: 00E2519A
    • ClientToScreen.USER32(00000000,?), ref: 00E251D5
    • GetForegroundWindow.USER32 ref: 00E251DB
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
    • String ID:
    • API String ID: 2759813231-0
    • Opcode ID: 8c02503c3bbb22e45972df3beabe787f419b031ba66ba8c57ca40ca727c44a43
    • Instruction ID: e19cb6306495cedfb1011e70a80907d78dd13084d5064c4585cfb4d36c9cdbb4
    • Opcode Fuzzy Hash: 8c02503c3bbb22e45972df3beabe787f419b031ba66ba8c57ca40ca727c44a43
    • Instruction Fuzzy Hash: FC313A72A00108AFCB00EFA5C8859EFF7F9EF89300B10406AE411E7251EA759E45CBB1
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • GetCursorPos.USER32(?), ref: 00E2C7C2
    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00DDBBFB,?,?,?,?,?), ref: 00E2C7D7
    • GetCursorPos.USER32(?), ref: 00E2C824
    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00DDBBFB,?,?,?), ref: 00E2C85E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Cursor$LongMenuPopupProcTrackWindow
    • String ID:
    • API String ID: 2864067406-0
    • Opcode ID: 1f878c2ea07828d94d468355d24b5904db7964db27aa5d7b84131039deac6809
    • Instruction ID: 6471bf4baf76eb3835e67a18c78d7e78d46a3b2b84a5b030c1a829c11615fb3d
    • Opcode Fuzzy Hash: 1f878c2ea07828d94d468355d24b5904db7964db27aa5d7b84131039deac6809
    • Instruction Fuzzy Hash: 93319635500028AFCB29CF59E898EEE7BB6EB49314F144065F905A7261C7316D51DFA0
    APIs
    • __setmode.LIBCMT ref: 00DC0BF2
      • Part of subcall function 00DA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E07B20,?,?,00000000), ref: 00DA5B8C
      • Part of subcall function 00DA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E07B20,?,?,00000000,?,?), ref: 00DA5BB0
    • _fprintf.LIBCMT ref: 00DC0C29
    • OutputDebugStringW.KERNEL32(?), ref: 00DF6331
      • Part of subcall function 00DC4CDA: _flsall.LIBCMT ref: 00DC4CF3
    • __setmode.LIBCMT ref: 00DC0C5E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
    • String ID:
    • API String ID: 521402451-0
    • Opcode ID: 00ef9f4bcb1f13df1e5b76848949fcd52c2e61edcd754868253e830680a812d6
    • Instruction ID: 6f071cdc8cc42f4fc25a6a98a929e362d7a07b7da9f401c46690ac69f20088d1
    • Opcode Fuzzy Hash: 00ef9f4bcb1f13df1e5b76848949fcd52c2e61edcd754868253e830680a812d6
    • Instruction Fuzzy Hash: FC112732904209BACB04B7B4AC42EBEBB69DF46320F18411DF204A71D1DE205D8687B5
    APIs
      • Part of subcall function 00DF8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DF8669
      • Part of subcall function 00DF8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DF8673
      • Part of subcall function 00DF8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF8682
      • Part of subcall function 00DF8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF8689
      • Part of subcall function 00DF8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF869F
    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00DF8BEB
    • _memcmp.LIBCMT ref: 00DF8C0E
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF8C44
    • HeapFree.KERNEL32(00000000), ref: 00DF8C4B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
    • String ID:
    • API String ID: 1592001646-0
    • Opcode ID: 3db36e9bfa62262b451e8d2c637eb8962d6acef0f534ce50e55f875d67dc0223
    • Instruction ID: 57779f91e8c4e0176e4474d90e0ca11baf33c0a225a491a3031ba2be360149d8
    • Opcode Fuzzy Hash: 3db36e9bfa62262b451e8d2c637eb8962d6acef0f534ce50e55f875d67dc0223
    • Instruction Fuzzy Hash: 9A218B71E0120CAFCB10DFA4C945BBEB7B8EF40344F1A8069E654AB241DB30AA46DB71
    APIs
    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E11A97
      • Part of subcall function 00E11B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E11B40
      • Part of subcall function 00E11B21: InternetCloseHandle.WININET(00000000), ref: 00E11BDD
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Internet$CloseConnectHandleOpen
    • String ID:
    • API String ID: 1463438336-0
    • Opcode ID: 5f4726ec76b62d6d4bb67a44f1dc7be1d6d6f7749d22f2e65f02a38c89ff2a3b
    • Instruction ID: b111597d96479115adec99680618bc437e1c22c772fb365fba2f8091e3cec114
    • Opcode Fuzzy Hash: 5f4726ec76b62d6d4bb67a44f1dc7be1d6d6f7749d22f2e65f02a38c89ff2a3b
    • Instruction Fuzzy Hash: BD218E35204605BFDB259F608C05FFABBB9FF48701F10102AFA51A6650EB71A8659BA0
    APIs
    • GetFileAttributesW.KERNEL32(?,00E2FAC0), ref: 00E03CA0
    • GetLastError.KERNEL32 ref: 00E03CAF
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E03CBE
    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E2FAC0), ref: 00E03D1B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CreateDirectory$AttributesErrorFileLast
    • String ID:
    • API String ID: 2267087916-0
    • Opcode ID: 870407b56200edb2a3ee50fcae5cfb31fe0713773fe753c36beee9337db00482
    • Instruction ID: c327aad2b3965a05b66f6b827221c9ff3d196fb0cfab23a7537d9493e88d76e5
    • Opcode Fuzzy Hash: 870407b56200edb2a3ee50fcae5cfb31fe0713773fe753c36beee9337db00482
    • Instruction Fuzzy Hash: C92174715083019FC710DF34D88189AB7E8EF56758F145A2DF499E72E1D7309E4ACB62
    APIs
      • Part of subcall function 00DFF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00DFE1C4,?,?,?,00DFEFB7,00000000,000000EF,00000119,?,?), ref: 00DFF5BC
      • Part of subcall function 00DFF5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00DFF5E2
      • Part of subcall function 00DFF5AD: lstrcmpiW.KERNEL32(00000000,?,00DFE1C4,?,?,?,00DFEFB7,00000000,000000EF,00000119,?,?), ref: 00DFF613
    • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00DFEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00DFE1DD
    • lstrcpyW.KERNEL32(00000000,?), ref: 00DFE203
    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00DFEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00DFE237
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: lstrcmpilstrcpylstrlen
    • String ID: cdecl
    • API String ID: 4031866154-3896280584
    • Opcode ID: b70096d952c3076a863d513a28f406da908cd8b33809e3d79d3a3690a1ca8cd1
    • Instruction ID: ba33596026213376fd2322c77dbefc825c4d01cd893947f9f1fe05924289d92c
    • Opcode Fuzzy Hash: b70096d952c3076a863d513a28f406da908cd8b33809e3d79d3a3690a1ca8cd1
    • Instruction Fuzzy Hash: A411B136100309EFCB25AF64D845E7A77B8FF85310B45802AF906CB2A0FB71985197B4
    APIs
    • _free.LIBCMT ref: 00DD5351
      • Part of subcall function 00DC594C: __FF_MSGBANNER.LIBCMT ref: 00DC5963
      • Part of subcall function 00DC594C: __NMSG_WRITE.LIBCMT ref: 00DC596A
      • Part of subcall function 00DC594C: RtlAllocateHeap.NTDLL(00FB0000,00000000,00000001,00000000,?,?,?,00DC1013,?), ref: 00DC598F
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: AllocateHeap_free
    • String ID:
    • API String ID: 614378929-0
    • Opcode ID: f910b2754524876460ee3cb97b90677ba2b2bc6b873309978b675746feaea3ca
    • Instruction ID: a9561df927447bcb61336bb8cb59f3c2f8554372ef57d9c4dd634af00737e0aa
    • Opcode Fuzzy Hash: f910b2754524876460ee3cb97b90677ba2b2bc6b873309978b675746feaea3ca
    • Instruction Fuzzy Hash: 09119132504A16AFCB313F70BC45F6A37A89F107E0B24442FF946AB295DEB5C94197B0
    APIs
      • Part of subcall function 00DA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E07B20,?,?,00000000), ref: 00DA5B8C
      • Part of subcall function 00DA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E07B20,?,?,00000000,?,?), ref: 00DA5BB0
    • gethostbyname.WSOCK32(?,?,?), ref: 00E166AC
    • WSAGetLastError.WSOCK32(00000000), ref: 00E166B7
    • _memmove.LIBCMT ref: 00E166E4
    • inet_ntoa.WSOCK32(?), ref: 00E166EF
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
    • String ID:
    • API String ID: 1504782959-0
    • Opcode ID: 94b82366ff592015d75478097007f4d94f1e322078d2aacf9bb066b9a430efdc
    • Instruction ID: 2222c50232e921771d4c727a37ae50ac12953b47f0a60761512afaabf8a5f5bd
    • Opcode Fuzzy Hash: 94b82366ff592015d75478097007f4d94f1e322078d2aacf9bb066b9a430efdc
    • Instruction Fuzzy Hash: B7116D36500509AFCB04EBA4ED96DEEB7B8EF19310B144069F506B71A1EF30AE44CB71
    APIs
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00DF9043
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DF9055
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DF906B
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DF9086
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 23ddb7fe6025bf322ec9868f3eb7b86c62b9d2b52b03cf03479fb2f13d2392db
    • Instruction ID: b373d8adfd71a8ba0d8d6cefa2cf81b761f20fcd237d2c50f4250deaffea3502
    • Opcode Fuzzy Hash: 23ddb7fe6025bf322ec9868f3eb7b86c62b9d2b52b03cf03479fb2f13d2392db
    • Instruction Fuzzy Hash: F8113A79900218BFDB10DFA5C884FADFB74FB48310F2140A5EA04B7250DA726E10DBA0
    APIs
      • Part of subcall function 00DA2612: GetWindowLongW.USER32(?,000000EB), ref: 00DA2623
    • DefDlgProcW.USER32(?,00000020,?), ref: 00DA12D8
    • GetClientRect.USER32(?,?), ref: 00DDB84B
    • GetCursorPos.USER32(?), ref: 00DDB855
    • ScreenToClient.USER32(?,?), ref: 00DDB860
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Client$CursorLongProcRectScreenWindow
    • String ID:
    • API String ID: 4127811313-0
    • Opcode ID: a4e0326a566a490f58b2a93c6b3529e9ade230cd8f18e14f230da357359b631f
    • Instruction ID: 7021e0c7f9299366685f63b286b77dca119a54e310c4708645f8b7d4e8429418
    • Opcode Fuzzy Hash: a4e0326a566a490f58b2a93c6b3529e9ade230cd8f18e14f230da357359b631f
    • Instruction Fuzzy Hash: F3113A39900119AFCB10DFA9D886AFE77B8FB06300F000466F941E7250C730FA568BB9
    APIs
    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DA1D73
    • GetStockObject.GDI32(00000011), ref: 00DA1D87
    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA1D91
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CreateMessageObjectSendStockWindow
    • String ID:
    • API String ID: 3970641297-0
    • Opcode ID: 4f05b7e1f0791d630f6247beea0a0aa3de597c8f546e77216df288f6d511cb18
    • Instruction ID: f2824cfb3eda3bbb3f24b6373357af0b33b92800d75c7fcc5dbc3a7a1837c662
    • Opcode Fuzzy Hash: 4f05b7e1f0791d630f6247beea0a0aa3de597c8f546e77216df288f6d511cb18
    • Instruction Fuzzy Hash: 56116D72501619BFDF128F91DC45EEA7B6AEF0A7A4F080126FA0462120C731DC65EBB0
    APIs
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00E001FD,?,00E01250,?,00008000), ref: 00E0166F
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00E001FD,?,00E01250,?,00008000), ref: 00E01694
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00E001FD,?,00E01250,?,00008000), ref: 00E0169E
    • Sleep.KERNEL32(?,?,?,?,?,?,?,00E001FD,?,00E01250,?,00008000), ref: 00E016D1
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CounterPerformanceQuerySleep
    • String ID:
    • API String ID: 2875609808-0
    • Opcode ID: d529da94652fea0ddfc0978aadf0474d0a2f75231174ca9bfed7a0de08de4cdf
    • Instruction ID: 92820e4506a181e2571f680ca72a46036fdb122ddcddf74262d69a9498c7df3d
    • Opcode Fuzzy Hash: d529da94652fea0ddfc0978aadf0474d0a2f75231174ca9bfed7a0de08de4cdf
    • Instruction Fuzzy Hash: 58117031C0151DDBCF049FA6EC44AEEBB78FF09741F4440A5E981BA180CB3155A18B96
    APIs
    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00DFDD3E
    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00DFDD55
    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00DFDD6A
    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00DFDD88
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Type$Register$FileLoadModuleNameUser
    • String ID:
    • API String ID: 1352324309-0
    • Opcode ID: a280851b142eb2c74f67b8da0212cab811532fe3798eb20667c158313e7efd79
    • Instruction ID: e364910c780330a4258598bb179b5a989fb8096578976cb585843ab642222d55
    • Opcode Fuzzy Hash: a280851b142eb2c74f67b8da0212cab811532fe3798eb20667c158313e7efd79
    • Instruction Fuzzy Hash: A4117CB1201308AFE720DF11DC48BA2BBBAEB00B18F118569A65AD6150D7B0E909DBB1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
    • Instruction ID: d66b9e3c3b1cbb81d0ec91f572d2a0725101951516b0bf132d5fc5f8fd06a988
    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
    • Instruction Fuzzy Hash: 9601433604418ABBCF125E84CC018EE3F62BF59355B588556FA1858231E237C971ABA5
    APIs
    • GetWindowRect.USER32(?,?), ref: 00E2B59E
    • ScreenToClient.USER32(?,?), ref: 00E2B5B6
    • ScreenToClient.USER32(?,?), ref: 00E2B5DA
    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E2B5F5
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClientRectScreen$InvalidateWindow
    • String ID:
    • API String ID: 357397906-0
    • Opcode ID: e3bed591df64f7102db8a3125af13c8677d112c9ae8df104ec7aac708d0f0342
    • Instruction ID: 50ef9c443cf5aa2f457c29d703683673d3696f63c55a4a29539292f8d7f09e51
    • Opcode Fuzzy Hash: e3bed591df64f7102db8a3125af13c8677d112c9ae8df104ec7aac708d0f0342
    • Instruction Fuzzy Hash: 4C1143B9D00209EFDB51CFA9D8849EEFBB9FB08310F108166E915E3620D735AA558F91
    APIs
    • _memset.LIBCMT ref: 00E2B8FE
    • _memset.LIBCMT ref: 00E2B90D
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E67F20,00E67F64), ref: 00E2B93C
    • CloseHandle.KERNEL32 ref: 00E2B94E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _memset$CloseCreateHandleProcess
    • String ID:
    • API String ID: 3277943733-0
    • Opcode ID: 6591e2a847ad3808e0ef08de81304dbc23024fac3a3d61d49d5212814ad49912
    • Instruction ID: 588f148f3c7da189f1a081f93aa7738cb20a06289b0c1d9d13f24f389ff1b63e
    • Opcode Fuzzy Hash: 6591e2a847ad3808e0ef08de81304dbc23024fac3a3d61d49d5212814ad49912
    • Instruction Fuzzy Hash: 22F054B26543107FF2106B62BC16FBB3A5CEB0939DF005030FA48F6192D7B1490497B8
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 00E06E88
      • Part of subcall function 00E0794E: _memset.LIBCMT ref: 00E07983
    • _memmove.LIBCMT ref: 00E06EAB
    • _memset.LIBCMT ref: 00E06EB8
    • LeaveCriticalSection.KERNEL32(?), ref: 00E06EC8
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CriticalSection_memset$EnterLeave_memmove
    • String ID:
    • API String ID: 48991266-0
    • Opcode ID: 64558f1d8b3c48af643474c17e06561ea2c320661a74f9886053053a9c1c93b9
    • Instruction ID: 01d0e8cd4c2c8f63083802fb5ea14dce250ea27fec28c8635617326e949212ee
    • Opcode Fuzzy Hash: 64558f1d8b3c48af643474c17e06561ea2c320661a74f9886053053a9c1c93b9
    • Instruction Fuzzy Hash: 6CF0543A100210ABCF116F55DC85F89BB69EF45320B04C065FE086F26BC731E951DBB4
    APIs
      • Part of subcall function 00DA12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DA134D
      • Part of subcall function 00DA12F3: SelectObject.GDI32(?,00000000), ref: 00DA135C
      • Part of subcall function 00DA12F3: BeginPath.GDI32(?), ref: 00DA1373
      • Part of subcall function 00DA12F3: SelectObject.GDI32(?,00000000), ref: 00DA139C
    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E2C030
    • LineTo.GDI32(00000000,?,?), ref: 00E2C03D
    • EndPath.GDI32(00000000), ref: 00E2C04D
    • StrokePath.GDI32(00000000), ref: 00E2C05B
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
    • String ID:
    • API String ID: 1539411459-0
    • Opcode ID: f9b0ea485b1fa214b1c25bd87716a89d4d7541e3bf7f4be9138462945007b063
    • Instruction ID: b772c3572e2f8efb920c9def3c8b6aa935ee9e33ffc567dc454ae51109f019f8
    • Opcode Fuzzy Hash: f9b0ea485b1fa214b1c25bd87716a89d4d7541e3bf7f4be9138462945007b063
    • Instruction Fuzzy Hash: 6FF05E31001269FFDB226F56FC0AFCE3F69AF06711F144110FA11710E287B5556ADBA9
    APIs
    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00DFA399
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DFA3AC
    • GetCurrentThreadId.KERNEL32 ref: 00DFA3B3
    • AttachThreadInput.USER32(00000000), ref: 00DFA3BA
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
    • String ID:
    • API String ID: 2710830443-0
    • Opcode ID: 559fdef28da5f94fa10ab3250499fc6741d3e8445b713ff85fbf8e9b92be3c21
    • Instruction ID: 9a90b0c9fae05d53f63639c505ff0defffe762d80a4fe3ddd7b4a02a8cb0ac74
    • Opcode Fuzzy Hash: 559fdef28da5f94fa10ab3250499fc6741d3e8445b713ff85fbf8e9b92be3c21
    • Instruction Fuzzy Hash: 57E015B1541228BADB202BA2DD0CEE73FACEF167A1F048034F609A8060C675D5458BE0
    APIs
    • GetSysColor.USER32(00000008), ref: 00DA2231
    • SetTextColor.GDI32(?,000000FF), ref: 00DA223B
    • SetBkMode.GDI32(?,00000001), ref: 00DA2250
    • GetStockObject.GDI32(00000005), ref: 00DA2258
    • GetWindowDC.USER32(?,00000000), ref: 00DDC0D3
    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00DDC0E0
    • GetPixel.GDI32(00000000,?,00000000), ref: 00DDC0F9
    • GetPixel.GDI32(00000000,00000000,?), ref: 00DDC112
    • GetPixel.GDI32(00000000,?,?), ref: 00DDC132
    • ReleaseDC.USER32(?,00000000), ref: 00DDC13D
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
    • String ID:
    • API String ID: 1946975507-0
    • Opcode ID: f72c99f06b343bda80e26890f281189ef54a40af1bb5ece73b4af8366f5b3a8d
    • Instruction ID: d54e3ac4b278ff4004443de9e058c294d3fe5d243683d29d1f49d48f0d565d5e
    • Opcode Fuzzy Hash: f72c99f06b343bda80e26890f281189ef54a40af1bb5ece73b4af8366f5b3a8d
    • Instruction Fuzzy Hash: 7DE06D32100244EEDB315FB9FC0DBE83B20EB05332F088376FA69680E287714995DB21
    APIs
    • GetCurrentThread.KERNEL32 ref: 00DF8C63
    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00DF882E), ref: 00DF8C6A
    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00DF882E), ref: 00DF8C77
    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00DF882E), ref: 00DF8C7E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CurrentOpenProcessThreadToken
    • String ID:
    • API String ID: 3974789173-0
    • Opcode ID: aa748b9a28791d7c7d30e1f57ace1e870847a530c9e41507077141025579101d
    • Instruction ID: c7636775670d22e005d45d327791751306bde90846e255401bafce5fd7e10b00
    • Opcode Fuzzy Hash: aa748b9a28791d7c7d30e1f57ace1e870847a530c9e41507077141025579101d
    • Instruction Fuzzy Hash: F6E04F36642211DFD7305FB26D0DF563BB8AF55792F098838E245EA050DA34844A9B61
    APIs
    • GetDesktopWindow.USER32 ref: 00DE2187
    • GetDC.USER32(00000000), ref: 00DE2191
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DE21B1
    • ReleaseDC.USER32(?), ref: 00DE21D2
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 7d8ea350dfe6fecd3a319c35c4a72ca43939fae84ffc945e100206b756189469
    • Instruction ID: e108a32f27100d3b9602b3e992c6c07754438d9f3a4f806cacbbbff9535bbf3c
    • Opcode Fuzzy Hash: 7d8ea350dfe6fecd3a319c35c4a72ca43939fae84ffc945e100206b756189469
    • Instruction Fuzzy Hash: 50E01AB5900604EFDF219F62CD08AAD7BF5EB4C350F108425F95AA7220DB7881469F90
    APIs
    • GetDesktopWindow.USER32 ref: 00DE219B
    • GetDC.USER32(00000000), ref: 00DE21A5
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DE21B1
    • ReleaseDC.USER32(?), ref: 00DE21D2
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 5d0e46b097c6be7553b01e50197d0ee7ad6a04d50ef4c55e12c5b3a0cb40f099
    • Instruction ID: 224feb71113d37b197eea93ad686d56b2fa9b3dd8a710b7bf31882105b51c457
    • Opcode Fuzzy Hash: 5d0e46b097c6be7553b01e50197d0ee7ad6a04d50ef4c55e12c5b3a0cb40f099
    • Instruction Fuzzy Hash: 90E012B5900204AFCF219FB2C908A9DBBF1EB4C320F108029F95AA7220DB7891469F90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID:
    • String ID: %
    • API String ID: 0-2291192146
    • Opcode ID: d4e0464d9b49e168e4811dc0936746815670a874d55949c957d77d81290fcc9e
    • Instruction ID: 1891af3d51a5673653bb4373575e4d8eb949fb834075b9e307eb4b5da85fc360
    • Opcode Fuzzy Hash: d4e0464d9b49e168e4811dc0936746815670a874d55949c957d77d81290fcc9e
    • Instruction Fuzzy Hash: 97B19F71D04109DACF14EFA8C8819EEB7B8FF4A310F584426E942A7295EB34DE81CB71
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __itow_s
    • String ID: xr$xr
    • API String ID: 3653519197-2528877900
    • Opcode ID: 7f2ff07bfc4537cfeb2ff206fbbb383886279c8d18fe3a14adccf2ed749a89c6
    • Instruction ID: a28836e80bb9c166e96ff31d461a6f3ecff44afdd329c7501e68fd1b56792af9
    • Opcode Fuzzy Hash: 7f2ff07bfc4537cfeb2ff206fbbb383886279c8d18fe3a14adccf2ed749a89c6
    • Instruction Fuzzy Hash: 27B18170A00209AFCB14DF54C891EFEB7BAFF59304F149459F945AB292EB70E985CB60
    APIs
      • Part of subcall function 00DBFEC6: _wcscpy.LIBCMT ref: 00DBFEE9
      • Part of subcall function 00DA9997: __itow.LIBCMT ref: 00DA99C2
      • Part of subcall function 00DA9997: __swprintf.LIBCMT ref: 00DA9A0C
    • __wcsnicmp.LIBCMT ref: 00E0B298
    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00E0B361
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
    • String ID: LPT
    • API String ID: 3222508074-1350329615
    • Opcode ID: 7a8ae4825071b7c2a58365344e900199339663479f2b998c42d6cf846bc10bfa
    • Instruction ID: 0d303235b9056aab3a04b4a4178b372f52ec2826ca77253fe77066fc89cca0ab
    • Opcode Fuzzy Hash: 7a8ae4825071b7c2a58365344e900199339663479f2b998c42d6cf846bc10bfa
    • Instruction Fuzzy Hash: A8616F75A00215EFCB14DF94C891EAEB7B4FF09310F15506AF946BB2A1DB74AE80CB60
    APIs
    • Sleep.KERNEL32(00000000), ref: 00DB2AC8
    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00DB2AE1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: GlobalMemorySleepStatus
    • String ID: @
    • API String ID: 2783356886-2766056989
    • Opcode ID: ee4454028e60bc5ad09179ab508acb2cf79625b29f3e7e6a001123a31e3d0e7a
    • Instruction ID: ff8ae591c8166094f47b4508db364870c4a25582a932189f82d5b5af2b079572
    • Opcode Fuzzy Hash: ee4454028e60bc5ad09179ab508acb2cf79625b29f3e7e6a001123a31e3d0e7a
    • Instruction Fuzzy Hash: 545146725187449BD320AF11D896BABBBF8FF86310F42885DF1D9911A5EB308529CB26
    APIs
      • Part of subcall function 00DA506B: __fread_nolock.LIBCMT ref: 00DA5089
    • _wcscmp.LIBCMT ref: 00E09AAE
    • _wcscmp.LIBCMT ref: 00E09AC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: _wcscmp$__fread_nolock
    • String ID: FILE
    • API String ID: 4029003684-3121273764
    • Opcode ID: 990f0884c962f65697d6a3f32d708e60760760c5876bcd1684d5a6cc7093b6a2
    • Instruction ID: 66ee99074471e068a6cf744f86eeeb1e6b6c739da7c9179f9bde859ae698f41a
    • Opcode Fuzzy Hash: 990f0884c962f65697d6a3f32d708e60760760c5876bcd1684d5a6cc7093b6a2
    • Instruction Fuzzy Hash: D241D371A0060ABADF209FA0DC46FEFBBB9DF45714F000469B900B71C6DA75AA448BB5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID: Dt$Dt
    • API String ID: 1473721057-4168040075
    • Opcode ID: c997d29dfbedf86566838494780e821bccbcd6dcfdcde813e79804a5a2e67946
    • Instruction ID: c7f1f72c5ef309f951c098fce7b10a2945457e0677cec06a791d9e1dc5030cca
    • Opcode Fuzzy Hash: c997d29dfbedf86566838494780e821bccbcd6dcfdcde813e79804a5a2e67946
    • Instruction Fuzzy Hash: 6551E3746083428FC754CF19C084A1ABBE1BB9A394F58895DE9858B321D771EC85CB62
    APIs
    • _memset.LIBCMT ref: 00E12892
    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E128C8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CrackInternet_memset
    • String ID: |
    • API String ID: 1413715105-2343686810
    • Opcode ID: 7fd2e61ef88cfdcea118a0fbe896dc987fea351cb66b48799008f5bd069f7639
    • Instruction ID: 980046b9ea9318d09a819f70ec0306f6bdfa161d6613398397c43383d9aa4197
    • Opcode Fuzzy Hash: 7fd2e61ef88cfdcea118a0fbe896dc987fea351cb66b48799008f5bd069f7639
    • Instruction Fuzzy Hash: CE313771C00219AFCF01AFA5DC85EEEBFB9FF09300F004029F914A6166EA315A56DBB0
    APIs
    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00E27DD0
    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E27DE5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: '
    • API String ID: 3850602802-1997036262
    • Opcode ID: 4551a056a9d1bb25cdc1d5ae0b914f770da9749b8b802f948290130af0a686a6
    • Instruction ID: 2ef0030fe30dcb8545b9aed1387fb4a85c5fa0b8294678c76fa7df0eddabad5a
    • Opcode Fuzzy Hash: 4551a056a9d1bb25cdc1d5ae0b914f770da9749b8b802f948290130af0a686a6
    • Instruction Fuzzy Hash: FB412874A0521A9FDB14CF69E881BEABBB5FF0A304F10116AED45EB341D770A945CFA0
    APIs
    • DestroyWindow.USER32(?,?,?,?), ref: 00E26D86
    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E26DC2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$DestroyMove
    • String ID: static
    • API String ID: 2139405536-2160076837
    • Opcode ID: 75cb2e8d2195cb1a82106206394d33640cab2f839c7b4661ba3066314bf78a3a
    • Instruction ID: abc1bfbb9229bb5958f81390341fc6a837b293d3fc1e6043b2179c0edcd6e7ca
    • Opcode Fuzzy Hash: 75cb2e8d2195cb1a82106206394d33640cab2f839c7b4661ba3066314bf78a3a
    • Instruction Fuzzy Hash: 9A31B371210218AEDB109F74DC40BFB73B9FF48724F109619F995A7190DB71AC91CB60
    APIs
    • _memset.LIBCMT ref: 00E02E00
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E02E3B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: InfoItemMenu_memset
    • String ID: 0
    • API String ID: 2223754486-4108050209
    • Opcode ID: bbf6d74f49fa4f0c89ca27e5bf6e822dfc29eef5ca8e74d60199790a253f7487
    • Instruction ID: 29c3e08f236f482c65d36143ccf47929f810191dfae250b39e700053b2a99e53
    • Opcode Fuzzy Hash: bbf6d74f49fa4f0c89ca27e5bf6e822dfc29eef5ca8e74d60199790a253f7487
    • Instruction Fuzzy Hash: 7B31F731640305ABEB268F58D849BDEBBF9EF05344F14106DEA85B71E0D77099C5CB50
    APIs
    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E269D0
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E269DB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Combobox
    • API String ID: 3850602802-2096851135
    • Opcode ID: d5bc34efe16991c11b2d8879611d4ac632b014f7a1bc9ffa1b5b492da0c05dc2
    • Instruction ID: ee30de5cf8efa13f3fc9480dc9b0e5bddf06768f38bad64fa3888d87d28d347b
    • Opcode Fuzzy Hash: d5bc34efe16991c11b2d8879611d4ac632b014f7a1bc9ffa1b5b492da0c05dc2
    • Instruction Fuzzy Hash: 8411B2716002196FEF159F14EC80EEB376AEB893A8F111225F958AB290DA759C9187A0
    APIs
      • Part of subcall function 00DA1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DA1D73
      • Part of subcall function 00DA1D35: GetStockObject.GDI32(00000011), ref: 00DA1D87
      • Part of subcall function 00DA1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA1D91
    • GetWindowRect.USER32(00000000,?), ref: 00E26EE0
    • GetSysColor.USER32(00000012), ref: 00E26EFA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Window$ColorCreateMessageObjectRectSendStock
    • String ID: static
    • API String ID: 1983116058-2160076837
    • Opcode ID: b43fe3ec821b7189f4ac1ca308efaabb6ad3952354f797eedf192c1bc7281446
    • Instruction ID: ee8ea523c8b33b914389e00b0e7f19bee2556d17ddcb21d886f6208ad60ee287
    • Opcode Fuzzy Hash: b43fe3ec821b7189f4ac1ca308efaabb6ad3952354f797eedf192c1bc7281446
    • Instruction Fuzzy Hash: 8421897261021AAFDF04DFA8DD45AEA7BB8FB08304F105628F955E3240D734E8619B60
    APIs
    • GetWindowTextLengthW.USER32(00000000), ref: 00E26C11
    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E26C20
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: LengthMessageSendTextWindow
    • String ID: edit
    • API String ID: 2978978980-2167791130
    • Opcode ID: 8c7cba4700e3fc4e55c01f648983a10bcc4b0dba5bf556b4c9a2d15a9dcbb093
    • Instruction ID: 02f5aa85c67d8a534075f072c45ccbf00646383168f3df946f5784544a2e3ee3
    • Opcode Fuzzy Hash: 8c7cba4700e3fc4e55c01f648983a10bcc4b0dba5bf556b4c9a2d15a9dcbb093
    • Instruction Fuzzy Hash: 8F119A71500228AFEB109F64EC46AEB3769EB04378F205724F961E31E0C775DC919B60
    APIs
    • _memset.LIBCMT ref: 00E02F11
    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00E02F30
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: InfoItemMenu_memset
    • String ID: 0
    • API String ID: 2223754486-4108050209
    • Opcode ID: da961abb8e894d71b36cc290fad1f7c36c2b557fc0e9c167b162868a79aa70f7
    • Instruction ID: dad4825cd3729a20c00f911eed13a5ed4f4afe3b2dae4da5eadac3e4a1044b1a
    • Opcode Fuzzy Hash: da961abb8e894d71b36cc290fad1f7c36c2b557fc0e9c167b162868a79aa70f7
    • Instruction Fuzzy Hash: 7F11D031E01115ABCB35DF98DC08B9A73F9EB01398F1450A9FE44B72E0D7B0AD458791
    APIs
    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E12520
    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E12549
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Internet$OpenOption
    • String ID: <local>
    • API String ID: 942729171-4266983199
    • Opcode ID: e97aea1a799e72dbeb1668ebce6f50b6cfddd9382a8975771d1945b5355efa73
    • Instruction ID: 5910522ec65d23b2785009c2ccad75c8422bf46eb1afc5050044c5046e59f363
    • Opcode Fuzzy Hash: e97aea1a799e72dbeb1668ebce6f50b6cfddd9382a8975771d1945b5355efa73
    • Instruction Fuzzy Hash: 3811E0B0500225BEDB248F618CD8EFBFF69FB16355F10912EFA0566040E27069A5EAE1
    APIs
      • Part of subcall function 00E1830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00E180C8,?,00000000,?,?), ref: 00E18322
    • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E180CB
    • htons.WSOCK32(00000000,?,00000000), ref: 00E18108
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ByteCharMultiWidehtonsinet_addr
    • String ID: 255.255.255.255
    • API String ID: 2496851823-2422070025
    • Opcode ID: 799baa66acffa4b16dc38787eb72d778fbe91390358fb881f8454e94c61b9145
    • Instruction ID: b8a047b518062e1cceeb3e8bb00ea3f579f9dbfdc0aefafb7c37fdfcd911b1d8
    • Opcode Fuzzy Hash: 799baa66acffa4b16dc38787eb72d778fbe91390358fb881f8454e94c61b9145
    • Instruction Fuzzy Hash: E211E135200209ABDB20AF64DD46FFEB374FF04320F108527F911A7291DA32A845C7A1
    APIs
    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00DA3C26,00E662F8,?,?,?), ref: 00DB0ACE
      • Part of subcall function 00DA7D2C: _memmove.LIBCMT ref: 00DA7D66
    • _wcscat.LIBCMT ref: 00DE50E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FullNamePath_memmove_wcscat
    • String ID: c
    • API String ID: 257928180-921687731
    • Opcode ID: 30ad30142f8a5f3bcd32b2c37f84a2db6adb07cea5accda107462b4f296e0baa
    • Instruction ID: 821af23462cb236097a36925ac1127961a0155e8ac2af879c72b9b2dc207e73a
    • Opcode Fuzzy Hash: 30ad30142f8a5f3bcd32b2c37f84a2db6adb07cea5accda107462b4f296e0baa
    • Instruction Fuzzy Hash: EB11883594421CEB8B10FBA4DC02EDE7BB8EF48354B0040A6B999E7251EE70DB888775
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00DFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00DFB0E7
    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00DF9355
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClassMessageNameSend_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 372448540-1403004172
    • Opcode ID: f0725837238fc12c412d130946be9f8fe4163f5d8360db2546449dd08918ae00
    • Instruction ID: 072815b48473754893e80f2b638cc80c88dca13660d4b48ff5c3bb34989a1e1e
    • Opcode Fuzzy Hash: f0725837238fc12c412d130946be9f8fe4163f5d8360db2546449dd08918ae00
    • Instruction Fuzzy Hash: 31015271A45218AB8B04EB64CC91DFEB7A9FF06320B154619F972672D2EA31691C8670
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __fread_nolock_memmove
    • String ID: EA06
    • API String ID: 1988441806-3962188686
    • Opcode ID: dff914c719de58184942fc6b10c4946e9946911efa2a0a356f2a8c616b999616
    • Instruction ID: c8f799a67c3c7bc2954babf5ca2be693de43b0a28c0f1b8ac791786b30975cd0
    • Opcode Fuzzy Hash: dff914c719de58184942fc6b10c4946e9946911efa2a0a356f2a8c616b999616
    • Instruction Fuzzy Hash: 0401F9718042186EDB28CAA8D816FEE7BF8DF01301F00419EF552D2182E575E6088770
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00DFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00DFB0E7
    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00DF924D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClassMessageNameSend_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 372448540-1403004172
    • Opcode ID: c602fc17b2f417eaa0dd9771e55627e6a3574041d63181355fff0a54ae909735
    • Instruction ID: 13056263f0a313e59c2b20293eac5bfc7dc19be603a6baea8f33d4d4a919ac12
    • Opcode Fuzzy Hash: c602fc17b2f417eaa0dd9771e55627e6a3574041d63181355fff0a54ae909735
    • Instruction Fuzzy Hash: 6A018871F412087BCB14E7A0C992EFFB3A8DF06310F554015BA12671C2EA156F1C9671
    APIs
      • Part of subcall function 00DA7F41: _memmove.LIBCMT ref: 00DA7F82
      • Part of subcall function 00DFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00DFB0E7
    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00DF92D0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClassMessageNameSend_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 372448540-1403004172
    • Opcode ID: 4d230b781bf592b8f0824faf2bb69f5d5444b8c9764616321f0c864dce88acb7
    • Instruction ID: 2e771ac8c614a3e6cc48a44d14b4fff522a6f118f70e67d8c8be5880957e0cb3
    • Opcode Fuzzy Hash: 4d230b781bf592b8f0824faf2bb69f5d5444b8c9764616321f0c864dce88acb7
    • Instruction Fuzzy Hash: AF018471E412087BCB04E7A4C992EFEB7A8DF12310B554116B91263182EA115F0C9275
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: __calloc_crt
    • String ID: @R
    • API String ID: 3494438863-2347139750
    • Opcode ID: 9aea7206865c496c1b67d10e92937c883e8c5e8812b31faa2905469c51839cfe
    • Instruction ID: df6ea726aa9df3dfde8b06b33f139ad19d1e90d772c5a2f3bdea2e34a2a7de17
    • Opcode Fuzzy Hash: 9aea7206865c496c1b67d10e92937c883e8c5e8812b31faa2905469c51839cfe
    • Instruction Fuzzy Hash: 50F04F71318617EFFB248F2AFD21F622795EB50760B14442FF101EB1A0EBB0C88996B1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: ClassName_wcscmp
    • String ID: #32770
    • API String ID: 2292705959-463685578
    • Opcode ID: 959d11c5e9783c650809c30bd8f18cba630876d497c4fe26030c2f17b0e838e0
    • Instruction ID: 20ef1d5945c29cf9a15e0dbec390ccd1c3dda901c3f64ed5e29bffc59c1e0b84
    • Opcode Fuzzy Hash: 959d11c5e9783c650809c30bd8f18cba630876d497c4fe26030c2f17b0e838e0
    • Instruction Fuzzy Hash: 43E02B325003291BD720A695AC09F97F7BCEB44761F00016BFD10E3050E56099498BE1
    APIs
    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00DF81CA
      • Part of subcall function 00DC3598: _doexit.LIBCMT ref: 00DC35A2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Message_doexit
    • String ID: AutoIt$Error allocating memory.
    • API String ID: 1993061046-4017498283
    • Opcode ID: e79827bdae33f1ff15265a4b5103834b515037e7661853d57748980dd93b23c3
    • Instruction ID: c40653926a7afed5bae4e624a436e38feb928322af11acc0e4c949edf65dd605
    • Opcode Fuzzy Hash: e79827bdae33f1ff15265a4b5103834b515037e7661853d57748980dd93b23c3
    • Instruction Fuzzy Hash: EED0123228535936D21432A56C0BFC969888B05B52F145429BB08765D389D1998252F9
    APIs
      • Part of subcall function 00DDB564: _memset.LIBCMT ref: 00DDB571
      • Part of subcall function 00DC0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00DDB540,?,?,?,00DA100A), ref: 00DC0B89
    • IsDebuggerPresent.KERNEL32(?,?,?,00DA100A), ref: 00DDB544
    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00DA100A), ref: 00DDB553
    Strings
    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00DDB54E
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
    • API String ID: 3158253471-631824599
    • Opcode ID: 7a8612407158f02ac989a85f2782b967766c084dc97d9dfa80373882b3bd6c30
    • Instruction ID: 09d7a3456d876a5d121004269c2886d99bdbc4553e2a606ed7a6d08d4175131e
    • Opcode Fuzzy Hash: 7a8612407158f02ac989a85f2782b967766c084dc97d9dfa80373882b3bd6c30
    • Instruction Fuzzy Hash: BCE06D70600311CFD721DF29F4047427BE0AB01B58F058A2EE446D3360DBB4E409CBB1
    APIs
    • GetSystemDirectoryW.KERNEL32(?), ref: 00DE1B9F
      • Part of subcall function 00E1C304: LoadLibraryA.KERNEL32(kernel32.dll,?,00DE1D88,?), ref: 00E1C312
      • Part of subcall function 00E1C304: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E1C324
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00DE1D97
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Library$AddressDirectoryFreeLoadProcSystem
    • String ID: WIN_XPe
    • API String ID: 582185067-3257408948
    • Opcode ID: 164d3f4d1fa323ac6d20a71806ffe502da93a7564a29936765dee831e7a64f73
    • Instruction ID: 698d9cedd0d0f1eb781d09fb0d187b9be6965c601db7e6ae2bccfd05b1de9f36
    • Opcode Fuzzy Hash: 164d3f4d1fa323ac6d20a71806ffe502da93a7564a29936765dee831e7a64f73
    • Instruction Fuzzy Hash: 74F039B4900049DFDB15EB92C988AEDBBF8AB09304F5400D5E052B2050E7708F89CF30
    APIs
    • GetTempPathW.KERNEL32(00000104,?), ref: 00E09B82
    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00E09B99
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: Temp$FileNamePath
    • String ID: aut
    • API String ID: 3285503233-3010740371
    • Opcode ID: 532af7ed9739278ccd989481465ad8fe51f9c550120327f4c51ddfd9e7be027b
    • Instruction ID: 8b926f0c2c48cdcb4ce0f3b8fb1c9a11daca8fb6183cdfd41bee5c1485fa0cd7
    • Opcode Fuzzy Hash: 532af7ed9739278ccd989481465ad8fe51f9c550120327f4c51ddfd9e7be027b
    • Instruction Fuzzy Hash: 76D0177A54030DABDA209A909C0EF9A773CA704702F0046B1BE64A11A1EEB055998AA1
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E25BF5
    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00E25C08
      • Part of subcall function 00E054E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E0555E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 7455c1104f7520b54f1b4d61dd922ec30dc22f1ff872d3c4b3fdfe69ed174f19
    • Instruction ID: 8ba60787bdb9266937d7d81bfc0fb240d7c86f3bc20b64ad9827ae5318a76a21
    • Opcode Fuzzy Hash: 7455c1104f7520b54f1b4d61dd922ec30dc22f1ff872d3c4b3fdfe69ed174f19
    • Instruction Fuzzy Hash: A7D0A932388300BAE334AB30AC0BFD32A20AB00B01F000834BB06BA0D0C8E05805C640
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E25C35
    • PostMessageW.USER32(00000000), ref: 00E25C3C
      • Part of subcall function 00E054E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E0555E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1855301649.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
    • Associated: 00000000.00000002.1855288320.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E2F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855356809.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855401740.0000000000E5F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1855419470.0000000000E68000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_da0000_mIzAhxUQjY.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 0f2a67f1ce0f75f86b06e31b9011b28de9d3c14e39d857c84a2efd1f44143d2e
    • Instruction ID: 52d791a7ded214db1ea3699cbc85a15ae63206a048a0cc429eaed314b952f38b
    • Opcode Fuzzy Hash: 0f2a67f1ce0f75f86b06e31b9011b28de9d3c14e39d857c84a2efd1f44143d2e
    • Instruction Fuzzy Hash: 31D0A9323C43007EE334AB30AC0BFC32620AB00B01F000834BB02BA0D0C8E06805C640