Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kbdgc.exe

Overview

General Information

Sample name:kbdgc.exe
Analysis ID:1467148
MD5:5025218d868f68c956a6bcb8f3c99007
SHA1:84f0f59997a46562e837730335c304b719335ce9
SHA256:ae8ada4be2d0844a57fcfcab82e65dd28613f4e9e802a14562c7f595115ee9bc
Tags:exe
Infos:

Detection

Score:27
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • kbdgc.exe (PID: 7600 cmdline: "C:\Users\user\Desktop\kbdgc.exe" MD5: 5025218D868F68C956A6BCB8F3C99007)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 86.2% probability
Source: kbdgc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: kbdgc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: kbdgc.exe
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B79F76 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00B79F76
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B89D3B SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00B89D3B
Source: zwei.exe.0.drString found in binary or memory: http://192.168.30.6:8080/SSH/jsp/upload/upload.jsp
Source: zwei.exe.0.drString found in binary or memory: http://www.Jewsys.com
Source: zwei.exe.0.drString found in binary or memory: http://www.zwei.com__vbaFailedFriend
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B76DD8: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00B76DD8
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B780FA0_2_00B780FA
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B854D80_2_00B854D8
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8E08A0_2_00B8E08A
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B7E8DD0_2_00B7E8DD
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B7D8280_2_00B7D828
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B730580_2_00B73058
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8E99E0_2_00B8E99E
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8590D0_2_00B8590D
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8295B0_2_00B8295B
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B7D22A0_2_00B7D22A
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8F2080_2_00B8F208
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B9E2440_2_00B9E244
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B923080_2_00B92308
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B84B090_2_00B84B09
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B82C8C0_2_00B82C8C
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B7DC8B0_2_00B7DC8B
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B99C3E0_2_00B99C3E
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B75C390_2_00B75C39
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8E5860_2_00B8E586
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B725F50_2_00B725F5
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8EDD30_2_00B8EDD3
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B73D3B0_2_00B73D3B
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B7B6860_2_00B7B686
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B826E00_2_00B826E0
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B7CE120_2_00B7CE12
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B997900_2_00B99790
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B85F460_2_00B85F46
Source: C:\Users\user\Desktop\kbdgc.exeCode function: String function: 00B8C630 appears 53 times
Source: C:\Users\user\Desktop\kbdgc.exeCode function: String function: 00B8CFB0 appears 31 times
Source: C:\Users\user\Desktop\kbdgc.exeCode function: String function: 00B8C560 appears 36 times
Source: kbdgc.exe, 00000000.00000003.1674339680.0000000005F08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamezwei.exe vs kbdgc.exe
Source: kbdgc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus27.winEXE@1/17@0/0
Source: C:\Users\user\Desktop\kbdgc.exeFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_6376203Jump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeCommand line argument: sfxname0_2_00B8B905
Source: C:\Users\user\Desktop\kbdgc.exeCommand line argument: sfxstime0_2_00B8B905
Source: C:\Users\user\Desktop\kbdgc.exeCommand line argument: STARTDLG0_2_00B8B905
Source: kbdgc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\kbdgc.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: zwei.exe.0.drBinary or memory string: select * from tbright with(nolock) where code ='frm_metalout' and empl_no =';
Source: C:\Users\user\Desktop\kbdgc.exeFile read: C:\Users\user\Desktop\kbdgc.exeJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: dxgidebug.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: kbdgc.exeStatic file information: File size 6427166 > 1048576
Source: kbdgc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: kbdgc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: kbdgc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: kbdgc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: kbdgc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: kbdgc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: kbdgc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: kbdgc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: kbdgc.exe
Source: kbdgc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: kbdgc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: kbdgc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: kbdgc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: kbdgc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\kbdgc.exeFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_6376203Jump to behavior
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8C560 push eax; ret 0_2_00B8C57E
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8CFF6 push ecx; ret 0_2_00B8D009
Source: C:\Users\user\Desktop\kbdgc.exeFile created: C:\Users\user\Desktop\update\zwei.exeJump to dropped file
Source: C:\Users\user\Desktop\kbdgc.exeDropped PE file which has not been started: C:\Users\user\Desktop\update\zwei.exeJump to dropped file
Source: C:\Users\user\Desktop\kbdgc.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-21900
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B79F76 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00B79F76
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B89D3B SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00B89D3B
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8C07D VirtualQuery,GetSystemInfo,0_2_00B8C07D
Source: C:\Users\user\Desktop\kbdgc.exeAPI call chain: ExitProcess graph end nodegraph_0-22042
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8D1B5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B8D1B5
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B94444 mov eax, dword ptr fs:[00000030h]0_2_00B94444
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B98382 GetProcessHeap,0_2_00B98382
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8D1B5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B8D1B5
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8D303 SetUnhandledExceptionFilter,0_2_00B8D303
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8D4BB SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B8D4BB
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B9552C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B9552C
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8D00B cpuid 0_2_00B8D00B
Source: C:\Users\user\Desktop\kbdgc.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00B88C23
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B8B905 OleInitialize,GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,LoadBitmapW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,0_2_00B8B905
Source: C:\Users\user\Desktop\kbdgc.exeCode function: 0_2_00B7A5E3 GetVersionExW,0_2_00B7A5E3
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDS24
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://192.168.30.6:8080/SSH/jsp/upload/upload.jsp0%Avira URL Cloudsafe
http://www.zwei.com__vbaFailedFriend0%Avira URL Cloudsafe
http://www.Jewsys.com0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.zwei.com__vbaFailedFriendzwei.exe.0.drfalse
  • Avira URL Cloud: safe
unknown
http://www.Jewsys.comzwei.exe.0.drfalse
  • Avira URL Cloud: safe
unknown
http://192.168.30.6:8080/SSH/jsp/upload/upload.jspzwei.exe.0.drfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467148
Start date and time:2024-07-03 18:54:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:kbdgc.exe
Detection:SUS
Classification:sus27.winEXE@1/17@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 72
  • Number of non-executed functions: 86
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • VT rate limit hit for: kbdgc.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 74, Total Editing Time: 1d+15:47:03, Last Saved Time/Date: Fri Jun 7 10:58:20 2024, Create Time/Date: Wed Jul 24 13:49:08 2013, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):20992
Entropy (8bit):7.317925520512782
Encrypted:false
SSDEEP:384:lzzN+du/iRjWD6KdIX84HyUM+QqVO3rFLqXzUflNFOKFT1T7tTSr:xUMUiD6K6X84HyJ/35LqjUflJ5tTE
MD5:EC4AC33729E7AE3E2DD811D9D2C7E12E
SHA1:51DD666551138996F9883313E904AD103FC0DFD9
SHA-256:F587B7042132D3E94274422812DED7775B749A563E02EC91378BD494F149B08B
SHA-512:B1FBAD8CF21BAECD012F34F35880D75BA891B4263C96871EC5E98BDFE7BC9EA8D9809C7BBC1E8845110A03B9320FCFA3943159560D0E9BABE36C1E16F39760A9
Malicious:false
Reputation:low
Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.u.b.d.o.c.u.m.e.n.t. .1..............................................................................9....pr.9................C.o.n.t.e.n.t.s.....................................................................................................@...:.......Q.E.S.e.s.s.i.o.n...................................................................................................$...........S.u.b.d.o.c.u.m.e.n.t. .2............................................................................\.9
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 936, Revision Number: 87, Total Editing Time: 03:46:56, Last Saved Time/Date: Mon Jul 1 04:55:50 2024, Create Time/Date: Wed Apr 11 10:39:29 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):16896
Entropy (8bit):7.257528123852287
Encrypted:false
SSDEEP:384:QaHVlEz4VGlgccKENhtKeLCQMkh+A9Q90HnI/7:QElnICccKENhtKeLCQMG+CQ8+7
MD5:9A90B2AC6AB4D0C35D9A55B5BA699464
SHA1:6C73AC92D1994AEAF0AFD3450C55DA204B53B2B7
SHA-256:29ECDE4F562E0176F0FF6C6C6E8F7DFC1222A35C3D3BC5290E987C67E130FB3C
SHA-512:FC82DAF986BB807A5D65371EB4A7991C79F7CD0179415E0B36570E5F0DF20537AF99D136EA88CE0434B8E505381CED3EC6FCE813CD4AF9B0D2EF51B76F8045EE
Malicious:false
Reputation:low
Preview:......................>........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.J=.8vK.P..8......\.]J..gC.*~.#z..dH..U..@...$..E..|...6Im......I...$.....:.....J"..E@..D.Q.m..@.jB+...M.?.<(.n..Z`.~.@..x..T..l..c......!.5n.....<.o.pS.87P...;....J..~B.+..a..Ib..rT|....cE..DmX(#..M .4......*......Fi..A..v..........h.;.>4U.m..#.m...k.E...Pw........~.......#/N=I...z..P...3d..m<.I...!...]Y...V...h...r..zl....}a..B....r0..)A..h..!)=.tY.[..9$J...(.....\..'W..F~..8.g.j.x.>..o.F..%Fk.5h.7.....P.).s..]lf.8......K......n4..
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 47, Total Editing Time: 1d+09:27:40, Last Saved Time/Date: Thu Jun 27 07:58:55 2024, Create Time/Date: Sat Jan 23 07:53:15 2021, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):27136
Entropy (8bit):7.4794390494515905
Encrypted:false
SSDEEP:768:decBsMWg1dsp927OSmtOiZPF3N0Kbcxgs:ccB2gDspw7OzhTqSs
MD5:F5960AAF6CFCA05F6F529AE4ADD63719
SHA1:C53FB97CFAAD02C5B0165F4594C778026FFAF66B
SHA-256:1CD65580C695A7B93E4F83AAF80A7EE5EF74CD11681874B5705DFF8DA493F839
SHA-512:EA9100FF8AAFC18180730503B7B0F64CADA6C4C3959687C9D13A7CCC325F579A14E37E4CF7C16E851066E425FE5E5AA95C8290342567B09A1757427A44D54DA0
Malicious:false
Reputation:low
Preview:......................>....................... ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................{...:...............................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 43, Total Editing Time: 1d+05:46:38, Last Saved Time/Date: Mon Jul 1 10:30:27 2024, Create Time/Date: Sat Jan 23 07:53:15 2021, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):115712
Entropy (8bit):7.836027423647195
Encrypted:false
SSDEEP:3072:QMV00ilmQeHCE4Xs0gM6yEHPJzZ5JsFa08xHFj1:bzfQOCs9yUPJd7jxh
MD5:51EDC791CCAFE1141F2D36AE275064DB
SHA1:446CAC76FED174C0B5D40BAB5208F786B40299FB
SHA-256:B5EA5ECBCF8A17D071FD6DF794FE796F271E3EBB079C6100A078D1B90E54B923
SHA-512:C89A039F9C3998AC4C7302A92558EE58A2C43EE43AC10AAE8437A7451941423D3A6BD0399C992C3AB27074E23DEE9A3C3342BF41FB7F583EAAAB7125AE4FD90C
Malicious:false
Reputation:low
Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................-......0..Hm..h1.....w.zW...S.n.H......l_..|w..T..l.g...m....i....8s.`....U.[..E.S..m. \yL.F...-.).C..q%..Kl...`.AC..2T...uhh..(L.{~c...0.N....\.g..jp6............0..Qz.N.KH.o...[l.v.&.5.2...7...z.'.....[c.l;..g>... ..Gi._..<...}..<.T..Y..f.t..~z..yI...l.jl7D.z.........@..0a..].A...yt.m..p.S.L!;q..q.L./.d....Iw....X^`X....$.X.N..m...\....I.\.Y.....2go..^u.x...i........)...'...;#..N.....~w..TF.......YZ...`[..;S..T.../C6...l.Ak....K.bm.EFv
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 31, Total Editing Time: 16:53:47, Last Saved Time/Date: Wed Apr 24 10:20:54 2024, Create Time/Date: Sat Jan 23 07:53:15 2021, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):99328
Entropy (8bit):7.838054823011136
Encrypted:false
SSDEEP:3072:P9PCV00ilmQeHCE4Xs0gM6yEHPJzZIK7yo2:hkzfQOCs9yUPJdT7x
MD5:1B39F6E81667D02369AA7D7B0FC30852
SHA1:F930B0FFA1DCB8A202B20A322EEC20D5F89D6882
SHA-256:C68FB9AFA03F43A0F95465B6378F3D75CED4804DB06E3C2F8F6202CEFC93F480
SHA-512:8747720ACC3A7256041BC611E8C4CB2427E29FD12AD8FBE5BB5F3A64063DAA494B4B0498CAB56EC2E623FCF1BAFCCA75C928F08E40FB47E9F32AA6DA36779ECD
Malicious:false
Reputation:low
Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................:...............................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 4.0, Code page: 1252, Revision Number: 136, Total Editing Time: 4d+06:57:45, Last Printed: Wed Dec 16 12:39:40 2020, Last Saved Time/Date: Wed Jul 3 06:46:47 2024, Create Time/Date: Thu Aug 8 04:21:38 2002, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Seagate Crystal Reports
Category:dropped
Size (bytes):34304
Entropy (8bit):7.5546645391024905
Encrypted:false
SSDEEP:768:eWHAjg1dsp9v/1Jpr+f0OowQvJzAmzZqtnwwHFs4:vagDspJRbOKvtv8Fs4
MD5:D5C8195621D6A6CE85D8E3DFE2FEB54E
SHA1:28F73F26381512B14204952D606C85325A23C7E1
SHA-256:247640B4E27177B98176C482DEFB44AA1817704C681916B2F2C5723806E8E4FD
SHA-512:4BF88E07F88441C2CC1A95D0C329BDB848D3509E0401A6EEDF9E0C4194DB81A222A90F1960D5C349E86986EEAF84088E288127AE11D1944898CDABD1DCBC159D
Malicious:false
Reputation:low
Preview:......................>.......................#...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................P...:...............................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 4.0, Code page: 1252, Revision Number: 136, Total Editing Time: 4d+03:46:27, Last Printed: Wed Dec 16 12:39:40 2020, Last Saved Time/Date: Wed Jul 3 04:57:48 2024, Create Time/Date: Thu Aug 8 04:21:38 2002, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Seagate Crystal Reports
Category:dropped
Size (bytes):37376
Entropy (8bit):7.668599184207851
Encrypted:false
SSDEEP:768:wBvDKLrfI5daeg1dsp9RNi0F4Vwg3xDDu1z7gRV4YYe:qorQ5PgDspzNT05Du1zxYY
MD5:38797A5508B282594EF8AD42A444B199
SHA1:C8B69B7CBA4BAB684F60F26D4249997E83B89B32
SHA-256:1CF1FF95752A37E7E8234D96D4BCB3B65E7CA9173BCF8B6958941E5FAB2F5745
SHA-512:32133AB1F07FDB490EDF573D7EAFEECF64CD93ED26FA213DC3368000C955E249F99B46D49AFA9F1D2EBAC37A5A76A4F545FCAC58E791CC28F42635209F47B35C
Malicious:false
Reputation:low
Preview:......................>.......................$...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................P...:...............................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 4.0, Code page: 1252, Revision Number: 139, Total Editing Time: 4d+02:56:30, Last Printed: Wed Dec 16 12:39:40 2020, Last Saved Time/Date: Tue Jul 2 04:08:23 2024, Create Time/Date: Thu Aug 8 04:21:38 2002, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Seagate Crystal Reports
Category:dropped
Size (bytes):43520
Entropy (8bit):7.681040219592289
Encrypted:false
SSDEEP:768:WXM1VYd0g1dsp9GWr1WTlDDSH+4IzaNYqPd3Ww80gXmVVr/xxQ:TYGgDsp/KocaNV3WX0gsT
MD5:0E7BD770F1186ADBAC0245DA8B7AA01B
SHA1:37ADA604765EF7D58E02757E698D859EEEAF8A58
SHA-256:4472D2FABC61A9C12652D05E80143446247A891879A8C2CAE0B8C33CE29A74B4
SHA-512:0840BC1D227B953BFCB10AAC30BB96DE1E69554A7EAF95B3331A3EE153972C1195FCD6A8A167E0FBB598FF019F33D05A578590E0EEFE7DB5F5B3A40AF8DBE70E
Malicious:false
Reputation:low
Preview:......................>.......................-...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................J.U.>.....=...0I.6.o.....Z.._..........\.!G....4. ..)....k..:Z.@..X.<C:.6."G....p%.e.........g..Q??\e.D.'.A..P........=)v...: J.;u........$........Z*..6N......Iw>..6!.v.29f'A..q0..vz.4L..w.#.[}.wK...It(.c..@.)&..@>.3.......X.Ga..l..F...\s..'.....j.3.B.@t?^.='...r?x.....c.C-...C.y.......B. .H.._ ....NU..=....x.&....9..yeq....:.+..BXy...+*.-&V.8.*hV..........PH....... ......z...U-....F.b02.i2.HD.l...A...G.X{..d.~YB..+Rn..2a.y.SV8EqU....V.......^rV
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 4.0, Code page: 1252, Revision Number: 130, Total Editing Time: 4d+02:19:19, Last Printed: Wed Dec 16 12:39:40 2020, Last Saved Time/Date: Tue Jul 2 04:08:36 2024, Create Time/Date: Thu Aug 8 04:21:38 2002, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Seagate Crystal Reports
Category:dropped
Size (bytes):33792
Entropy (8bit):7.562436424578068
Encrypted:false
SSDEEP:384:qmkSf6lUVlWdEQl2AxMaiJ3sp1Xx7bNupoAXKZunujB/7l7cSz7ulSUeaFvCaFsW:lkdlUog1dsp9FgpjXsjBZ8S4vWW
MD5:9EFAB31B11B25334F1D4A5D914E736BA
SHA1:28CAF6139123E86CFDF6AF1E29BFEEC41C83E546
SHA-256:F5103002B65A1712D877F8B9BF4C1CA9FA14ECAA9E5259EB1CCDB4DAE00EE1C5
SHA-512:4FE57D75C0B7BECC9153F5A90D53C479463772994A74CF6E0407C41724AAF599E4CDDDE26AAA75246C207DDADBB66E6C6E39BB7C7B7D964C6B810B01C7AFA8AA
Malicious:false
Reputation:low
Preview:......................>.......................!...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................=...:...............................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 11, Total Editing Time: 05:01:39, Last Saved Time/Date: Fri Jun 7 06:56:27 2024, Create Time/Date: Thu Dec 27 07:22:14 2012, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):28672
Entropy (8bit):7.288773304398094
Encrypted:false
SSDEEP:384:9SgjRvdgLDeGaQ5BkZIJHZGeyec6zWlYcU7WwydHKy7Yl9n4W3ptGUU2AK45dOIS:9BtCXcZepyec6zWDUlS7YlyYFUBKzI
MD5:BC3FD89CA077D5ED0D92A2EA95FA28F1
SHA1:F9F5B1739CB4E9427AA11B33BFA47DC0615B566D
SHA-256:FB63CD260043C958980F2B4C5057D5EF726ABE259A8DCAA4C2D2D7E1D9C3C7A2
SHA-512:EC06B87BEB4F5EA3BE31323873D5701CC888868F5D928258771728E250AC632C96BE3D93130253F8389A8D46D288FB95C4552ECADE61B18574463A125E408E98
Malicious:false
Reputation:low
Preview:......................>......................./...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.u.b.d.o.c.u.m.e.n.t. .1..............................................................................o....05.o................C.o.n.t.e.n.t.s.....................................................................................................=...........Q.E.S.e.s.s.i.o.n..................................................................................................."...........S.u.b.d.o.c.u.m.e.n.t. .2..............................................................................o
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 29, Total Editing Time: 01:34:29, Last Saved Time/Date: Thu Jun 6 07:06:05 2024, Create Time/Date: Thu Dec 27 07:22:14 2012, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):8704
Entropy (8bit):6.451885016786889
Encrypted:false
SSDEEP:192:3knKQ0AvH0CDBS547sYuVkyNyX/aWLvB2oYI:UK5A/Jo0yVlOVvMoY
MD5:6DCCCBECA34C119EB39036AFF0928EC8
SHA1:6FFC0B7A455CE38089B03E58216623CC3506E014
SHA-256:DDDA0A65A2DA99ABCB104BEE42F069D71D50F95776C4DCFF0B0506F40171E3E7
SHA-512:CBBAA1AC30B7D0C4D64AED884DDA40809BD4914821DA7465790E57D2FC1D02FD47631284659E392412F1D7DEAB69CA435238E8A6C4C31F0BC6FEE4DF746D500E
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 34, Total Editing Time: 01:42:48, Last Saved Time/Date: Thu Jun 6 07:44:12 2024, Create Time/Date: Thu Dec 27 07:22:14 2012, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):8704
Entropy (8bit):6.425411330574039
Encrypted:false
SSDEEP:96:JTjyU2aozoboSEOg9UOh7sbRqz1Q0SgIeGXqlyAVy2emDrod0alqG+bCMVJcST+P:RUkoFOZOh75EgIeGYVgwcd0aqlVun
MD5:61C996537672E56B3895D38793FEF51E
SHA1:C48C8B05E18208C4E58CD997B26E9824D45D62BF
SHA-256:3EC08A5424B1C2CD958D2FCBC3CF37EBD43941540651D907F00C16306ABDFCC7
SHA-512:5A2281A69A6EA59D87CC8B690A0DC56A0CD602A226B050597DCD6C9EF3463EBE07B949142F4671022F04D78B0C57A8087977E68B99092527711B6815608E3913
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.0, Code page: 936, Revision Number: 82, Total Editing Time: 03:58:18, Last Saved Time/Date: Wed Jul 3 04:02:28 2024, Create Time/Date: Tue Dec 13 14:17:25 2005, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):13824
Entropy (8bit):7.015833199595925
Encrypted:false
SSDEEP:384:wNHebIs5sg/ErTzf7T+dwxkbGfvBqmmjLw:jbX5v/ITzYwxi8vB7
MD5:E8A04303C9F5D3FF634AAF3AF17C16A3
SHA1:17C7A9D0698B022EE1CA93BD8BFDCF07EB49EFAA
SHA-256:9AA744B900703F545830104E1E5FF8FCC5FD2F45BE6F1AE37CC7D6EBDB67E34C
SHA-512:E842A7C5BDAACAC3F45112EE3653684DC3442D66B59849F82630F167E1F6C11F278306EC457AE1A7249DE9E4DEE6FC925B6F08CB92708437805D26734FC7C6C9
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.0, Code page: 936, Revision Number: 65, Total Editing Time: 01:13:11, Last Saved Time/Date: Wed Jul 3 04:02:12 2024, Create Time/Date: Tue Dec 13 14:17:25 2005, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):12800
Entropy (8bit):6.9842017501205955
Encrypted:false
SSDEEP:192:eJaaYWfkTm1km9VjPpFAylMlpMtOQBB2sFIuZyZwJLdmtLOc:SaaFe6zAyqluD2SrZkwJp
MD5:218DA672087A986EF7DAC94A4B5E665B
SHA1:F83AF3EAB9303AFA49CC37FB1429183B419A3BE4
SHA-256:FA61C479C6B8BF91A47964C64F02AC7F49F51FD04BE8235DF8A81C3D9DB95950
SHA-512:2E57226275866731F14CBA5C3A4CADB68C9AE6D3F5F8F07B9451A51570117263459ECA1445967CEAC16C0FEE80A7F5C97AF7C904985CD1DC29E95E3550ADF347
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 11, Total Editing Time: 05:16:08, Last Saved Time/Date: Fri Jun 7 08:17:48 2024, Create Time/Date: Thu Dec 27 07:22:14 2012, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):8704
Entropy (8bit):6.325257751897019
Encrypted:false
SSDEEP:96:zIjyUfapzogM8zMmfKodTFECKFQcJO1Oj35l0Q8tQh8ZriIxz0sfoo:c9uM8zZfKoYC2nO1OYQ+QWrJxz0I
MD5:6C73C30AF9548F1AC5ADECEB15B279FA
SHA1:655E0F25F5FD5E229C0C9B86AF186E14116EC681
SHA-256:DE547EB36BD293CAD5E227772CCE7E804184AB1F87235B3239C3638426B1A138
SHA-512:00A372842405E76247D3CE10063CCDE4E246ED48893957CC5F04199A000C93FDFFEAFD0FC24CFEC6D26BFE4133050BA25184EB826DA12474F65596FBA25F4C5E
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Revision Number: 39, Total Editing Time: 01:48:57, Last Saved Time/Date: Thu Jun 6 10:07:39 2024, Create Time/Date: Thu Dec 27 07:22:14 2012, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal
Category:dropped
Size (bytes):8192
Entropy (8bit):6.500774482657499
Encrypted:false
SSDEEP:96:ALFyUmaxzop6bdQVtNkRtV4yhwZ1MuQ0f837ACLlY5pVG5poQDBZ7uQooA:MWD65Q9kRtVphoM7x25pqpoPo
MD5:9A6A2DF9EB24983122E0B06EFF4CFF57
SHA1:E9459C7267C245EEB6AF2A866DEC8FB204E215F6
SHA-256:8D9E6F8242B9D93518DC7945B42950EC96595BBC0984324188566A7B5D4C82C9
SHA-512:87C240069CCF15A56AD0B5FD5F2287171BBC815F2A233C24EE7A103AFD706CDEEADF6B3AF28D1BBC42FD1D8C62681E628B3402AA9AD480FDB353C046F82E77E4
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\kbdgc.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):50991104
Entropy (8bit):5.545741590574733
Encrypted:false
SSDEEP:1572864:h3P5aFLI10JhKvkgVKJ2SUmzNCW+ke2gMNx3Smco1Ow+CiLebfraeEGQ8m+V9n3X:2wmkWiaj
MD5:AA54788F8FF9F9D50FA3804069F148CB
SHA1:85BF40F886EE19D1B7C18B320676C58E0FC4D623
SHA-256:B930CFA7A81E07DA6A98A126C6D45560DF027C86B8C6716B9672ABD421C70077
SHA-512:F6E2EB609F95946776165D35106D02E2FA8C1D0B9F7065B6A88DDCEB842482C3FFAE833891953706FFE7CCABA04E01B8913B3EB8643E424BC1D9633CE49C0BED
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`.........................y...........Rich....................PE..L....^.f..........................................@..........................`......p8......................................4...(.... ...<..................................................................0... ....................................text...X........................... ..`.data...@\..........................@....rsrc....<... ...@..................@..@..^............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.99198950173466
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:kbdgc.exe
File size:6'427'166 bytes
MD5:5025218d868f68c956a6bcb8f3c99007
SHA1:84f0f59997a46562e837730335c304b719335ce9
SHA256:ae8ada4be2d0844a57fcfcab82e65dd28613f4e9e802a14562c7f595115ee9bc
SHA512:a79e4f0cc275857fdec42e68bf59e8d12c324bd948386b9cc3391ea74b9aa5906aea1f9a471c63980c5f11ddaa0ac374476fd21f285e8af1887c31a671486dd8
SSDEEP:98304:zJpnERJapCZgZ4WUJ7X7KxKxUDxUk6ef5cUtlQbEgUyLeU7wi0:lloopCZsQJz7K36U5vQZ4Uki0
TLSH:49563305FFC20D33EAB25436DE1A5F54A63C7A644D12C76F97E00DA5FE322E196288B1
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..`_Z.`_Z.`_Z...Z.`_Z...Z1`_Z...Z.`_Z.>\[.`_Z.>[[.`_Z.>Z[.`_Z...Z.`_Z...Z.`_Z.`^Z@`_Z->Z[.`_Z->_[.`_Z(>.Z.`_Z->][.`_ZRich.`_
Icon Hash:2775250905472797
Entrypoint:0x41cec9
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x598DB6FE [Fri Aug 11 13:54:06 2017 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:027ea80e8125c6dda271246922d4c3b0
Instruction
call 00007FB824E3C44Fh
jmp 00007FB824E3BE53h
cmp ecx, dword ptr [0043A1B8h]
jne 00007FB824E3BFC5h
ret
jmp 00007FB824E3C5C5h
and dword ptr [ecx+04h], 00000000h
mov eax, ecx
and dword ptr [ecx+08h], 00000000h
mov dword ptr [ecx+04h], 00430F60h
mov dword ptr [ecx], 00431904h
ret
push ebp
mov ebp, esp
push esi
push dword ptr [ebp+08h]
mov esi, ecx
call 00007FB824E2F9E1h
mov dword ptr [esi], 00431910h
mov eax, esi
pop esi
pop ebp
retn 0004h
and dword ptr [ecx+04h], 00000000h
mov eax, ecx
and dword ptr [ecx+08h], 00000000h
mov dword ptr [ecx+04h], 00431918h
mov dword ptr [ecx], 00431910h
ret
push ebp
mov ebp, esp
push esi
mov esi, ecx
lea eax, dword ptr [esi+04h]
mov dword ptr [esi], 004318F8h
push eax
call 00007FB824E3F158h
test byte ptr [ebp+08h], 00000001h
pop ecx
je 00007FB824E3BFCCh
push 0000000Ch
push esi
call 00007FB824E3B5C4h
pop ecx
pop ecx
mov eax, esi
pop esi
pop ebp
retn 0004h
push ebp
mov ebp, esp
sub esp, 0Ch
lea ecx, dword ptr [ebp-0Ch]
call 00007FB824E3BF3Fh
push 00437AECh
lea eax, dword ptr [ebp-0Ch]
push eax
call 00007FB824E3E857h
int3
push ebp
mov ebp, esp
sub esp, 0Ch
lea ecx, dword ptr [ebp-0Ch]
call 00007FB824E3BF55h
push 00437D1Ch
lea eax, dword ptr [ebp-0Ch]
push eax
Programming Language:
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [C++] VS2015 UPD3.1 build 24215
  • [EXP] VS2015 UPD3.1 build 24215
  • [RES] VS2015 UPD3 build 24213
  • [LNK] VS2015 UPD3.1 build 24215
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x38c400x34.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x38c740x28.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b0000x39c4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f0000x1f58.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x36e500x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x318980x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x300000x21c.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x381c40x120.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x2e1cb0x2e2005c7b428a0e89ea47b4077685a6b368f9False0.5913416751355014data6.694270808561643IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x300000x98a00x9a0093fd19be3a021a1128e7caf2a14b8416False0.45680296266233766COM executable for DOS5.121063891730476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x3a0000x1f2900xc0074d4929d26aa823ed75bb2f4ae8c5198False0.2809244791666667data3.237186720912972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.gfids0x5a0000xe80x2005cfc4d481aa83c2fc6ce55ddf06fb8cfFalse0.337890625data2.0550667973769086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x5b0000x39c40x3a003ab7d834d0baf7f50b7283fae81c49b7False0.4030845905172414data5.363611359089126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x5f0000x1f580x20009caffe0a7af61f18e5154f80560d2242False0.7845458984375data6.622969932482304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_BITMAP0x5b57c0xbb6Device independent bitmap graphic, 93 x 302 x 4, 2 compression, image size 2894, resolution 2835 x 2835 px/mChineseChina0.2581721147431621
RT_ICON0x5c1340x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.6047297297297297
RT_ICON0x5c25c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320ChineseChina0.4703757225433526
RT_ICON0x5c7c40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.4986559139784946
RT_ICON0x5caac0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152ChineseChina0.4444945848375451
RT_DIALOG0x5d3540x176dataChineseChina0.6898395721925134
RT_DIALOG0x5d4cc0xd6dataChineseChina0.6962616822429907
RT_DIALOG0x5d5a40xbadataChineseChina0.7204301075268817
RT_DIALOG0x5d6600x102dataChineseChina0.6201550387596899
RT_DIALOG0x5d7640x286dataChineseChina0.4953560371517028
RT_DIALOG0x5d9ec0x1cedataChineseChina0.6645021645021645
RT_STRING0x5dbbc0xb6dataChineseChina0.7472527472527473
RT_STRING0x5dc740xd6dataChineseChina0.6962616822429907
RT_STRING0x5dd4c0xcadataChineseChina0.7920792079207921
RT_STRING0x5de180x76dataChineseChina0.9152542372881356
RT_STRING0x5de900x282dataChineseChina0.6417445482866043
RT_STRING0x5e1140x94dataChineseChina0.777027027027027
RT_STRING0x5e1a80x78dataChineseChina0.9083333333333333
RT_STRING0x5e2200x64dataChineseChina0.63
RT_STRING0x5e2840x52dataChineseChina0.8780487804878049
RT_STRING0x5e2d80x6adataChineseChina0.7452830188679245
RT_GROUP_ICON0x5e3440x3edataChineseChina0.8387096774193549
RT_MANIFEST0x5e3840x640XML 1.0 document, ASCII text, with CRLF line terminatorsChineseChina0.423125
DLLImport
KERNEL32.dllGetLastError, SetLastError, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, SetStdHandle, HeapSize, GetConsoleCP, GetConsoleMode, SetFilePointerEx, DecodePointer
Language of compilation systemCountry where language is spokenMap
ChineseChina
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:12:54:54
Start date:03/07/2024
Path:C:\Users\user\Desktop\kbdgc.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\kbdgc.exe"
Imagebase:0xb70000
File size:6'427'166 bytes
MD5 hash:5025218D868F68C956A6BCB8F3C99007
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:10%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:8.9%
    Total number of Nodes:1398
    Total number of Limit Nodes:25
    execution_graph 23359 b8a29b 96 API calls 5 library calls 21615 b948be 21626 b97f15 21615->21626 21620 b948db 21622 b9539b _free 20 API calls 21620->21622 21623 b94910 21622->21623 21624 b948e6 21643 b9539b 21624->21643 21627 b97f1e 21626->21627 21628 b948d0 21626->21628 21649 b97e14 21627->21649 21630 b98287 GetEnvironmentStringsW 21628->21630 21631 b9829e 21630->21631 21641 b982f1 21630->21641 21634 b982a4 WideCharToMultiByte 21631->21634 21632 b982fa FreeEnvironmentStringsW 21633 b948d5 21632->21633 21633->21620 21642 b94916 26 API calls 3 library calls 21633->21642 21635 b982c0 21634->21635 21634->21641 21636 b953d5 __vswprintf_c_l 21 API calls 21635->21636 21637 b982c6 21636->21637 21638 b982cd WideCharToMultiByte 21637->21638 21639 b982e3 21637->21639 21638->21639 21640 b9539b _free 20 API calls 21639->21640 21640->21641 21641->21632 21641->21633 21642->21624 21644 b953cf _free 21643->21644 21645 b953a6 RtlFreeHeap 21643->21645 21644->21620 21645->21644 21646 b953bb 21645->21646 21839 b95817 20 API calls _free 21646->21839 21648 b953c1 GetLastError 21648->21644 21669 b95cdc GetLastError 21649->21669 21651 b97e21 21690 b97f33 21651->21690 21653 b97e29 21699 b97ba8 21653->21699 21656 b97e40 21656->21628 21660 b9539b _free 20 API calls 21660->21656 21662 b97e7e 21723 b95817 20 API calls _free 21662->21723 21664 b97e83 21664->21660 21665 b97e9b 21666 b9539b _free 20 API calls 21665->21666 21667 b97ec7 21665->21667 21666->21667 21667->21664 21724 b97a7e 26 API calls 21667->21724 21670 b95cfe 21669->21670 21671 b95cf2 21669->21671 21726 b95466 20 API calls 2 library calls 21670->21726 21725 b972b5 11 API calls 2 library calls 21671->21725 21674 b95cf8 21674->21670 21676 b95d47 SetLastError 21674->21676 21675 b95d0a 21681 b95d12 21675->21681 21727 b9730b 11 API calls 2 library calls 21675->21727 21676->21651 21678 b9539b _free 20 API calls 21680 b95d18 21678->21680 21679 b95d27 21679->21681 21682 b95d2e 21679->21682 21683 b95d53 SetLastError 21680->21683 21681->21678 21728 b95b4e 20 API calls _free 21682->21728 21729 b95423 38 API calls _abort 21683->21729 21686 b95d39 21688 b9539b _free 20 API calls 21686->21688 21689 b95d40 21688->21689 21689->21676 21689->21683 21691 b97f3f ___FrameUnwindToState 21690->21691 21692 b95cdc FindHandler 38 API calls 21691->21692 21697 b97f49 21692->21697 21694 b97fcd ___FrameUnwindToState 21694->21653 21697->21694 21698 b9539b _free 20 API calls 21697->21698 21730 b95423 38 API calls _abort 21697->21730 21731 b97093 EnterCriticalSection 21697->21731 21732 b97fc4 LeaveCriticalSection _abort 21697->21732 21698->21697 21733 b91dc6 21699->21733 21702 b97bc9 GetOEMCP 21704 b97bf2 21702->21704 21703 b97bdb 21703->21704 21705 b97be0 GetACP 21703->21705 21704->21656 21706 b953d5 21704->21706 21705->21704 21707 b95413 21706->21707 21711 b953e3 _free 21706->21711 21744 b95817 20 API calls _free 21707->21744 21708 b953fe RtlAllocateHeap 21710 b95411 21708->21710 21708->21711 21710->21664 21713 b97fd5 21710->21713 21711->21707 21711->21708 21743 b940d3 7 API calls 2 library calls 21711->21743 21714 b97ba8 40 API calls 21713->21714 21717 b97ff4 21714->21717 21715 b97ffb 21755 b8ced3 21715->21755 21717->21715 21719 b98045 IsValidCodePage 21717->21719 21722 b9806a ___scrt_get_show_window_mode 21717->21722 21718 b97e76 21718->21662 21718->21665 21719->21715 21720 b98057 GetCPInfo 21719->21720 21720->21715 21720->21722 21745 b97c80 GetCPInfo 21722->21745 21723->21664 21724->21664 21725->21674 21726->21675 21727->21679 21728->21686 21731->21697 21732->21697 21734 b91de3 21733->21734 21740 b91dd9 21733->21740 21735 b95cdc FindHandler 38 API calls 21734->21735 21734->21740 21736 b91e04 21735->21736 21741 b95e2b 38 API calls __fassign 21736->21741 21738 b91e1d 21742 b95e58 38 API calls __fassign 21738->21742 21740->21702 21740->21703 21741->21738 21742->21740 21743->21711 21744->21710 21746 b97d64 21745->21746 21747 b97cba 21745->21747 21750 b8ced3 DloadLock 5 API calls 21746->21750 21762 b98ccb 21747->21762 21752 b97e10 21750->21752 21752->21715 21754 b96f88 __vswprintf_c_l 44 API calls 21754->21746 21756 b8cedc 21755->21756 21757 b8cede IsProcessorFeaturePresent 21755->21757 21756->21718 21759 b8d4f7 21757->21759 21838 b8d4bb SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21759->21838 21761 b8d5da 21761->21718 21763 b91dc6 __fassign 38 API calls 21762->21763 21764 b98ceb MultiByteToWideChar 21763->21764 21766 b98d29 21764->21766 21774 b98dc1 21764->21774 21768 b953d5 __vswprintf_c_l 21 API calls 21766->21768 21771 b98d4a __vswprintf_c_l ___scrt_get_show_window_mode 21766->21771 21767 b8ced3 DloadLock 5 API calls 21769 b97d1b 21767->21769 21768->21771 21776 b96f88 21769->21776 21770 b98dbb 21781 b96fd3 20 API calls _free 21770->21781 21771->21770 21773 b98d8f MultiByteToWideChar 21771->21773 21773->21770 21775 b98dab GetStringTypeW 21773->21775 21774->21767 21775->21770 21777 b91dc6 __fassign 38 API calls 21776->21777 21778 b96f9b 21777->21778 21782 b96d6b 21778->21782 21781->21774 21783 b96d86 __vswprintf_c_l 21782->21783 21784 b96dac MultiByteToWideChar 21783->21784 21785 b96f60 21784->21785 21786 b96dd6 21784->21786 21787 b8ced3 DloadLock 5 API calls 21785->21787 21789 b953d5 __vswprintf_c_l 21 API calls 21786->21789 21792 b96df7 __vswprintf_c_l 21786->21792 21788 b96f73 21787->21788 21788->21754 21789->21792 21790 b96eac 21821 b96fd3 20 API calls _free 21790->21821 21791 b96e40 MultiByteToWideChar 21791->21790 21793 b96e59 21791->21793 21792->21790 21792->21791 21809 b973c6 21793->21809 21797 b96ebb 21801 b953d5 __vswprintf_c_l 21 API calls 21797->21801 21804 b96edc __vswprintf_c_l 21797->21804 21798 b96e83 21798->21790 21799 b973c6 __vswprintf_c_l 12 API calls 21798->21799 21799->21790 21800 b96f51 21820 b96fd3 20 API calls _free 21800->21820 21801->21804 21802 b973c6 __vswprintf_c_l 12 API calls 21805 b96f30 21802->21805 21804->21800 21804->21802 21805->21800 21806 b96f3f WideCharToMultiByte 21805->21806 21806->21800 21807 b96f7f 21806->21807 21822 b96fd3 20 API calls _free 21807->21822 21823 b970f2 21809->21823 21812 b9741d 21830 b9744e 10 API calls 3 library calls 21812->21830 21813 b973f6 LCMapStringEx 21817 b9743d 21813->21817 21816 b97436 LCMapStringW 21816->21817 21818 b8ced3 DloadLock 5 API calls 21817->21818 21819 b96e70 21818->21819 21819->21790 21819->21797 21819->21798 21820->21790 21821->21785 21822->21790 21824 b97122 21823->21824 21827 b9711e 21823->21827 21824->21812 21824->21813 21825 b97142 21825->21824 21828 b9714e GetProcAddress 21825->21828 21827->21824 21827->21825 21831 b9718e 21827->21831 21829 b9715e __crt_fast_encode_pointer 21828->21829 21829->21824 21830->21816 21832 b971af LoadLibraryExW 21831->21832 21833 b971a4 21831->21833 21834 b971cc GetLastError 21832->21834 21835 b971e4 21832->21835 21833->21827 21834->21835 21836 b971d7 LoadLibraryExW 21834->21836 21835->21833 21837 b971fb FreeLibrary 21835->21837 21836->21835 21837->21833 21838->21761 21839->21648 23383 b9f1a1 DeleteCriticalSection 23361 b8cca3 46 API calls 6 library calls 22348 b8b8a4 22349 b8b8b1 22348->22349 22350 b7cd80 55 API calls 22349->22350 22351 b8b8c5 22350->22351 22352 b73cd1 _swprintf 52 API calls 22351->22352 22353 b8b8d7 SetDlgItemTextW 22352->22353 22356 b891f2 PeekMessageW 22353->22356 22357 b8920d GetMessageW TranslateMessage DispatchMessageW 22356->22357 22358 b8922e 22356->22358 22357->22358 23432 b8a29b 92 API calls 4 library calls 23405 b8ce9a 28 API calls 2 library calls 22376 b8939b 22377 b893a5 __EH_prolog 22376->22377 22530 b712a6 22377->22530 22380 b89a5b 22382 b89a81 22380->22382 22383 b89a73 SendMessageW 22380->22383 22381 b893e7 22384 b8945d 22381->22384 22385 b893f4 22381->22385 22410 b893d3 22381->22410 22386 b89a8a SendDlgItemMessageW 22382->22386 22387 b89a9b 22382->22387 22383->22382 22391 b8946a 22384->22391 22392 b894ef GetDlgItemTextW 22384->22392 22388 b893f9 22385->22388 22389 b89430 22385->22389 22386->22387 22603 b8b0b4 22387->22603 22397 b7cd80 55 API calls 22388->22397 22388->22410 22398 b89451 EndDialog 22389->22398 22389->22410 22393 b7cd80 55 API calls 22391->22393 22392->22389 22394 b89526 22392->22394 22396 b8948c SetDlgItemTextW 22393->22396 22400 b8953e GetDlgItem 22394->22400 22528 b8952f 22394->22528 22403 b8949a 22396->22403 22404 b89413 22397->22404 22398->22410 22401 b89578 SetFocus 22400->22401 22402 b89552 SendMessageW SendMessageW 22400->22402 22408 b89588 22401->22408 22421 b89594 22401->22421 22402->22401 22403->22410 22412 b894a7 GetMessageW 22403->22412 22428 b894cd TranslateMessage DispatchMessageW 22403->22428 22640 b711e6 SHGetMalloc 22404->22640 22405 b89ad3 GetDlgItem 22406 b89aec 22405->22406 22407 b89af2 SetWindowTextW 22405->22407 22406->22407 22622 b888f1 GetClassNameW 22407->22622 22413 b7cd80 55 API calls 22408->22413 22412->22403 22412->22410 22417 b89592 22413->22417 22414 b8941a 22414->22410 22418 b8941e SetDlgItemTextW 22414->22418 22415 b899fb 22419 b7cd80 55 API calls 22415->22419 22540 b8af10 GetDlgItem 22417->22540 22418->22410 22422 b89a0b SetDlgItemTextW 22419->22422 22429 b7cd80 55 API calls 22421->22429 22425 b89a1f 22422->22425 22430 b7cd80 55 API calls 22425->22430 22426 b895e9 22548 b799d4 22426->22548 22427 b89b33 22432 b89b63 22427->22432 22436 b7cd80 55 API calls 22427->22436 22428->22403 22433 b895c6 22429->22433 22434 b89a48 22430->22434 22431 b8a247 92 API calls 22431->22427 22438 b8a247 92 API calls 22432->22438 22487 b89c04 22432->22487 22437 b73cd1 _swprintf 52 API calls 22433->22437 22440 b7cd80 55 API calls 22434->22440 22442 b89b46 SetDlgItemTextW 22436->22442 22437->22417 22443 b89b7e 22438->22443 22439 b89cae 22444 b89cc0 22439->22444 22445 b89cb7 EnableWindow 22439->22445 22440->22410 22448 b7cd80 55 API calls 22442->22448 22449 b89bb5 22443->22449 22453 b89b90 22443->22453 22450 b89cdd 22444->22450 22648 b71263 GetDlgItem EnableWindow 22444->22648 22445->22444 22446 b8961e GetLastError 22447 b89625 22446->22447 22554 b8894c SetCurrentDirectoryW 22447->22554 22452 b89b5a SetDlgItemTextW 22448->22452 22455 b89bf7 22449->22455 22473 b89bd5 DialogBoxParamW 22449->22473 22456 b89d04 22450->22456 22466 b89cfc SendMessageW 22450->22466 22452->22432 22646 b880a6 6 API calls 22453->22646 22462 b8a247 92 API calls 22455->22462 22456->22410 22463 b7cd80 55 API calls 22456->22463 22457 b8963b 22460 b89644 GetLastError 22457->22460 22461 b8964e 22457->22461 22459 b89cd3 22649 b71263 GetDlgItem EnableWindow 22459->22649 22460->22461 22468 b896c9 22461->22468 22471 b896d9 22461->22471 22472 b89666 GetTickCount 22461->22472 22462->22487 22469 b89d1d SetDlgItemTextW 22463->22469 22464 b89ba9 22464->22449 22466->22456 22467 b89c8c 22647 b880a6 6 API calls 22467->22647 22468->22471 22474 b898fe 22468->22474 22469->22410 22476 b89899 22471->22476 22477 b896f1 GetModuleFileNameW 22471->22477 22479 b73cd1 _swprintf 52 API calls 22472->22479 22473->22389 22473->22455 22563 b71281 GetDlgItem ShowWindow 22474->22563 22476->22389 22486 b7cd80 55 API calls 22476->22486 22641 b7dac2 74 API calls 22477->22641 22478 b89cab 22478->22439 22483 b89683 22479->22483 22480 b7cd80 55 API calls 22480->22487 22481 b8990e 22564 b71281 GetDlgItem ShowWindow 22481->22564 22555 b791f7 22483->22555 22485 b8971b 22489 b73cd1 _swprintf 52 API calls 22485->22489 22490 b898ad 22486->22490 22487->22439 22487->22467 22487->22480 22488 b89918 22491 b7cd80 55 API calls 22488->22491 22492 b89744 CreateFileMappingW 22489->22492 22493 b73cd1 _swprintf 52 API calls 22490->22493 22495 b89922 SetDlgItemTextW 22491->22495 22496 b897a2 GetCommandLineW 22492->22496 22523 b89808 __vswprintf_c_l 22492->22523 22497 b898cb 22493->22497 22565 b71281 GetDlgItem ShowWindow 22495->22565 22500 b897b3 22496->22500 22509 b7cd80 55 API calls 22497->22509 22498 b896a9 22501 b896b7 22498->22501 22502 b896b0 GetLastError 22498->22502 22642 b890b8 SHGetMalloc 22500->22642 22505 b7913d 74 API calls 22501->22505 22502->22501 22503 b89936 SetDlgItemTextW GetDlgItem 22506 b8994f GetWindowLongW SetWindowLongW 22503->22506 22507 b89967 22503->22507 22505->22468 22506->22507 22566 b8a247 22507->22566 22508 b897cf 22643 b890b8 SHGetMalloc 22508->22643 22509->22389 22513 b897db 22644 b890b8 SHGetMalloc 22513->22644 22514 b8a247 92 API calls 22516 b89983 22514->22516 22591 b8b44c 22516->22591 22517 b897e7 MapViewOfFile 22517->22523 22518 b89873 22518->22476 22522 b89889 UnmapViewOfFile CloseHandle 22518->22522 22522->22476 22523->22518 22525 b8985f Sleep 22523->22525 22525->22518 22525->22523 22528->22389 22528->22415 22531 b71308 22530->22531 22534 b712af 22530->22534 22668 b7caee GetWindowLongW SetWindowLongW 22531->22668 22533 b71315 22533->22380 22533->22381 22533->22410 22534->22533 22650 b7cb15 22534->22650 22537 b712e4 GetDlgItem 22537->22533 22538 b712f4 22537->22538 22538->22533 22539 b712fa SetWindowTextW 22538->22539 22539->22533 22541 b8af6c SendMessageW SendMessageW 22540->22541 22542 b8af3c 22540->22542 22543 b8afc3 SendMessageW SendMessageW SendMessageW 22541->22543 22544 b8afa4 22541->22544 22545 b8af47 ShowWindow SendMessageW SendMessageW 22542->22545 22546 b8b00d SendMessageW 22543->22546 22547 b8afee SendMessageW 22543->22547 22544->22543 22545->22541 22546->22426 22547->22546 22550 b799de 22548->22550 22549 b79a6f 22551 b79b8c 9 API calls 22549->22551 22553 b79a98 22549->22553 22550->22549 22550->22553 22672 b79b8c 22550->22672 22551->22553 22553->22446 22553->22447 22554->22457 22556 b79201 22555->22556 22557 b7926b CreateFileW 22556->22557 22558 b7925f 22556->22558 22557->22558 22559 b792bd 22558->22559 22560 b7af43 2 API calls 22558->22560 22559->22498 22561 b792a4 22560->22561 22561->22559 22562 b792a8 CreateFileW 22561->22562 22562->22559 22563->22481 22564->22488 22565->22503 22567 b8a251 __EH_prolog 22566->22567 22568 b89975 22567->22568 22704 b88fc0 ExpandEnvironmentStringsW 22567->22704 22568->22514 22572 b8a588 SetWindowTextW 22580 b8a288 _wcslen _wcsrchr 22572->22580 22577 b8a379 SetFileAttributesW 22579 b8a434 GetFileAttributesW 22577->22579 22588 b8a36c _wcslen ___scrt_get_show_window_mode 22577->22588 22582 b8a442 DeleteFileW 22579->22582 22579->22588 22580->22568 22580->22572 22580->22588 22705 b806e6 CompareStringW 22580->22705 22706 b885b2 GetCurrentDirectoryW 22580->22706 22707 b79eaf 7 API calls 22580->22707 22710 b79e38 FindClose 22580->22710 22711 b89118 70 API calls 2 library calls 22580->22711 22712 b91870 22580->22712 22725 b88fc0 ExpandEnvironmentStringsW 22580->22725 22582->22588 22584 b8a74d GetDlgItem SetWindowTextW SendMessageW 22584->22588 22585 b73cd1 _swprintf 52 API calls 22586 b8a477 GetFileAttributesW 22585->22586 22586->22588 22589 b8a488 MoveFileW 22586->22589 22587 b8a78f SendMessageW 22587->22580 22588->22577 22588->22579 22588->22580 22588->22584 22588->22585 22588->22587 22708 b7add8 53 API calls 3 library calls 22588->22708 22709 b79eaf 7 API calls 22588->22709 22589->22588 22590 b8a4a0 MoveFileExW 22589->22590 22590->22588 22592 b8b456 __EH_prolog 22591->22592 22728 b7ed7a 22592->22728 22594 b8b487 22732 b7592d 22594->22732 22596 b8b4a5 22736 b7783a 22596->22736 22600 b8b4f8 22753 b778ca 22600->22753 22604 b8b0c1 22603->22604 23295 b8850d 22604->23295 22607 b8b0ce GetWindow 22608 b89aa1 GetDlgItem SendMessageW 22607->22608 22611 b8b0ea 22607->22611 22621 b885b2 GetCurrentDirectoryW 22608->22621 22609 b8b0f7 GetClassNameW 23300 b806e6 CompareStringW 22609->23300 22611->22608 22611->22609 22612 b8b188 GetWindow 22611->22612 22613 b8b11f GetWindowLongW 22611->22613 22612->22608 22612->22611 22613->22612 22614 b8b12f SendMessageW 22613->22614 22614->22612 22616 b8b145 22614->22616 23301 b8856f GetDC GetDeviceCaps ReleaseDC 22616->23301 23302 b8852c GetDC GetDeviceCaps ReleaseDC 22616->23302 23303 b8861c 6 API calls ___scrt_get_show_window_mode 22616->23303 22619 b8b16a SendMessageW 22619->22612 22620 b8b181 DeleteObject 22619->22620 22620->22612 22621->22405 22623 b88912 22622->22623 22629 b88937 22622->22629 23306 b806e6 CompareStringW 22623->23306 22625 b8893c SHAutoComplete 22626 b88945 22625->22626 22630 b88d79 22626->22630 22627 b88925 22628 b88929 FindWindowExW 22627->22628 22627->22629 22628->22629 22629->22625 22629->22626 22631 b88d83 __EH_prolog 22630->22631 22632 b71346 76 API calls 22631->22632 22633 b88da5 22632->22633 23307 b71dfc 22633->23307 22636 b7187c 129 API calls 22637 b88dd9 __vswprintf_c_l new 22636->22637 22638 b715c1 80 API calls 22637->22638 22639 b88e25 22638->22639 22639->22427 22639->22431 22640->22414 22641->22485 22642->22508 22643->22513 22644->22517 22646->22464 22647->22478 22648->22459 22649->22450 22669 b7c4de 22650->22669 22652 b7cb3b GetWindowRect GetClientRect 22653 b7cc30 22652->22653 22656 b7cb95 22652->22656 22654 b7cc72 GetSystemMetrics GetWindow 22653->22654 22655 b7cc3a GetWindowTextW 22653->22655 22663 b7cc92 22654->22663 22657 b7c56f 53 API calls 22655->22657 22656->22654 22658 b7cbf6 GetWindowLongW 22656->22658 22660 b7cc66 SetWindowTextW 22657->22660 22662 b7cc20 GetWindowRect 22658->22662 22659 b712d1 22659->22533 22659->22537 22660->22654 22661 b7cc9e GetWindowTextW 22661->22663 22662->22653 22663->22659 22663->22661 22664 b7cce4 GetWindowRect 22663->22664 22665 b7cd59 GetWindow 22663->22665 22666 b7c56f 53 API calls 22663->22666 22664->22665 22665->22659 22665->22663 22667 b7ccd1 SetWindowTextW 22666->22667 22667->22663 22668->22533 22670 b7c56f 53 API calls 22669->22670 22671 b7c506 _wcschr 22670->22671 22671->22652 22673 b79b99 22672->22673 22674 b79bbd 22673->22674 22675 b79bb0 CreateDirectoryW 22673->22675 22693 b79b05 22674->22693 22675->22674 22677 b79bf0 22675->22677 22680 b79bff 22677->22680 22685 b79dc9 22677->22685 22679 b79c03 GetLastError 22679->22680 22680->22550 22681 b7af43 2 API calls 22683 b79bd9 22681->22683 22683->22679 22684 b79bdd CreateDirectoryW 22683->22684 22684->22677 22684->22679 22686 b8c630 22685->22686 22687 b79dd6 SetFileAttributesW 22686->22687 22688 b79dec 22687->22688 22689 b79e19 22687->22689 22690 b7af43 2 API calls 22688->22690 22689->22680 22691 b79e00 22690->22691 22691->22689 22692 b79e04 SetFileAttributesW 22691->22692 22692->22689 22696 b79b19 22693->22696 22697 b8c630 22696->22697 22698 b79b26 GetFileAttributesW 22697->22698 22699 b79b37 22698->22699 22700 b79b0e 22698->22700 22701 b7af43 2 API calls 22699->22701 22700->22679 22700->22681 22702 b79b4b 22701->22702 22702->22700 22703 b79b4f GetFileAttributesW 22702->22703 22703->22700 22704->22580 22705->22580 22706->22580 22707->22580 22708->22588 22709->22588 22710->22580 22711->22580 22713 b954c3 22712->22713 22714 b954db 22713->22714 22715 b954d0 22713->22715 22717 b954e3 22714->22717 22723 b954ec _free 22714->22723 22716 b953d5 __vswprintf_c_l 21 API calls 22715->22716 22721 b954d8 22716->22721 22718 b9539b _free 20 API calls 22717->22718 22718->22721 22719 b954f1 22726 b95817 20 API calls _free 22719->22726 22720 b95516 HeapReAlloc 22720->22721 22720->22723 22721->22580 22723->22719 22723->22720 22727 b940d3 7 API calls 2 library calls 22723->22727 22725->22580 22726->22721 22727->22723 22729 b7ed87 _wcslen 22728->22729 22757 b71742 22729->22757 22731 b7ed9f 22731->22594 22733 b7ed7a _wcslen 22732->22733 22734 b71742 70 API calls 22733->22734 22735 b7ed9f 22734->22735 22735->22596 22737 b77844 __EH_prolog 22736->22737 22774 b7c07f 22737->22774 22739 b7785c 22780 b8c51f 22739->22780 22742 b7789c 22744 b77995 22742->22744 22745 b7799f 22744->22745 22750 b77a09 22745->22750 22834 b79e4b 22745->22834 22747 b77ab4 22747->22600 22749 b77a73 22749->22747 22840 b7131b 68 API calls 22749->22840 22750->22749 22751 b79e4b 8 API calls 22750->22751 22812 b77f13 22750->22812 22751->22750 22754 b778df 22753->22754 22755 b778d8 22753->22755 22756 b809f5 80 API calls 22755->22756 22756->22754 22758 b71758 22757->22758 22769 b717b3 __vswprintf_c_l 22757->22769 22759 b71781 22758->22759 22770 b76b2c 68 API calls __vswprintf_c_l 22758->22770 22761 b717e0 22759->22761 22762 b717a0 new 22759->22762 22764 b91870 22 API calls 22761->22764 22762->22769 22772 b76b64 69 API calls 22762->22772 22763 b71777 22771 b76b64 69 API calls 22763->22771 22766 b717e7 22764->22766 22766->22769 22773 b76b64 69 API calls 22766->22773 22769->22731 22770->22763 22771->22759 22772->22769 22773->22769 22775 b7c089 __EH_prolog 22774->22775 22776 b8c51f new 8 API calls 22775->22776 22777 b7c0cc 22776->22777 22778 b8c51f new 8 API calls 22777->22778 22779 b7c0f0 22778->22779 22779->22739 22783 b8c524 new 22780->22783 22781 b77885 22781->22742 22786 b807b4 22781->22786 22783->22781 22790 b940d3 7 API calls 2 library calls 22783->22790 22791 b8cf79 RaiseException FindHandler new 22783->22791 22792 b8cf5c RaiseException Concurrency::cancel_current_task FindHandler 22783->22792 22787 b807be __EH_prolog 22786->22787 22793 b7f717 22787->22793 22789 b808be 22789->22742 22790->22783 22809 b8c560 22793->22809 22795 b7f721 EnterCriticalSection 22796 b7f745 22795->22796 22803 b7f763 22795->22803 22799 b8c51f new 8 API calls 22796->22799 22797 b7f77b 22800 b8c51f new 8 API calls 22797->22800 22798 b7f7aa LeaveCriticalSection 22801 b7f7b6 22798->22801 22802 b7f74f 22799->22802 22804 b7f785 22800->22804 22801->22789 22802->22803 22810 b7f545 72 API calls 22802->22810 22803->22797 22803->22798 22806 b7f79f LeaveCriticalSection 22804->22806 22811 b7f545 72 API calls 22804->22811 22806->22801 22808 b7f79d 22808->22806 22809->22795 22810->22803 22811->22808 22813 b77f1d __EH_prolog 22812->22813 22841 b71346 22813->22841 22815 b77f38 22849 b798a8 22815->22849 22818 b77f67 22964 b715c1 22818->22964 22822 b77fff 22866 b780a8 22822->22866 22826 b7805f 22870 b71dad 22826->22870 22829 b7806a 22829->22818 22874 b737ec 22829->22874 22883 b780fa 22829->22883 22830 b79e4b 8 API calls 22832 b77f63 22830->22832 22832->22818 22832->22822 22832->22830 22968 b7b36e CompareStringW _wcslen 22832->22968 22835 b79e60 22834->22835 22839 b79e64 22835->22839 23283 b79f76 22835->23283 22837 b79e74 22838 b79e79 FindClose 22837->22838 22837->22839 22838->22839 22839->22745 22840->22747 22842 b7134b __EH_prolog 22841->22842 22843 b7c07f 8 API calls 22842->22843 22844 b71382 22843->22844 22845 b8c51f new 8 API calls 22844->22845 22848 b713db ___scrt_get_show_window_mode 22844->22848 22846 b713c8 22845->22846 22846->22848 22970 b7a96e 22846->22970 22848->22815 22850 b798b3 22849->22850 22851 b77f4e 22850->22851 22986 b76bab 68 API calls 22850->22986 22851->22818 22853 b71927 22851->22853 22854 b71931 __EH_prolog 22853->22854 22861 b71973 22854->22861 22864 b7195a 22854->22864 22987 b76ce9 22854->22987 22856 b71a8c 22990 b7131b 68 API calls 22856->22990 22858 b737ec 92 API calls 22859 b71a9c 22858->22859 22859->22858 22860 b71afd 22859->22860 22859->22864 22860->22864 22865 b71b2b 22860->22865 22991 b7131b 68 API calls 22860->22991 22861->22856 22861->22859 22861->22864 22863 b737ec 92 API calls 22863->22865 22864->22832 22865->22863 22865->22864 22867 b780b4 22866->22867 23009 b7fbd4 GetSystemTime SystemTimeToFileTime 22867->23009 22869 b78019 22869->22826 22969 b80284 66 API calls 22869->22969 22872 b71db2 __EH_prolog 22870->22872 22871 b71de6 22871->22829 22872->22871 23011 b7187c 22872->23011 22875 b737fd 22874->22875 22882 b737f9 22874->22882 22876 b7382e 22875->22876 22877 b7381a 22875->22877 23186 b725f5 92 API calls 3 library calls 22876->23186 22880 b73826 22877->22880 23185 b73058 80 API calls 2 library calls 22877->23185 22880->22882 23187 b71e87 68 API calls 22880->23187 22882->22829 22887 b78104 __EH_prolog 22883->22887 22884 b7817c 22885 b781a5 22884->22885 22886 b7822c 22884->22886 22914 b78180 22884->22914 22888 b781c7 22885->22888 22885->22914 23242 b77722 151 API calls 22885->23242 22886->22914 23188 b75b09 22886->23188 22887->22884 22887->22914 23241 b872ff 95 API calls 22887->23241 22888->22914 23243 b872ff 95 API calls 22888->23243 22893 b7827b 22893->22914 23196 b77e00 22893->23196 22896 b783d7 22897 b79e4b 8 API calls 22896->22897 22898 b7843b 22896->22898 22897->22898 23200 b7793b 22898->23200 22900 b7c1e8 74 API calls 22910 b78495 _memcmp 22900->22910 22901 b785d5 22902 b786a4 22901->22902 22906 b78623 22901->22906 22904 b786ff 22902->22904 22918 b786af 22902->22918 22916 b78693 22904->22916 23247 b77c8f 90 API calls 22904->23247 22905 b786fd 22911 b7913d 74 API calls 22905->22911 22912 b79b05 4 API calls 22906->22912 22906->22916 22907 b78cb0 22909 b7913d 74 API calls 22907->22909 22909->22914 22910->22900 22910->22901 22910->22914 23244 b77dad 76 API calls 22910->23244 23245 b7131b 68 API calls 22910->23245 22911->22914 22915 b7865a 22912->22915 22913 b78768 22913->22907 22917 b79420 GetFileType 22913->22917 22928 b787d1 22913->22928 22914->22829 22915->22916 23246 b78e64 90 API calls 22915->23246 22916->22905 22916->22913 22922 b787a9 22917->22922 22918->22905 23206 b77acb 22918->23206 22919 b7a3ac 8 API calls 22920 b78820 22919->22920 22924 b7a3ac 8 API calls 22920->22924 22922->22928 23248 b71e37 68 API calls 22922->23248 22930 b78836 22924->22930 22926 b787bf 23249 b76cad 69 API calls 22926->23249 22928->22919 22929 b788d9 22931 b78922 22929->22931 22932 b78a1b 22929->22932 22930->22929 23231 b7956f 22930->23231 22933 b78979 22931->22933 22938 b78932 22931->22938 22934 b78a41 22932->22934 22935 b78a2d 22932->22935 22955 b78954 22932->22955 22937 b77e00 CharUpperW 22933->22937 22940 b81b4f 69 API calls 22934->22940 23254 b78dcb 122 API calls __EH_prolog 22935->23254 22941 b78994 22937->22941 22942 b78961 22938->22942 22946 b78940 22938->22946 22943 b78a5a 22940->22943 22948 b789c4 22941->22948 22949 b789bd 22941->22949 22941->22955 22942->22955 23251 b774c7 102 API calls 22942->23251 22945 b817f6 122 API calls 22943->22945 22945->22955 23250 b71e37 68 API calls 22946->23250 23253 b78d09 86 API calls __EH_prolog 22948->23253 23252 b772b7 78 API calls __except_handler4 22949->23252 22952 b78b6a 22952->22907 22953 b78bd6 22952->22953 23256 b79870 SetEndOfFile 22952->23256 23236 b79718 22953->23236 22955->22952 23255 b71e37 68 API calls 22955->23255 22958 b78c30 22959 b791a9 70 API calls 22958->22959 22960 b78c3b 22959->22960 22960->22907 22961 b79dc9 4 API calls 22960->22961 22962 b78c9a 22961->22962 22962->22907 23257 b71e37 68 API calls 22962->23257 22965 b715d3 22964->22965 23282 b7c122 80 API calls 22965->23282 22968->22832 22969->22826 22971 b7a978 __EH_prolog 22970->22971 22976 b7da08 74 API calls 22971->22976 22973 b7a98a 22977 b7aa56 22973->22977 22976->22973 22978 b7aa68 ___scrt_get_show_window_mode 22977->22978 22981 b7f8fb 22978->22981 22984 b7f8bb GetCurrentProcess GetProcessAffinityMask 22981->22984 22985 b7a9d0 22984->22985 22985->22848 22986->22851 22992 b7168b 22987->22992 22989 b76d05 22989->22861 22990->22864 22991->22865 22993 b716a1 22992->22993 23004 b716f9 __vswprintf_c_l 22992->23004 22994 b716ca 22993->22994 23005 b76b2c 68 API calls __vswprintf_c_l 22993->23005 22995 b71720 22994->22995 23001 b716e6 new 22994->23001 22997 b91870 22 API calls 22995->22997 23000 b71727 22997->23000 22998 b716c0 23006 b76b64 69 API calls 22998->23006 23000->23004 23008 b76b64 69 API calls 23000->23008 23001->23004 23007 b76b64 69 API calls 23001->23007 23004->22989 23005->22998 23006->22994 23007->23004 23008->23004 23010 b7fc04 __vswprintf_c_l 23009->23010 23010->22869 23013 b71881 __EH_prolog 23011->23013 23012 b71895 23012->22871 23013->23012 23014 b718b7 23013->23014 23016 b718da 23013->23016 23015 b737ec 92 API calls 23014->23015 23015->23012 23020 b73bc1 23016->23020 23024 b73bca 23020->23024 23021 b737ec 92 API calls 23021->23024 23022 b718f6 23022->23012 23025 b71cc0 23022->23025 23024->23021 23024->23022 23037 b7f507 23024->23037 23026 b71cca __EH_prolog 23025->23026 23045 b73867 23026->23045 23028 b71cf3 23029 b71d7a 23028->23029 23030 b7168b 70 API calls 23028->23030 23029->23012 23031 b71d0a 23030->23031 23075 b71802 70 API calls 23031->23075 23033 b71d22 23035 b71d2e _wcslen 23033->23035 23076 b802a5 MultiByteToWideChar 23033->23076 23077 b71802 70 API calls 23035->23077 23038 b7f50e 23037->23038 23039 b7f529 23038->23039 23043 b76b27 RaiseException FindHandler 23038->23043 23041 b7f53a SetThreadExecutionState 23039->23041 23044 b76b27 RaiseException FindHandler 23039->23044 23041->23024 23043->23039 23044->23041 23046 b73871 __EH_prolog 23045->23046 23047 b73887 23046->23047 23048 b738a3 23046->23048 23095 b7131b 68 API calls 23047->23095 23050 b73ae8 23048->23050 23053 b738d2 23048->23053 23119 b7131b 68 API calls 23050->23119 23052 b73892 23052->23028 23053->23052 23054 b807b4 75 API calls 23053->23054 23055 b7390a 23054->23055 23078 b81b4f 23055->23078 23057 b73921 23059 b7394f 23057->23059 23061 b7393f 23057->23061 23067 b73953 23057->23067 23058 b739de 23104 b7a3ac 23058->23104 23059->23067 23097 b71e6d 70 API calls 23059->23097 23096 b7131b 68 API calls 23061->23096 23064 b739f1 23068 b73a62 23064->23068 23069 b73a6c 23064->23069 23067->23058 23074 b7394a 23067->23074 23098 b7c1e8 23067->23098 23108 b78dcb 122 API calls __EH_prolog 23068->23108 23109 b817f6 23069->23109 23072 b73a6a 23072->23074 23118 b71e37 68 API calls 23072->23118 23091 b809f5 23074->23091 23075->23033 23076->23035 23077->23029 23079 b81b5e 23078->23079 23081 b81b68 23078->23081 23120 b76b64 69 API calls 23079->23120 23082 b81bad new 23081->23082 23083 b81ba8 23081->23083 23090 b81c06 ___scrt_get_show_window_mode 23081->23090 23085 b81cbd 23082->23085 23087 b81be2 23082->23087 23082->23090 23122 b8f80a RaiseException 23083->23122 23123 b8f80a RaiseException 23085->23123 23121 b81a70 69 API calls 3 library calls 23087->23121 23088 b81ce0 23090->23057 23090->23090 23092 b80a17 23091->23092 23124 b7f845 23092->23124 23094 b80a30 23094->23052 23095->23052 23096->23074 23097->23067 23099 b7c21b 23098->23099 23100 b7c209 23098->23100 23141 b75f38 74 API calls 23099->23141 23140 b75f38 74 API calls 23100->23140 23103 b7c213 23103->23058 23105 b7a3b9 23104->23105 23107 b7a3c3 23104->23107 23106 b8c51f new 8 API calls 23105->23106 23106->23107 23107->23064 23108->23072 23110 b81828 23109->23110 23111 b817ff 23109->23111 23117 b8181c 23110->23117 23156 b83d71 122 API calls 2 library calls 23110->23156 23112 b8181e 23111->23112 23114 b81814 23111->23114 23111->23117 23155 b84a89 117 API calls 23112->23155 23142 b854d8 23114->23142 23117->23072 23118->23074 23119->23052 23120->23081 23121->23090 23122->23085 23123->23088 23125 b7f8b7 23124->23125 23126 b7f84e EnterCriticalSection 23124->23126 23125->23094 23127 b7f88a 23126->23127 23130 b7f86c 23126->23130 23128 b7f5e6 78 API calls 23127->23128 23129 b7f8ad LeaveCriticalSection 23127->23129 23131 b7f8a4 23128->23131 23129->23125 23130->23127 23133 b7f5e6 23130->23133 23131->23129 23134 b7f9de 73 API calls 23133->23134 23135 b7f608 ReleaseSemaphore 23134->23135 23136 b7f646 DeleteCriticalSection FindCloseChangeNotification CloseHandle 23135->23136 23137 b7f628 23135->23137 23136->23127 23138 b7f6dc 71 API calls 23137->23138 23139 b7f632 CloseHandle 23138->23139 23139->23136 23139->23137 23140->23103 23141->23103 23157 b81d8c 23142->23157 23145 b858bb 23184 b83a45 93 API calls __vswprintf_c_l 23145->23184 23147 b858cb __vswprintf_c_l 23147->23117 23150 b854e9 ___BuildCatchObject __vswprintf_c_l 23150->23145 23161 b7c2c3 23150->23161 23170 b7f67c 23150->23170 23176 b826e0 117 API calls 23150->23176 23177 b8590d 117 API calls 23150->23177 23178 b7f9de 23150->23178 23182 b82139 93 API calls __vswprintf_c_l 23150->23182 23183 b85f46 122 API calls __vswprintf_c_l 23150->23183 23155->23117 23156->23117 23159 b81d96 __EH_prolog ___scrt_get_show_window_mode new 23157->23159 23158 b81e81 23158->23150 23159->23158 23160 b76b64 69 API calls 23159->23160 23160->23159 23163 b7c2d7 __vswprintf_c_l 23161->23163 23162 b7c408 23164 b7c430 23162->23164 23165 b7c262 PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 23162->23165 23163->23162 23167 b7c3ff 23163->23167 23168 b872ff 95 API calls 23163->23168 23169 b7a494 86 API calls 23163->23169 23166 b7f507 SetThreadExecutionState RaiseException 23164->23166 23165->23164 23166->23167 23167->23150 23168->23163 23169->23163 23171 b7f68d 23170->23171 23172 b7f688 23170->23172 23173 b7f6a6 23171->23173 23175 b7f9de 73 API calls 23171->23175 23174 b7f7c6 78 API calls 23172->23174 23173->23150 23174->23171 23175->23173 23176->23150 23177->23150 23179 b7fa23 23178->23179 23180 b7f9f8 ResetEvent ReleaseSemaphore 23178->23180 23179->23150 23181 b7f6dc 71 API calls 23180->23181 23181->23179 23182->23150 23183->23150 23184->23147 23185->22880 23186->22880 23187->22882 23189 b75b19 _wcslen 23188->23189 23194 b75b3a 23189->23194 23258 b75a37 CharUpperW CompareStringW CompareStringW 23189->23258 23192 b75b5f 23193 b75ba1 23192->23193 23192->23194 23259 b7a653 CharUpperW CompareStringW CompareStringW _wcslen 23192->23259 23193->23194 23260 b7ecfa CompareStringW 23193->23260 23194->22893 23197 b77e1e 23196->23197 23198 b77ebf CharUpperW 23197->23198 23199 b77ed2 23198->23199 23199->22896 23201 b7794a 23200->23201 23202 b7798a 23201->23202 23261 b76c8f 68 API calls 23201->23261 23202->22910 23204 b77982 23262 b7131b 68 API calls 23204->23262 23207 b77ad5 23206->23207 23208 b79b8c 9 API calls 23207->23208 23211 b77c5c 23207->23211 23209 b77b12 23208->23209 23210 b79b05 4 API calls 23209->23210 23227 b77c00 __except_handler4 23209->23227 23212 b77b22 23210->23212 23211->22905 23213 b77b68 23212->23213 23214 b79b19 4 API calls 23212->23214 23215 b799d4 9 API calls 23213->23215 23221 b77bd6 23213->23221 23219 b77b30 23214->23219 23217 b77b78 23215->23217 23218 b79b8c 9 API calls 23217->23218 23222 b77b95 23218->23222 23219->23213 23279 b78e64 90 API calls 23219->23279 23223 b77c69 23221->23223 23224 b77be8 23221->23224 23221->23227 23226 b799d4 9 API calls 23222->23226 23222->23227 23280 b71e37 68 API calls 23223->23280 23224->23227 23228 b79dc9 4 API calls 23224->23228 23229 b77bb9 23226->23229 23227->23211 23263 b79c30 23227->23263 23228->23227 23230 b79b8c 9 API calls 23229->23230 23230->23221 23232 b7959d 2 API calls 23231->23232 23233 b79583 23232->23233 23234 b7958e 23233->23234 23281 b79870 SetEndOfFile 23233->23281 23234->22929 23237 b79729 23236->23237 23240 b79738 23236->23240 23238 b7972f FlushFileBuffers 23237->23238 23237->23240 23238->23240 23239 b797b1 SetFileTime 23239->22958 23240->23239 23241->22884 23242->22888 23243->22914 23244->22910 23245->22910 23246->22916 23247->22916 23248->22926 23249->22928 23250->22955 23251->22955 23252->22955 23253->22955 23254->22955 23255->22952 23256->22953 23257->22907 23258->23192 23259->23192 23260->23194 23261->23204 23262->23202 23264 b79c3a 23263->23264 23265 b79b19 4 API calls 23264->23265 23266 b79c9e 23265->23266 23267 b79cb9 CreateFileW 23266->23267 23270 b79dc9 4 API calls 23266->23270 23269 b79ce5 23267->23269 23277 b79d2d 23267->23277 23271 b7af43 2 API calls 23269->23271 23270->23267 23272 b79cfb 23271->23272 23273 b79d03 CreateFileW 23272->23273 23274 b79dbc 23272->23274 23273->23274 23273->23277 23274->23211 23275 b79d66 SetFileTime CloseHandle 23275->23274 23276 b79dac 23275->23276 23278 b79dc9 4 API calls 23276->23278 23277->23275 23278->23274 23279->23213 23280->23227 23281->23234 23284 b79f80 23283->23284 23285 b7a010 FindNextFileW 23284->23285 23286 b79f9e FindFirstFileW 23284->23286 23287 b7a02f 23285->23287 23288 b7a01b GetLastError 23285->23288 23289 b79fb7 23286->23289 23294 b79ff4 23286->23294 23287->23294 23288->23287 23290 b7af43 2 API calls 23289->23290 23291 b79fd0 23290->23291 23292 b79fd4 FindFirstFileW 23291->23292 23293 b79fe9 GetLastError 23291->23293 23292->23293 23292->23294 23293->23294 23294->22837 23304 b8852c GetDC GetDeviceCaps ReleaseDC 23295->23304 23297 b88514 23298 b88520 23297->23298 23305 b8856f GetDC GetDeviceCaps ReleaseDC 23297->23305 23298->22607 23298->22608 23300->22611 23301->22616 23302->22616 23303->22619 23304->23297 23305->23298 23306->22627 23308 b798a8 68 API calls 23307->23308 23309 b71e08 23308->23309 23310 b71927 92 API calls 23309->23310 23312 b71e0c 23309->23312 23311 b71e19 23310->23311 23311->23312 23316 b7131b 68 API calls 23311->23316 23312->22636 23314 b71e28 23315 b791a9 70 API calls 23314->23315 23315->23312 23316->23314 23317 b71093 23322 b758ab 23317->23322 23323 b758b5 __EH_prolog 23322->23323 23324 b7a96e 76 API calls 23323->23324 23325 b758c1 23324->23325 23329 b75a9c GetCurrentProcess GetProcessAffinityMask 23325->23329 23362 b92c91 QueryPerformanceFrequency QueryPerformanceCounter 23406 b91290 5 API calls 2 library calls 23385 b79187 74 API calls 23386 b96988 71 API calls _free 23363 b9788a 6 API calls DloadLock 23344 b71881 129 API calls __EH_prolog 23434 b7778e GetCurrentProcess GetLastError CloseHandle 23435 b98382 GetProcessHeap 23407 b8a29b 93 API calls 4 library calls 23408 b8ce86 20 API calls 23436 b9e786 CloseHandle 23411 b8def0 51 API calls 2 library calls 23437 b8f7f6 RaiseException 23389 b905ee 48 API calls 22359 b95de5 22367 b97209 22359->22367 22363 b95e01 22364 b95e0e 22363->22364 22375 b95e11 11 API calls 22363->22375 22366 b95df9 22368 b970f2 _free 5 API calls 22367->22368 22369 b97230 22368->22369 22370 b97248 TlsAlloc 22369->22370 22371 b97239 22369->22371 22370->22371 22372 b8ced3 DloadLock 5 API calls 22371->22372 22373 b95def 22372->22373 22373->22366 22374 b95d60 20 API calls _free 22373->22374 22374->22363 22375->22366 23365 b9d0e4 IsProcessorFeaturePresent 23390 b881da 21 API calls 23413 b8c2db 12 API calls 2 library calls 23439 b877df GetClientRect 23414 b916d0 RtlUnwind 23440 b96bd3 21 API calls 23415 b8cec9 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 23416 b8a29b 102 API calls 5 library calls 23345 b798ce 23346 b798e1 23345->23346 23347 b798da 23345->23347 23348 b798e7 GetStdHandle 23346->23348 23352 b798f2 23346->23352 23348->23352 23349 b79947 WriteFile 23349->23352 23350 b79917 WriteFile 23351 b79912 23350->23351 23350->23352 23351->23350 23351->23352 23352->23347 23352->23349 23352->23350 23352->23351 23354 b799ba 23352->23354 23356 b76ab3 57 API calls 23352->23356 23357 b76cad 69 API calls 23354->23357 23356->23352 23357->23347 23366 b968c0 21 API calls _free 23391 b945c4 53 API calls 2 library calls 23417 b88e38 72 API calls 23392 b89d3b 94 API calls _swprintf 23418 b89233 139 API calls 23419 b98237 GetCommandLineA GetCommandLineW 23421 b7da20 FreeLibrary 23372 b8b022 73 API calls 22321 b8c323 22322 b8c336 22321->22322 22323 b8c377 LoadLibraryExA 22322->22323 22324 b8c3d8 22322->22324 22326 b8c4a6 22322->22326 22329 b8c3ea 22322->22329 22323->22324 22325 b8c38a GetLastError 22323->22325 22324->22329 22330 b8c3e3 FreeLibrary 22324->22330 22327 b8c3b3 22325->22327 22335 b8c39d 22325->22335 22347 b8c1e2 11 API calls 3 library calls 22326->22347 22344 b8c1e2 11 API calls 3 library calls 22327->22344 22328 b8c448 GetProcAddress 22328->22326 22332 b8c458 GetLastError 22328->22332 22329->22326 22329->22328 22330->22329 22333 b8c46b 22332->22333 22333->22326 22345 b8c1e2 11 API calls 3 library calls 22333->22345 22335->22324 22335->22327 22336 b8c3be RaiseException 22337 b8c4d4 22336->22337 22339 b8ced3 DloadLock 5 API calls 22337->22339 22341 b8c4e3 22339->22341 22340 b8c48c RaiseException 22346 b8bf72 11 API calls 2 library calls 22340->22346 22343 b8c4a3 22343->22326 22344->22336 22345->22340 22346->22343 22347->22337 23443 b88f1a 93 API calls 23422 b88a1e 74 API calls 23374 b71019 29 API calls pre_c_initialization 23444 b85f17 117 API calls 23445 b84b09 122 API calls __vswprintf_c_l 23396 b8090e 26 API calls std::bad_exception::bad_exception 23423 b75e01 74 API calls 23397 b9789b 27 API calls DloadLock 23447 b96b7d 31 API calls 2 library calls 23375 b9bc71 21 API calls __vswprintf_c_l 23448 b8c772 38 API calls 2 library calls 23377 b8a29b 103 API calls 4 library calls 23378 b71067 76 API calls pre_c_initialization 21840 b8cd61 21841 b8cd6d ___FrameUnwindToState 21840->21841 21866 b8c879 21841->21866 21843 b8cd74 21845 b8cd9d 21843->21845 21938 b8d1b5 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 21843->21938 21853 b8cddc ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 21845->21853 21877 b95166 21845->21877 21849 b8cdbc ___FrameUnwindToState 21850 b8ce3c 21885 b8d2d0 21850->21885 21853->21850 21939 b94169 38 API calls 3 library calls 21853->21939 21861 b8ce68 21862 b8ce71 21861->21862 21940 b94551 28 API calls _abort 21861->21940 21941 b8c9f0 13 API calls 2 library calls 21862->21941 21867 b8c882 21866->21867 21942 b8d00b IsProcessorFeaturePresent 21867->21942 21869 b8c88e 21943 b902a6 21869->21943 21871 b8c893 21872 b8c897 21871->21872 21952 b94fc2 21871->21952 21872->21843 21875 b8c8ae 21875->21843 21879 b9517d 21877->21879 21878 b8ced3 DloadLock 5 API calls 21880 b8cdb6 21878->21880 21879->21878 21880->21849 21881 b9510a 21880->21881 21882 b95139 21881->21882 21883 b8ced3 DloadLock 5 API calls 21882->21883 21884 b95162 21883->21884 21884->21853 22002 b8d5e0 21885->22002 21887 b8d2e3 GetStartupInfoW 21888 b8ce42 21887->21888 21889 b950b7 21888->21889 21890 b97f15 52 API calls 21889->21890 21893 b950c0 21890->21893 21891 b8ce4b 21894 b8b905 21891->21894 21893->21891 22004 b9821f 38 API calls 21893->22004 22005 b7ef68 21894->22005 21898 b8b928 ___scrt_get_show_window_mode 21899 b8b938 GetCommandLineW 21898->21899 21900 b8b9b9 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 21899->21900 21901 b8b947 21899->21901 22069 b73cd1 21900->22069 22056 b8a0d8 21901->22056 21907 b8b9b3 22063 b8b5d9 21907->22063 21908 b8b956 OpenFileMappingW 21910 b8b9aa CloseHandle 21908->21910 21911 b8b96e MapViewOfFile 21908->21911 21909 b8ba70 22076 b7c6f2 21909->22076 21910->21900 21914 b8b9a3 UnmapViewOfFile 21911->21914 21915 b8b983 __vswprintf_c_l 21911->21915 21914->21910 21916 b8b5d9 2 API calls 21915->21916 21916->21914 21917 b8ba7b 21918 b8ba8d DialogBoxParamW 21917->21918 21919 b8bac7 21918->21919 22081 b889a5 21919->22081 21921 b8bad9 21922 b8bae9 21921->21922 21923 b8bae2 Sleep 21921->21923 21925 b8baf7 21922->21925 22087 b88b32 CompareStringW GetCurrentDirectoryW SetCurrentDirectoryW _wcslen ___scrt_get_show_window_mode 21922->22087 21923->21922 21926 b8bb15 DeleteObject 21925->21926 21927 b8bb2c DeleteObject 21926->21927 21928 b8bb2f 21926->21928 21927->21928 21929 b8bb75 OleUninitialize 21928->21929 22083 b8b638 WaitForSingleObject 21928->22083 21931 b8bb84 21929->21931 21933 b94485 GetModuleHandleW 21931->21933 21934 b8ce5e 21933->21934 21934->21861 21935 b945ae 21934->21935 22270 b9432b 21935->22270 21938->21843 21939->21850 21940->21862 21941->21849 21942->21869 21944 b902ab ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 21943->21944 21956 b9135e 21944->21956 21947 b902b9 21947->21871 21949 b902c1 21950 b902cc 21949->21950 21970 b9139a DeleteCriticalSection 21949->21970 21950->21871 21998 b9839d 21952->21998 21955 b902cf 8 API calls 3 library calls 21955->21872 21957 b91367 21956->21957 21959 b91390 21957->21959 21960 b902b5 21957->21960 21971 b915f2 21957->21971 21976 b9139a DeleteCriticalSection 21959->21976 21960->21947 21962 b903e6 21960->21962 21991 b91507 21962->21991 21964 b903f0 21965 b903fb 21964->21965 21996 b915b5 6 API calls try_get_function 21964->21996 21965->21949 21967 b90409 21968 b90416 21967->21968 21997 b90419 6 API calls ___vcrt_FlsFree 21967->21997 21968->21949 21970->21947 21977 b913e6 21971->21977 21974 b91629 InitializeCriticalSectionAndSpinCount 21975 b91615 21974->21975 21975->21957 21976->21960 21978 b9141a 21977->21978 21982 b91416 21977->21982 21978->21974 21978->21975 21979 b9143a 21979->21978 21981 b91446 GetProcAddress 21979->21981 21983 b91456 __crt_fast_encode_pointer 21981->21983 21982->21978 21982->21979 21984 b91486 21982->21984 21983->21978 21985 b914ae LoadLibraryExW 21984->21985 21986 b914a3 21984->21986 21987 b914ca GetLastError 21985->21987 21988 b914e2 21985->21988 21986->21982 21987->21988 21989 b914d5 LoadLibraryExW 21987->21989 21988->21986 21990 b914f9 FreeLibrary 21988->21990 21989->21988 21990->21986 21992 b913e6 try_get_function 5 API calls 21991->21992 21993 b91521 21992->21993 21994 b91539 TlsAlloc 21993->21994 21995 b9152a 21993->21995 21995->21964 21996->21967 21997->21965 22001 b983b6 21998->22001 21999 b8ced3 DloadLock 5 API calls 22000 b8c8a0 21999->22000 22000->21875 22000->21955 22001->21999 22003 b8d5f7 22002->22003 22003->21887 22003->22003 22004->21893 22088 b8c630 22005->22088 22008 b7efdd 22012 b7f312 GetModuleFileNameW 22008->22012 22099 b94095 42 API calls __vswprintf_c_l 22008->22099 22009 b7ef8c GetProcAddress 22010 b7efb5 GetProcAddress 22009->22010 22011 b7efa5 22009->22011 22010->22008 22013 b7efc1 22010->22013 22011->22010 22025 b7f32d 22012->22025 22013->22008 22015 b7f250 22015->22012 22016 b7f25b GetModuleFileNameW CreateFileW 22015->22016 22017 b7f306 CloseHandle 22016->22017 22018 b7f28a SetFilePointer 22016->22018 22017->22012 22018->22017 22019 b7f29a ReadFile 22018->22019 22019->22017 22022 b7f2b9 22019->22022 22022->22017 22024 b7ef1e 2 API calls 22022->22024 22023 b7f362 CompareStringW 22023->22025 22024->22022 22025->22023 22026 b7f398 GetFileAttributesW 22025->22026 22027 b7f3ac 22025->22027 22090 b7a5e3 22025->22090 22093 b7ef1e 22025->22093 22026->22025 22026->22027 22028 b7f3b9 22027->22028 22031 b7f3eb 22027->22031 22030 b7f3d1 GetFileAttributesW 22028->22030 22033 b7f3e5 22028->22033 22029 b7f4fa OleInitialize 22053 b802de GetCPInfo 22029->22053 22030->22028 22030->22033 22031->22029 22032 b7a5e3 GetVersionExW 22031->22032 22034 b7f405 22032->22034 22033->22031 22035 b7f472 22034->22035 22036 b7f40c 22034->22036 22037 b73cd1 _swprintf 52 API calls 22035->22037 22038 b7ef1e 2 API calls 22036->22038 22039 b7f49a AllocConsole 22037->22039 22040 b7f416 22038->22040 22041 b7f4a7 GetCurrentProcessId AttachConsole 22039->22041 22042 b7f4f2 ExitProcess 22039->22042 22043 b7ef1e 2 API calls 22040->22043 22107 b91845 22041->22107 22045 b7f420 22043->22045 22100 b7cd80 22045->22100 22047 b7f4c8 GetStdHandle WriteConsoleW Sleep FreeConsole 22047->22042 22049 b73cd1 _swprintf 52 API calls 22050 b7f44e 22049->22050 22051 b7cd80 55 API calls 22050->22051 22052 b7f45d 22051->22052 22052->22042 22054 b80302 IsDBCSLeadByte 22053->22054 22054->22054 22055 b8031a 22054->22055 22055->21898 22059 b8a0e2 22056->22059 22057 b8a1f8 22057->21907 22057->21908 22058 b8a12a CharUpperW 22058->22059 22059->22057 22059->22058 22060 b8a1ad CharUpperW 22059->22060 22062 b8a151 CharUpperW 22059->22062 22119 b7dc24 74 API calls 2 library calls 22059->22119 22060->22059 22062->22059 22064 b8c630 22063->22064 22065 b8b5e6 SetEnvironmentVariableW 22064->22065 22067 b8b609 22065->22067 22066 b8b631 22066->21900 22067->22066 22068 b8b625 SetEnvironmentVariableW 22067->22068 22068->22066 22120 b73ca4 22069->22120 22072 b8895f 22073 b7ef1e 2 API calls 22072->22073 22074 b88971 OleInitialize 22073->22074 22075 b88993 SHGetMalloc 22074->22075 22075->21909 22149 b7c717 22076->22149 22080 b7c705 22080->21917 22082 b889c8 OleUninitialize 22081->22082 22082->21921 22084 b8b66e 22083->22084 22085 b8b651 PeekMessageW WaitForSingleObject 22084->22085 22086 b8b672 CloseHandle 22084->22086 22085->22084 22086->21929 22087->21925 22089 b7ef72 GetModuleHandleW 22088->22089 22089->22008 22089->22009 22091 b7a5f7 GetVersionExW 22090->22091 22092 b7a633 22090->22092 22091->22092 22092->22025 22094 b8c630 22093->22094 22095 b7ef2b GetSystemDirectoryW 22094->22095 22096 b7ef43 22095->22096 22097 b7ef61 22095->22097 22098 b7ef54 LoadLibraryW 22096->22098 22097->22025 22098->22097 22099->22015 22101 b7cdb0 22100->22101 22102 b7cdcf LoadStringW 22101->22102 22103 b7cdb9 LoadStringW 22101->22103 22104 b7cde1 22102->22104 22103->22102 22103->22104 22109 b7c56f 22104->22109 22106 b7cdef 22106->22049 22108 b9184d 22107->22108 22108->22047 22108->22108 22110 b7c579 22109->22110 22111 b7c5ed _strlen 22110->22111 22116 b7c64b _wcschr _wcsrchr 22110->22116 22117 b804d9 WideCharToMultiByte 22110->22117 22118 b804d9 WideCharToMultiByte 22111->22118 22114 b7c618 _strlen 22115 b73cd1 _swprintf 52 API calls 22114->22115 22115->22116 22116->22106 22117->22111 22118->22114 22119->22059 22121 b73cbb __vswprintf_c_l 22120->22121 22124 b92c6d 22121->22124 22127 b9194b 22124->22127 22128 b9198b 22127->22128 22129 b91973 22127->22129 22128->22129 22131 b91993 22128->22131 22144 b95817 20 API calls _free 22129->22144 22133 b91dc6 __fassign 38 API calls 22131->22133 22132 b91978 22145 b956f6 26 API calls _abort 22132->22145 22135 b919a3 22133->22135 22146 b91d91 20 API calls 2 library calls 22135->22146 22136 b8ced3 DloadLock 5 API calls 22138 b73cc5 SetEnvironmentVariableW GetModuleHandleW LoadIconW LoadBitmapW 22136->22138 22138->22072 22139 b91a1b 22147 b91fcc 52 API calls 3 library calls 22139->22147 22142 b91983 22142->22136 22143 b91a26 22148 b91e49 20 API calls _free 22143->22148 22144->22132 22145->22142 22146->22139 22147->22143 22148->22142 22150 b7c721 _wcschr __EH_prolog 22149->22150 22151 b7c74d GetModuleFileNameW 22150->22151 22154 b7c774 22150->22154 22152 b7c767 _wcsrchr 22151->22152 22153 b7c6fe 22152->22153 22152->22154 22168 b7ca86 GetModuleHandleW FindResourceW 22153->22168 22172 b79443 22154->22172 22157 b7c8dd 22158 b796e6 71 API calls 22157->22158 22167 b7c927 22157->22167 22161 b7c8f7 new 22158->22161 22162 b79613 74 API calls 22161->22162 22161->22167 22165 b7c91d new 22162->22165 22164 b7c7a1 22164->22157 22164->22167 22181 b797f1 22164->22181 22196 b79613 22164->22196 22204 b796e6 22164->22204 22165->22167 22209 b802a5 MultiByteToWideChar 22165->22209 22189 b7913d 22167->22189 22169 b7cab4 22168->22169 22171 b7caae 22168->22171 22170 b7c56f 53 API calls 22169->22170 22170->22171 22171->22080 22173 b7944d 22172->22173 22174 b794a3 CreateFileW 22173->22174 22175 b79521 22174->22175 22176 b794d0 GetLastError 22174->22176 22175->22164 22210 b7af43 22176->22210 22178 b794f0 22178->22175 22179 b794f4 CreateFileW GetLastError 22178->22179 22180 b79518 22179->22180 22180->22175 22182 b79815 SetFilePointer 22181->22182 22184 b79804 22181->22184 22183 b7984e 22182->22183 22185 b79833 GetLastError 22182->22185 22183->22164 22184->22183 22223 b76bf3 69 API calls 22184->22223 22185->22183 22187 b7983d 22185->22187 22187->22183 22224 b76bf3 69 API calls 22187->22224 22190 b79161 22189->22190 22191 b79172 22189->22191 22190->22191 22192 b79174 22190->22192 22193 b7916d 22190->22193 22191->22153 22232 b791a9 22192->22232 22225 b792f0 22193->22225 22198 b7962a 22196->22198 22199 b7967d 22198->22199 22201 b7968b 22198->22201 22203 b7968d 22198->22203 22247 b79319 22198->22247 22259 b76bb9 69 API calls 22199->22259 22201->22164 22202 b79319 5 API calls 22202->22203 22203->22201 22203->22202 22264 b7959d 22204->22264 22207 b79711 22207->22164 22209->22167 22211 b7af50 22210->22211 22219 b7af5a _wcslen 22211->22219 22220 b7b0f5 CharUpperW 22211->22220 22213 b7af68 _wcslen 22221 b7b121 CharUpperW 22213->22221 22215 b7af77 22216 b7b001 GetCurrentDirectoryW 22215->22216 22217 b7af7f 22215->22217 22216->22219 22222 b7b0f5 CharUpperW 22217->22222 22219->22178 22220->22213 22221->22215 22222->22219 22223->22182 22224->22183 22226 b792fd 22225->22226 22227 b792f9 22225->22227 22228 b79308 22226->22228 22229 b791a9 70 API calls 22226->22229 22227->22191 22228->22227 22238 b79ab2 22228->22238 22229->22228 22233 b791b5 22232->22233 22234 b791d3 22232->22234 22233->22234 22236 b791c1 FindCloseChangeNotification 22233->22236 22235 b791f2 22234->22235 22246 b76ad9 69 API calls 22234->22246 22235->22191 22236->22234 22239 b8c630 22238->22239 22240 b79abf DeleteFileW 22239->22240 22241 b79ad2 22240->22241 22242 b79317 22240->22242 22243 b7af43 2 API calls 22241->22243 22242->22191 22244 b79ae6 22243->22244 22244->22242 22245 b79aea DeleteFileW 22244->22245 22245->22242 22246->22235 22248 b79327 GetStdHandle 22247->22248 22249 b79332 ReadFile 22247->22249 22248->22249 22250 b7936b 22249->22250 22251 b7934b 22249->22251 22250->22198 22260 b79420 22251->22260 22253 b79352 22254 b79360 22253->22254 22255 b79373 GetLastError 22253->22255 22256 b79382 22253->22256 22258 b79319 GetFileType 22254->22258 22255->22250 22255->22256 22256->22250 22257 b79392 GetLastError 22256->22257 22257->22250 22257->22254 22258->22250 22259->22201 22261 b79426 22260->22261 22262 b79429 GetFileType 22260->22262 22261->22253 22263 b79437 22262->22263 22263->22253 22265 b795a9 22264->22265 22268 b79608 22264->22268 22266 b795e0 SetFilePointer 22265->22266 22267 b795fe GetLastError 22266->22267 22266->22268 22267->22268 22268->22207 22269 b76bf3 69 API calls 22268->22269 22269->22207 22271 b94337 FindHandler 22270->22271 22272 b9434f 22271->22272 22273 b94485 _abort GetModuleHandleW 22271->22273 22292 b97093 EnterCriticalSection 22272->22292 22275 b94343 22273->22275 22275->22272 22304 b944c9 GetModuleHandleExW 22275->22304 22276 b943f5 22293 b94435 22276->22293 22280 b943cc 22283 b943e4 22280->22283 22288 b9510a _abort 5 API calls 22280->22288 22281 b9443e 22313 b9eab9 5 API calls DloadLock 22281->22313 22282 b94412 22296 b94444 22282->22296 22289 b9510a _abort 5 API calls 22283->22289 22284 b94357 22284->22276 22284->22280 22312 b94e50 20 API calls _abort 22284->22312 22288->22283 22289->22276 22292->22284 22314 b970db LeaveCriticalSection 22293->22314 22295 b9440e 22295->22281 22295->22282 22315 b974d0 22296->22315 22299 b94472 22302 b944c9 _abort 8 API calls 22299->22302 22300 b94452 GetPEB 22300->22299 22301 b94462 GetCurrentProcess TerminateProcess 22300->22301 22301->22299 22303 b9447a ExitProcess 22302->22303 22305 b944f3 GetProcAddress 22304->22305 22306 b94516 22304->22306 22311 b94508 22305->22311 22307 b9451c FreeLibrary 22306->22307 22308 b94525 22306->22308 22307->22308 22309 b8ced3 DloadLock 5 API calls 22308->22309 22310 b9452f 22309->22310 22310->22272 22311->22306 22312->22280 22314->22295 22316 b974f5 22315->22316 22319 b974eb 22315->22319 22317 b970f2 _free 5 API calls 22316->22317 22317->22319 22318 b8ced3 DloadLock 5 API calls 22320 b9444e 22318->22320 22319->22318 22320->22299 22320->22300 23426 b71669 80 API calls 23427 b88e5d GetDlgItem EnableWindow ShowWindow SendMessageW 23330 b97052 23331 b9705d 23330->23331 23333 b97086 23331->23333 23335 b97082 23331->23335 23336 b97364 23331->23336 23343 b970aa DeleteCriticalSection 23333->23343 23337 b970f2 _free 5 API calls 23336->23337 23338 b9738b 23337->23338 23339 b973a9 InitializeCriticalSectionAndSpinCount 23338->23339 23340 b97394 23338->23340 23339->23340 23341 b8ced3 DloadLock 5 API calls 23340->23341 23342 b973c0 23341->23342 23342->23331 23343->23335 23428 b9ba54 52 API calls 23402 b8cd4f 27 API calls pre_c_initialization 23403 b90140 6 API calls 3 library calls 23451 b94f42 8 API calls ___vcrt_uninitialize 23358 b7134b 76 API calls 3 library calls

    Control-flow Graph

    APIs
      • Part of subcall function 00B7EF68: GetModuleHandleW.KERNEL32 ref: 00B7EF80
      • Part of subcall function 00B7EF68: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B7EF98
      • Part of subcall function 00B7EF68: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B7EFBB
    • OleInitialize.OLE32(00000000), ref: 00B8B918
      • Part of subcall function 00B802DE: GetCPInfo.KERNEL32(00000000,?), ref: 00B802EF
      • Part of subcall function 00B802DE: IsDBCSLeadByte.KERNEL32(00000000), ref: 00B80303
    • GetCommandLineW.KERNEL32 ref: 00B8B93B
    • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00B8B962
    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007002), ref: 00B8B977
    • UnmapViewOfFile.KERNEL32(00000000), ref: 00B8B9A4
      • Part of subcall function 00B8B5D9: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 00B8B5EF
      • Part of subcall function 00B8B5D9: SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00B8B62B
    • CloseHandle.KERNEL32(00000000), ref: 00B8B9AB
    • GetModuleFileNameW.KERNEL32(00000000,00BC47F0,00000800), ref: 00B8B9C5
    • SetEnvironmentVariableW.KERNEL32(sfxname,00BC47F0), ref: 00B8B9D7
    • GetLocalTime.KERNEL32(?), ref: 00B8B9DE
    • _swprintf.LIBCMT ref: 00B8BA1D
    • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00B8BA2F
    • GetModuleHandleW.KERNEL32(00000000), ref: 00B8BA32
    • LoadIconW.USER32(00000000,00000064), ref: 00B8BA49
    • LoadBitmapW.USER32(00000065), ref: 00B8BA5C
    • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001939B,00000000), ref: 00B8BAAC
    • Sleep.KERNEL32(?), ref: 00B8BAE3
    • DeleteObject.GDI32 ref: 00B8BB21
    • DeleteObject.GDI32(?), ref: 00B8BB2D
      • Part of subcall function 00B8A0D8: CharUpperW.USER32(?,?,?,?,00001000), ref: 00B8A130
      • Part of subcall function 00B8A0D8: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00B8A157
    • CloseHandle.KERNEL32 ref: 00B8BB6F
    • OleUninitialize.OLE32 ref: 00B8BB75
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteLoadObjectProcUpperView$BitmapByteCommandDialogIconInfoInitializeLeadLineLocalMappingNameOpenParamSleepTimeUninitializeUnmap_swprintf
    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
    • API String ID: 3132662180-3710569615
    • Opcode ID: a32bcf86e68be792125c0f2278b32b36c94e0ffce4203d8a317359adbbae03b9
    • Instruction ID: 43cbd12e3cc9b100a3121bfbb076973deeed0b6af922d311d3bfe21adf9eb5a3
    • Opcode Fuzzy Hash: a32bcf86e68be792125c0f2278b32b36c94e0ffce4203d8a317359adbbae03b9
    • Instruction Fuzzy Hash: B051E231544215AFD721BB75EC0BFAA3BECEB4A700F40059AFA45A31B1EF759940CB62

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 635 b79f76-b79f9c call b8c630 638 b7a010-b7a019 FindNextFileW 635->638 639 b79f9e-b79fb1 FindFirstFileW 635->639 640 b7a02f-b7a031 638->640 641 b7a01b-b7a029 GetLastError 638->641 642 b7a037-b7a0e0 call b7ed2b call b7b56e call b7fde4 * 3 639->642 643 b79fb7-b79fd2 call b7af43 639->643 640->642 644 b7a0e5-b7a0f8 640->644 641->640 642->644 650 b79fd4-b79fe7 FindFirstFileW 643->650 651 b79fe9-b79ff2 GetLastError 643->651 650->642 650->651 653 b79ff4-b79ff7 651->653 654 b7a003 651->654 653->654 655 b79ff9-b79ffc 653->655 656 b7a005-b7a00b 654->656 655->654 658 b79ffe-b7a001 655->658 656->644 658->656
    APIs
    • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00B79E74,000000FF,?,?), ref: 00B79FAB
    • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,?,?,?,00B79E74,000000FF,?,?), ref: 00B79FE1
    • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00B79E74,000000FF,?,?), ref: 00B79FE9
    • FindNextFileW.KERNEL32(?,?,?,?,?,?,00B79E74,000000FF,?,?), ref: 00B7A011
    • GetLastError.KERNEL32(?,?,?,?,00B79E74,000000FF,?,?), ref: 00B7A01D
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: FileFind$ErrorFirstLast$Next
    • String ID:
    • API String ID: 869497890-0
    • Opcode ID: dbcaa45b049ff829a61bfc935ba890eaf504928a9abfc35ee9b32a47b82cb7fc
    • Instruction ID: 410b4f2afceaf149b10ac942c2f7468e2a15f42803d5ba8b66307fd2f82c1b02
    • Opcode Fuzzy Hash: dbcaa45b049ff829a61bfc935ba890eaf504928a9abfc35ee9b32a47b82cb7fc
    • Instruction Fuzzy Hash: 85418471508245AFC364EF24C884ADEF7E8FB89340F008A6AF5ADD3240D730A9548B92
    APIs
    • GetCurrentProcess.KERNEL32(?,?,00B9441A,?,00BA7ED8,0000000C,00B94571,?,00000002,00000000), ref: 00B94465
    • TerminateProcess.KERNEL32(00000000,?,00B9441A,?,00BA7ED8,0000000C,00B94571,?,00000002,00000000), ref: 00B9446C
    • ExitProcess.KERNEL32 ref: 00B9447E
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: 972ec9dbef35fc7b69036b5471900d515ed911a304beeef2736a34718c6aeb14
    • Instruction ID: fe3841858204dab1258caf81209f893653a7066b3794a9aae147e01486388018
    • Opcode Fuzzy Hash: 972ec9dbef35fc7b69036b5471900d515ed911a304beeef2736a34718c6aeb14
    • Instruction Fuzzy Hash: 08E09231021108AFCF116F64D90AF893BA9FB42381F004064FA899B732DF35AD82CA50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog_memcmp
    • String ID:
    • API String ID: 3004599000-0
    • Opcode ID: d99dda265a6c77fec51cc7a3a7b6117f558b6b7ffe91add9a0b8f8954936caf0
    • Instruction ID: cc9d170f1440b8541d056ccc9cf9a034172e51d528b740bb8c59c792e6965832
    • Opcode Fuzzy Hash: d99dda265a6c77fec51cc7a3a7b6117f558b6b7ffe91add9a0b8f8954936caf0
    • Instruction Fuzzy Hash: 9872F870944285AEDF25DF64C889BF97BE9EF05300F08C1F9E96D9B242DB315A85CB60
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: d0a124bbecb18d222c1b28ef5013409c2b26df96fb3cf26d99faab63aa2feb40
    • Instruction ID: 833f418472af7db1976e260d14996fb76b6133b91a6b151e19f12fb54bd59f61
    • Opcode Fuzzy Hash: d0a124bbecb18d222c1b28ef5013409c2b26df96fb3cf26d99faab63aa2feb40
    • Instruction Fuzzy Hash: D1D129B1A047418FDB24EF28C88079BBBE5FF94304F0845ADE8859B252D334ED54CB9A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 b8939b-b893d1 call b8c560 call b8c630 call b712a6 7 b893db-b893e1 0->7 8 b893d3-b893d6 0->8 10 b89a5b-b89a71 7->10 11 b893e7-b893ea 7->11 9 b89d28-b89d38 8->9 14 b89a81-b89a88 10->14 15 b89a73-b89a7b SendMessageW 10->15 12 b893ec-b893f2 11->12 13 b893fe-b89400 11->13 16 b8945d-b89464 12->16 17 b893f4-b893f7 12->17 13->9 18 b89a8a-b89a95 SendDlgItemMessageW 14->18 19 b89a9b-b89aea call b8b0b4 GetDlgItem SendMessageW call b885b2 GetDlgItem 14->19 15->14 23 b8946a-b89498 call b7cd80 SetDlgItemTextW 16->23 24 b894ef-b8950c GetDlgItemTextW 16->24 20 b893f9-b893fc 17->20 21 b89430-b89440 17->21 18->19 47 b89aec 19->47 48 b89af2-b89b23 SetWindowTextW call b888f1 call b88d79 19->48 20->13 26 b89405-b8941c call b7cd80 call b711e6 20->26 27 b8944f 21->27 28 b89442-b89449 21->28 44 b894e1-b894e8 23->44 29 b8950e-b89518 24->29 30 b89526-b8952d 24->30 26->8 65 b8941e-b8942e SetDlgItemTextW 26->65 37 b89451-b89458 EndDialog 27->37 28->27 34 b89d26 28->34 35 b8951a 29->35 36 b89520-b89521 29->36 39 b8953e-b89550 GetDlgItem 30->39 40 b8952f-b89539 30->40 34->9 35->36 36->37 37->34 42 b89578-b89586 SetFocus 39->42 43 b89552-b89573 SendMessageW * 2 39->43 41 b899e6-b899ed 40->41 41->36 54 b899f3-b899f5 41->54 49 b89588-b89592 call b7cd80 42->49 50 b89594-b895db call b7ed2b call b8ae8f call b7cd80 call b73cd1 42->50 43->42 52 b8949a-b894a1 44->52 53 b894ea 44->53 47->48 79 b89b33-b89b3a 48->79 80 b89b25-b89b2e call b8a247 48->80 68 b895e1-b895f0 call b8af10 49->68 50->68 52->34 56 b894a7-b894b8 GetMessageW 52->56 53->34 54->36 60 b899fb-b89a1d call b7cd80 SetDlgItemTextW 54->60 56->34 62 b894be-b894cb 56->62 75 b89a1f-b89a24 60->75 76 b89a26-b89a3a 60->76 62->44 81 b894cd-b894db TranslateMessage DispatchMessageW 62->81 65->8 84 b895fe-b8961c call b799d4 68->84 85 b895f2-b895f9 call b8b549 68->85 77 b89a3c-b89a56 call b7cd80 * 2 call b885f4 75->77 76->77 77->34 87 b89b3c-b89b5d call b7cd80 SetDlgItemTextW call b7cd80 SetDlgItemTextW 79->87 88 b89b63-b89b6a 79->88 80->79 81->44 109 b8961e-b89623 GetLastError 84->109 110 b8962f-b89642 call b8894c 84->110 85->84 87->88 95 b89b70-b89b85 call b8a247 88->95 96 b89c04-b89c0b 88->96 112 b89bb5-b89bbb 95->112 113 b89b87-b89b8e 95->113 98 b89cae-b89cb5 96->98 99 b89c11-b89c18 96->99 106 b89cc0-b89cc7 98->106 107 b89cb7-b89cba EnableWindow 98->107 99->98 105 b89c1e-b89c25 99->105 105->98 114 b89c2b-b89c32 105->114 116 b89cc9-b89cd8 call b71263 * 2 106->116 117 b89cdd-b89ce4 106->117 107->106 118 b8962a-b8962c 109->118 119 b89625-b89628 109->119 137 b89644-b8964c GetLastError 110->137 138 b89655 110->138 126 b89bbd-b89bca 112->126 127 b89bf7-b89bff call b8a247 112->127 113->112 122 b89b90-b89bb4 call b880a6 call b91860 113->122 123 b89c39-b89c3f 114->123 116->117 128 b89d0a-b89d11 117->128 129 b89ce6-b89ced 117->129 118->110 119->110 119->118 122->112 133 b89c4a-b89c50 123->133 134 b89c41-b89c48 123->134 126->127 157 b89bcc-b89bd3 126->157 127->96 128->34 131 b89d13-b89d20 call b7cd80 SetDlgItemTextW 128->131 129->128 136 b89cef-b89cfa 129->136 131->34 144 b89c5b-b89c82 call b92db9 call b7cd80 call b92db9 133->144 145 b89c52-b89c59 133->145 134->133 143 b89c83-b89c8a 134->143 148 b89cfc-b89d02 SendMessageW 136->148 149 b89d04 136->149 137->138 150 b8964e-b89653 137->150 140 b89658-b89660 138->140 152 b896cf-b896d3 140->152 153 b89662-b89664 140->153 143->123 151 b89c8c-b89cab call b880a6 143->151 144->143 145->143 145->144 148->128 149->128 150->140 151->98 164 b896d9-b896e0 152->164 165 b898fe-b8994d call b71281 * 2 call b7cd80 SetDlgItemTextW call b71281 SetDlgItemTextW GetDlgItem 152->165 159 b896e3-b896eb 153->159 160 b89666-b896ae GetTickCount call b73cd1 call b79107 call b791f7 153->160 157->127 163 b89bd5-b89bf1 DialogBoxParamW 157->163 167 b89899-b8989d 159->167 168 b896f1-b897a0 GetModuleFileNameW call b7dac2 call b73cd1 CreateFileMappingW 159->168 201 b896ba-b896c4 call b7913d 160->201 202 b896b0-b896b5 GetLastError 160->202 163->35 163->127 164->159 210 b8994f-b89961 GetWindowLongW SetWindowLongW 165->210 211 b89967-b8998f call b8a247 * 2 call b8b44c 165->211 167->27 174 b898a3-b898f9 call b7cd80 call b73cd1 call b76c14 call b7cd80 call b885f4 167->174 192 b8980d-b89810 168->192 193 b897a2-b897b1 GetCommandLineW 168->193 174->27 196 b89813-b89843 call b7dc6f * 2 192->196 198 b897c3-b8980b call b890b8 * 3 MapViewOfFile call b8d740 193->198 199 b897b3-b897be call b7ed2b 193->199 231 b8987d-b89880 196->231 232 b89845-b89857 196->232 198->196 199->198 214 b896c9 201->214 202->201 207 b896b7 202->207 207->201 210->211 236 b89994-b899b0 call b8a247 211->236 214->152 235 b89883-b89887 231->235 241 b8985a-b8985d 232->241 235->167 238 b89889-b89893 UnmapViewOfFile CloseHandle 235->238 242 b899d2-b899e1 call b71263 236->242 243 b899b2-b899b9 236->243 238->167 244 b8985f-b89871 Sleep 241->244 245 b89873-b8987b 241->245 242->41 243->242 246 b899bb-b899c2 243->246 244->241 244->245 245->235 246->242 248 b899c4-b899cd call b8a247 246->248 248->242
    APIs
    • __EH_prolog.LIBCMT ref: 00B893A0
      • Part of subcall function 00B712A6: GetDlgItem.USER32(00000000,00003021), ref: 00B712EA
      • Part of subcall function 00B712A6: SetWindowTextW.USER32(00000000,00BA0294), ref: 00B71300
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prologItemTextWindow
    • String ID: "%s"%s$-el -s2 "-d%s" "-p%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
    • API String ID: 810644672-706182287
    • Opcode ID: e9b36d51f39d8b158339e60cf83e5f8d655b826e63a9751a7e83b16aa275cb2d
    • Instruction ID: 3107c5dabbf5fb9fb0e08de00df5a76c1b7192a7a860cd3283607482b2b9b23c
    • Opcode Fuzzy Hash: e9b36d51f39d8b158339e60cf83e5f8d655b826e63a9751a7e83b16aa275cb2d
    • Instruction Fuzzy Hash: 5032E270940315BBEF21BB64DC8AFBA3BE8EB06700F4841E9F605A70E1DBB55944DB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 251 b7ef68-b7ef8a call b8c630 GetModuleHandleW 254 b7efdd-b7f244 251->254 255 b7ef8c-b7efa3 GetProcAddress 251->255 258 b7f312-b7f343 GetModuleFileNameW call b7b4f8 call b7ed2b 254->258 259 b7f24a-b7f255 call b94095 254->259 256 b7efb5-b7efbf GetProcAddress 255->256 257 b7efa5-b7efb2 255->257 256->254 260 b7efc1-b7efd8 256->260 257->256 272 b7f345-b7f34f call b7a5e3 258->272 259->258 267 b7f25b-b7f288 GetModuleFileNameW CreateFileW 259->267 260->254 269 b7f306-b7f30d CloseHandle 267->269 270 b7f28a-b7f298 SetFilePointer 267->270 269->258 270->269 271 b7f29a-b7f2b7 ReadFile 270->271 271->269 273 b7f2b9-b7f2de 271->273 277 b7f351-b7f355 call b7ef1e 272->277 278 b7f35c 272->278 276 b7f2fb-b7f304 call b7eb20 273->276 276->269 286 b7f2e0-b7f2fa call b7ef1e 276->286 283 b7f35a 277->283 281 b7f35e-b7f360 278->281 284 b7f382-b7f3a4 call b7b56e GetFileAttributesW 281->284 285 b7f362-b7f380 CompareStringW 281->285 283->281 288 b7f3a6-b7f3aa 284->288 293 b7f3ae 284->293 285->284 285->288 286->276 288->272 292 b7f3ac 288->292 294 b7f3b2-b7f3b7 292->294 293->294 295 b7f3eb-b7f3ed 294->295 296 b7f3b9 294->296 297 b7f3f3-b7f40a call b7b542 call b7a5e3 295->297 298 b7f4fa-b7f504 295->298 299 b7f3bb-b7f3dd call b7b56e GetFileAttributesW 296->299 309 b7f472-b7f4a5 call b73cd1 AllocConsole 297->309 310 b7f40c-b7f46d call b7ef1e * 2 call b7cd80 call b73cd1 call b7cd80 call b885f4 297->310 304 b7f3e7 299->304 305 b7f3df-b7f3e3 299->305 304->295 305->299 307 b7f3e5 305->307 307->295 315 b7f4a7-b7f4ec GetCurrentProcessId AttachConsole call b91845 GetStdHandle WriteConsoleW Sleep FreeConsole 309->315 316 b7f4f2-b7f4f4 ExitProcess 309->316 310->316 315->316
    APIs
    • GetModuleHandleW.KERNEL32 ref: 00B7EF80
    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B7EF98
    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B7EFBB
    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B7F266
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B7F27E
    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B7F290
    • ReadFile.KERNEL32(00000000,?,00007FFE,00BA07E0,00000000), ref: 00B7F2AF
    • CloseHandle.KERNEL32(00000000), ref: 00B7F307
    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B7F31D
    • CompareStringW.KERNEL32(00000400,00001001,00BA082C,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 00B7F377
    • GetFileAttributesW.KERNELBASE(?,?,00BA07F8,00000800,?,00000000,?,00000800), ref: 00B7F3A0
    • GetFileAttributesW.KERNEL32(?,?,00BA08B8,00000800), ref: 00B7F3D9
      • Part of subcall function 00B7EF1E: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B7EF39
      • Part of subcall function 00B7EF1E: LoadLibraryW.KERNELBASE(?,?,00B7DB0E,Crypt32.dll,?,00B7DB90,?,00B7DB74,?,?,?,?), ref: 00B7EF5B
    • _swprintf.LIBCMT ref: 00B7F449
    • _swprintf.LIBCMT ref: 00B7F495
      • Part of subcall function 00B73CD1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B73CE4
    • AllocConsole.KERNEL32 ref: 00B7F49D
    • GetCurrentProcessId.KERNEL32 ref: 00B7F4A7
    • AttachConsole.KERNEL32(00000000), ref: 00B7F4AE
    • _wcslen.LIBCMT ref: 00B7F4C3
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00B7F4D4
    • WriteConsoleW.KERNEL32(00000000), ref: 00B7F4DB
    • Sleep.KERNEL32(00002710), ref: 00B7F4E6
    • FreeConsole.KERNEL32 ref: 00B7F4EC
    • ExitProcess.KERNEL32 ref: 00B7F4F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
    • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
    • API String ID: 1207345701-3298887752
    • Opcode ID: e05b4148e140b6371350441894ecd03e45c9832448d9983e5179dc5002e7ce31
    • Instruction ID: 24edfff5dde1d0a89ed95ea345de5ddec70dfe25802ed6c0e60e1cca968191a4
    • Opcode Fuzzy Hash: e05b4148e140b6371350441894ecd03e45c9832448d9983e5179dc5002e7ce31
    • Instruction Fuzzy Hash: 75D182B202C3859BD370BF60C849B9FBBE8EF86704F4049ADF19997150DBB09548CB66

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 389 b7cb15-b7cb8f call b7c4de GetWindowRect GetClientRect 392 b7cb95-b7cb9d 389->392 393 b7cc30-b7cc38 389->393 394 b7cc72-b7cc8d GetSystemMetrics GetWindow 392->394 396 b7cba3-b7cbec 392->396 393->394 395 b7cc3a-b7cc6c GetWindowTextW call b7c56f SetWindowTextW 393->395 398 b7cd6b-b7cd6d 394->398 395->394 399 b7cbf0-b7cbf2 396->399 400 b7cbee 396->400 403 b7cd73-b7cd7d 398->403 404 b7cc92-b7cc98 398->404 401 b7cbf6-b7cc2c GetWindowLongW GetWindowRect 399->401 402 b7cbf4 399->402 400->399 401->393 402->401 404->403 406 b7cc9e-b7ccb6 GetWindowTextW 404->406 408 b7ccdd-b7cce2 406->408 409 b7ccb8-b7ccd7 call b7c56f SetWindowTextW 406->409 410 b7cce4-b7cd52 GetWindowRect 408->410 411 b7cd59-b7cd68 GetWindow 408->411 409->408 410->411 411->403 413 b7cd6a 411->413 413->398
    APIs
      • Part of subcall function 00B7C4DE: _wcschr.LIBVCRUNTIME ref: 00B7C50D
    • GetWindowRect.USER32(?,?), ref: 00B7CB4C
    • GetClientRect.USER32(?,?), ref: 00B7CB58
    • GetWindowLongW.USER32(?,000000F0), ref: 00B7CBF9
    • GetWindowRect.USER32(?,?), ref: 00B7CC26
    • GetWindowTextW.USER32(?,?,00000400), ref: 00B7CC45
    • SetWindowTextW.USER32(?,?), ref: 00B7CC6C
    • GetSystemMetrics.USER32(00000008), ref: 00B7CC74
    • GetWindow.USER32(?,00000005), ref: 00B7CC7F
    • GetWindowTextW.USER32(00000000,?,00000400), ref: 00B7CCAA
    • SetWindowTextW.USER32(00000000,00000000), ref: 00B7CCD7
    • GetWindowRect.USER32(00000000,?), ref: 00B7CCEA
    • GetWindow.USER32(00000000,00000002), ref: 00B7CD5C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
    • String ID: d
    • API String ID: 4134264131-2564639436
    • Opcode ID: de89f35603be13f8c936608516715abe01010fd4234909616eba5971c2535e1c
    • Instruction ID: 3629a7764cf0e98d9841312a8e927893ebe930f41ad821be7a50a9ff8bdd097d
    • Opcode Fuzzy Hash: de89f35603be13f8c936608516715abe01010fd4234909616eba5971c2535e1c
    • Instruction Fuzzy Hash: 0F616E72208304AFD311DF68CD89E6BBBEAFB89704F44491DF59493290DB74E905CB62

    Control-flow Graph

    APIs
    • GetDlgItem.USER32(00000068,00BC6818), ref: 00B8AF1F
    • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,00B88C19), ref: 00B8AF4A
    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00B8AF59
    • SendMessageW.USER32(00000000,000000C2,00000000,00BA0294), ref: 00B8AF63
    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00B8AF79
    • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00B8AF8F
    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00B8AFCF
    • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00B8AFD9
    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00B8AFE8
    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00B8B00B
    • SendMessageW.USER32(00000000,000000C2,00000000,00BA12C0), ref: 00B8B016
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: MessageSend$ItemShowWindow
    • String ID: \
    • API String ID: 1207805008-2967466578
    • Opcode ID: a8af27dfdd608e68316721c154abc0af26982e8bc71440aaff70e0d5499992df
    • Instruction ID: 57e93871d664711b596142232e20bf5b696c36feb9402396f9838d41f6b639f9
    • Opcode Fuzzy Hash: a8af27dfdd608e68316721c154abc0af26982e8bc71440aaff70e0d5499992df
    • Instruction Fuzzy Hash: A42104B12457443BE311BB249C46FAB7ADCEF82754F000619F690971E0CBA55908CBBB

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 424 b8c323-b8c334 425 b8c355-b8c357 424->425 426 b8c336-b8c349 424->426 427 b8c35d-b8c35f 425->427 428 b8c3f0-b8c3f5 425->428 444 b8c4ab-b8c4b3 426->444 452 b8c34f 426->452 432 b8c361-b8c375 427->432 433 b8c377-b8c388 LoadLibraryExA 427->433 429 b8c409-b8c40b 428->429 430 b8c3f7-b8c407 428->430 436 b8c411-b8c419 429->436 437 b8c4a6-b8c4a9 429->437 430->429 432->433 434 b8c3d8-b8c3e1 432->434 433->434 435 b8c38a-b8c39b GetLastError 433->435 446 b8c3ea 434->446 447 b8c3e3-b8c3e4 FreeLibrary 434->447 440 b8c39d-b8c3b1 435->440 441 b8c3b3-b8c3d3 call b8c1e2 RaiseException 435->441 442 b8c448-b8c456 GetProcAddress 436->442 443 b8c41b-b8c41e 436->443 437->444 440->434 440->441 465 b8c4d6-b8c4e6 call b8ced3 441->465 442->437 453 b8c458-b8c469 GetLastError 442->453 443->442 448 b8c420-b8c42a 443->448 450 b8c4cf-b8c4d4 call b8c1e2 444->450 451 b8c4b5-b8c4cd 444->451 446->428 447->446 448->442 460 b8c42c-b8c433 448->460 450->465 451->450 452->425 454 b8c46b-b8c47f 453->454 455 b8c481-b8c4a3 call b8c1e2 RaiseException call b8bf72 453->455 454->437 454->455 455->437 460->442 464 b8c435-b8c439 460->464 464->442 471 b8c43b-b8c446 464->471 471->437 471->442
    APIs
    • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00B8C37E
    • GetLastError.KERNEL32 ref: 00B8C38A
    • DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B8C3B9
    • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 00B8C3CA
    • FreeLibrary.KERNEL32(00000000), ref: 00B8C3E4
    • GetProcAddress.KERNEL32(?,?), ref: 00B8C44C
    • GetLastError.KERNEL32(?,?), ref: 00B8C458
    • DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B8C487
    • RaiseException.KERNEL32(C06D007F,00000000,00000001,?,?,?), ref: 00B8C498
    • DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B8C4CF
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AccessDloadReleaseSectionWrite$ErrorExceptionLastLibraryRaise$AddressFreeLoadProc
    • String ID:
    • API String ID: 202095176-0
    • Opcode ID: da5706e96d6d0adadf653a03cfc1302f9f90fa5f041fee4c35d6308baa502227
    • Instruction ID: ec9c74ebc5f3a73e3add019bdf407b23e750c2b8f5d25f92c1dc7aa13a6f7a9b
    • Opcode Fuzzy Hash: da5706e96d6d0adadf653a03cfc1302f9f90fa5f041fee4c35d6308baa502227
    • Instruction Fuzzy Hash: FB518CB5911319AFDB21EFA4D895ABE7BF9FF45310F1500A9E901A7320DB709D41CBA0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 476 b7c717-b7c74b call b8c560 call b8c630 call b8f878 483 b7c774-b7c7a3 call b91823 call b79107 call b79443 476->483 484 b7c74d-b7c76b GetModuleFileNameW call b8fa5b 476->484 495 b7c9f6-b7c9fc call b7913d 483->495 496 b7c7a9-b7c7b2 483->496 489 b7ca01-b7ca11 484->489 490 b7c771 484->490 490->483 495->489 498 b7c7b5-b7c7b8 496->498 499 b7c8e6-b7c906 call b796e6 call b91865 498->499 500 b7c7be-b7c7c4 call b797f1 498->500 499->495 509 b7c90c-b7c925 call b79613 499->509 504 b7c7c9-b7c7f0 call b79613 500->504 510 b7c7f6-b7c7fe 504->510 511 b7c8af-b7c8b2 504->511 523 b7c927-b7c92c 509->523 524 b7c92e-b7c940 call b91865 509->524 513 b7c800-b7c808 510->513 514 b7c829-b7c834 510->514 515 b7c8b5-b7c8d7 call b796e6 511->515 513->514 517 b7c80a-b7c824 call b92e00 513->517 518 b7c836-b7c842 514->518 519 b7c85f-b7c867 514->519 515->498 534 b7c8dd-b7c8e0 515->534 539 b7c826 517->539 540 b7c8a5-b7c8ad 517->540 518->519 526 b7c844-b7c849 518->526 521 b7c893-b7c897 519->521 522 b7c869-b7c871 519->522 521->511 529 b7c899-b7c89c 521->529 522->521 528 b7c873-b7c88d call b92e00 522->528 530 b7c965-b7c96d 523->530 524->495 546 b7c946-b7c963 call b802a5 call b91860 524->546 526->519 533 b7c84b-b7c85d call b92cf7 526->533 528->495 528->521 529->510 535 b7c972-b7c97f 530->535 536 b7c96f 530->536 533->519 547 b7c8a1 533->547 534->495 534->499 543 b7c981-b7c983 535->543 544 b7c9eb-b7c9f3 535->544 536->535 539->514 540->515 548 b7c984-b7c98e 543->548 544->495 546->530 547->540 548->544 550 b7c990-b7c994 548->550 552 b7c996-b7c99d 550->552 553 b7c9ce-b7c9d1 550->553 557 b7c9c4 552->557 558 b7c99f-b7c9a2 552->558 555 b7c9d3-b7c9d9 553->555 556 b7c9db-b7c9dd 553->556 555->556 561 b7c9de 555->561 556->561 560 b7c9c6-b7c9cc 557->560 562 b7c9a4-b7c9a7 558->562 563 b7c9c0-b7c9c2 558->563 564 b7c9e2-b7c9e9 560->564 561->564 565 b7c9bc-b7c9be 562->565 566 b7c9a9-b7c9ac 562->566 563->560 564->544 564->548 565->560 567 b7c9ae-b7c9b2 566->567 568 b7c9b8-b7c9ba 566->568 567->561 569 b7c9b4-b7c9b6 567->569 568->560 569->560
    APIs
    • __EH_prolog.LIBCMT ref: 00B7C71C
    • _wcschr.LIBVCRUNTIME ref: 00B7C73A
    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00B7C6FE,?), ref: 00B7C754
    • _wcsrchr.LIBVCRUNTIME ref: 00B7C762
      • Part of subcall function 00B802A5: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00B7AF29,00000000,?,?), ref: 00B802C1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr_wcsrchr
    • String ID: *messages***$*messages***$R$a
    • API String ID: 3071809318-2900423073
    • Opcode ID: e41242cf21396dc42122339eb0831a85a906794df47f2c8eb60a8fb7425dcd8c
    • Instruction ID: 8e2d716e45c061981193449a5aa34a2cf442c2ee10d80f65eb9091908a38b4e4
    • Opcode Fuzzy Hash: e41242cf21396dc42122339eb0831a85a906794df47f2c8eb60a8fb7425dcd8c
    • Instruction Fuzzy Hash: BD912BB29002059ADB35DF64CC91BAE7BE4EF40710F1085EEE66DA71D1DB709E84CB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 570 b96d6b-b96d84 571 b96d9a-b96d9f 570->571 572 b96d86-b96d96 call b9b31d 570->572 574 b96dac-b96dd0 MultiByteToWideChar 571->574 575 b96da1-b96da9 571->575 572->571 582 b96d98 572->582 577 b96f63-b96f76 call b8ced3 574->577 578 b96dd6-b96de2 574->578 575->574 579 b96de4-b96df5 578->579 580 b96e36 578->580 583 b96e14-b96e25 call b953d5 579->583 584 b96df7-b96e06 call b9ead0 579->584 586 b96e38-b96e3a 580->586 582->571 589 b96f58 583->589 596 b96e2b 583->596 584->589 595 b96e0c-b96e12 584->595 586->589 590 b96e40-b96e53 MultiByteToWideChar 586->590 594 b96f5a-b96f61 call b96fd3 589->594 590->589 593 b96e59-b96e6b call b973c6 590->593 601 b96e70-b96e74 593->601 594->577 600 b96e31-b96e34 595->600 596->600 600->586 601->589 602 b96e7a-b96e81 601->602 603 b96ebb-b96ec7 602->603 604 b96e83-b96e88 602->604 606 b96ec9-b96eda 603->606 607 b96f13 603->607 604->594 605 b96e8e-b96e90 604->605 605->589 608 b96e96-b96eb0 call b973c6 605->608 610 b96edc-b96eeb call b9ead0 606->610 611 b96ef5-b96f06 call b953d5 606->611 609 b96f15-b96f17 607->609 608->594 623 b96eb6 608->623 613 b96f19-b96f32 call b973c6 609->613 614 b96f51-b96f57 call b96fd3 609->614 610->614 626 b96eed-b96ef3 610->626 611->614 622 b96f08 611->622 613->614 628 b96f34-b96f3b 613->628 614->589 627 b96f0e-b96f11 622->627 623->589 626->627 627->609 629 b96f3d-b96f3e 628->629 630 b96f77-b96f7d 628->630 631 b96f3f-b96f4f WideCharToMultiByte 629->631 630->631 631->614 632 b96f7f-b96f86 call b96fd3 631->632 632->594
    APIs
    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00B92752,00B92752,?,?,?,00B96FBC,00000001,00000001,3EE85006), ref: 00B96DC5
    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00B96FBC,00000001,00000001,3EE85006,?,?,?), ref: 00B96E4B
    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3EE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00B96F45
    • __freea.LIBCMT ref: 00B96F52
      • Part of subcall function 00B953D5: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B91B3A,?,0000015D,?,?,?,?,00B926B9,000000FF,00000000,?,?), ref: 00B95407
    • __freea.LIBCMT ref: 00B96F5B
    • __freea.LIBCMT ref: 00B96F80
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ByteCharMultiWide__freea$AllocateHeap
    • String ID:
    • API String ID: 1414292761-0
    • Opcode ID: ba8ddadf3a54e7a8c01df678d6caf72d875db1c58e3a979d02e0896b6f1ac103
    • Instruction ID: 6067ee625d6803450404babdc10ae6b2744b6e68a54440be9f35cfc152ad57ea
    • Opcode Fuzzy Hash: ba8ddadf3a54e7a8c01df678d6caf72d875db1c58e3a979d02e0896b6f1ac103
    • Instruction Fuzzy Hash: F151CF7261021AABEF258F64DC81FBF77EAEB40750F1546B9FD18D6180EB74EC4086A0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 663 b98287-b9829c GetEnvironmentStringsW 664 b9829e-b982be call b98250 WideCharToMultiByte 663->664 665 b982f4 663->665 664->665 671 b982c0-b982c1 call b953d5 664->671 666 b982f6-b982f8 665->666 668 b982fa-b982fb FreeEnvironmentStringsW 666->668 669 b98301-b98309 666->669 668->669 673 b982c6-b982cb 671->673 674 b982e9 673->674 675 b982cd-b982e1 WideCharToMultiByte 673->675 677 b982eb-b982f2 call b9539b 674->677 675->674 676 b982e3-b982e7 675->676 676->677 677->666
    APIs
    • GetEnvironmentStringsW.KERNEL32 ref: 00B98290
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B982B3
      • Part of subcall function 00B953D5: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B91B3A,?,0000015D,?,?,?,?,00B926B9,000000FF,00000000,?,?), ref: 00B95407
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B982D9
    • _free.LIBCMT ref: 00B982EC
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B982FB
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
    • String ID:
    • API String ID: 336800556-0
    • Opcode ID: 633fdf51ec29a05307aa44728f18112f3e34b450cff72f649d0ea1bd919e85cf
    • Instruction ID: c0896b5ad421106627e0888bca60fba51b66913022e0260ed508566fe3117cbd
    • Opcode Fuzzy Hash: 633fdf51ec29a05307aa44728f18112f3e34b450cff72f649d0ea1bd919e85cf
    • Instruction Fuzzy Hash: 750184B2605A157B2B212BB65C8DCBF7AEDDEC7FA432501BAB904D3101DEA08C0181B8

    Control-flow Graph

    APIs
      • Part of subcall function 00B7F9DE: ResetEvent.KERNEL32(?,?,00B7F608,00DC1E08,?,00BB1E64,00000000,00B9F0A1,000000FF,000001B8,00B7F8A4,?,?,?,?,00B7A2A3), ref: 00B7F9FE
      • Part of subcall function 00B7F9DE: ReleaseSemaphore.KERNEL32(?,?,00000000,?,?,?,?,00B7A2A3,?,?,?,?,00B9F0A1,000000FF), ref: 00B7FA12
    • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 00B7F61A
    • CloseHandle.KERNEL32(?,?), ref: 00B7F634
    • DeleteCriticalSection.KERNEL32(?), ref: 00B7F64D
    • FindCloseChangeNotification.KERNELBASE(?), ref: 00B7F659
    • CloseHandle.KERNEL32(?), ref: 00B7F665
      • Part of subcall function 00B7F6DC: WaitForSingleObject.KERNEL32(?,000000FF,00B7F920,?,?,00B7F995,?,?,?,?,?,00B7F97F), ref: 00B7F6E2
      • Part of subcall function 00B7F6DC: GetLastError.KERNEL32(?,?,00B7F995,?,?,?,?,?,00B7F97F), ref: 00B7F6EE
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Close$HandleReleaseSemaphore$ChangeCriticalDeleteErrorEventFindLastNotificationObjectResetSectionSingleWait
    • String ID:
    • API String ID: 565839277-0
    • Opcode ID: 899a637e2aab2591eba012f1b4c21c724c69676a8262d070931db38819307046
    • Instruction ID: bf03f04ddda4151d32db7ef3961b8a2ecd2f7284a781511fd911b2a59174232f
    • Opcode Fuzzy Hash: 899a637e2aab2591eba012f1b4c21c724c69676a8262d070931db38819307046
    • Instruction Fuzzy Hash: 4901B132010748EFCB31AF28DD89F96BBEAFB46710F00456AF26E92570CB716800DB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 688 b888f1-b88910 GetClassNameW 689 b88938-b8893a 688->689 690 b88912-b88927 call b806e6 688->690 692 b8893c-b8893f SHAutoComplete 689->692 693 b88945-b88949 689->693 695 b88929-b88935 FindWindowExW 690->695 696 b88937 690->696 692->693 695->696 696->689
    APIs
    • GetClassNameW.USER32(?,?,00000050), ref: 00B88908
    • SHAutoComplete.SHLWAPI(?,00000010), ref: 00B8893F
      • Part of subcall function 00B806E6: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B7A92C,?,?,?,00B7A8DB,?,-00000002,?,00000000,?), ref: 00B806FC
    • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00B8892F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AutoClassCompareCompleteFindNameStringWindow
    • String ID: EDIT
    • API String ID: 4243998846-3080729518
    • Opcode ID: 7731d3737bf04e3a5c0d45aac09b055ed55d61c86d9967ee7a86f33ffd94525a
    • Instruction ID: e6dd2f5da438c92c45ddfc382c7c3e38e75500ae207cb8bb2eaefdb445ac2a83
    • Opcode Fuzzy Hash: 7731d3737bf04e3a5c0d45aac09b055ed55d61c86d9967ee7a86f33ffd94525a
    • Instruction Fuzzy Hash: 0EF08232A013287BDB3066659C0AFAB76ECDB97B51F4401A5F900E3190DB60A901CBF7

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 697 b8b5d9-b8b60d call b8c630 SetEnvironmentVariableW call b7eb20 702 b8b60f-b8b613 697->702 703 b8b631-b8b635 697->703 704 b8b61c-b8b623 call b7ec17 702->704 707 b8b615-b8b61b 704->707 708 b8b625-b8b62b SetEnvironmentVariableW 704->708 707->704 708->703
    APIs
    • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 00B8B5EF
    • SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00B8B62B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: EnvironmentVariable
    • String ID: sfxcmd$sfxpar
    • API String ID: 1431749950-3493335439
    • Opcode ID: c0e99cd3c90fda872ef2346e03d73e651b898a0cb3b69a150f44d33c98edeb39
    • Instruction ID: 381ed259a0df2a7aef1890c5d29408fcf848fff7dcebb220c3d2be3078a8b9dc
    • Opcode Fuzzy Hash: c0e99cd3c90fda872ef2346e03d73e651b898a0cb3b69a150f44d33c98edeb39
    • Instruction Fuzzy Hash: 99F0A7B2414224A6C7213BA59C0AEFABBDCEF09781F0000D5FC4857161EB719C50C7F0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 709 b8895f-b889a4 call b7ef1e OleInitialize SHGetMalloc
    APIs
      • Part of subcall function 00B7EF1E: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B7EF39
      • Part of subcall function 00B7EF1E: LoadLibraryW.KERNELBASE(?,?,00B7DB0E,Crypt32.dll,?,00B7DB90,?,00B7DB74,?,?,?,?), ref: 00B7EF5B
    • OleInitialize.OLE32(00000000), ref: 00B88975
    • SHGetMalloc.SHELL32(00BB20D8), ref: 00B88998
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: DirectoryInitializeLibraryLoadMallocSystem
    • String ID: riched20.dll$3To
    • API String ID: 1045004029-2168385784
    • Opcode ID: dd00931190d49c1f39027dd8f20233ee3d5076bb1a3aff01bb775058697296bf
    • Instruction ID: 56eb12dd4ad3eb8acd91b520b9f50b5ed5be543ec208ba6213f0aab4cbd3f0c1
    • Opcode Fuzzy Hash: dd00931190d49c1f39027dd8f20233ee3d5076bb1a3aff01bb775058697296bf
    • Instruction Fuzzy Hash: 31E01A70544349ABD750AF98DD0AAA97BE8EB05711F000599F944E3250DAB59944CBA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 713 b79c30-b79c4c call b8c630 716 b79c4e-b79c57 713->716 717 b79c59 713->717 716->717 718 b79c5d-b79c66 716->718 717->718 719 b79c73 718->719 720 b79c68-b79c71 718->720 721 b79c77-b79c80 719->721 720->719 720->721 722 b79c82-b79c8c 721->722 723 b79c8e 721->723 722->723 724 b79c92-b79ca5 call b79b19 722->724 723->724 727 b79ca7-b79ca9 724->727 728 b79cbb 724->728 727->728 730 b79cab-b79cb9 call b79dc9 727->730 729 b79cbd-b79ce3 CreateFileW 728->729 731 b79ce5-b79cfd call b7af43 729->731 732 b79d2d-b79d32 729->732 730->729 742 b79d03-b79d27 CreateFileW 731->742 743 b79dbc-b79dc6 731->743 736 b79d34-b79d3b call b7fb8b 732->736 737 b79d40-b79d45 732->737 736->737 740 b79d47-b79d4e call b7fb8b 737->740 741 b79d53-b79d58 737->741 740->741 745 b79d66-b79daa SetFileTime CloseHandle 741->745 746 b79d5a-b79d61 call b7fb8b 741->746 742->732 742->743 745->743 747 b79dac-b79db7 call b79dc9 745->747 746->745 747->743
    APIs
    • CreateFileW.KERNELBASE(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,00B77C5C,?,?,?), ref: 00B79CD6
    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,00B77C5C,?,?), ref: 00B79D1A
    • SetFileTime.KERNELBASE(?,00000800,?,00000000,?,00000000,?,00B77C5C,?,?,?,?,?,?,?,?), ref: 00B79D9B
    • CloseHandle.KERNEL32(?,?,00000000,?,00B77C5C,?,?,?,?,?,?,?,?,?,?,?), ref: 00B79DA2
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: File$Create$CloseHandleTime
    • String ID:
    • API String ID: 2287278272-0
    • Opcode ID: f7c91896b611e8b6d024c7830f881dd67541109abd0e03c621504c1b7911cf55
    • Instruction ID: e36b74dbe8f49e338dabc6a67c9c5c9e654428141fffc43089db5a4cd0cf1f66
    • Opcode Fuzzy Hash: f7c91896b611e8b6d024c7830f881dd67541109abd0e03c621504c1b7911cf55
    • Instruction Fuzzy Hash: DF41E430248385AAD731DF34DC55FEABBE8EB85300F0489ADB5F8D31D1D6649A48C752
    APIs
    • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,?,?,00000000,00B7746D,?,00000005,?,00000011), ref: 00B794C3
    • GetLastError.KERNEL32(?,00000000,00B7746D,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B794D0
    • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,00000000,00B7746D,?,00000005,?), ref: 00B79505
    • GetLastError.KERNEL32(?,00000000,00B7746D,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B7950D
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CreateErrorFileLast
    • String ID:
    • API String ID: 1214770103-0
    • Opcode ID: e613e00ae6a8bfe8e02a32fb5c6b2f795af14d769adeda402121735ae442fcb3
    • Instruction ID: 5d63a71e4e4c0c93007ab4af7a67ea05bfa4ee03ee64a5461fc1d36c97382967
    • Opcode Fuzzy Hash: e613e00ae6a8bfe8e02a32fb5c6b2f795af14d769adeda402121735ae442fcb3
    • Instruction Fuzzy Hash: E53186B08407656BD330AF209C45BE6BBE8FB49324F008728F9B8832C1D7759989CB90
    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 00B79329
    • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00B79341
    • GetLastError.KERNEL32 ref: 00B79373
    • GetLastError.KERNEL32 ref: 00B79392
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ErrorLast$FileHandleRead
    • String ID:
    • API String ID: 2244327787-0
    • Opcode ID: fa6089f212b30eddceaca5798ad82edbfbc4a6bd467695d09249e7ca638f4e81
    • Instruction ID: 4457c661dd17840e2b941682de1d583475eb995b5a3b2dbe5ab79b85ba5b89c9
    • Opcode Fuzzy Hash: fa6089f212b30eddceaca5798ad82edbfbc4a6bd467695d09249e7ca638f4e81
    • Instruction Fuzzy Hash: BE117C30514608EFDB349F60D844AAD77ECEB06361F11C1AAF93E861D0CB369D40DB59
    APIs
    • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00B919A3,00000000,00000000,?,00B97135,00B919A3,00000000,00000000,00000000,?,00B97332,00000006,FlsSetValue), ref: 00B971C0
    • GetLastError.KERNEL32(?,00B97135,00B919A3,00000000,00000000,00000000,?,00B97332,00000006,FlsSetValue,00BA36D8,00BA36E0,00000000,00000364,?,00B95DAE), ref: 00B971CC
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00B97135,00B919A3,00000000,00000000,00000000,?,00B97332,00000006,FlsSetValue,00BA36D8,00BA36E0,00000000), ref: 00B971DA
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: LibraryLoad$ErrorLast
    • String ID:
    • API String ID: 3177248105-0
    • Opcode ID: 626038740ee54cfb33ce3301b8d311b64deed48c84dfc4bdedce25519d25b5ee
    • Instruction ID: f3fa87f7ea96f2134106d58929e91b1d71e2de39138020e0c8dcaeda6d1cb7ff
    • Opcode Fuzzy Hash: 626038740ee54cfb33ce3301b8d311b64deed48c84dfc4bdedce25519d25b5ee
    • Instruction Fuzzy Hash: 3601AC32679236ABCF215F689C45E567BD8EF07BA1B210570F916E7140DF20DC01C6E0
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B89203
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B89214
    • TranslateMessage.USER32(?), ref: 00B8921E
    • DispatchMessageW.USER32(?), ref: 00B89228
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Message$DispatchPeekTranslate
    • String ID:
    • API String ID: 4217535847-0
    • Opcode ID: d1d788a3f907d29e53d891427e2e3086790a9aed827b3305e1d4be7645bd2e64
    • Instruction ID: a0f8ea7976034ed52de250084949ea695b9be371b0d21984e4dc1d9acc8a1b87
    • Opcode Fuzzy Hash: d1d788a3f907d29e53d891427e2e3086790a9aed827b3305e1d4be7645bd2e64
    • Instruction Fuzzy Hash: 20E05972D0212EA78B20ABE6ED4DDEBBFACEE062617004551B919D3410EB689505C7F1
    APIs
    • __EH_prolog.LIBCMT ref: 00B71CC5
      • Part of subcall function 00B73867: __EH_prolog.LIBCMT ref: 00B7386C
    • _wcslen.LIBCMT ref: 00B71D6C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog$_wcslen
    • String ID: CMT
    • API String ID: 2838827086-2756464174
    • Opcode ID: 423c38055140932397b89d5811abdcd48644c59dc5454e54576c145f94fac93d
    • Instruction ID: c48017bdd0a5781dfd50c0465f524b16ac8518b7ce7194be942509a3619c86da
    • Opcode Fuzzy Hash: 423c38055140932397b89d5811abdcd48644c59dc5454e54576c145f94fac93d
    • Instruction Fuzzy Hash: 4F2117729042089FCB25EF9CD9859EDFBF6EF58300B1048A9E459A7261CB325A14DB61
    APIs
    • CreateThread.KERNELBASE(00000000,00010000,Function_0000F976,?,00000000,00000000), ref: 00B7F7EA
    • SetThreadPriority.KERNEL32(000000FF,00000000), ref: 00B7F831
      • Part of subcall function 00B76B2C: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B76B4A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Thread$CreatePriority__vswprintf_c_l
    • String ID: CreateThread failed
    • API String ID: 2655393344-3849766595
    • Opcode ID: 22e7d0035b733091a347bf442a3d233bc57c33a6537e10c671a952e1ca27aaa5
    • Instruction ID: 93c5d9016b0118f5cec0d8ea66fafd1214767ddad767ac8912e8d93be4a94339
    • Opcode Fuzzy Hash: 22e7d0035b733091a347bf442a3d233bc57c33a6537e10c671a952e1ca27aaa5
    • Instruction Fuzzy Hash: E101FEB234830AAFD6246F54DC43F7677D9EB42751F2080BDF55592191CEE29801C675
    APIs
    • LCMapStringEx.KERNELBASE(?,00B91F24,00000010,?,?,00B92752,?,?,00000000,?,?,?,?,?,00B923DE), ref: 00B97419
    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3EE85006,00000001,?,000000FF), ref: 00B97437
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: String
    • String ID: LCMapStringEx
    • API String ID: 2568140703-3893581201
    • Opcode ID: 5cbfa18ca5323ccc24df1d70017a75106c956a64ec0aadf9355d295bcc7177a4
    • Instruction ID: 6f47ce23bf0c001225a35a47cd9909d0fa73dd9e71c025aa3da093c5d07480d7
    • Opcode Fuzzy Hash: 5cbfa18ca5323ccc24df1d70017a75106c956a64ec0aadf9355d295bcc7177a4
    • Instruction Fuzzy Hash: 3F01DB7265421DBBCF026F90DC06DDE7FE2FB09750F104154FE0426261CA728931EB91
    APIs
    • GetStdHandle.KERNEL32(000000F5,?,?,00B7C4A3,00000001,?,?,?,00000000,00B83D5F,?,?,?,?,?,00B83804), ref: 00B798E9
    • WriteFile.KERNEL32(?,00000000,?,00B83A0C,00000000,?,?,00000000,00B83D5F,?,?,?,?,?,00B83804,?), ref: 00B79929
    • WriteFile.KERNELBASE(?,00000000,?,00B83A0C,00000000,?,00000001,?,?,00B7C4A3,00000001,?,?,?,00000000,00B83D5F), ref: 00B79956
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: FileWrite$Handle
    • String ID:
    • API String ID: 4209713984-0
    • Opcode ID: 64073be353dccffbb917da4b44335535951622fc3a31d0e8e583fd2818e91c15
    • Instruction ID: da360f7c360ad84768f8de0487fe6599ee68e75439cbf263abdd3763e22ddaeb
    • Opcode Fuzzy Hash: 64073be353dccffbb917da4b44335535951622fc3a31d0e8e583fd2818e91c15
    • Instruction Fuzzy Hash: D931E57114460AAFEB209E24CC49FA6B7E8FB52311F04C15DE6BD935C0CB75E848CBA2
    APIs
      • Part of subcall function 00B7B4DC: _wcslen.LIBCMT ref: 00B7B4E2
    • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00B79A98,?,00000001,00000000,?,?), ref: 00B79BB3
    • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00B79A98,?,00000001,00000000,?,?), ref: 00B79BE6
    • GetLastError.KERNEL32(?,?,?,?,00B79A98,?,00000001,00000000,?,?), ref: 00B79C03
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CreateDirectory$ErrorLast_wcslen
    • String ID:
    • API String ID: 2260680371-0
    • Opcode ID: 8b84f119ab17678227d4c4242d27782b34225678581236b3dd258aa3a60365f1
    • Instruction ID: 98826c320a56b26c21175b765f38f88c119048b9385a1e0a0a9a70fd8c88e0bb
    • Opcode Fuzzy Hash: 8b84f119ab17678227d4c4242d27782b34225678581236b3dd258aa3a60365f1
    • Instruction Fuzzy Hash: 8B01B57115011865EF326A78AD86FEE33DCDF06740F0484D1F82DD6191DB649A81D7E9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: d36b9367a10ee4a7857cf0b9e7d45465f2cd842e259b5051de39c502b574c1e7
    • Instruction ID: a82ba0462b8285a33593bd15d692178af262dab14206cd10d79324e0eec8f537
    • Opcode Fuzzy Hash: d36b9367a10ee4a7857cf0b9e7d45465f2cd842e259b5051de39c502b574c1e7
    • Instruction Fuzzy Hash: 9611A771A002449EDB14EB78D9557AEBBE4DF95300F1080EEE45ED7682DF745E04C761
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: CMT
    • API String ID: 3519838083-2756464174
    • Opcode ID: 81dbe9e9c104b663ce6eefc83ff778c5e4f6994e51428fef80a3540b1f5e31dd
    • Instruction ID: b54568ba908e61903c6a304efe74926870639660cf60741d8efc8baf1d1acbb6
    • Opcode Fuzzy Hash: 81dbe9e9c104b663ce6eefc83ff778c5e4f6994e51428fef80a3540b1f5e31dd
    • Instruction Fuzzy Hash: BC61C2B1500F449EDB25DB74C8429EBB7E8EB15701F4089AEE1EF47142DA326A44EF10
    APIs
    • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00B97CA5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Info
    • String ID:
    • API String ID: 1807457897-3916222277
    • Opcode ID: 425b26ee220a0f7e0eae1f57998cf01513bc85da87cd2cf72b4f43b63045e78d
    • Instruction ID: 6e3b18bae7ccc6f2a096b7085705c88cd5c9a1dd9ace466fd909704dff6e465e
    • Opcode Fuzzy Hash: 425b26ee220a0f7e0eae1f57998cf01513bc85da87cd2cf72b4f43b63045e78d
    • Instruction Fuzzy Hash: 7C410AB055828C9ADF228F28CC84BF6BBF9EF45304F2404FDE59A87142D6359A45DF60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: CMT
    • API String ID: 3519838083-2756464174
    • Opcode ID: 8e7599566225690d633202c8c5fe42f352d9288d0f223d0c8f35ba6c7fe63f1b
    • Instruction ID: c45920ea2267c790d062b1ec4e3f230f328b974283b48cc13757dc568acdf01f
    • Opcode Fuzzy Hash: 8e7599566225690d633202c8c5fe42f352d9288d0f223d0c8f35ba6c7fe63f1b
    • Instruction Fuzzy Hash: 0511B674A00205AFCB04DF6C84919BDFBEEEF84300F04C499E46997341DB359912DB60
    APIs
    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00B96A57), ref: 00B973AF
    Strings
    • InitializeCriticalSectionEx, xrefs: 00B9737F
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CountCriticalInitializeSectionSpin
    • String ID: InitializeCriticalSectionEx
    • API String ID: 2593887523-3084827643
    • Opcode ID: d9e6bdc77137d9b1d455480275f4a39863cdcc2e4dd62ab1ab715f70a91a8b84
    • Instruction ID: 00e31264b250b0da1ad0202463c07a07df1aabca42a31a96aa9e4d7a04b4c8a4
    • Opcode Fuzzy Hash: d9e6bdc77137d9b1d455480275f4a39863cdcc2e4dd62ab1ab715f70a91a8b84
    • Instruction Fuzzy Hash: 02F09071689218BBCF016F64DC06DAE7FE1EF46B20F0040A4FC086A260CE724A11EA90
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Alloc
    • String ID: FlsAlloc
    • API String ID: 2773662609-671089009
    • Opcode ID: 3c2c272f4a80607a1fdd540c408f77a47cc2c9b5a47378cfe55b522a33f529d5
    • Instruction ID: 777664bcc9609cb56cb57e957e8b3c778bb5d7ad4a61b460fda5a83f4f07963c
    • Opcode Fuzzy Hash: 3c2c272f4a80607a1fdd540c408f77a47cc2c9b5a47378cfe55b522a33f529d5
    • Instruction Fuzzy Hash: 22E0A030AA9218779710AB689C0696EBAD4DF56B21F2401A5F805672A0CEA15A0086D9
    APIs
    • try_get_function.LIBVCRUNTIME ref: 00B9151C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: try_get_function
    • String ID: FlsAlloc
    • API String ID: 2742660187-671089009
    • Opcode ID: b54dffd0ec73bb300a62ba2c2438d742d7cbc1a874e02380271bd24d7df7b137
    • Instruction ID: c44b5f18b8576c57c99c5b042c6f2ebc10516a51f6eb5394cf0bfba2d63e47a9
    • Opcode Fuzzy Hash: b54dffd0ec73bb300a62ba2c2438d742d7cbc1a874e02380271bd24d7df7b137
    • Instruction Fuzzy Hash: 8ED02B7578A32C778A5032DCAC039DD7EC4CB01BF1F0104E2FB083215796A1054052D1
    APIs
      • Part of subcall function 00B97BA8: GetOEMCP.KERNEL32(00000000,?,?,00B97E31,?), ref: 00B97BD3
    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00B97E76,?,00000000), ref: 00B98049
    • GetCPInfo.KERNEL32(00000000,00B97E76,?,?,?,00B97E76,?,00000000), ref: 00B9805C
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CodeInfoPageValid
    • String ID:
    • API String ID: 546120528-0
    • Opcode ID: f5d282f48a53c574c849d5656b2ea9824897183b01869914f8e57433fa7aa147
    • Instruction ID: 80f04f48f1c8b10c13f82ae168033a29aa3a2bb3afbbd80fafc11201a4aa37aa
    • Opcode Fuzzy Hash: f5d282f48a53c574c849d5656b2ea9824897183b01869914f8e57433fa7aa147
    • Instruction Fuzzy Hash: C1512270A042159EDF24DF35C881ABBBBE5EF47300F1444FED096AB252EB399946CB90
    APIs
    • __EH_prolog.LIBCMT ref: 00B7134B
      • Part of subcall function 00B75D54: __EH_prolog.LIBCMT ref: 00B75D59
      • Part of subcall function 00B7C07F: __EH_prolog.LIBCMT ref: 00B7C084
      • Part of subcall function 00B7C07F: new.LIBCMT ref: 00B7C0C7
      • Part of subcall function 00B7C07F: new.LIBCMT ref: 00B7C0EB
    • new.LIBCMT ref: 00B713C3
      • Part of subcall function 00B7A96E: __EH_prolog.LIBCMT ref: 00B7A973
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: c4048f8eccbcc34bfc896566287df6676056db3c909fbdf54fd5c3c3db68159a
    • Instruction ID: f88ad31e7fac27e527d03b17f3f999189e8405313922ef70afc3796854a69e13
    • Opcode Fuzzy Hash: c4048f8eccbcc34bfc896566287df6676056db3c909fbdf54fd5c3c3db68159a
    • Instruction Fuzzy Hash: 914127B0904B44DED720DF798885AD6FBE5BF28300F5089AFE5BE83282C7326654CB15
    APIs
    • __EH_prolog.LIBCMT ref: 00B7134B
      • Part of subcall function 00B75D54: __EH_prolog.LIBCMT ref: 00B75D59
      • Part of subcall function 00B7C07F: __EH_prolog.LIBCMT ref: 00B7C084
      • Part of subcall function 00B7C07F: new.LIBCMT ref: 00B7C0C7
      • Part of subcall function 00B7C07F: new.LIBCMT ref: 00B7C0EB
    • new.LIBCMT ref: 00B713C3
      • Part of subcall function 00B7A96E: __EH_prolog.LIBCMT ref: 00B7A973
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: 0cb6a44511eed0307d6ab02c59854a26c5965d8d03f95c01ee2cfe6db36211d4
    • Instruction ID: a3c429218519d26f41f056daeba86a38dfa90c1de76a4e6d08ea51c93398156c
    • Opcode Fuzzy Hash: 0cb6a44511eed0307d6ab02c59854a26c5965d8d03f95c01ee2cfe6db36211d4
    • Instruction Fuzzy Hash: AE4117B0905B44DED720DF798885AD6FBE5BF28300F504AAFD5BE83282D7326654CB15
    APIs
      • Part of subcall function 00B95CDC: GetLastError.KERNEL32(?,00BACBD8,00B91E04,00BACBD8,?,?,00B919A3,?,?,00BACBD8), ref: 00B95CE0
      • Part of subcall function 00B95CDC: _free.LIBCMT ref: 00B95D13
      • Part of subcall function 00B95CDC: SetLastError.KERNEL32(00000000,?,00BACBD8), ref: 00B95D54
      • Part of subcall function 00B95CDC: _abort.LIBCMT ref: 00B95D5A
      • Part of subcall function 00B97F33: _abort.LIBCMT ref: 00B97F65
      • Part of subcall function 00B97F33: _free.LIBCMT ref: 00B97F99
      • Part of subcall function 00B97BA8: GetOEMCP.KERNEL32(00000000,?,?,00B97E31,?), ref: 00B97BD3
    • _free.LIBCMT ref: 00B97E8C
    • _free.LIBCMT ref: 00B97EC2
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$ErrorLast_abort
    • String ID:
    • API String ID: 2991157371-0
    • Opcode ID: 1c2d091e059ee482fbfda6ccb17a1eb4204b477f2f9af87323f3214cb6fe486b
    • Instruction ID: b6e42763c64e92be48879c0693c477a0acddec3e1d6a081131a51da99230f2ac
    • Opcode Fuzzy Hash: 1c2d091e059ee482fbfda6ccb17a1eb4204b477f2f9af87323f3214cb6fe486b
    • Instruction Fuzzy Hash: F5317132958608AFDF21EFA8D441BAD77F9EF41320F2540E9E4049B2A1EF755D41CB54
    APIs
    • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,?,?,?,00000000,00B7988D,?,?,00B77429), ref: 00B7927F
    • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,00000000,00B7988D,?,?,00B77429), ref: 00B792B4
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: bb5c5d367fcec239c53374083e0e8712f3faa44c68f77e8dab8e217ad2c3aa4c
    • Instruction ID: cfd104ffe28f8e288cc2d84dceca1f332c9c68be5c8e1f2cf6be7c19f04b7412
    • Opcode Fuzzy Hash: bb5c5d367fcec239c53374083e0e8712f3faa44c68f77e8dab8e217ad2c3aa4c
    • Instruction Fuzzy Hash: 002101B1404748BEE730AF14C885BA777E8EB49364F008AADF5F9825D2C374AD498B60
    APIs
    • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,00B7718F,?,?,?), ref: 00B79732
    • SetFileTime.KERNELBASE(?,?,?,?), ref: 00B797E2
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: File$BuffersFlushTime
    • String ID:
    • API String ID: 1392018926-0
    • Opcode ID: 0b9a693a81fa1c674f527b07684c5e0ccb2634015fa88ac7deb245aada0ea8bb
    • Instruction ID: f108ce871bfafba330c4683b473c930ffaaa3db4b1f0fafee399ede5a5426c92
    • Opcode Fuzzy Hash: 0b9a693a81fa1c674f527b07684c5e0ccb2634015fa88ac7deb245aada0ea8bb
    • Instruction Fuzzy Hash: 6021F331268245AFC718DE24C891AAABBE8EF95704F04899DF8A9C7141C725ED08C791
    APIs
    • GetProcAddress.KERNEL32(00000000,?), ref: 00B97152
    • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00B9715F
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AddressProc__crt_fast_encode_pointer
    • String ID:
    • API String ID: 2279764990-0
    • Opcode ID: cda258ead71278c0b6648ed759ff10ac6977bb42d74e26cc0c5706ef79114be1
    • Instruction ID: 6e93fd389a7accf9c7678e26df8cd720980699129a0cdc9cd3c771fed57cf526
    • Opcode Fuzzy Hash: cda258ead71278c0b6648ed759ff10ac6977bb42d74e26cc0c5706ef79114be1
    • Instruction Fuzzy Hash: 4911A737A54131AB9F259E28EC819AA73D5EB85B60B1642B0ED14FB294DF30DC4186D1
    APIs
    • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00B79827
    • GetLastError.KERNEL32 ref: 00B79833
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ErrorFileLastPointer
    • String ID:
    • API String ID: 2976181284-0
    • Opcode ID: 1f1778e0941ae407d4fb4c0e9e0816c7a32c833f6ed0aa9ed53c26e36ac2ddf3
    • Instruction ID: 153cfbae68effcb52037301a9941726e0aec39894d421f1f5d1145da27aa1260
    • Opcode Fuzzy Hash: 1f1778e0941ae407d4fb4c0e9e0816c7a32c833f6ed0aa9ed53c26e36ac2ddf3
    • Instruction Fuzzy Hash: B601DE717042046BE730AE29CC85B6AB7DAEB86355F14C57EB16AC7690DA71DC0CC222
    APIs
    • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 00B795F1
    • GetLastError.KERNEL32 ref: 00B795FE
      • Part of subcall function 00B793B0: __EH_prolog.LIBCMT ref: 00B793B5
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ErrorFileH_prologLastPointer
    • String ID:
    • API String ID: 4236474358-0
    • Opcode ID: 6561d9c45c5d8f27e01b2e374dab7a4a835befe6c3d8d567db7f3e56fdab8eed
    • Instruction ID: bd339f59e10d00f731e495bbcd6816636bfdb7279eb9c4a8be980860fd27e29a
    • Opcode Fuzzy Hash: 6561d9c45c5d8f27e01b2e374dab7a4a835befe6c3d8d567db7f3e56fdab8eed
    • Instruction Fuzzy Hash: 910175722043259BCF159E298CC49AB77E9FF61720714C299E93DCB291DB71D8019760
    APIs
    • __EH_prolog.LIBCMT ref: 00B7783F
      • Part of subcall function 00B7C07F: __EH_prolog.LIBCMT ref: 00B7C084
      • Part of subcall function 00B7C07F: new.LIBCMT ref: 00B7C0C7
      • Part of subcall function 00B7C07F: new.LIBCMT ref: 00B7C0EB
    • new.LIBCMT ref: 00B77880
      • Part of subcall function 00B807B4: __EH_prolog.LIBCMT ref: 00B807B9
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: 44596ecfc8c3aa85106849b1a36782b617629f820770c9ac1edf5b76c6ed0f1f
    • Instruction ID: e0e87f5e84578e4bf60aca127457de1f26b8d3d871b5a50e5232a431f4f47a6a
    • Opcode Fuzzy Hash: 44596ecfc8c3aa85106849b1a36782b617629f820770c9ac1edf5b76c6ed0f1f
    • Instruction Fuzzy Hash: 98118BB1A007449AC724DF69D4416AAFBE4FF98340F10896FE86AC7650EB70A940CB60
    APIs
    • _free.LIBCMT ref: 00B954E4
      • Part of subcall function 00B953D5: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B91B3A,?,0000015D,?,?,?,?,00B926B9,000000FF,00000000,?,?), ref: 00B95407
    • HeapReAlloc.KERNEL32(00000000,?,00200000,?,?,00BACBD8,00B71727,?,?,?,?,00000000,?,00B76D05,?,?), ref: 00B95520
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Heap$AllocAllocate_free
    • String ID:
    • API String ID: 2447670028-0
    • Opcode ID: afdae951cffef35bea665b23943fe46c0db31d8ac73edf46ae80808d1db41059
    • Instruction ID: 3198cd3da38df9c167099f4fadf7146e91d3dabb2776d9d00d590d9f558f32e5
    • Opcode Fuzzy Hash: afdae951cffef35bea665b23943fe46c0db31d8ac73edf46ae80808d1db41059
    • Instruction Fuzzy Hash: 48F0C2312C4911679F732A29AC41B6B3BD9CF817B2F2180B5FC15AB795DE30C88087A0
    APIs
    • LoadStringW.USER32(?,?,00000200,?), ref: 00B7CDC5
    • LoadStringW.USER32(?,?,00000200,?), ref: 00B7CDDB
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: LoadString
    • String ID:
    • API String ID: 2948472770-0
    • Opcode ID: 621877e2da2e1b2381b94075073bc84bb749f70f74d83ce60cd28093ab9b0ab8
    • Instruction ID: 0017d5b20d7436161b99c38a650222aefd8d02f5cda0ae92bf5b0b9c20288687
    • Opcode Fuzzy Hash: 621877e2da2e1b2381b94075073bc84bb749f70f74d83ce60cd28093ab9b0ab8
    • Instruction Fuzzy Hash: 24F0C8326001287BDB21AF149C46FA77E99EB06790F00047DF959A3061EB129C00C7B0
    APIs
      • Part of subcall function 00B98287: GetEnvironmentStringsW.KERNEL32 ref: 00B98290
      • Part of subcall function 00B98287: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B982B3
      • Part of subcall function 00B98287: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B982D9
      • Part of subcall function 00B98287: _free.LIBCMT ref: 00B982EC
      • Part of subcall function 00B98287: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B982FB
    • _free.LIBCMT ref: 00B94904
    • _free.LIBCMT ref: 00B9490B
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
    • String ID:
    • API String ID: 400815659-0
    • Opcode ID: 8dce0f53f59ba4597e891517d65602e7402e2148d9ec9c56259ccfc97784ce48
    • Instruction ID: b2af6b79fa0bc84957ea0b64a0df5f21ee75524bcda491acd69e7d1bd8611ed7
    • Opcode Fuzzy Hash: 8dce0f53f59ba4597e891517d65602e7402e2148d9ec9c56259ccfc97784ce48
    • Instruction Fuzzy Hash: 21E0E513A1D9514A9EB236393C52F9B0BC48B92374B3103FEF526870D3CF508C0302A5
    APIs
    • GetCurrentProcess.KERNEL32(?,?), ref: 00B7F8C8
    • GetProcessAffinityMask.KERNEL32(00000000), ref: 00B7F8CF
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Process$AffinityCurrentMask
    • String ID:
    • API String ID: 1231390398-0
    • Opcode ID: f19db42be766543eaa92f6fe5a333a5b6889cf4bfdac500e0ca939b36b4e543a
    • Instruction ID: bb85992b6e2cf0591e93aa74c950d9cda16d260530dfabccda94154418d77297
    • Opcode Fuzzy Hash: f19db42be766543eaa92f6fe5a333a5b6889cf4bfdac500e0ca939b36b4e543a
    • Instruction Fuzzy Hash: 36E06532E2020AAB5B1497A49C559BF72DDDA09300B2081F5A82BD7500EA20DD0157A5
    APIs
    • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B79BFF,?,?,?,00B79A98,?,00000001,00000000,?,?), ref: 00B79DDD
    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B79BFF,?,?,?,00B79A98,?,00000001,00000000,?,?), ref: 00B79E0E
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: cb77f1c6b4fc8e2e2874c149faeaf5dd8cae6a20c7ead79104ea4804f23159ef
    • Instruction ID: 2671f055a37eb1f147fe087f4884f6a4b7f3dde0a99008198d232f5b8d732e30
    • Opcode Fuzzy Hash: cb77f1c6b4fc8e2e2874c149faeaf5dd8cae6a20c7ead79104ea4804f23159ef
    • Instruction Fuzzy Hash: A3F0A07129010D6BDF11AF60EC01BDA37ADEB04385F04C0A5B99887060DB3299A8DB90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ItemText_swprintf
    • String ID:
    • API String ID: 3011073432-0
    • Opcode ID: 7952fb9afdb23e813f09f61bdb8d723f7b3ae4abbe5ef02bf4a0bb46aa16138a
    • Instruction ID: 08f8bbe184313328b7740f14f9e5893e9795ed20c429317d4309bc560975e512
    • Opcode Fuzzy Hash: 7952fb9afdb23e813f09f61bdb8d723f7b3ae4abbe5ef02bf4a0bb46aa16138a
    • Instruction Fuzzy Hash: 1EF0E571A1434C3BEB11BBB09C0BFAA3BDDDB04741F0405E5F605630B2EA716A20E762
    APIs
    • DeleteFileW.KERNELBASE(?,?,?,00B79317,?,?,00B79172), ref: 00B79AC3
    • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00B79317,?,?,00B79172), ref: 00B79AF1
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: DeleteFile
    • String ID:
    • API String ID: 4033686569-0
    • Opcode ID: 0bd5a9e6fbe46d668f5c71550ccf80a7a13d56f171677c1234b03d0f17d16766
    • Instruction ID: ca3d0ebc5783a4bc011c5c29885ac3ab979cf5fcacb71981ff4228c5b67c501a
    • Opcode Fuzzy Hash: 0bd5a9e6fbe46d668f5c71550ccf80a7a13d56f171677c1234b03d0f17d16766
    • Instruction Fuzzy Hash: E3E0927165121D6BDF21AF61EC41BE977ECEB09381F8480A1FA88C7060DF71DD94DAA0
    APIs
    • GetFileAttributesW.KERNELBASE(?,?,?,00B79B0E,?,00B772CE,?,?,?,?), ref: 00B79B2A
    • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00B79B0E,?,00B772CE,?,?,?,?), ref: 00B79B56
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: 675cbfe935fab5f769e50132b5e6fe63be25fce15c7dfab2bafcd8945784e846
    • Instruction ID: 677162fb29002a91183365b2eab35cf25963f2dc8db197d1becaf48e47418bf4
    • Opcode Fuzzy Hash: 675cbfe935fab5f769e50132b5e6fe63be25fce15c7dfab2bafcd8945784e846
    • Instruction Fuzzy Hash: BEE0653151012867CB60AAA4DC05BD9779CDB093E1F0442E1FE58E3290DA715D8487D0
    APIs
    • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B7EF39
    • LoadLibraryW.KERNELBASE(?,?,00B7DB0E,Crypt32.dll,?,00B7DB90,?,00B7DB74,?,?,?,?), ref: 00B7EF5B
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: DirectoryLibraryLoadSystem
    • String ID:
    • API String ID: 1175261203-0
    • Opcode ID: d2c0c0136a168bc7b38e589c8608ff3579b8ab7cdd878d8326913c5cff1a6072
    • Instruction ID: 21b648b0af0cf795871003767032be4e4c2c49952f65bb632c1246d784ccd722
    • Opcode Fuzzy Hash: d2c0c0136a168bc7b38e589c8608ff3579b8ab7cdd878d8326913c5cff1a6072
    • Instruction Fuzzy Hash: 77E0127281116C6BDB11AAA49C09FDA77ACEF0D381F0440E5B948D3005DA74D944CBB0
    APIs
      • Part of subcall function 00B91507: try_get_function.LIBVCRUNTIME ref: 00B9151C
    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B90404
    • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00B9040F
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
    • String ID:
    • API String ID: 806969131-0
    • Opcode ID: 06cb347ccb3236c8db16f0f1f0b451b07cb02642ed14daf6f7dfbe0bcb7bbb79
    • Instruction ID: d9fb9739f10f3b1c7742035984c84de5bd0a7b6d83b901b3ec84f6783a4e6728
    • Opcode Fuzzy Hash: 06cb347ccb3236c8db16f0f1f0b451b07cb02642ed14daf6f7dfbe0bcb7bbb79
    • Instruction Fuzzy Hash: 21D0A76057C7015E5C44327C681385A17D4846777877147F9E521892E1EF1094017025
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ItemShowWindow
    • String ID:
    • API String ID: 3351165006-0
    • Opcode ID: 77d1bb1e171fd3f6b80eeefc3d3ae022b1026085b8f44b425adeaf882e0e9313
    • Instruction ID: 717b030cada662ae580917aa3fbea1f1857d32f6eb311565dccd2f9d3d4154c0
    • Opcode Fuzzy Hash: 77d1bb1e171fd3f6b80eeefc3d3ae022b1026085b8f44b425adeaf882e0e9313
    • Instruction Fuzzy Hash: 14C01272058100BECB012BB0DC0AC2A7BA99B96212F00C904B0A5C1060C738C010DB32
    APIs
    • EnterCriticalSection.KERNEL32(00BB1E64,?,?,?,?,00B7A2A3,?,?,?,?,00B9F0A1,000000FF), ref: 00B7F857
    • LeaveCriticalSection.KERNEL32(00BB1E64,?,?,?,?,00B7A2A3,?,?,?,?,00B9F0A1,000000FF), ref: 00B7F8AE
      • Part of subcall function 00B7F5E6: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 00B7F61A
      • Part of subcall function 00B7F5E6: CloseHandle.KERNEL32(?,?), ref: 00B7F634
      • Part of subcall function 00B7F5E6: DeleteCriticalSection.KERNEL32(?), ref: 00B7F64D
      • Part of subcall function 00B7F5E6: FindCloseChangeNotification.KERNELBASE(?), ref: 00B7F659
      • Part of subcall function 00B7F5E6: CloseHandle.KERNEL32(?), ref: 00B7F665
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CloseCriticalSection$Handle$ChangeDeleteEnterFindLeaveNotificationReleaseSemaphore
    • String ID:
    • API String ID: 2851692498-0
    • Opcode ID: 1024a94076049f57bbcc7bb40216d2569b1230a4cb0b22d947c949b00a5112da
    • Instruction ID: df66cdd41e8e932d8607b9b634812b3cf7bf0fbd964e0b487f1162eb3435d331
    • Opcode Fuzzy Hash: 1024a94076049f57bbcc7bb40216d2569b1230a4cb0b22d947c949b00a5112da
    • Instruction Fuzzy Hash: 2EF07873500202CBD3216B2CEC4187EB3ECE7807903118666EC3857101DF72EC004379
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: 2981e1b821d3e0ea146a873a112085a3abfa01b38b080c9e49c9e4e221194b1e
    • Instruction ID: 31ee502d682f9d0956c6338f4233a0f871d4254dcd89d153b9071add85ea929c
    • Opcode Fuzzy Hash: 2981e1b821d3e0ea146a873a112085a3abfa01b38b080c9e49c9e4e221194b1e
    • Instruction Fuzzy Hash: 61A1A470A01642AEEB19CF7CC484BB9FBE5FF45300F1489AAD47D97281D771A951CBA0
    APIs
    • __EH_prolog.LIBCMT ref: 00B77F18
      • Part of subcall function 00B71346: __EH_prolog.LIBCMT ref: 00B7134B
      • Part of subcall function 00B71346: new.LIBCMT ref: 00B713C3
      • Part of subcall function 00B71927: __EH_prolog.LIBCMT ref: 00B7192C
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: 62ecfa31c41ef5314fec7f77cf861eba84fe8b2137294a9c632c90b5657c39c7
    • Instruction ID: 376f8928d324dbf33f0bc8fe91cb80f9532380f7c6c0a603ad98e3db6f924e72
    • Opcode Fuzzy Hash: 62ecfa31c41ef5314fec7f77cf861eba84fe8b2137294a9c632c90b5657c39c7
    • Instruction Fuzzy Hash: 4141A1719842589EDB24EB60CC55BEA77F8EF11300F4484EAE45E63092DB756EC8CB21
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: ef78145484b7f95f35326ea47cd837b92c6b67a803d8f382b90f37388211b3e7
    • Instruction ID: a4fc4cb68d96fca034f6bd361e13737ec91f2800c6807248f86bacd757909478
    • Opcode Fuzzy Hash: ef78145484b7f95f35326ea47cd837b92c6b67a803d8f382b90f37388211b3e7
    • Instruction Fuzzy Hash: 1E21F5B1E41215AFDB14EF78DC42A6A7BECEB14354F0045BAE905E7691D7709D00C7A8
    APIs
    • __EH_prolog.LIBCMT ref: 00B88D7E
      • Part of subcall function 00B71346: __EH_prolog.LIBCMT ref: 00B7134B
      • Part of subcall function 00B71346: new.LIBCMT ref: 00B713C3
      • Part of subcall function 00B7187C: __EH_prolog.LIBCMT ref: 00B71881
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: d0603d8a5a95c675cebd93160c1bc9f1e50efa4d7bd71fda47d572bc354af9f5
    • Instruction ID: 443635c7b1262071313cb128b495c1108c0157e186833ea4d9fdbd4604927fcf
    • Opcode Fuzzy Hash: d0603d8a5a95c675cebd93160c1bc9f1e50efa4d7bd71fda47d572bc354af9f5
    • Instruction Fuzzy Hash: AD213A75C042099BCB15EF98D8819EEBBF4FF59300F1048AAE809A3251DB356E04CBB0
    APIs
    • __EH_prolog.LIBCMT ref: 00B8B451
      • Part of subcall function 00B7ED7A: _wcslen.LIBCMT ref: 00B7ED90
      • Part of subcall function 00B7783A: __EH_prolog.LIBCMT ref: 00B7783F
      • Part of subcall function 00B7783A: new.LIBCMT ref: 00B77880
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog$_wcslen
    • String ID:
    • API String ID: 2838827086-0
    • Opcode ID: 31f628daa8fc3898afe52af6df9a7fc4840aabdb6e6a08d2baecde174ce052fd
    • Instruction ID: 5b2a3d8c4d64fdb73c8f4bf7f1f2f8590117ff604fe08c3e1139b51769a43271
    • Opcode Fuzzy Hash: 31f628daa8fc3898afe52af6df9a7fc4840aabdb6e6a08d2baecde174ce052fd
    • Instruction Fuzzy Hash: 23110832508244AFD704EBACE806FD97BE0DB6D320F0084EEF41497292DFB11684DB65
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 52a26c187ae18e92b20300223c50c763a19eec92ec0916de75924cfd3bbcb820
    • Instruction ID: 9b4e65d7e4bcfafc17124f79a5f7c1960223a01ba015edd4a7847a007c4c0523
    • Opcode Fuzzy Hash: 52a26c187ae18e92b20300223c50c763a19eec92ec0916de75924cfd3bbcb820
    • Instruction Fuzzy Hash: 94F0AF3151470A9FDBB0EE24C84565E77D4EB51321F20CA9EE4BEC7690EBB0E880A752
    APIs
    • __EH_prolog.LIBCMT ref: 00B758B0
      • Part of subcall function 00B7A96E: __EH_prolog.LIBCMT ref: 00B7A973
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: 76bfebea808e8974bbec359d71d0abc72e2a0ef67b6048a22a4b831798ffc204
    • Instruction ID: 197bbd4bf7862816b6987fa63e44bf6d1af8bdc9ce99dbc2af36ee020a839c73
    • Opcode Fuzzy Hash: 76bfebea808e8974bbec359d71d0abc72e2a0ef67b6048a22a4b831798ffc204
    • Instruction Fuzzy Hash: EA011D34915694DAEB25E7A4C0567DDFBE49F19304F0084EDA8BE53283DFB46B04CB62
    APIs
    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00B91B3A,?,0000015D,?,?,?,?,00B926B9,000000FF,00000000,?,?), ref: 00B95407
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: 9a9885c8b8dfd1833c78662f307216e46b023fa648fbef8864c017fe80f26aa7
    • Instruction ID: 557026a376f37c5304e7e4c7d2c359c7068fed132115090959cb32cef3446b10
    • Opcode Fuzzy Hash: 9a9885c8b8dfd1833c78662f307216e46b023fa648fbef8864c017fe80f26aa7
    • Instruction Fuzzy Hash: E8E0E531194E2066EE7326219C06B5B7BC8DB413A1F1580B0EC05D72C0CB60CC4087A4
    APIs
    • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00B79179), ref: 00B791C4
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: 2e5ff5117282f590bc3be9170445c7e741374cb0ecc65f11b0471ffa57517295
    • Instruction ID: 854f73423c571ae480833466e16386161408dd2cdab0febe07666cc47e4d627a
    • Opcode Fuzzy Hash: 2e5ff5117282f590bc3be9170445c7e741374cb0ecc65f11b0471ffa57517295
    • Instruction Fuzzy Hash: 37F0BE70082B1A6EDB308A20D54D792B7E5DB12725F04CB9E80FA53CD09321A85AAB10
    APIs
    • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00B79E7A
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CloseFind
    • String ID:
    • API String ID: 1863332320-0
    • Opcode ID: 67fa858679aaf2d08efd509040d387b03ec6b40ff162d3941f7814b1a692bc22
    • Instruction ID: 2c33ff46b3a4ada021e67ec4b4caf39adaced4b668ee4fb8a415c63784f82610
    • Opcode Fuzzy Hash: 67fa858679aaf2d08efd509040d387b03ec6b40ff162d3941f7814b1a692bc22
    • Instruction Fuzzy Hash: 8CF0AE31009790EECB2267B48405BDB7FD45F15331F04CA89F5FE52192C2756099DB31
    APIs
    • __EH_prolog.LIBCMT ref: 00B71DB2
      • Part of subcall function 00B7187C: __EH_prolog.LIBCMT ref: 00B71881
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: 07fc4d4c4738ef119063c285833148dde2e822f5df0cd33de598e289a74ed82b
    • Instruction ID: 9fcc2be0efdca057980665a2d220b86c388d8baf9f80e800a2dc065d3eacc753
    • Opcode Fuzzy Hash: 07fc4d4c4738ef119063c285833148dde2e822f5df0cd33de598e289a74ed82b
    • Instruction Fuzzy Hash: 19F0DFB2D002488ECF50EFACD806AEEBBF0EB58300F0045BAD419E7202E7348604CBA1
    APIs
    • __EH_prolog.LIBCMT ref: 00B71DB2
      • Part of subcall function 00B7187C: __EH_prolog.LIBCMT ref: 00B71881
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: ef9742a724c3354562ded9886123954e7815d08fed9df62cc830c93c762edad9
    • Instruction ID: 8e7c9e3265724af7aefe6760fb15acde8db07c558ea5dbf22f4dd6ce38ccbb21
    • Opcode Fuzzy Hash: ef9742a724c3354562ded9886123954e7815d08fed9df62cc830c93c762edad9
    • Instruction Fuzzy Hash: 32F0F2B1C002488ECF40EFACD806BEEBBF0EB18300F0045BAD419E7202E7348604CBA1
    APIs
    • SetThreadExecutionState.KERNEL32(00000001), ref: 00B7F53C
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ExecutionStateThread
    • String ID:
    • API String ID: 2211380416-0
    • Opcode ID: 6a592d408515dfb0a2b9e3609b32e781daaf618e62764df5f8a1216cffb41b0c
    • Instruction ID: 94c37bf9fbb0451453683675a5682c4995d5c50006c9ab7eba91d30f578db9dc
    • Opcode Fuzzy Hash: 6a592d408515dfb0a2b9e3609b32e781daaf618e62764df5f8a1216cffb41b0c
    • Instruction Fuzzy Hash: 52D0C20161411155DA213B28680BBBD1AC68F87351F0840F5B408932A28B850947D2B2
    APIs
    • GetFileType.KERNELBASE(000000FF,00B79352), ref: 00B7942C
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: FileType
    • String ID:
    • API String ID: 3081899298-0
    • Opcode ID: eed7e93cebe5cb4c5365db083ff8c2ffaf5aa2840d4eedae475c8dc20bf99268
    • Instruction ID: 423a6d30aa5c9a9cdaec8b8974ca38e3615a9b0448870d5424089649c38bb4d1
    • Opcode Fuzzy Hash: eed7e93cebe5cb4c5365db083ff8c2ffaf5aa2840d4eedae475c8dc20bf99268
    • Instruction Fuzzy Hash: CED01230012140568E7116345D0A06666D1DB43366F68C6E4E17DC51A1CB22C843F501
    APIs
    • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00B8B76B
      • Part of subcall function 00B891F2: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B89203
      • Part of subcall function 00B891F2: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B89214
      • Part of subcall function 00B891F2: TranslateMessage.USER32(?), ref: 00B8921E
      • Part of subcall function 00B891F2: DispatchMessageW.USER32(?), ref: 00B89228
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Message$DispatchItemPeekSendTranslate
    • String ID:
    • API String ID: 4142818094-0
    • Opcode ID: ab6967e2c204fe233833ac87e170127bf6e1b4443d68e13ff9074d396ee18ad3
    • Instruction ID: 025a9200f82d4179ae3a1e37e1c9ecffec561835d42b69976eafae9d5dd429f7
    • Opcode Fuzzy Hash: ab6967e2c204fe233833ac87e170127bf6e1b4443d68e13ff9074d396ee18ad3
    • Instruction Fuzzy Hash: 61D09E75144200BADA113B51DE0BF1A7AE2BF99B04F404694B349340B1C6629D21DB12
    APIs
    • SetEndOfFile.KERNELBASE(?,00B78BD6,?,?,-00000954), ref: 00B79873
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: File
    • String ID:
    • API String ID: 749574446-0
    • Opcode ID: 9888150c70db5ea11398db35eff33125517bbf2c22e7510e6dd57ab27ecd8aa0
    • Instruction ID: 6382eaad45d82a05e0799662982edfea180f9d2d3c1a7db5515edfcd128bbd6c
    • Opcode Fuzzy Hash: 9888150c70db5ea11398db35eff33125517bbf2c22e7510e6dd57ab27ecd8aa0
    • Instruction Fuzzy Hash: 56B011300F000A8A8E203B30CC0A8203A20EB2230AB0082A0A00ACA0A0CF23C002AA00
    APIs
      • Part of subcall function 00B712A6: GetDlgItem.USER32(00000000,00003021), ref: 00B712EA
      • Part of subcall function 00B712A6: SetWindowTextW.USER32(00000000,00BA0294), ref: 00B71300
    • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00B89DCC
    • EndDialog.USER32(?,00000006), ref: 00B89DDF
    • GetDlgItem.USER32(?,0000006C), ref: 00B89DFB
    • SetFocus.USER32(00000000), ref: 00B89E02
    • SetDlgItemTextW.USER32(?,00000065,?), ref: 00B89E42
    • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00B89E75
    • FindFirstFileW.KERNEL32(?,?), ref: 00B89E8B
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B89EA9
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B89EB9
    • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00B89ED6
    • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00B89EF4
      • Part of subcall function 00B7CD80: LoadStringW.USER32(?,?,00000200,?), ref: 00B7CDC5
      • Part of subcall function 00B7CD80: LoadStringW.USER32(?,?,00000200,?), ref: 00B7CDDB
    • _swprintf.LIBCMT ref: 00B89F24
      • Part of subcall function 00B73CD1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B73CE4
    • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00B89F37
    • FindClose.KERNEL32(00000000), ref: 00B89F3A
    • _swprintf.LIBCMT ref: 00B89F95
    • SetDlgItemTextW.USER32(?,00000068,?), ref: 00B89FA8
    • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00B89FBE
    • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00B89FDE
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B89FEE
    • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00B8A008
    • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00B8A020
    • _swprintf.LIBCMT ref: 00B8A051
    • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00B8A064
    • _swprintf.LIBCMT ref: 00B8A0B4
    • SetDlgItemTextW.USER32(?,00000069,?), ref: 00B8A0C7
      • Part of subcall function 00B88C23: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00B88C49
      • Part of subcall function 00B88C23: GetNumberFormatW.KERNEL32(00000400,00000000,?,00BAA150,?,?), ref: 00B88C98
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
    • String ID: %s %s$%s %s %s$REPLACEFILEDLG
    • API String ID: 3227067027-1840816070
    • Opcode ID: a7fabe3626d3585f3ae32f87d96ed589416f0c4a331f6aedf353098c09bed270
    • Instruction ID: cf15a4380883fdd9a51540bd392dc74903196c2ed71b9d2b94335b11bc1ab5a6
    • Opcode Fuzzy Hash: a7fabe3626d3585f3ae32f87d96ed589416f0c4a331f6aedf353098c09bed270
    • Instruction Fuzzy Hash: 7B919472244348BBE631ABA4CD4AFFB77ECEB4A704F044869B645D6091DB71A604C772
    APIs
    • __EH_prolog.LIBCMT ref: 00B76DDD
    • _wcslen.LIBCMT ref: 00B76E4B
    • _wcslen.LIBCMT ref: 00B76EBE
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 00B76F3D
    • CloseHandle.KERNEL32(00000000), ref: 00B76F4D
      • Part of subcall function 00B77790: GetCurrentProcess.KERNEL32(00000020,?), ref: 00B7779F
      • Part of subcall function 00B77790: GetLastError.KERNEL32 ref: 00B777E5
      • Part of subcall function 00B77790: CloseHandle.KERNEL32(?), ref: 00B777F4
    • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 00B76F58
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00B77066
    • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00B77092
    • CloseHandle.KERNEL32(?), ref: 00B770A4
    • GetLastError.KERNEL32(00000014,00000000,?), ref: 00B770B4
    • RemoveDirectoryW.KERNEL32(?), ref: 00B770F5
    • DeleteFileW.KERNEL32(?), ref: 00B7711D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CloseCreateFileHandle$DirectoryErrorLast_wcslen$ControlCurrentDeleteDeviceH_prologProcessRemove
    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
    • API String ID: 1889552639-3508440684
    • Opcode ID: 93c5960df24debd15be09fb1a018046c68150d977c23aceba1a6b9bfd0e57950
    • Instruction ID: 765dfa3554c8dbd61181b623832d3b1c3b21b0e590306a34d2bb4c76b6990721
    • Opcode Fuzzy Hash: 93c5960df24debd15be09fb1a018046c68150d977c23aceba1a6b9bfd0e57950
    • Instruction Fuzzy Hash: 56B17171910218AADF21EF64CC46FEA77F8EF45300F0485E9F969E7241DB34AA45CBA1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: __floor_pentium4
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
    • API String ID: 4168288129-2761157908
    • Opcode ID: 0fdeb24da673ddd8095193c78ce6b0c52e39de2fa40bda30f6e0587fed5e144c
    • Instruction ID: 960f40e3fe351cc5b5e66d00ef42f2b742d66271ec467cfe33f6c7577c3776b7
    • Opcode Fuzzy Hash: 0fdeb24da673ddd8095193c78ce6b0c52e39de2fa40bda30f6e0587fed5e144c
    • Instruction Fuzzy Hash: 38C22871E086288FDF65CE289D807EAB7F5EB85305F1541EAD40DE7240E775AE818F81
    APIs
    • __EH_prolog.LIBCMT ref: 00B725FE
    • _strlen.LIBCMT ref: 00B72B66
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B72CA7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_strlen
    • String ID: CMT
    • API String ID: 3741668355-2756464174
    • Opcode ID: d84a74b9df88b6369d9d14bf7d92b5485aa270d25980b3c9e48a2300b782fc2e
    • Instruction ID: bd1950f728bcd13d1cc3da0a9c4b69b8d1b9fdbd76cfc7a28de3b07c51df879a
    • Opcode Fuzzy Hash: d84a74b9df88b6369d9d14bf7d92b5485aa270d25980b3c9e48a2300b782fc2e
    • Instruction Fuzzy Hash: 8B62A4716002849FDB19DF38C895BEA77E1EF54300F0885BEEDAE8B286D7719945CB50
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _memcmp$H_prolog
    • String ID: CMT
    • API String ID: 212800410-2756464174
    • Opcode ID: de7a479d67cfdf476a2672b1b63baa77996a4852fceb6250de67fe2df0f8f417
    • Instruction ID: 59b722efa99cdbc7926d0d44a0b00e5b080b2915878104fc6485824a0d48199d
    • Opcode Fuzzy Hash: de7a479d67cfdf476a2672b1b63baa77996a4852fceb6250de67fe2df0f8f417
    • Instruction Fuzzy Hash: 6B2294B15142849BDF18DF28C895FEA37E5EF14700F0884B9FD6E9B286D7709A48DB60
    APIs
    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00B95624
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00B9562E
    • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00B9563B
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$DebuggerPresent
    • String ID:
    • API String ID: 3906539128-0
    • Opcode ID: 212ba5e6e4f12c5f626fe5d940094925d05c1573c727d57a14a2742f974bd2f8
    • Instruction ID: 066a63896cc6f55123f4c8cc4215f3ce0a0db98e9b6127c40bdd16dc970c6e87
    • Opcode Fuzzy Hash: 212ba5e6e4f12c5f626fe5d940094925d05c1573c727d57a14a2742f974bd2f8
    • Instruction Fuzzy Hash: CB31A3759412189BCB21EF68D889BD9BBB4BF18310F5041EAE41CA72A0EB709B85CF45
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2c2cafb7d0179fca0dc76ba42366ff9ba0cff1ddef3592acb5223377cb4d6ba2
    • Instruction ID: 9a1f1aa82144c0306f85ba100be96e42c361849fe93c1f6f783aa99dde18d637
    • Opcode Fuzzy Hash: 2c2cafb7d0179fca0dc76ba42366ff9ba0cff1ddef3592acb5223377cb4d6ba2
    • Instruction Fuzzy Hash: EE020B71E002199BDF54CFADD8806ADBBF5EF88324F2581ADD919E7384D731A941CB90
    APIs
    • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00B88C49
    • GetNumberFormatW.KERNEL32(00000400,00000000,?,00BAA150,?,?), ref: 00B88C98
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: FormatInfoLocaleNumber
    • String ID:
    • API String ID: 2169056816-0
    • Opcode ID: 814a67767d825c2521cc8c7a70a6ace4dcce8afe243dbad988c4ebc6bd417042
    • Instruction ID: 65465483466dab53f0abcd2dbb696c82ea6987ffd81cdcce4e75c8d56e43897b
    • Opcode Fuzzy Hash: 814a67767d825c2521cc8c7a70a6ace4dcce8afe243dbad988c4ebc6bd417042
    • Instruction Fuzzy Hash: DB011A36510208BAD710DFA4EC46F9B7BFCEF0A710F108466FA09E7261D771A925CBA5
    APIs
    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B9E23F,?,?,00000008,?,?,00B9DEDF,00000000), ref: 00B9E471
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ExceptionRaise
    • String ID:
    • API String ID: 3997070919-0
    • Opcode ID: 5c1b63aade881eb74ec27f598ff49d34de6159da38a404d33e48e2f6df6cc48c
    • Instruction ID: 827863240daeba10a2292f3c43c281c828bef7251f6d5310bec35ee5305dca77
    • Opcode Fuzzy Hash: 5c1b63aade881eb74ec27f598ff49d34de6159da38a404d33e48e2f6df6cc48c
    • Instruction Fuzzy Hash: 9BB13D31510609DFDB15CF28C48AB697BE0FF45364F2986A8E8A9CF3A1C335E991CB44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID: gj
    • API String ID: 0-4203073231
    • Opcode ID: f753c6d98738af00ef9ad4458234b29911385bd382ab2aa6c705e3c5b1b0d637
    • Instruction ID: b1f784f518817537c0f092d58867581e22c18f204c990f2dace172fecac76399
    • Opcode Fuzzy Hash: f753c6d98738af00ef9ad4458234b29911385bd382ab2aa6c705e3c5b1b0d637
    • Instruction Fuzzy Hash: 50F1C1B2A083418FD748CF29D880A1AFBE1BFC8308F19896EF598D7711D634E9558B56
    APIs
    • GetVersionExW.KERNEL32(?), ref: 00B7A608
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Version
    • String ID:
    • API String ID: 1889659487-0
    • Opcode ID: 1eba1cc977df4d4fe9a487761a9fb9f0e4503dc6bcf31621322b659fc22a476f
    • Instruction ID: 401dbf2ca7b3205c833349c77679debdee480ee8a5a4347d86f3cf670cbde6d9
    • Opcode Fuzzy Hash: 1eba1cc977df4d4fe9a487761a9fb9f0e4503dc6bcf31621322b659fc22a476f
    • Instruction Fuzzy Hash: ABF01DB490420C8BCB68DF18EC936E977E5E79A710F604295DA1983390DB719D85CE62
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0001D30F,00B8CD54), ref: 00B8D308
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 2a7ca883f7aa7bdc11a09b19f93ce3d3dd4359a6d15e6810ef2e7fb6452a1a02
    • Instruction ID: 681b7bf1ff37b310afabec0da22d6fa4521d0d7ebbfe3d23ef9d671742de6e8b
    • Opcode Fuzzy Hash: 2a7ca883f7aa7bdc11a09b19f93ce3d3dd4359a6d15e6810ef2e7fb6452a1a02
    • Instruction Fuzzy Hash:
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: HeapProcess
    • String ID:
    • API String ID: 54951025-0
    • Opcode ID: fefe86e993b713ad958a6abb75609e93e17c3a6e47fa50a2cc28a474f32e2339
    • Instruction ID: 46e58b798d90ee22f0a747695c58669d48c0a474c36c2874c3c4c3033b1599d9
    • Opcode Fuzzy Hash: fefe86e993b713ad958a6abb75609e93e17c3a6e47fa50a2cc28a474f32e2339
    • Instruction Fuzzy Hash: DFA012301011028B53004F315B092083698654638070040156000C6120DE2444046600
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2f57cee6a3f68f2ea44f517637ee78aa12ab0d29124def700172ccf505d64b50
    • Instruction ID: afc10eed2fcc35ed5b40f363e8dda28ede115092792116059f3f165d3dfad845
    • Opcode Fuzzy Hash: 2f57cee6a3f68f2ea44f517637ee78aa12ab0d29124def700172ccf505d64b50
    • Instruction Fuzzy Hash: F3621931604B859FCB29EF38C8906B9BBE1EF95304F0889ADD99B8B356D730E945C710
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 646a614e24d9edccf22d0e6f7202ac8f24f57ae9bfccc6911069f75be2a98548
    • Instruction ID: 020d49f67bd7eea593b32962dccc25d4a6e4326ab1160d184be75a440544ca25
    • Opcode Fuzzy Hash: 646a614e24d9edccf22d0e6f7202ac8f24f57ae9bfccc6911069f75be2a98548
    • Instruction Fuzzy Hash: AB62457060478A9FC719EF28C8805B9FBE1FF55308F0486AED9AA87752D730E955CB81
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bb00a5abd01d033ee68bdeca0c76caad9ad43990f1d126b925065b3382741e35
    • Instruction ID: 829a5277ead0904ff3c52da2aa71fde598f2f2d364c8afc90d152a95df6e8026
    • Opcode Fuzzy Hash: bb00a5abd01d033ee68bdeca0c76caad9ad43990f1d126b925065b3382741e35
    • Instruction Fuzzy Hash: FF5249B2A087019FC758CF18C891A6AF7E1FFC8304F49892DF59697255D734E919CB82
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 642a2eb9d46371431086cfb1af4ad4f45592854b3025634bafb0edc2474d9246
    • Instruction ID: d43860297cc0cb0a72391b368455930a36b5a2b620de19323d354ed98adb4901
    • Opcode Fuzzy Hash: 642a2eb9d46371431086cfb1af4ad4f45592854b3025634bafb0edc2474d9246
    • Instruction Fuzzy Hash: B312C3B1600B068FC738EF28C8D0AB9B7E1FB54308F14896DE997C7A91D774A895CB45
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6a937ffb8167a3bc83e52ba59db907e3c001931c4c0f47df396c2d1350b2b68c
    • Instruction ID: 440add7e5b856edf26140fc942387c6a418eb2599472debdd4b3c3a31a40287a
    • Opcode Fuzzy Hash: 6a937ffb8167a3bc83e52ba59db907e3c001931c4c0f47df396c2d1350b2b68c
    • Instruction Fuzzy Hash: E4F15671A083458FC718CF29C484A6ABBE2FFC9314F148AAEF5A997355D730E9058F52
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction ID: 92660ea888bfbc4761823987432bcc186a8af2b3bd53e08e029b95658713e578
    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction Fuzzy Hash: 91C17F322050934ADB6D6639C57403EBFE19AA27B131A1BEDD4F6CB1E9FE20C524D720
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction ID: 3bc4f8049bcb8cefdf900057428882e09db11f5f9b0f80148451c8c87d135c6a
    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction Fuzzy Hash: 31C151362051930ADF6D6639857403EBFE19AA27B131A17EED4F6CB1E9FE20C524D720
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
    • Instruction ID: 39b49d0261c5f3c83b3476aa0d564ae2ca80093c991ea2575aa8ba1837c9cd98
    • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
    • Instruction Fuzzy Hash: 21C16F322091930ADB6D663A857403EBFE19AA27B131A17EDD4F7CB1E5FE20C564D720
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction ID: 958b6fbba84f3adaab61f1815fb658f52b31c22a9cf114e5f6306aea3a34f982
    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction Fuzzy Hash: A7C180322050930ADF6D6639857403EBFE19AA27B131A1BEDD4F6CB1E5FE60D524D720
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2c5665097acd20256151c921c30662e59532a696cd5d58addabde8d45f97e848
    • Instruction ID: 52bb019b8d26ffe1a37dd8b0e894db970320f975f8abe63a9de045393fd60055
    • Opcode Fuzzy Hash: 2c5665097acd20256151c921c30662e59532a696cd5d58addabde8d45f97e848
    • Instruction Fuzzy Hash: A7E114755183848FC344CF29D89086FBBF0AF8A300F4549AEF9D997362C635EA15CB62
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: acc86ef6530741bf12f030ffdbc9df68382067f2af2f4e8018943a469f09223c
    • Instruction ID: 8c192b590b75d9a24ec85f0d5a82b27fadaac02c0730f32d622c9f92627177c1
    • Opcode Fuzzy Hash: acc86ef6530741bf12f030ffdbc9df68382067f2af2f4e8018943a469f09223c
    • Instruction Fuzzy Hash: 229157B12047458BDB28FF68C8D1BBE73C5EF90300F5049ADEA9B87292EA74E505C752
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e2de3448ec8d4ce43da569c41b599a0194a85f7e0faceec2f8a4eba3248b7119
    • Instruction ID: ca88de8b7dc083c29449dfeb3983b2befd8843bbda3ee6bfdc31872e479abe46
    • Opcode Fuzzy Hash: e2de3448ec8d4ce43da569c41b599a0194a85f7e0faceec2f8a4eba3248b7119
    • Instruction Fuzzy Hash: 50618B71E04709BADF349B288992BBE23D8EF11700F1444F9EA82DF391D659DD428369
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a61d5d9953e74e6cdb0c985f438739bb0da6a3f2832c33027433e3b352e928f4
    • Instruction ID: 5988cbec92ae812aef72373faaeea6c951430e76274b0b8a2bba9d1d09ec3696
    • Opcode Fuzzy Hash: a61d5d9953e74e6cdb0c985f438739bb0da6a3f2832c33027433e3b352e928f4
    • Instruction Fuzzy Hash: 54714D713043459BEB24FF28C8D0BBE37D1EBA1304F0049BDE9868B6A2DB749885C756
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: baf34ac37983a97901c7efc9e024c99bbb6a4e50ba79d836059643b8e21fbdd4
    • Instruction ID: 2071aa0abf7ecfbdb89e80b99e88989b9a1402e1c8a75a3f2fea34cea2e71ec7
    • Opcode Fuzzy Hash: baf34ac37983a97901c7efc9e024c99bbb6a4e50ba79d836059643b8e21fbdd4
    • Instruction Fuzzy Hash: AE819EA211A2D49EC7065F7D38E11FA3FE18737241F1C85EAD4D9C72A3C87686A8C721
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 142f9aa733a696a89d87cf7be154181c17fb7e513b482f132d628971e8a5f3b4
    • Instruction ID: e77b2b5c8af3db729f133806bb96db20004cd2629d1da0e9b4ae755dff3afe91
    • Opcode Fuzzy Hash: 142f9aa733a696a89d87cf7be154181c17fb7e513b482f132d628971e8a5f3b4
    • Instruction Fuzzy Hash: 7451BF3550C2914EC712DF29818056EBFF0EEDA364F4A88DEE5E95A212D130E689CB63
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ea7c87a74382d8d84588d431bdc4e18b8e5189a87ec0e316371a65e439a9cb0e
    • Instruction ID: a2ddda574389dc4ec26986882a8611c85a110ca6e535b860cc75e9997dfee5d0
    • Opcode Fuzzy Hash: ea7c87a74382d8d84588d431bdc4e18b8e5189a87ec0e316371a65e439a9cb0e
    • Instruction Fuzzy Hash: FC512471A083128FC748CF19D48059AF7E1FF88354F058A2EE899A7740DB34EA59CBD6
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8d076a1827b305f7e3beae0ec7141c057bfc4bf90f4aea6f352a5f2352c845c5
    • Instruction ID: 07e62b5bdc8576814e8a2add839478a1a830bdcee5339626f812042abff13ef0
    • Opcode Fuzzy Hash: 8d076a1827b305f7e3beae0ec7141c057bfc4bf90f4aea6f352a5f2352c845c5
    • Instruction Fuzzy Hash: B93103756047068FCB14EF29C85126EBBD0FB96700F40896DE89AD7741D634ED09CB92
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 341edde6f00a0213392303534f53c4f6984cc9f2af2941549d0a4151e0e65aed
    • Instruction ID: 4a9a976a581597cd0af574e494c75ab89d03e5edb83be92ccb4244e897ced358
    • Opcode Fuzzy Hash: 341edde6f00a0213392303534f53c4f6984cc9f2af2941549d0a4151e0e65aed
    • Instruction Fuzzy Hash: 99213731A201214FCB58CF6DDCE183AB791E78B300B46C12BED568B2C1CA35ED20CBA0
    APIs
    • __EH_prolog.LIBCMT ref: 00B8A24C
      • Part of subcall function 00B88FC0: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00B89088
    • SetFileAttributesW.KERNEL32(-00003C84,00000005,-00007C84,00000800,-0000FC8C,75C05540,?,00000000,00B892FD,?,00000003), ref: 00B8A381
    • _wcslen.LIBCMT ref: 00B8A3BC
    • _wcslen.LIBCMT ref: 00B8A3D0
    • _wcslen.LIBCMT ref: 00B8A3F5
    • GetFileAttributesW.KERNEL32(-00003C84), ref: 00B8A43B
    • DeleteFileW.KERNEL32(-00003C84), ref: 00B8A449
    • _wcslen.LIBCMT ref: 00B8A52B
    • _wcslen.LIBCMT ref: 00B8A534
    • SetWindowTextW.USER32(?,-00005C84), ref: 00B8A592
    • _wcslen.LIBCMT ref: 00B8A5D4
    • _wcsrchr.LIBVCRUNTIME ref: 00B8A712
    • GetDlgItem.USER32(?,00000066), ref: 00B8A752
    • SetWindowTextW.USER32(00000000,-0000103C), ref: 00B8A762
    • SendMessageW.USER32(00000000,00000143,00000000,00BC5808), ref: 00B8A776
    • SendMessageW.USER32(00000000,00000143,00000000,-0000103C), ref: 00B8A79F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen$File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
    • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
    • API String ID: 1808871598-312220925
    • Opcode ID: 670d70f2c0dc7776451658085f814bda185aa6fae447dd07ae0d8666f07349be
    • Instruction ID: eb46dfaedb8b7249ad67847a9eceef5875f47fcd04e370cbe2ca41f3134a021a
    • Opcode Fuzzy Hash: 670d70f2c0dc7776451658085f814bda185aa6fae447dd07ae0d8666f07349be
    • Instruction Fuzzy Hash: 02E14972900219AAEF25ABA4DD85DEE77FCEB04350F1044E7F509E30A1EE749B84DB61
    APIs
    • ___free_lconv_mon.LIBCMT ref: 00B98EA9
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98A61
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98A73
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98A85
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98A97
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98AA9
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98ABB
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98ACD
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98ADF
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98AF1
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98B03
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98B15
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98B27
      • Part of subcall function 00B98A44: _free.LIBCMT ref: 00B98B39
    • _free.LIBCMT ref: 00B98E9E
      • Part of subcall function 00B9539B: RtlFreeHeap.NTDLL(00000000,00000000,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?), ref: 00B953B1
      • Part of subcall function 00B9539B: GetLastError.KERNEL32(?,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?,?), ref: 00B953C3
    • _free.LIBCMT ref: 00B98EC0
    • _free.LIBCMT ref: 00B98ED5
    • _free.LIBCMT ref: 00B98EE0
    • _free.LIBCMT ref: 00B98F02
    • _free.LIBCMT ref: 00B98F15
    • _free.LIBCMT ref: 00B98F23
    • _free.LIBCMT ref: 00B98F2E
    • _free.LIBCMT ref: 00B98F66
    • _free.LIBCMT ref: 00B98F6D
    • _free.LIBCMT ref: 00B98F8A
    • _free.LIBCMT ref: 00B98FA2
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
    • String ID:
    • API String ID: 161543041-0
    • Opcode ID: b79a6d0971d3f878f23f51fcdf8bfc5a5d6dc302c1f80c3979b526f130358afa
    • Instruction ID: fd6d630be6e78e3d3242d93d0c7673832d52c90099156902fdc055ec4a753f80
    • Opcode Fuzzy Hash: b79a6d0971d3f878f23f51fcdf8bfc5a5d6dc302c1f80c3979b526f130358afa
    • Instruction Fuzzy Hash: 8C313B7160CB049FEF31AA39D865B5A77E9EB02350F1548B9F44AD7152DF71AC80C724
    APIs
    • _free.LIBCMT ref: 00B95BFC
      • Part of subcall function 00B9539B: RtlFreeHeap.NTDLL(00000000,00000000,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?), ref: 00B953B1
      • Part of subcall function 00B9539B: GetLastError.KERNEL32(?,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?,?), ref: 00B953C3
    • _free.LIBCMT ref: 00B95C08
    • _free.LIBCMT ref: 00B95C13
    • _free.LIBCMT ref: 00B95C1E
    • _free.LIBCMT ref: 00B95C29
    • _free.LIBCMT ref: 00B95C34
    • _free.LIBCMT ref: 00B95C3F
    • _free.LIBCMT ref: 00B95C4A
    • _free.LIBCMT ref: 00B95C55
    • _free.LIBCMT ref: 00B95C63
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: c1a03499f0b793348fbc44bbccbaa5053cc104179a97e63783b4e28d886c1258
    • Instruction ID: 9246c46bdac45652ce5d3a3a1b08dea1e213e81ba6b52d8f9be1718cbcd5812a
    • Opcode Fuzzy Hash: c1a03499f0b793348fbc44bbccbaa5053cc104179a97e63783b4e28d886c1258
    • Instruction Fuzzy Hash: 5911A7B614C908EFCF12EF54C9A6CDD3BA5EF08390B5145E1FA0A4B122DA71DE519B44
    APIs
    • GetTempPathW.KERNEL32(00000800,?), ref: 00B8A8CE
      • Part of subcall function 00B7AACD: _wcslen.LIBCMT ref: 00B7AAD3
    • _swprintf.LIBCMT ref: 00B8A900
      • Part of subcall function 00B73CD1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B73CE4
    • _swprintf.LIBCMT ref: 00B8A92D
    • GetFileAttributesW.KERNEL32(?), ref: 00B8A93C
    • SetDlgItemTextW.USER32(?,00000066,?), ref: 00B8A94F
    • _wcschr.LIBVCRUNTIME ref: 00B8A982
    • EndDialog.USER32(?,00000001), ref: 00B8AA58
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _swprintf$AttributesDialogFileItemPathTempText__vswprintf_c_l_wcschr_wcslen
    • String ID: %s%s%u
    • API String ID: 3334984662-1360425832
    • Opcode ID: 47a7ef7fe09a649380144660b630fa606e014cd1843f7e3551d6342c53d45239
    • Instruction ID: 530c9b2101aa9bf0e53750ab2356606f2d974f233f5fadb22fd306f0ce0bc1a6
    • Opcode Fuzzy Hash: 47a7ef7fe09a649380144660b630fa606e014cd1843f7e3551d6342c53d45239
    • Instruction Fuzzy Hash: 29513872900219AEEF25EB64CD85EEA77BCEB04310F1044E7E509E6061EF749B84DF61
    APIs
    • _wcslen.LIBCMT ref: 00B87A14
    • _wcslen.LIBCMT ref: 00B87AB5
    • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00B88214,?), ref: 00B87AC4
    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00B87AE5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen$AllocByteCharGlobalMultiWide
    • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
    • API String ID: 1116704506-4209811716
    • Opcode ID: 9651debd4fc57dda18690c9f462490f99bfcae2a705c51b8ebafb158ecd13d25
    • Instruction ID: 397714e8225a7f62cab15d7a06b7863cdaebc2926a290e215dc58171dc0e7d16
    • Opcode Fuzzy Hash: 9651debd4fc57dda18690c9f462490f99bfcae2a705c51b8ebafb158ecd13d25
    • Instruction Fuzzy Hash: BF31FF365482027EE729BB24DC46EAFB7DCDF42764F2045AAF410A61E1EF70DA05C7A1
    APIs
    • GetWindow.USER32(?,00000005), ref: 00B8B0D5
    • GetClassNameW.USER32(00000000,?,00000800), ref: 00B8B104
      • Part of subcall function 00B806E6: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B7A92C,?,?,?,00B7A8DB,?,-00000002,?,00000000,?), ref: 00B806FC
    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B8B122
    • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00B8B139
      • Part of subcall function 00B8856F: GetDC.USER32(00000000), ref: 00B8857B
      • Part of subcall function 00B8856F: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B8858A
      • Part of subcall function 00B8856F: ReleaseDC.USER32(00000000,00000000), ref: 00B88598
      • Part of subcall function 00B8852C: GetDC.USER32(00000000), ref: 00B88538
      • Part of subcall function 00B8852C: GetDeviceCaps.GDI32(00000000,00000058), ref: 00B88547
      • Part of subcall function 00B8852C: ReleaseDC.USER32(00000000,00000000), ref: 00B88555
    • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00B8B173
    • DeleteObject.GDI32(00000000), ref: 00B8B182
    • GetWindow.USER32(00000000,00000002), ref: 00B8B18B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Window$CapsDeviceMessageReleaseSend$ClassCompareDeleteLongNameObjectString
    • String ID: STATIC
    • API String ID: 2770908980-1882779555
    • Opcode ID: 9264eb6bf67fea54c0afe5610fc532e3b7d1b3dd4526653e400c1a937c2b228d
    • Instruction ID: 89c1214c00983488d1fc55a89050bef7375fae882acc590dacd4cc083a3bce3b
    • Opcode Fuzzy Hash: 9264eb6bf67fea54c0afe5610fc532e3b7d1b3dd4526653e400c1a937c2b228d
    • Instruction Fuzzy Hash: 1721BE326502147BEB227B64CC4AFAF3AE9EF16741F404191F900BB0A1CF245D42CBB2
    APIs
    • _wcslen.LIBCMT ref: 00B8B1C9
    • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 00B8B328
    • GetExitCodeProcess.KERNEL32(?,?), ref: 00B8B356
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B8B37A
    • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 00B8B3DE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ShowWindow$CloseCodeExitHandleProcess_wcslen
    • String ID: .exe$.inf
    • API String ID: 783751319-3750412487
    • Opcode ID: 990b4bddb2aea8fbea350b7c399998c98ab27fd18cbea6eb9a4561e2b79543ac
    • Instruction ID: 3e81b5e3a8c3f4196f1459611adc99929be55012af8daf568a2d6b84ed9a4389
    • Opcode Fuzzy Hash: 990b4bddb2aea8fbea350b7c399998c98ab27fd18cbea6eb9a4561e2b79543ac
    • Instruction Fuzzy Hash: 5B51E0715047809AD731BF74D941EAFBBE8EF86340F04499EE4C193171EBA19984C766
    APIs
    • __EH_prolog.LIBCMT ref: 00B78F38
    • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00B78F5B
    • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00B78F7A
      • Part of subcall function 00B7B4F8: _wcslen.LIBCMT ref: 00B7B500
      • Part of subcall function 00B806E6: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B7A92C,?,?,?,00B7A8DB,?,-00000002,?,00000000,?), ref: 00B806FC
    • _swprintf.LIBCMT ref: 00B79016
      • Part of subcall function 00B73CD1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B73CE4
    • MoveFileW.KERNEL32(?,?), ref: 00B7908B
    • MoveFileW.KERNEL32(?,?), ref: 00B790C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
    • String ID: rtmp%d
    • API String ID: 3726343395-3303766350
    • Opcode ID: 567788ed68fdf59f8b2a227b1979defd8bca5b04a23ce0b83bab7fac4a77bf43
    • Instruction ID: 10660a613624260bc3ee5a9f8a0be3a470b693836a26056d01db6ccb4b25f721
    • Opcode Fuzzy Hash: 567788ed68fdf59f8b2a227b1979defd8bca5b04a23ce0b83bab7fac4a77bf43
    • Instruction Fuzzy Hash: 75416C75921269AADF20FB64CC89EEA73BDEF45780F04C0E5F529A3141EA309B45CB60
    APIs
      • Part of subcall function 00B712A6: GetDlgItem.USER32(00000000,00003021), ref: 00B712EA
      • Part of subcall function 00B712A6: SetWindowTextW.USER32(00000000,00BA0294), ref: 00B71300
    • SendMessageW.USER32(?,00000080,00000001,?), ref: 00B892A3
    • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00B892B8
    • GetDlgItem.USER32(?,00000065), ref: 00B892C7
    • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00B892DB
    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00B892ED
    • EndDialog.USER32(?,00000001), ref: 00B89337
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: MessageSend$Item$DialogTextWindow
    • String ID: LICENSEDLG
    • API String ID: 3077722735-2177901306
    • Opcode ID: 81c05eb728111b1b88eac8449221b0dca74449ec018da2280d9cc3c30ef5b400
    • Instruction ID: e02d13226ae57bae719918db15f0f504b3fe14d1d4d43e153da5fffa3dc3e605
    • Opcode Fuzzy Hash: 81c05eb728111b1b88eac8449221b0dca74449ec018da2280d9cc3c30ef5b400
    • Instruction Fuzzy Hash: 1721D032244209BBEA217F69EC4AFBB3BDDEB4A744F050451F201A30B0CF62A941D776
    APIs
    • GetTickCount.KERNEL32 ref: 00B878B9
    • GetTickCount.KERNEL32 ref: 00B878D7
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B878ED
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B87901
    • TranslateMessage.USER32(?), ref: 00B8790C
    • DispatchMessageW.USER32(?), ref: 00B87917
    • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00B879C7
    • SetWindowTextW.USER32(?,00000000), ref: 00B879D1
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
    • String ID:
    • API String ID: 4150546248-0
    • Opcode ID: f8618814cba23768ad4905b66cf5f242b064da6b6f9f3401673f2d1627bf53ea
    • Instruction ID: 3826f5a9b1aa6835580a3a5da50468181b2715f4b9ef772a00bd19af7e409c43
    • Opcode Fuzzy Hash: f8618814cba23768ad4905b66cf5f242b064da6b6f9f3401673f2d1627bf53ea
    • Instruction Fuzzy Hash: A7413A71208306AFD714EF65D888E2BBBE9EF89708B10086DF546C7160DF31E849CB62
    APIs
    • __aulldiv.LIBCMT ref: 00B7FA48
      • Part of subcall function 00B7A5E3: GetVersionExW.KERNEL32(?), ref: 00B7A608
    • FileTimeToLocalFileTime.KERNEL32(?,00000000,00000000,?,00000064,00000000,00000000,?,?), ref: 00B7FA71
    • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000000,?,?), ref: 00B7FA83
    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00B7FA90
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7FAA6
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7FAB2
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7FAEF
    • __aullrem.LIBCMT ref: 00B7FB79
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
    • String ID:
    • API String ID: 1247370737-0
    • Opcode ID: c8715d9b843aa0a0a5603ce63aad228804aec9e65ae2281a60db1bdc671e04ca
    • Instruction ID: 363cc24e1074e341b04498fc86f8b56625c3444daaa43a9569c38d0c805fce13
    • Opcode Fuzzy Hash: c8715d9b843aa0a0a5603ce63aad228804aec9e65ae2281a60db1bdc671e04ca
    • Instruction Fuzzy Hash: BF412AB240830A9FC714DF65C880A6BF7F9FF88714F408A2EF59A92250E735E548DB65
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen
    • String ID: </p>$</style>$<br>$<style>$>
    • API String ID: 176396367-3568243669
    • Opcode ID: 9b5371e6732cf5ea2cb60a42516e0e3366e3d078a7d36020d619b0610879a673
    • Instruction ID: edd2b4570204bacd2e288e7c11920fdf5bd49ce25f1204d3c13655f220897c80
    • Opcode Fuzzy Hash: 9b5371e6732cf5ea2cb60a42516e0e3366e3d078a7d36020d619b0610879a673
    • Instruction Fuzzy Hash: 42415D1564839396CB30BF668851776B3E0EF61744F64049AFAC4571A0FFA5CC89C392
    APIs
    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,00B9C652,?,00000000,?,00000000,00000000), ref: 00B9BF1F
    • __fassign.LIBCMT ref: 00B9BF9A
    • __fassign.LIBCMT ref: 00B9BFB5
    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 00B9BFDB
    • WriteFile.KERNEL32(?,?,00000000,00B9C652,00000000,?,?,?,?,?,?,?,?,?,00B9C652,?), ref: 00B9BFFA
    • WriteFile.KERNEL32(?,?,00000001,00B9C652,00000000,?,?,?,?,?,?,?,?,?,00B9C652,?), ref: 00B9C033
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
    • String ID:
    • API String ID: 1324828854-0
    • Opcode ID: ea897da47cd8ba9bd02b66d56e5c6c401c5220672eec40508b8b45850ec4e269
    • Instruction ID: 771447d7e86e3e42e2d23d7ca0ee6727616ee99b86e7dcae6d1d2b18efafd597
    • Opcode Fuzzy Hash: ea897da47cd8ba9bd02b66d56e5c6c401c5220672eec40508b8b45850ec4e269
    • Instruction Fuzzy Hash: 8F516171900249AFDF14CFA8DC85BEEBBF5EF09310F2445AAE555E72A1D7309941CB60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _strlen$_swprintf_wcschr_wcsrchr
    • String ID: %08x
    • API String ID: 1593746830-3682738293
    • Opcode ID: a138fdae961f9926577b8b042f7652964df35f8f20b534289dce4a9a4522abef
    • Instruction ID: 745a0d1a23478e6561dc0b0e5098c1748bda4b3017466c8bea6c4bc089a10ad8
    • Opcode Fuzzy Hash: a138fdae961f9926577b8b042f7652964df35f8f20b534289dce4a9a4522abef
    • Instruction Fuzzy Hash: 6A412933908300AAD730AA248C89FBB7BECDB45350F1045AEF96CE7192E731ED44C661
    APIs
    • _wcslen.LIBCMT ref: 00B7B3A5
      • Part of subcall function 00B7ECFF: _wcslen.LIBCMT ref: 00B7ED05
      • Part of subcall function 00B7AD74: _wcsrchr.LIBVCRUNTIME ref: 00B7AD8B
    • _wcslen.LIBCMT ref: 00B7B424
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen$_wcsrchr
    • String ID: .rar$exe$rar$sfx
    • API String ID: 3513545583-630704357
    • Opcode ID: d06038b438f3b9f26d05036c04ba11909e2e7b7a22e0aa4e7cb894c9f9fa82b5
    • Instruction ID: cdd9bfa7cbbb5bf6f0e65a8aad7474d20a0022d07d4c50d6e0b8d761529e70f3
    • Opcode Fuzzy Hash: d06038b438f3b9f26d05036c04ba11909e2e7b7a22e0aa4e7cb894c9f9fa82b5
    • Instruction Fuzzy Hash: 0A31262240431199CA356F3098C2F3AA3F8DF517A4B20C8CEF8F9662C3E76099C1EB55
    APIs
    • ShowWindow.USER32(?,00000000), ref: 00B880BF
    • GetWindowRect.USER32(?,?), ref: 00B880E4
    • ShowWindow.USER32(?,00000005,?), ref: 00B8817B
    • SetWindowTextW.USER32(?,00000000), ref: 00B88183
    • ShowWindow.USER32(00000000,00000005), ref: 00B88199
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Window$Show$RectText
    • String ID: RarHtmlClassName
    • API String ID: 3937224194-1658105358
    • Opcode ID: e4e693afa5cf1df8a96852e5eb47e9e6ecfad3af1242a9d88697f317df18533a
    • Instruction ID: c1430dee3e17560b68837896e51adc8b475a19f04c9ef56e5106cfcfeb8896cc
    • Opcode Fuzzy Hash: e4e693afa5cf1df8a96852e5eb47e9e6ecfad3af1242a9d88697f317df18533a
    • Instruction Fuzzy Hash: CE31A031104204AFD721AFA4DD8DB1B7FE8EF49711F404599F949AA162CF30D805CBB2
    APIs
      • Part of subcall function 00B98BAB: _free.LIBCMT ref: 00B98BD4
    • _free.LIBCMT ref: 00B98C35
      • Part of subcall function 00B9539B: RtlFreeHeap.NTDLL(00000000,00000000,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?), ref: 00B953B1
      • Part of subcall function 00B9539B: GetLastError.KERNEL32(?,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?,?), ref: 00B953C3
    • _free.LIBCMT ref: 00B98C40
    • _free.LIBCMT ref: 00B98C4B
    • _free.LIBCMT ref: 00B98C9F
    • _free.LIBCMT ref: 00B98CAA
    • _free.LIBCMT ref: 00B98CB5
    • _free.LIBCMT ref: 00B98CC0
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 0a69699327f5e84a00df05e308deb8057040ce51548e750906fe9a755bda1513
    • Instruction ID: d2029c1dba6df817d820f2a2e4fbbb8f95ca0bd824022cb1e5e958e04a9a58d4
    • Opcode Fuzzy Hash: 0a69699327f5e84a00df05e308deb8057040ce51548e750906fe9a755bda1513
    • Instruction Fuzzy Hash: E6113DB1588B04EADE31B7B0CC67FCB7BDC9F05700F850CB5B2AA66092DA6AB5054750
    APIs
    • GetLastError.KERNEL32(?,?,00B9034B,00B8DDA2), ref: 00B90362
    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B90370
    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B90389
    • SetLastError.KERNEL32(00000000,?,00B9034B,00B8DDA2), ref: 00B903DB
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ErrorLastValue___vcrt_
    • String ID:
    • API String ID: 3852720340-0
    • Opcode ID: 660610edb4baf53ef0c46d28445cc343c80239622db13aa8cdd3a1a464e0d47d
    • Instruction ID: dd7c4970951eb92e8848cc94550feec5c5fff06337d9a248eeab1ec109e039f5
    • Opcode Fuzzy Hash: 660610edb4baf53ef0c46d28445cc343c80239622db13aa8cdd3a1a464e0d47d
    • Instruction Fuzzy Hash: 9101243213D712AFAE643778BC8752637D4EB97770F2103B9F812621E1EF514C01A228
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
    • API String ID: 0-1718035505
    • Opcode ID: f75c9c360bc09cb184903d82f72309943de77046f0fe3f71755c0e2f554c4f70
    • Instruction ID: 8a681f97cba8c0ea8f34b5e2679bc59340cbaf9b04d74807684dae08e18b80a1
    • Opcode Fuzzy Hash: f75c9c360bc09cb184903d82f72309943de77046f0fe3f71755c0e2f554c4f70
    • Instruction Fuzzy Hash: 4501FFB22452229B4FB07E781CD1EA3A7C8DA063D171415FAE610C3230DF20C885EFA0
    APIs
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7FCCA
      • Part of subcall function 00B7A5E3: GetVersionExW.KERNEL32(?), ref: 00B7A608
    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00B7FCEC
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7FD06
    • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00B7FD17
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7FD27
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7FD33
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Time$File$System$Local$SpecificVersion
    • String ID:
    • API String ID: 2092733347-0
    • Opcode ID: b7c27a57506175d8a6a6cd0c2f354172e3d6b34daddc9bc8d34567fbf770e170
    • Instruction ID: f0cd62a374ac459ced67f2ad9f49e5812300504edc2f804f2ef6c2fd9cdcd5cd
    • Opcode Fuzzy Hash: b7c27a57506175d8a6a6cd0c2f354172e3d6b34daddc9bc8d34567fbf770e170
    • Instruction Fuzzy Hash: 393107751083469BC704DFA4C8809ABB7E9FFD8704F04892EF9A9C3210EA30D509CB6A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _memcmp
    • String ID:
    • API String ID: 2931989736-0
    • Opcode ID: c7b290362e24a009b2886432c7f95daaf7a013f89c842fcb22d7d1d09b168ff1
    • Instruction ID: a882815c51a784cbe02e6272509c67ece06cb9a3e6611d8353b51ac3a74f3683
    • Opcode Fuzzy Hash: c7b290362e24a009b2886432c7f95daaf7a013f89c842fcb22d7d1d09b168ff1
    • Instruction Fuzzy Hash: 0E2190F164810AABD754BA14CC82E7B77ECAE5178CF2089B5FC049A222EA70DD45D7A0
    APIs
    • __EH_prolog.LIBCMT ref: 00B7F71C
    • EnterCriticalSection.KERNEL32(00BB1E64,00000000,?,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?,?,00B83653,?,00008000), ref: 00B7F72A
    • new.LIBCMT ref: 00B7F74A
    • new.LIBCMT ref: 00B7F780
    • LeaveCriticalSection.KERNEL32(00BB1E64,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?,?,00B83653,?,00008000,?), ref: 00B7F7A0
    • LeaveCriticalSection.KERNEL32(00BB1E64,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?,?,00B83653,?,00008000,?), ref: 00B7F7AB
      • Part of subcall function 00B7F545: InitializeCriticalSection.KERNEL32(000001A0,00BB1E64,00000000,?,?,00B7F79D,00000020,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?), ref: 00B7F57E
      • Part of subcall function 00B7F545: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?,?,00B83653,?), ref: 00B7F588
      • Part of subcall function 00B7F545: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?,?,00B83653,?), ref: 00B7F598
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CriticalSection$CreateLeave$EnterEventH_prologInitializeSemaphore
    • String ID:
    • API String ID: 3919453512-0
    • Opcode ID: a44d377598b46bbf43cc90b58d755711ca5e3bfb70faceccfd32283e18ec3abb
    • Instruction ID: 5d564ad23a9c41f7efc5cda2886e2540fa8ae3df109bc29f310f23c5f9755d8a
    • Opcode Fuzzy Hash: a44d377598b46bbf43cc90b58d755711ca5e3bfb70faceccfd32283e18ec3abb
    • Instruction Fuzzy Hash: 15119135A00212DBDB18AF68EC56AB976F4EB49750F0086AAF829D7290DFB08D008764
    APIs
    • GetLastError.KERNEL32(?,00BACBD8,00B91E04,00BACBD8,?,?,00B919A3,?,?,00BACBD8), ref: 00B95CE0
    • _free.LIBCMT ref: 00B95D13
    • _free.LIBCMT ref: 00B95D3B
    • SetLastError.KERNEL32(00000000,?,00BACBD8), ref: 00B95D48
    • SetLastError.KERNEL32(00000000,?,00BACBD8), ref: 00B95D54
    • _abort.LIBCMT ref: 00B95D5A
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ErrorLast$_free$_abort
    • String ID:
    • API String ID: 3160817290-0
    • Opcode ID: c553b3c4aaf3b363d91bcfb8c5454e00bb9f97d6015fbec932f2759c1fabb6d5
    • Instruction ID: 0c6d686a4d000e7928d858b67b13e5aaba05ccd4ce177115ee84b004ef638671
    • Opcode Fuzzy Hash: c553b3c4aaf3b363d91bcfb8c5454e00bb9f97d6015fbec932f2759c1fabb6d5
    • Instruction Fuzzy Hash: 4EF0A4351D8E0576CE333B34AD1AF1A22E6DFC3761F3501B8F91597291EE2088425325
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen
    • String ID: UNC$\\?\
    • API String ID: 176396367-253988292
    • Opcode ID: adab79377b6a44802d74785b4a6b1f4ad2b7f960e3d46e1268a26d3845e45bf6
    • Instruction ID: e39f864566df2c3b2ab2dbc9b85d84bbcfa287e8388ae52304ff8c9ea398668f
    • Opcode Fuzzy Hash: adab79377b6a44802d74785b4a6b1f4ad2b7f960e3d46e1268a26d3845e45bf6
    • Instruction Fuzzy Hash: 594145769002556ACF20BBA0CC42FAF73ECEF55750F0488E6F93997182E774DA819A61
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen
    • String ID: &nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
    • API String ID: 176396367-864536935
    • Opcode ID: da929b2fa508b16e140653912159735fa06178292c16cd05e31563d2222555bb
    • Instruction ID: c447b5a8aa2fd797c28e7ded30cc02ab6747a864f4c5f83d4ce201a4864f4205
    • Opcode Fuzzy Hash: da929b2fa508b16e140653912159735fa06178292c16cd05e31563d2222555bb
    • Instruction Fuzzy Hash: C8313B3268C301A9D624BB68EC42B7A73E4EB90728F30486FF451571E0FE60ED90D7A4
    APIs
    • _swprintf.LIBCMT ref: 00B7ADFF
      • Part of subcall function 00B73CD1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B73CE4
    • _wcschr.LIBVCRUNTIME ref: 00B7AE1D
    • _wcschr.LIBVCRUNTIME ref: 00B7AE2D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcschr$__vswprintf_c_l_swprintf
    • String ID: %c:\
    • API String ID: 525462905-3142399695
    • Opcode ID: d6eb847ebfbc5166ae9e4d8907afd2a4a0ca7434f82cec0c0c7f04888c534000
    • Instruction ID: a9cae280743cbd84bb54fba61930e9bbde603dde659656653bd04552820c18e2
    • Opcode Fuzzy Hash: d6eb847ebfbc5166ae9e4d8907afd2a4a0ca7434f82cec0c0c7f04888c534000
    • Instruction Fuzzy Hash: 5501F563504312B99F206B799C81D3FA7ECDED57A0770C8A6F868C6092FB20D850C2A2
    APIs
      • Part of subcall function 00B712A6: GetDlgItem.USER32(00000000,00003021), ref: 00B712EA
      • Part of subcall function 00B712A6: SetWindowTextW.USER32(00000000,00BA0294), ref: 00B71300
    • EndDialog.USER32(?,00000001), ref: 00B8B06D
    • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 00B8B083
    • SetDlgItemTextW.USER32(?,00000065,?), ref: 00B8B09D
    • SetDlgItemTextW.USER32(?,00000066), ref: 00B8B0A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ItemText$DialogWindow
    • String ID: RENAMEDLG
    • API String ID: 445417207-3299779563
    • Opcode ID: c84726dba10ab011d5aa84dfa9c35a7ed857dd844e41cd37d4bff0da63fd45bf
    • Instruction ID: b4bfcf34ac28656805bcdbc0aa71e097a3fed2f751a0493b5c74d050877bb53b
    • Opcode Fuzzy Hash: c84726dba10ab011d5aa84dfa9c35a7ed857dd844e41cd37d4bff0da63fd45bf
    • Instruction Fuzzy Hash: 2F01B132A44214BAD621AE78ED49F777BECE74AB41F10085AF251A70F0CB92A800D772
    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00B9447A,?,?,00B9441A,?,00BA7ED8,0000000C,00B94571,?,00000002), ref: 00B944E9
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B944FC
    • FreeLibrary.KERNEL32(00000000,?,?,?,00B9447A,?,?,00B9441A,?,00BA7ED8,0000000C,00B94571,?,00000002,00000000), ref: 00B9451F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: ce888f6d143615c35d494f42e92adce2641e417b472e8b73df08fc84145f1126
    • Instruction ID: a016807cb993a836e812c553e2ecffc5c18bad38fa9e37b8e7f06ade09bb09b0
    • Opcode Fuzzy Hash: ce888f6d143615c35d494f42e92adce2641e417b472e8b73df08fc84145f1126
    • Instruction Fuzzy Hash: D9F0447091420CBBCF15AFA4DC0AB9E7FF4EB46711F0140A5B805A3160DF709A45CB90
    APIs
      • Part of subcall function 00B7EF1E: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B7EF39
      • Part of subcall function 00B7EF1E: LoadLibraryW.KERNELBASE(?,?,00B7DB0E,Crypt32.dll,?,00B7DB90,?,00B7DB74,?,?,?,?), ref: 00B7EF5B
    • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B7DB1A
    • GetProcAddress.KERNEL32(00BB1E48,CryptUnprotectMemory), ref: 00B7DB2A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AddressProc$DirectoryLibraryLoadSystem
    • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
    • API String ID: 2141747552-1753850145
    • Opcode ID: a58a9d349ebdd8c538ea1bdc09e4d62215704c42545f8988acf86077d447e4a3
    • Instruction ID: 24e6365ddf717f7069a92180ba2ba8f691ad23140b60b8130df11ebff12508ff
    • Opcode Fuzzy Hash: a58a9d349ebdd8c538ea1bdc09e4d62215704c42545f8988acf86077d447e4a3
    • Instruction Fuzzy Hash: 48E046B0968747AEDB50AB38A809B01FBE4BF66750F04C195F068D3660DBB4D0A88F50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free
    • String ID:
    • API String ID: 269201875-0
    • Opcode ID: 21eaa1ac68428d9be62f2f2db772a3ffd354b98c0d6ec38a205bc1c1b6b98de0
    • Instruction ID: a60e94c107727e103df8338b6225ca0c90a7475c6f90e0b9e99580fd68ac9996
    • Opcode Fuzzy Hash: 21eaa1ac68428d9be62f2f2db772a3ffd354b98c0d6ec38a205bc1c1b6b98de0
    • Instruction Fuzzy Hash: 51419036A00600ABCF24DF78C881A5DB7F5EF8A710B1645F9E515EB391DB31AD02CB80
    APIs
    • GetLastError.KERNEL32(?,?,?,00B9581C,00B954B8,?,00B95D0A,00000001,00000364,?,00B919A3,?,?,00BACBD8), ref: 00B95D65
    • _free.LIBCMT ref: 00B95D9A
    • _free.LIBCMT ref: 00B95DC1
    • SetLastError.KERNEL32(00000000,?,00BACBD8), ref: 00B95DCE
    • SetLastError.KERNEL32(00000000,?,00BACBD8), ref: 00B95DD7
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ErrorLast$_free
    • String ID:
    • API String ID: 3170660625-0
    • Opcode ID: b92dcdc88ef108a3872370a013c7d0e72c738bbc892711573435f40ea29e0d25
    • Instruction ID: 9d0b4b6fdd7c3254e9294aa25b861904c11eef42a8135d1133e8740220d820be
    • Opcode Fuzzy Hash: b92dcdc88ef108a3872370a013c7d0e72c738bbc892711573435f40ea29e0d25
    • Instruction Fuzzy Hash: 1E01A2721C8E01768A332B356C9AE1A22D9DFC3761B2100B8F40693251FE608C019361
    APIs
    • _free.LIBCMT ref: 00B98B5A
      • Part of subcall function 00B9539B: RtlFreeHeap.NTDLL(00000000,00000000,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?), ref: 00B953B1
      • Part of subcall function 00B9539B: GetLastError.KERNEL32(?,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?,?), ref: 00B953C3
    • _free.LIBCMT ref: 00B98B6C
    • _free.LIBCMT ref: 00B98B7E
    • _free.LIBCMT ref: 00B98B90
    • _free.LIBCMT ref: 00B98BA2
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 542b8f8824ada9be2c4f819ac1d2cbdc5f5925eeed6b0c76363162263f57322b
    • Instruction ID: a4a745adde0824d2bf417972279bcc071293dbb1ece33f083b179a2a25b4c08b
    • Opcode Fuzzy Hash: 542b8f8824ada9be2c4f819ac1d2cbdc5f5925eeed6b0c76363162263f57322b
    • Instruction Fuzzy Hash: 2EF012B254C700AB8E71EF58E892C1A73E9EA02B5179A08A5F009D7511CF79FC818778
    APIs
    • _wcslen.LIBCMT ref: 00B80710
    • _wcslen.LIBCMT ref: 00B80721
    • _wcslen.LIBCMT ref: 00B80731
    • _wcslen.LIBCMT ref: 00B8073F
    • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,?,00000000,?,00B7A7BA,__rar_,00000000,00000006,?,?,00000000), ref: 00B8075A
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen$CompareString
    • String ID:
    • API String ID: 3397213944-0
    • Opcode ID: a0314052a1bcf7efff4bee67a1c30a52c54f5ff391dacf2a8d422d9a1a7a21d8
    • Instruction ID: 66cda258d922881a2d2d7945c54eaaa4c15b57f2a4ba02d0712e6271ecaf9eb6
    • Opcode Fuzzy Hash: a0314052a1bcf7efff4bee67a1c30a52c54f5ff391dacf2a8d422d9a1a7a21d8
    • Instruction Fuzzy Hash: FCF09036004019BFCF523F54EC49CCE3F66EF817B0B108465F6196E0A1CE31A955EB80
    APIs
    • _free.LIBCMT ref: 00B94F69
      • Part of subcall function 00B9539B: RtlFreeHeap.NTDLL(00000000,00000000,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?), ref: 00B953B1
      • Part of subcall function 00B9539B: GetLastError.KERNEL32(?,?,00B98BD9,?,00000000,?,00000000,?,00B98C00,?,00000007,?,?,00B98FFD,?,?), ref: 00B953C3
    • _free.LIBCMT ref: 00B94F7B
    • _free.LIBCMT ref: 00B94F8E
    • _free.LIBCMT ref: 00B94F9F
    • _free.LIBCMT ref: 00B94FB0
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 4179dc5f38d011d4bbd467e0eb448a6c4bf7317d281bc17631cab665f3595edc
    • Instruction ID: 1f04598d795a8954c601c02bdf9432150c0d284d8673b500202a2f719465d47f
    • Opcode Fuzzy Hash: 4179dc5f38d011d4bbd467e0eb448a6c4bf7317d281bc17631cab665f3595edc
    • Instruction Fuzzy Hash: 0DF05EB084C621EBCB676F24FC66C193BE0F71975030201AAF01A9B2B2CF740802DBD9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _swprintf
    • String ID: ;%u
    • API String ID: 589789837-535004727
    • Opcode ID: 9fd89312ba8d386f043f6ace8c2e0d5ddb793eb87aa63eb419b5408eb142e80f
    • Instruction ID: 2b4160b800e82518958ca39a561f17489eba9072ed21bc5ad37851bd36083ad0
    • Opcode Fuzzy Hash: 9fd89312ba8d386f043f6ace8c2e0d5ddb793eb87aa63eb419b5408eb142e80f
    • Instruction Fuzzy Hash: E4F1D7716043405ADB15EB288895FFA77E5AF90300F08C5F9FDAE9F283DB649948CB61
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\kbdgc.exe,00000104), ref: 00B94604
    • _free.LIBCMT ref: 00B946CF
    • _free.LIBCMT ref: 00B946D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _free$FileModuleName
    • String ID: C:\Users\user\Desktop\kbdgc.exe
    • API String ID: 2506810119-469509009
    • Opcode ID: 9e9463f5478f08326c01a00df5cf0eb9ed7d0e22c41751321ce930d91200eab7
    • Instruction ID: fe054725ea8087cdc4c6ed1038025ed52a2c1429c880494a58576d971a3b4007
    • Opcode Fuzzy Hash: 9e9463f5478f08326c01a00df5cf0eb9ed7d0e22c41751321ce930d91200eab7
    • Instruction Fuzzy Hash: 6F313EB1A44258BFDF21DF99D985D9EBBECEB8A710F1140FAF80497211DB704A42CB90
    APIs
    • CharUpperW.USER32(?,?,?,?,00001000), ref: 00B8A130
    • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00B8A157
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CharUpper
    • String ID: -
    • API String ID: 9403516-2547889144
    • Opcode ID: 7b487d2a970a69b06dd502d635a3865506971f02755c64ef73c786f96858ed11
    • Instruction ID: cd4225f9081a335f5066f0759c408ea16adb8abf1b311da8d51fcbe1051491ee
    • Opcode Fuzzy Hash: 7b487d2a970a69b06dd502d635a3865506971f02755c64ef73c786f96858ed11
    • Instruction Fuzzy Hash: 5021D37144430666F321BA68884DB7B6AD9DB86341F04489BF994B21B1EAB4C948E363
    APIs
      • Part of subcall function 00B712A6: GetDlgItem.USER32(00000000,00003021), ref: 00B712EA
      • Part of subcall function 00B712A6: SetWindowTextW.USER32(00000000,00BA0294), ref: 00B71300
    • EndDialog.USER32(?,00000001), ref: 00B88AA6
    • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 00B88ABB
    • SetDlgItemTextW.USER32(?,00000065,?), ref: 00B88AD0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ItemText$DialogWindow
    • String ID: ASKNEXTVOL
    • API String ID: 445417207-3402441367
    • Opcode ID: e578a5f8394f411aca592e4488a7e5f54c5267184b07a7cb5ed0b7d376fe89df
    • Instruction ID: fc2140d15d2a8cb0e69eee2bb6fa062d40e3350a60a843dbdb18d9679cefbba4
    • Opcode Fuzzy Hash: e578a5f8394f411aca592e4488a7e5f54c5267184b07a7cb5ed0b7d376fe89df
    • Instruction Fuzzy Hash: A5119832240110BFD616AF68DD4AFA67BE9FB4A701F8444A2F201EB5F1CF71A901D765
    APIs
      • Part of subcall function 00B712A6: GetDlgItem.USER32(00000000,00003021), ref: 00B712EA
      • Part of subcall function 00B712A6: SetWindowTextW.USER32(00000000,00BA0294), ref: 00B71300
    • EndDialog.USER32(?,00000001), ref: 00B88F68
    • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 00B88F80
    • SetDlgItemTextW.USER32(?,00000066,?), ref: 00B88FAE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ItemText$DialogWindow
    • String ID: GETPASSWORD1
    • API String ID: 445417207-3292211884
    • Opcode ID: 0cded6cfd01696b07c5b60306ff9c94453fcda84a97f5a30c86acd17ca350c87
    • Instruction ID: d627e1d56d8e8dd6f4fa2ddb64cccee1ae0f8eeffa9034cddd3b25d2b5531b9d
    • Opcode Fuzzy Hash: 0cded6cfd01696b07c5b60306ff9c94453fcda84a97f5a30c86acd17ca350c87
    • Instruction Fuzzy Hash: 8911C2329441187BDB21AA68DE49FBA77FDEB1A750F4008A1FA45E20A0CAA19940D771
    APIs
    • InitializeCriticalSection.KERNEL32(000001A0,00BB1E64,00000000,?,?,00B7F79D,00000020,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?), ref: 00B7F57E
    • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?,?,00B83653,?), ref: 00B7F588
    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00B7A4C5,?,00B7C3A0,?,00000000,?,00000001,?,?,00B83653,?), ref: 00B7F598
    Strings
    • Thread pool initialization failed., xrefs: 00B7F5B0
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Create$CriticalEventInitializeSectionSemaphore
    • String ID: Thread pool initialization failed.
    • API String ID: 3340455307-2182114853
    • Opcode ID: a8ccc3fd7832ea084238d6e8d575a70debf990ad050a47fd1f2b98354aeaf72f
    • Instruction ID: 798567236b7c17fbc3c4860a33eed99470195f5c141fcc33699bf6732006df51
    • Opcode Fuzzy Hash: a8ccc3fd7832ea084238d6e8d575a70debf990ad050a47fd1f2b98354aeaf72f
    • Instruction Fuzzy Hash: D11130B1540705AFD3305F65D88AAA7FBECFB66755F10886EE2EE83240DB715840CB20
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID: RENAMEDLG$REPLACEFILEDLG
    • API String ID: 0-56093855
    • Opcode ID: 86ddb2a4e07a836205e3aa4a5036018a9a9d1ccc670f18c5712a5be7f1eee127
    • Instruction ID: 067e39f165bd1164b6f38b0761cef060804a666496f77056c747b3f0bad0d6b0
    • Opcode Fuzzy Hash: 86ddb2a4e07a836205e3aa4a5036018a9a9d1ccc670f18c5712a5be7f1eee127
    • Instruction Fuzzy Hash: F601F276604305AFC711FB38EC80E2ABBD8E78A350F0149A6F501D3230DBB28C41DB61
    APIs
    • GetModuleHandleW.KERNEL32(00000000), ref: 00B7CA95
    • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00B7CAA4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: FindHandleModuleResource
    • String ID: LTR$RTL
    • API String ID: 3537982541-719208805
    • Opcode ID: eb396657092a98ac9c112033b49dd7b68da4bda26c4bf1966fb30e0dd35347de
    • Instruction ID: a1b2ffacb4913d013eb99f15af9eaaefad34009389de62f21f7370778a051762
    • Opcode Fuzzy Hash: eb396657092a98ac9c112033b49dd7b68da4bda26c4bf1966fb30e0dd35347de
    • Instruction Fuzzy Hash: DDF0F631A1835866D634A6745C0AF673BECE742B00F0046ADB509971C0DF91A40887E0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: __alldvrm$_strrchr
    • String ID:
    • API String ID: 1036877536-0
    • Opcode ID: e87606991b07f75024143e5cd0ca27557d54b0088f95e94a6bd6839ed64b41d6
    • Instruction ID: c840ef25f13b8548e715b4aabae577e83a11717d276a8e9694d994ac37adfd8d
    • Opcode Fuzzy Hash: e87606991b07f75024143e5cd0ca27557d54b0088f95e94a6bd6839ed64b41d6
    • Instruction Fuzzy Hash: 4AA135729007969FEF26CF28C8D17AEBBE5EF11350F2441FEE585AB282C2388941C750
    APIs
    • MultiByteToWideChar.KERNEL32(?,00000000,3EE85006,00B91F24,00000000,00000000,00B92752,?,00B92752,?,00000001,00B91F24,3EE85006,00000001,00B92752,00B92752), ref: 00B98D18
    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B98DA1
    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00B98DB3
    • __freea.LIBCMT ref: 00B98DBC
      • Part of subcall function 00B953D5: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B91B3A,?,0000015D,?,?,?,?,00B926B9,000000FF,00000000,?,?), ref: 00B95407
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
    • String ID:
    • API String ID: 2652629310-0
    • Opcode ID: 87bc8d5879f1d4751bd28f72f2e691a7d4482d840773e4c1f06d2267ee605e29
    • Instruction ID: 88bfceb02287c1945ff3d398298554fc6b05cf81f149eba1f2bec96345352d0d
    • Opcode Fuzzy Hash: 87bc8d5879f1d4751bd28f72f2e691a7d4482d840773e4c1f06d2267ee605e29
    • Instruction Fuzzy Hash: AA319872A0020AABDF259F64DC85EAE7BE5EF12310F0405BDFC14972A0EB359D50CBA0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen
    • String ID:
    • API String ID: 176396367-0
    • Opcode ID: bde42e06df32f66d33436717cdcf6fa8f5b79226ece1e4d16ea95ee51bbce5bb
    • Instruction ID: 6b360dc8cb7d678c4119377c3f6d3805d26e8ba317a5d159b528de3d1f90deb8
    • Opcode Fuzzy Hash: bde42e06df32f66d33436717cdcf6fa8f5b79226ece1e4d16ea95ee51bbce5bb
    • Instruction Fuzzy Hash: DD31C4719083519BC721AB6DC84699FBBE8EF85350F408C6DF988B3251DB30A904DBF6
    APIs
    • ___BuildCatchObject.LIBVCRUNTIME ref: 00B90771
      • Part of subcall function 00B90DA9: ___AdjustPointer.LIBCMT ref: 00B90DF3
    • _UnwindNestedFrames.LIBCMT ref: 00B90788
    • ___FrameUnwindToState.LIBVCRUNTIME ref: 00B9079A
    • CallCatchBlock.LIBVCRUNTIME ref: 00B907BE
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
    • String ID:
    • API String ID: 2633735394-0
    • Opcode ID: 4dc650116e7e5aae9092ca9527fd40b0513069fbce0eaaf75eb99d6c00b7aab7
    • Instruction ID: 424572755f55b4e21d65faa017a2917f643b2aed09a55f9cdc7c8dc03f02441a
    • Opcode Fuzzy Hash: 4dc650116e7e5aae9092ca9527fd40b0513069fbce0eaaf75eb99d6c00b7aab7
    • Instruction Fuzzy Hash: 71010532010109BFCF126F95CC81E9A3BBAEF58760F054165F91866121D336E861EFA0
    APIs
    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00B902A6
    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00B902AB
    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00B902B0
      • Part of subcall function 00B9135E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00B9136F
    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00B902C5
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
    • String ID:
    • API String ID: 1761009282-0
    • Opcode ID: 1077441b6670170e91f7c0696cdfb54392132abf0a68dcdefd542e0a52f98195
    • Instruction ID: 04fb14c3bd96d5b8222ec3662f2f7e8bd421fcec13096fa79da65cd7619625a4
    • Opcode Fuzzy Hash: 1077441b6670170e91f7c0696cdfb54392132abf0a68dcdefd542e0a52f98195
    • Instruction Fuzzy Hash: 82C04C0552D703AD1C113FB8224A1FD63D04CB3BC57A819F5E840179039916040A743B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen
    • String ID: __rar_
    • API String ID: 176396367-2561138058
    • Opcode ID: 6b64a92fb94213f445475335a74a252b8c59d2c0982cb6bf33cc0c989a2643a8
    • Instruction ID: 78a751c7b51fae2b905759fc2981e3f8f02754598034fbcfccf36c38a94a6866
    • Opcode Fuzzy Hash: 6b64a92fb94213f445475335a74a252b8c59d2c0982cb6bf33cc0c989a2643a8
    • Instruction Fuzzy Hash: C541F7724043456AD6B4BA648CC5DAF73ECDBD5740F0488AAF9BDE3052EA24DC44D673
    APIs
    • __EH_prolog.LIBCMT ref: 00B7731E
      • Part of subcall function 00B7ECFF: _wcslen.LIBCMT ref: 00B7ED05
    • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B7748C
      • Part of subcall function 00B79DC9: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B79BFF,?,?,?,00B79A98,?,00000001,00000000,?,?), ref: 00B79DDD
      • Part of subcall function 00B79DC9: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B79BFF,?,?,?,00B79A98,?,00000001,00000000,?,?), ref: 00B79E0E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: File$Attributes$H_prologTime_wcslen
    • String ID: :
    • API String ID: 3922717191-336475711
    • Opcode ID: 170c473b25cda0fc1f42c2de75baeb8762be6d1267ad0a4d39ebdfd1987d6901
    • Instruction ID: 0784f135e79685570e7f68e29b0744f637f80914f9cf94de498f37c0bcc549e5
    • Opcode Fuzzy Hash: 170c473b25cda0fc1f42c2de75baeb8762be6d1267ad0a4d39ebdfd1987d6901
    • Instruction Fuzzy Hash: E741B171844218AADB24EB60CC56EEE77FCEF05300F0080D5B62DA6182DB706F89DF61
    APIs
    • __EH_prolog.LIBCMT ref: 00B771C1
      • Part of subcall function 00B73867: __EH_prolog.LIBCMT ref: 00B7386C
      • Part of subcall function 00B77790: GetCurrentProcess.KERNEL32(00000020,?), ref: 00B7779F
      • Part of subcall function 00B77790: GetLastError.KERNEL32 ref: 00B777E5
      • Part of subcall function 00B77790: CloseHandle.KERNEL32(?), ref: 00B777F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: H_prolog$CloseCurrentErrorHandleLastProcess
    • String ID: SeRestorePrivilege$SeSecurityPrivilege
    • API String ID: 2432491591-639343689
    • Opcode ID: 3120e88772b3faf0af8409152d86b6e6fe8bfcf2347fca6ea6e5e13e4b420ed4
    • Instruction ID: 20b24cbc25532ccca4e23bd455ca48c016a4d0b4474cde9056907582d17fd0bc
    • Opcode Fuzzy Hash: 3120e88772b3faf0af8409152d86b6e6fe8bfcf2347fca6ea6e5e13e4b420ed4
    • Instruction Fuzzy Hash: 66217171944248AADF10EF649C03BEE7FF8EB46714F0480A6F56CA7152DB758944CBB1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: _wcslen
    • String ID: }
    • API String ID: 176396367-4239843852
    • Opcode ID: d9fc4d06fe9230a73ff71204ca7723f1735cfe3c08e37793f90d9b219fabbd0e
    • Instruction ID: 6efb5ec21f9376bf2c796fa23125dd868baeda25085182f890935738210c006c
    • Opcode Fuzzy Hash: d9fc4d06fe9230a73ff71204ca7723f1735cfe3c08e37793f90d9b219fabbd0e
    • Instruction Fuzzy Hash: 0D21A4226083176ADB21BB64D84DA7BB3DCDF41764F1408A9F940E3191EA61DD48C3A2
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID:
    • String ID: Shell.Explorer$about:blank
    • API String ID: 0-874089819
    • Opcode ID: f2d6143846f6ea6c95d51f7fe844827a42eef5964c895498fdfc09bba292a5f3
    • Instruction ID: 6dc539f7d8b1ec9ba637cfab14857317b88a2d96aa3cdc43299595cd02f2658c
    • Opcode Fuzzy Hash: f2d6143846f6ea6c95d51f7fe844827a42eef5964c895498fdfc09bba292a5f3
    • Instruction Fuzzy Hash: 57219271348706AFD704BF64C8A0E26B7EAFF45714B14869DB5058B661CF70EC00C7A0
    APIs
      • Part of subcall function 00B7DAFB: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B7DB1A
      • Part of subcall function 00B7DAFB: GetProcAddress.KERNEL32(00BB1E48,CryptUnprotectMemory), ref: 00B7DB2A
    • GetCurrentProcessId.KERNEL32(?,00000080,?,00B7DB74), ref: 00B7DBFB
    Strings
    • CryptProtectMemory failed, xrefs: 00B7DBBB
    • CryptUnprotectMemory failed, xrefs: 00B7DBF3
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: AddressProc$CurrentProcess
    • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
    • API String ID: 2190909847-396321323
    • Opcode ID: f441ea566e474889e591425a85c27afcb94995acc2f64cd960086a5e0071a540
    • Instruction ID: e2902dffabd740a2068db0da3435f14eb660ea8036a1f208240818d39b70d218
    • Opcode Fuzzy Hash: f441ea566e474889e591425a85c27afcb94995acc2f64cd960086a5e0071a540
    • Instruction Fuzzy Hash: 7E112B713046115BD7069B3CCC51B6A37E9EF85B90F04C0D9F529DB296EFA1DD418290
    APIs
      • Part of subcall function 00B7CB15: GetWindowRect.USER32(?,?), ref: 00B7CB4C
      • Part of subcall function 00B7CB15: GetClientRect.USER32(?,?), ref: 00B7CB58
      • Part of subcall function 00B7CB15: GetWindowLongW.USER32(?,000000F0), ref: 00B7CBF9
      • Part of subcall function 00B7CB15: GetWindowRect.USER32(?,?), ref: 00B7CC26
      • Part of subcall function 00B7CB15: GetWindowTextW.USER32(?,?,00000400), ref: 00B7CC45
    • GetDlgItem.USER32(00000000,00003021), ref: 00B712EA
    • SetWindowTextW.USER32(00000000,00BA0294), ref: 00B71300
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: Window$Rect$Text$ClientItemLong
    • String ID: 0
    • API String ID: 660763476-4108050209
    • Opcode ID: 8d19556b58b933a26b7849fb07e97fa3f8b17bd046438f6ee87e4a64d258bdf5
    • Instruction ID: c5af86c4144f028b2e0795fbffbb730044999c5ddf18f268806795225e086741
    • Opcode Fuzzy Hash: 8d19556b58b933a26b7849fb07e97fa3f8b17bd046438f6ee87e4a64d258bdf5
    • Instruction Fuzzy Hash: DFF0693010474CBADF151F6C880AAE93BE9AB06349F05849AFC58914A2CB79C994EA74
    APIs
    • WaitForSingleObject.KERNEL32(?,000000FF,00B7F920,?,?,00B7F995,?,?,?,?,?,00B7F97F), ref: 00B7F6E2
    • GetLastError.KERNEL32(?,?,00B7F995,?,?,?,?,?,00B7F97F), ref: 00B7F6EE
      • Part of subcall function 00B76B2C: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B76B4A
    Strings
    • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00B7F6F7
    Memory Dump Source
    • Source File: 00000000.00000002.1685827095.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
    • Associated: 00000000.00000002.1685813848.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685852035.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BAE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685868238.0000000000BC8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1685924546.0000000000BCA000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b70000_kbdgc.jbxd
    Similarity
    • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
    • String ID: WaitForMultipleObjects error %d, GetLastError %d
    • API String ID: 1091760877-2248577382
    • Opcode ID: ec1fb8011304ddd996519e696f05e4a35ef16b75f030448057b1ac37e138596c
    • Instruction ID: f488e91884a6be575233b811b78b8302eba4dd95c3a0283fabc04dba745bb44f
    • Opcode Fuzzy Hash: ec1fb8011304ddd996519e696f05e4a35ef16b75f030448057b1ac37e138596c
    • Instruction Fuzzy Hash: 50D05E7295C4217AC6113B246C0BF6E7EC59B63372F648BA4F13AA62F1CF210D4246E5