Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe

Overview

General Information

Sample name:SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe
Analysis ID:1467950
MD5:0e570d20533d55b18cd26885fdb6a5a6
SHA1:924fc50d17bac3b46eee68a00ec2b7c2b08ebe19
SHA256:914fb029425c442aaaa942e74f57b48c9c3d0366232e9d57d5661e4a52c0bc14
Tags:exe
Infos:

Detection

Score:29
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Contains functionality to detect sleep reduction / modifications
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    0.2.SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: Binary string: .PDBU source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004095D4 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_004095D4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004096B0 FindFirstFileA,GetLastError,0_2_004096B0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00405D5C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405D5C
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://nitton.pl/tomseditor/index.php
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://tomseditor.com/blog/Projector.exe
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://tomseditor.com/blog/viewer
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://tomseditor.com/blog/viewer_update.php?v=
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://tomseditor.com/blog/vieweropen
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://tomseditor.com/blog/vieweropenS
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://tomseditor.com/blog/vieweropenSV
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://tomseditor.com/blog/youtube_thumb.php?url=
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004320D0 OpenClipboard,GlobalAlloc,GlobalFix,EmptyClipboard,SetClipboardData,GlobalUnWire,0_2_004320D0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004320D0 OpenClipboard,GlobalAlloc,GlobalFix,EmptyClipboard,SetClipboardData,GlobalUnWire,0_2_004320D0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00436080 SetClipboardData,SetClipboardData,0_2_00436080
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004361A4 SetClipboardData,0_2_004361A4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00435FFC SetClipboardData,SetClipboardData,0_2_00435FFC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00436150 GetClipboardData,0_2_00436150
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00446708 GetKeyboardState,KiUserCallbackDispatcher,0_2_00446708
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00449684 NtdllDefWindowProc_A,GetCapture,KiUserCallbackDispatcher,0_2_00449684
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00463DC0 NtdllDefWindowProc_A,0_2_00463DC0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00464568 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_00464568
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00464618 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_00464618
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0043504C NtdllDefWindowProc_A,0_2_0043504C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004590EC GetSubMenu,SaveDC,RestoreDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,0_2_004590EC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0049A0100_2_0049A010
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004CE0A40_2_004CE0A4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004CA1B40_2_004CA1B4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004A42480_2_004A4248
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E22D00_2_004E22D0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0045E2B80_2_0045E2B8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004B83EC0_2_004B83EC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004DA40C0_2_004DA40C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004A44FC0_2_004A44FC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004AC49C0_2_004AC49C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004C659C0_2_004C659C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E07A80_2_004E07A8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0046E87C0_2_0046E87C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E69780_2_004E6978
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0040E9300_2_0040E930
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004CC9900_2_004CC990
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004DAAF40_2_004DAAF4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00498D380_2_00498D38
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004C8DDC0_2_004C8DDC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0048EDA40_2_0048EDA4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0048ADBC0_2_0048ADBC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004ACEF80_2_004ACEF8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0048AEF40_2_0048AEF4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004D0F400_2_004D0F40
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004CEF680_2_004CEF68
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004EAFE80_2_004EAFE8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004590EC0_2_004590EC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004F10880_2_004F1088
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004D91D00_2_004D91D0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004672700_2_00467270
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004DB3440_2_004DB344
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004AD4200_2_004AD420
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004734300_2_00473430
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E56940_2_004E5694
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004F77600_2_004F7760
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004F17D40_2_004F17D4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004B99D40_2_004B99D4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004A1A500_2_004A1A50
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00493A180_2_00493A18
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00473D640_2_00473D64
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004A3DB80_2_004A3DB8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004C7EBC0_2_004C7EBC
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004D3F280_2_004D3F28
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004DDFC80_2_004DDFC8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00493FB80_2_00493FB8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: String function: 00404740 appears 47 times
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: String function: 00404B4C appears 33 times
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: String function: 00406DA4 appears 61 times
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9981084408967391
      Source: classification engineClassification label: sus29.evad.winEXE@1/0@0/0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0048CC3C GetLastError,FormatMessageA,0_2_0048CC3C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00409996 GetDiskFreeSpaceA,0_2_00409996
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0041A3B0 FindResourceA,0_2_0041A3B0
      Source: Yara matchFile source: 0.2.SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeSection loaded: wintypes.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: Binary string: .PDBU source: SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00450608 SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,0_2_00450608
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00450C54 push 00450CE1h; ret 0_2_00450CD9
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0046A05C push 0046A088h; ret 0_2_0046A080
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E407C push 004E41D5h; ret 0_2_004E41CD
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0048807C push 004880A8h; ret 0_2_004880A0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00430078 push 004300A4h; ret 0_2_0043009C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00486018 push ecx; mov dword ptr [esp], ecx0_2_0048601C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00430018 push 00430044h; ret 0_2_0043003C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0042E020 push 0042E04Ch; ret 0_2_0042E044
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004D60E4 push 004D61E1h; ret 0_2_004D61D9
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004300E8 push 00430114h; ret 0_2_0043010C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004DC090 push 004DC2B5h; ret 0_2_004DC2AD
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004D80A4 push 004D8150h; ret 0_2_004D8148
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004300B0 push 004300DCh; ret 0_2_004300D4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E80B4 push 004E81B6h; ret 0_2_004E81AE
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004660B8 push 00466112h; ret 0_2_0046610A
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004D8158 push 004D820Dh; ret 0_2_004D8205
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00430120 push 0043014Ch; ret 0_2_00430144
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00416138 push 00416164h; ret 0_2_0041615C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E81C0 push 004E82C2h; ret 0_2_004E82BA
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004701E4 push 0047021Ch; ret 0_2_00470214
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004301E4 push 00430210h; ret 0_2_00430208
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00430194 push 004301C0h; ret 0_2_004301B8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004841B4 push 004841E0h; ret 0_2_004841D8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004D8218 push 004D831Ah; ret 0_2_004D8312
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0043021C push 00430248h; ret 0_2_00430240
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E82CC push 004E83CEh; ret 0_2_004E83C6
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0046A2E0 push 0046A30Ch; ret 0_2_0046A304
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004E02F4 push 004E03F9h; ret 0_2_004E03F1
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00416288 push ecx; mov dword ptr [esp], ecx0_2_0041628B
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004162A8 push ecx; mov dword ptr [esp], ecx0_2_004162AB
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0046A2A8 push 0046A2D4h; ret 0_2_0046A2CC
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00460E70 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,0_2_00460E70
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00463E48 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,0_2_00463E48
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00464568 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_00464568
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00464618 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_00464618
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0042CA48 MonitorFromWindow,MonitorFromWindow,IsIconic,GetWindowPlacement,GetWindowRect,0_2_0042CA48
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0044ADA8 IsIconic,GetCapture,0_2_0044ADA8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0044B65C IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_0044B65C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0044BF80 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_0044BF80
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00450608 SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,0_2_00450608

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0043FC200_2_0043FC20
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_004633B8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeAPI coverage: 6.3 %
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0043FC200_2_0043FC20
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004095D4 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_004095D4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004096B0 FindFirstFileA,GetLastError,0_2_004096B0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00405D5C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405D5C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004261D8 GetSystemInfo,0_2_004261D8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00450608 SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,0_2_00450608
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_004662E4 cpuid 0_2_004662E4
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00405F14
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: GetLocaleInfoA,0_2_0040C44C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: GetLocaleInfoA,0_2_0040C498
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: GetLocaleInfoA,0_2_0040680A
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: GetLocaleInfoA,0_2_0040680C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: GetLocaleInfoA,GetACP,0_2_0040DB1C
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_0040ADE8 GetLocalTime,0_2_0040ADE8
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00406DEA GetTimeZoneInformation,0_2_00406DEA
      Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exeCode function: 0_2_00450C54 GetVersion,0_2_00450C54
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      11
      Input Capture
      2
      System Time Discovery
      Remote Services11
      Input Capture
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Deobfuscate/Decode Files or Information
      LSASS Memory12
      Security Software Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      Junk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)21
      Obfuscated Files or Information
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin Shares3
      Clipboard Data
      SteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Software Packing
      NTDS11
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials25
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe10%ReversingLabs
      SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe6%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://tomseditor.com/blog/viewer_update.php?v=0%Avira URL Cloudsafe
      http://nitton.pl/tomseditor/index.php0%Avira URL Cloudsafe
      http://tomseditor.com/blog/youtube_thumb.php?url=0%Avira URL Cloudsafe
      http://tomseditor.com/blog/Projector.exe0%Avira URL Cloudsafe
      http://tomseditor.com/blog/vieweropen0%Avira URL Cloudsafe
      http://tomseditor.com/blog/viewer0%Avira URL Cloudsafe
      http://tomseditor.com/blog/vieweropenS0%Avira URL Cloudsafe
      http://tomseditor.com/blog/vieweropenSV0%Avira URL Cloudsafe
      http://nitton.pl/tomseditor/index.php2%VirustotalBrowse
      http://tomseditor.com/blog/viewer_update.php?v=0%VirustotalBrowse
      http://tomseditor.com/blog/youtube_thumb.php?url=0%VirustotalBrowse
      http://tomseditor.com/blog/Projector.exe1%VirustotalBrowse
      http://tomseditor.com/blog/viewer0%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://tomseditor.com/blog/Projector.exeSecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://tomseditor.com/blog/youtube_thumb.php?url=SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://tomseditor.com/blog/vieweropenSecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://tomseditor.com/blog/viewer_update.php?v=SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://nitton.pl/tomseditor/index.phpSecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • 2%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://tomseditor.com/blog/viewerSecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://tomseditor.com/blog/vieweropenSSecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://tomseditor.com/blog/vieweropenSVSecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe, 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1467950
      Start date and time:2024-07-05 06:19:09 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 31s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe
      Detection:SUS
      Classification:sus29.evad.winEXE@1/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 79%
      • Number of executed functions: 41
      • Number of non-executed functions: 188
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
      Entropy (8bit):7.939005315015433
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.63%
      • UPX compressed Win32 Executable (30571/9) 0.30%
      • Win16/32 Executable Delphi generic (2074/23) 0.02%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      File name:SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe
      File size:528'384 bytes
      MD5:0e570d20533d55b18cd26885fdb6a5a6
      SHA1:924fc50d17bac3b46eee68a00ec2b7c2b08ebe19
      SHA256:914fb029425c442aaaa942e74f57b48c9c3d0366232e9d57d5661e4a52c0bc14
      SHA512:b542c0a23cf0cac27fec2a5a9d531092ca7fe50a6dd99b07024e0c69a27ad7d4bd9fda18b597da6cb974ddc49383c8bee2d1ca2d4ea2fe5810cb61736ef7f2e2
      SSDEEP:12288:687p5KzT1d4ZpLvIJWoKj5YhW26zSTLwMgJToSN:Te7sLvIJ/OPz0gJn
      TLSH:A4B423A5FE4558AFF629D3304336C1A7E23091FE70B68293FE2B2DB85D469310A57C19
      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
      Icon Hash:a4868c93a2c6b0a6
      Entrypoint:0x5a4430
      Entrypoint Section:UPX1
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      DLL Characteristics:
      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:5464b33a39ace45edc996bc813b37593
      Instruction
      pushad
      mov esi, 00532000h
      lea edi, dword ptr [esi-00131000h]
      mov dword ptr [edi+001320A0h], 785C75D4h
      push edi
      mov ebp, esp
      lea ebx, dword ptr [esp-00003E80h]
      xor eax, eax
      push eax
      cmp esp, ebx
      jne 00007FFBED453B5Dh
      inc esi
      inc esi
      push ebx
      push 001A2071h
      push edi
      add ebx, 04h
      push ebx
      push 0007242Dh
      push esi
      add ebx, 04h
      push ebx
      push eax
      mov dword ptr [ebx], 00000003h
      push ebp
      push edi
      push esi
      push ebx
      sub esp, 7Ch
      mov edx, dword ptr [esp+00000090h]
      mov dword ptr [esp+74h], 00000000h
      mov byte ptr [esp+73h], 00000000h
      mov ebp, dword ptr [esp+0000009Ch]
      lea eax, dword ptr [edx+04h]
      mov dword ptr [esp+78h], eax
      mov eax, 00000001h
      movzx ecx, byte ptr [edx+02h]
      mov ebx, eax
      shl ebx, cl
      mov ecx, ebx
      dec ecx
      mov dword ptr [esp+6Ch], ecx
      movzx ecx, byte ptr [edx+01h]
      shl eax, cl
      dec eax
      mov dword ptr [esp+68h], eax
      mov eax, dword ptr [esp+000000A8h]
      movzx esi, byte ptr [edx]
      mov dword ptr [ebp+00h], 00000000h
      mov dword ptr [esp+60h], 00000000h
      mov dword ptr [eax], 00000000h
      mov eax, 00000300h
      mov dword ptr [esp+64h], esi
      mov dword ptr [esp+5Ch], 00000001h
      mov dword ptr [esp+58h], 00000001h
      mov dword ptr [esp+00h], 00000000h
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1b290c0x298.rsrc
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a50000xd90c.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x1a4fd40x18UPX1
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      UPX00x10000x1310000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      UPX10x1320000x730000x730005aec3db22c4a646068783b276f4053efFalse0.9981084408967391data7.999398234549258IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x1a50000xe0000xdc003698998e4db4dbe208259de1f591b52dFalse0.6517755681818181data6.590884033711403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_CURSOR0x17af0c0x134data1.0357142857142858
      RT_CURSOR0x17b0400x134data1.0357142857142858
      RT_CURSOR0x17b1740x134data1.0357142857142858
      RT_CURSOR0x17b2a80x134data1.0357142857142858
      RT_CURSOR0x17b3dc0x134data1.0357142857142858
      RT_CURSOR0x17b5100x134data1.0357142857142858
      RT_CURSOR0x17b6440x134data1.0357142857142858
      RT_BITMAP0x17b7780x1d0data1.0237068965517242
      RT_BITMAP0x17b9480x1e4data1.0227272727272727
      RT_BITMAP0x17bb2c0x1d0OpenPGP Secret Key1.0237068965517242
      RT_BITMAP0x17bcfc0x1d0data1.0237068965517242
      RT_BITMAP0x17becc0x1d0data1.0237068965517242
      RT_BITMAP0x17c09c0x1d0data1.0237068965517242
      RT_BITMAP0x17c26c0x1d0data1.0237068965517242
      RT_BITMAP0x17c43c0x1d0data1.0237068965517242
      RT_BITMAP0x17c60c0x1d0data1.0237068965517242
      RT_BITMAP0x17c7dc0x1d0data1.0237068965517242
      RT_BITMAP0x17c9ac0xe8data1.0474137931034482
      RT_ICON0x1a5f100x4204PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedPolishPoland0.9797041420118343
      RT_ICON0x1aa1180x1628Device independent bitmap graphic, 64 x 128 x 8, image size 0PolishPoland0.34643864598025387
      RT_ICON0x1ab7440xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0PolishPoland0.4069829424307036
      RT_ICON0x1ac5f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0PolishPoland0.421028880866426
      RT_ICON0x1ace9c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.3603411513859275
      RT_ICON0x1add480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.37274368231046934
      RT_ICON0x1ae5f40x1628Device independent bitmap graphic, 64 x 128 x 8, image size 0EnglishUnited States0.26533850493653033
      RT_ICON0x1afc200x2c64PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9656810982048575
      RT_DIALOG0x1893ec0x52data1.1341463414634145
      RT_STRING0x1894400xe4data1.0482456140350878
      RT_STRING0x1895240x364data1.012672811059908
      RT_STRING0x1898880x3e4data1.0110441767068272
      RT_STRING0x189c6c0x3e4data1.0110441767068272
      RT_STRING0x18a0500x340data1.0132211538461537
      RT_STRING0x18a3900x324data1.013681592039801
      RT_STRING0x18a6b40x3d0data1.0112704918032787
      RT_STRING0x18aa840x258data1.0183333333333333
      RT_STRING0x18acdc0x3e0data1.0110887096774193
      RT_STRING0x18b0bc0x2a0data1.0163690476190477
      RT_STRING0x18b35c0x25cdata1.0182119205298013
      RT_STRING0x18b5b80x474data1.0096491228070175
      RT_STRING0x18ba2c0x3a4OpenPGP Public Key1.011802575107296
      RT_STRING0x18bdd00x1e4data1.0227272727272727
      RT_STRING0x18bfb40x1a4data1.026190476190476
      RT_STRING0x18c1580x11cdata1.0387323943661972
      RT_STRING0x18c2740x458data1.0098920863309353
      RT_STRING0x18c6cc0xe8OpenPGP Secret Key1.0474137931034482
      RT_STRING0x18c7b40xf8data1.0443548387096775
      RT_STRING0x18c8ac0x1a8data1.025943396226415
      RT_STRING0x18ca540x398data1.0119565217391304
      RT_STRING0x18cdec0x408data1.0106589147286822
      RT_STRING0x18d1f40x350data1.0129716981132075
      RT_STRING0x18d5440x394data1.012008733624454
      RT_STRING0x18d8d80x430data1.0102611940298507
      RT_STRING0x18dd080xf4data1.0450819672131149
      RT_STRING0x18ddfc0xc4data1.0561224489795917
      RT_STRING0x18dec00x2c0data1.015625
      RT_STRING0x18e1800x408data1.0106589147286822
      RT_STRING0x18e5880x330data1.0134803921568627
      RT_STRING0x18e8b80x314data1.013959390862944
      RT_RCDATA0x18ebcc0x10OpenPGP Public Key1.5625
      RT_RCDATA0x18ebdc0x8d8data1.0048586572438163
      RT_RCDATA0x18f4b40x114ecdata1.000437284884049
      RT_GROUP_CURSOR0x1a09a00x14Non-ISO extended-ASCII text, with no line terminators1.45
      RT_GROUP_CURSOR0x1a09b40x14data1.45
      RT_GROUP_CURSOR0x1a09c80x14data1.4
      RT_GROUP_CURSOR0x1a09dc0x14data1.4
      RT_GROUP_CURSOR0x1a09f00x14data1.45
      RT_GROUP_CURSOR0x1a0a040x14data1.45
      RT_GROUP_CURSOR0x1a0a180x14data1.45
      RT_GROUP_ICON0x1b28880x3edataPolishPoland0.8548387096774194
      RT_GROUP_ICON0x1b28cc0x3edataEnglishUnited States0.8548387096774194
      DLLImport
      advapi32.dllRegCloseKey
      comctl32.dllImageList_Add
      comdlg32.dllPrintDlgA
      gdi32.dllSaveDC
      KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
      oleaut32.dllVariantCopy
      shell32.dllDragFinish
      user32.dllGetDC
      version.dllVerQueryValueA
      winmm.dlltimeGetTime
      winspool.drvOpenPrinterA
      Language of compilation systemCountry where language is spokenMap
      PolishPoland
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Target ID:0
      Start time:00:19:59
      Start date:05/07/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Zpevdo.14269.7346.exe"
      Imagebase:0x400000
      File size:528'384 bytes
      MD5 hash:0E570D20533D55B18CD26885FDB6A5A6
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Borland Delphi
      Yara matches:
      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
      Reputation:low
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:2.2%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:20.2%
        Total number of Nodes:985
        Total number of Limit Nodes:57
        execution_graph 75082 442244 SetWindowLongA GetWindowLongA 75083 4422a1 SetPropA SetPropA 75082->75083 75084 442283 GetWindowLongA 75082->75084 75088 4224f0 75083->75088 75084->75083 75085 442292 SetWindowLongA 75084->75085 75085->75083 75094 44942c 75088->75094 75101 463e48 75088->75101 75189 463b48 75088->75189 75197 449684 75088->75197 75089 422506 75100 449684 107 API calls 75094->75100 75095 44945b 75215 443e78 74 API calls 75095->75215 75097 44946d 75216 428d24 76 API calls 75097->75216 75099 449472 75099->75089 75100->75095 75102 463eb0 75101->75102 75106 463e7e 75101->75106 75217 463cfc 75102->75217 75105 463ebb 75107 463ecb 75105->75107 75108 463f79 75105->75108 75106->75102 75184 463e9f 75106->75184 75234 41a800 75106->75234 75111 464417 75107->75111 75112 463ed1 75107->75112 75109 463f80 75108->75109 75110 463fcf 75108->75110 75116 463f86 75109->75116 75148 4642ef 75109->75148 75113 463fd6 75110->75113 75114 463ff5 75110->75114 75256 465010 12 API calls 75111->75256 75117 463f45 75112->75117 75118 463f62 75112->75118 75123 463f5d 75112->75123 75112->75184 75119 464431 75113->75119 75120 463fdc 75113->75120 75114->75123 75132 4642ac 75114->75132 75114->75184 75121 463fb6 75116->75121 75122 463f8d 75116->75122 75124 4644bb 75117->75124 75125 463f4b 75117->75125 75126 4640a7 75118->75126 75127 463f6b 75118->75127 75128 464452 75119->75128 75129 46443a 75119->75129 75130 463fe7 75120->75130 75131 4643d8 IsIconic 75120->75131 75121->75123 75144 4642cd 75121->75144 75121->75184 75141 464011 75122->75141 75142 463f9a 75122->75142 75122->75184 75123->75184 75233 463dc0 NtdllDefWindowProc_A 75123->75233 75274 463dc0 NtdllDefWindowProc_A 75124->75274 75134 463f54 75125->75134 75135 464495 75125->75135 75241 46454c 75126->75241 75127->75123 75137 4641f8 75127->75137 75258 464b2c 43 API calls 75128->75258 75257 464ad0 12 API calls 75129->75257 75130->75111 75130->75123 75133 4643ec GetFocus 75131->75133 75131->75184 75247 465f4c 107 API calls 75132->75247 75145 4643fd 75133->75145 75133->75184 75134->75123 75146 4640db 75134->75146 75259 4505a4 75135->75259 75165 464226 75137->75165 75137->75184 75151 464023 75141->75151 75152 46402c 75141->75152 75142->75123 75149 4641b0 SendMessageA 75142->75149 75248 464990 IsWindowEnabled 75144->75248 75255 45bc80 GetCurrentThreadId 75145->75255 75224 463dc0 NtdllDefWindowProc_A 75146->75224 75163 464315 IsWindowEnabled 75148->75163 75148->75184 75149->75184 75157 46402a 75151->75157 75158 464039 75151->75158 75238 464568 54 API calls 75152->75238 75156 4644a7 75272 463d54 11 API calls 75156->75272 75240 463dc0 NtdllDefWindowProc_A 75157->75240 75239 464618 118 API calls 75158->75239 75161 464404 75167 46440c SetFocus 75161->75167 75161->75184 75162 4640e1 75168 464120 75162->75168 75169 4640fe 75162->75169 75170 464323 75163->75170 75163->75184 75246 40e8ac SetErrorMode LoadLibraryA 75165->75246 75167->75184 75230 463c50 75168->75230 75225 463c60 75169->75225 75179 46432a IsWindowVisible 75170->75179 75171 4644b2 75273 463dc0 NtdllDefWindowProc_A 75171->75273 75176 464235 75180 464284 GetLastError 75176->75180 75181 464244 GetProcAddress 75176->75181 75182 464338 GetFocus 75179->75182 75179->75184 75180->75184 75183 46426c 75181->75183 75181->75184 75249 44bc70 75182->75249 75183->75184 75184->75089 75186 46434d SetFocus 75251 44663c 75186->75251 75190 463bec 75189->75190 75191 463b5e 75189->75191 75190->75089 75191->75190 75192 463b6b EnumWindows 75191->75192 75192->75190 75193 463b8e GetWindow GetWindowLongA 75192->75193 75194 463bab 75193->75194 75194->75190 75195 41a800 42 API calls 75194->75195 75196 463be0 SetWindowPos 75195->75196 75196->75190 75196->75194 75198 449697 75197->75198 75199 4496af 75197->75199 75200 449709 75198->75200 75201 449699 75198->75201 75203 4496aa 75199->75203 75365 4495f0 107 API calls 75199->75365 75202 446708 105 API calls 75200->75202 75201->75203 75208 4497a6 GetCapture 75201->75208 75209 449712 75202->75209 75206 449746 75203->75206 75351 446708 75203->75351 75205 449763 75205->75203 75211 449767 75205->75211 75206->75089 75208->75203 75210 4497b1 75208->75210 75209->75206 75364 44955c 107 API calls 75209->75364 75210->75203 75213 44663c 105 API calls 75210->75213 75211->75206 75214 44978a NtdllDefWindowProc_A 75211->75214 75213->75203 75214->75206 75215->75097 75216->75099 75218 463d0f 75217->75218 75219 463d1a SetThreadLocale 75218->75219 75220 463d29 75218->75220 75223 463d39 75218->75223 75275 40dd7c 60 API calls 75219->75275 75220->75223 75276 462cb8 75220->75276 75223->75105 75224->75162 75226 463cbe PostMessageA 75225->75226 75227 463c6f 75225->75227 75226->75184 75227->75226 75228 41a800 42 API calls 75227->75228 75229 463cb2 SetWindowPos 75228->75229 75229->75226 75229->75227 75231 463b48 46 API calls 75230->75231 75232 463c57 PostMessageA 75231->75232 75232->75184 75233->75184 75235 41a80a 75234->75235 75236 41a81e 75235->75236 75307 41a78c 42 API calls 75235->75307 75236->75106 75238->75184 75239->75184 75240->75184 75308 42b758 75241->75308 75244 464567 75244->75184 75245 46455b LoadIconA 75245->75244 75246->75176 75247->75184 75248->75184 75250 44bc7a 75249->75250 75250->75186 75252 446663 SetFocus 75251->75252 75253 446658 75251->75253 75252->75184 75254 449684 107 API calls 75253->75254 75254->75252 75255->75161 75256->75183 75257->75183 75258->75183 75260 4505b3 75259->75260 75264 4505ac 75259->75264 75323 450508 75260->75323 75262 4505b1 75262->75156 75264->75262 75267 4505ef SendMessageA 75264->75267 75268 4505de SystemParametersInfoA 75264->75268 75265 4505c0 75326 450554 6 API calls 75265->75326 75266 4505c9 75327 450524 SystemParametersInfoA 75266->75327 75267->75262 75268->75262 75271 4505d0 75271->75156 75272->75171 75273->75184 75274->75184 75275->75220 75277 462cd1 75276->75277 75278 462d02 SystemParametersInfoA 75277->75278 75302 465260 107 API calls 75277->75302 75280 462d15 CreateFontIndirectA 75278->75280 75281 462d2d GetStockObject 75278->75281 75297 424a60 75280->75297 75283 424a60 16 API calls 75281->75283 75285 462d41 SystemParametersInfoA 75283->75285 75286 462d95 75285->75286 75287 462d61 CreateFontIndirectA 75285->75287 75303 424b44 16 API calls 75286->75303 75288 424a60 16 API calls 75287->75288 75291 462d7a CreateFontIndirectA 75288->75291 75290 462da5 GetStockObject 75292 424a60 16 API calls 75290->75292 75293 424a60 16 API calls 75291->75293 75294 462d93 75292->75294 75293->75294 75295 462dfc 75294->75295 75304 465260 107 API calls 75294->75304 75295->75223 75305 42461c GetObjectA 75297->75305 75299 424a72 75306 424854 15 API calls 75299->75306 75301 424a7b 75301->75285 75302->75278 75303->75290 75304->75295 75305->75299 75306->75301 75307->75236 75311 42b794 75308->75311 75312 42b762 75311->75312 75313 42b7a4 75311->75313 75312->75244 75312->75245 75313->75312 75320 41d25c 42 API calls 75313->75320 75315 42b7c3 75315->75312 75316 42b7d0 75315->75316 75317 42b7dd 75315->75317 75322 425bdc 42 API calls 75316->75322 75321 426730 45 API calls 75317->75321 75320->75315 75321->75312 75322->75312 75328 42c930 75323->75328 75326->75262 75327->75271 75329 42c960 75328->75329 75330 42c940 75328->75330 75333 42c991 GetSystemMetrics 75329->75333 75334 42c997 75329->75334 75335 42c848 75330->75335 75333->75334 75334->75265 75334->75266 75336 42c85e 75335->75336 75338 42c8b9 75336->75338 75340 42c8d1 75336->75340 75341 42c848 11 API calls 75336->75341 75342 42c8c1 GetProcAddress 75338->75342 75346 404740 75340->75346 75343 42c8a3 75341->75343 75342->75340 75343->75338 75344 42c8b1 75343->75344 75345 404740 11 API calls 75344->75345 75345->75338 75347 404746 75346->75347 75349 404761 KiUserCallbackDispatcher 75346->75349 75347->75349 75350 402794 11 API calls 75347->75350 75349->75334 75350->75349 75352 44671e 75351->75352 75353 446873 75352->75353 75355 4467ac 75352->75355 75360 446764 75352->75360 75361 4467f5 75352->75361 75354 44688a KiUserCallbackDispatcher 75353->75354 75367 444ff0 107 API calls 75353->75367 75354->75361 75357 4467cf 75355->75357 75358 4467da 75355->75358 75357->75354 75357->75360 75362 446836 GetKeyboardState 75357->75362 75366 465758 107 API calls 75358->75366 75360->75354 75360->75361 75361->75206 75363 446852 75362->75363 75363->75361 75364->75206 75365->75205 75366->75360 75367->75354 75368 449064 75369 449091 75368->75369 75370 44909a 75369->75370 75372 40e230 44 API calls 75369->75372 75372->75370 75373 449364 75375 44936c 75373->75375 75374 44939f 75375->75374 75377 449268 75375->75377 75378 44927d 75377->75378 75379 4492ef 75378->75379 75382 41a800 42 API calls 75378->75382 75383 449268 107 API calls 75378->75383 75380 44663c 107 API calls 75379->75380 75381 449334 75379->75381 75380->75381 75381->75374 75382->75378 75383->75378 75384 4021a0 75385 4021b4 75384->75385 75386 4021bd 75384->75386 75402 401ab4 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 75385->75402 75389 4021e6 RtlEnterCriticalSection 75386->75389 75390 4021f0 75386->75390 75393 4021c5 75386->75393 75388 4021b9 75388->75386 75388->75393 75389->75390 75390->75393 75396 4020ac 75390->75396 75394 402311 RtlLeaveCriticalSection 75395 40231b 75394->75395 75400 4020bc 75396->75400 75397 4020e8 75401 40210c 75397->75401 75408 401ec0 9 API calls 75397->75408 75400->75397 75400->75401 75403 402020 75400->75403 75401->75394 75401->75395 75402->75388 75409 401874 75403->75409 75405 402030 75406 40203d 75405->75406 75418 401f94 9 API calls 75405->75418 75406->75400 75408->75401 75413 401890 75409->75413 75410 40189a 75419 401760 75410->75419 75413->75410 75415 4018eb 75413->75415 75416 4018a6 75413->75416 75423 4015cc 75413->75423 75431 4014c8 LocalAlloc 75413->75431 75432 4016a8 VirtualFree 75415->75432 75416->75405 75418->75406 75421 4017a6 75419->75421 75420 4017d6 75420->75416 75421->75420 75422 4017c2 VirtualAlloc 75421->75422 75422->75420 75422->75421 75424 4015db VirtualAlloc 75423->75424 75426 401608 75424->75426 75427 40162b 75424->75427 75433 401480 LocalAlloc 75426->75433 75427->75413 75429 401614 75429->75427 75430 401618 VirtualFree 75429->75430 75430->75427 75431->75413 75432->75416 75433->75429 75434 4263e0 75435 4263f7 75434->75435 75437 42642f 75434->75437 75436 4263fe SelectObject GetDIBColorTable SelectObject DeleteDC 75435->75436 75436->75437 75438 426459 75437->75438 75441 42646b 75437->75441 75444 426348 73E9A570 75437->75444 75438->75441 75442 4261d8 GetSystemInfo 75438->75442 75443 4261f6 75442->75443 75443->75441 75444->75438 75445 4043e5 75446 404417 75445->75446 75449 404384 75446->75449 75450 404393 75449->75450 75451 4043c0 75449->75451 75450->75451 75454 405cd8 75450->75454 75458 450c54 75450->75458 75455 405d04 75454->75455 75456 405ce8 GetModuleFileNameA 75454->75456 75455->75450 75472 405f14 GetModuleFileNameA RegOpenKeyExA 75456->75472 75459 450ccc 75458->75459 75460 450c6e GetVersion 75458->75460 75459->75450 75491 450a04 GetCurrentProcessId 75460->75491 75464 450c92 75525 41a0dc 44 API calls 75464->75525 75466 450c9c 75526 41a088 44 API calls 75466->75526 75468 450cac 75527 41a088 44 API calls 75468->75527 75470 450cbc 75528 41a088 44 API calls 75470->75528 75473 405f97 75472->75473 75474 405f57 RegOpenKeyExA 75472->75474 75490 405d5c 12 API calls 75473->75490 75474->75473 75475 405f75 RegOpenKeyExA 75474->75475 75475->75473 75477 406020 lstrcpyn GetThreadLocale GetLocaleInfoA 75475->75477 75479 406057 75477->75479 75480 40613a 75477->75480 75478 405fbc RegQueryValueExA 75481 405fdc RegQueryValueExA 75478->75481 75482 405ffa RegCloseKey 75478->75482 75479->75480 75483 406067 lstrlen 75479->75483 75480->75455 75481->75482 75482->75455 75485 40607f 75483->75485 75485->75480 75486 4060a4 lstrcpyn LoadLibraryExA 75485->75486 75487 4060cc 75485->75487 75486->75487 75487->75480 75488 4060d6 lstrcpyn LoadLibraryExA 75487->75488 75488->75480 75489 406108 lstrcpyn LoadLibraryExA 75488->75489 75489->75480 75490->75478 75529 40a13c 75491->75529 75495 450a4d 75496 450a57 GlobalAddAtomA GetCurrentThreadId 75495->75496 75497 40a13c 42 API calls 75496->75497 75498 450a91 75497->75498 75499 404794 11 API calls 75498->75499 75500 450a9e 75499->75500 75501 450aa8 GlobalAddAtomA 75500->75501 75538 404c00 75501->75538 75505 450ad5 75544 450608 75505->75544 75507 450adf 75552 450430 75507->75552 75509 450aeb 75556 4624dc 75509->75556 75511 450afe 75573 4635c0 75511->75573 75513 450b14 75587 465260 107 API calls 75513->75587 75515 450b2a 75588 41a1c8 44 API calls 75515->75588 75517 450b3e GetModuleHandleA 75518 450b5e 75517->75518 75519 450b4e GetProcAddress 75517->75519 75520 404740 11 API calls 75518->75520 75519->75518 75521 450b73 75520->75521 75522 404740 11 API calls 75521->75522 75523 450b7b 75522->75523 75524 41a03c 44 API calls 75523->75524 75524->75464 75525->75466 75526->75468 75527->75470 75528->75459 75589 40a150 75529->75589 75532 404794 75533 404798 75532->75533 75536 4047a8 75532->75536 75535 404804 11 API calls 75533->75535 75533->75536 75534 4047d6 75534->75495 75535->75536 75536->75534 75621 402794 11 API calls 75536->75621 75539 404c04 RegisterClipboardFormatA 75538->75539 75540 41aa6c 75539->75540 75541 41aa72 75540->75541 75542 41aa87 RtlInitializeCriticalSection 75541->75542 75543 41aa9c 75542->75543 75543->75505 75545 450775 75544->75545 75546 45061c SetErrorMode 75544->75546 75545->75507 75547 450640 GetModuleHandleA GetProcAddress 75546->75547 75548 45065c 75546->75548 75547->75548 75549 450757 SetErrorMode 75548->75549 75550 450669 LoadLibraryA 75548->75550 75549->75507 75550->75549 75551 450685 10 API calls 75550->75551 75551->75549 75553 450436 75552->75553 75554 4505a4 23 API calls 75553->75554 75555 4504a4 75554->75555 75555->75509 75558 4624e6 75556->75558 75622 421488 75558->75622 75559 4624fc 75626 462898 LoadCursorA 75559->75626 75562 462535 75563 462571 73E9A570 75562->75563 75564 462585 75563->75564 75631 4246d0 75564->75631 75566 4625b3 75567 4246d0 13 API calls 75566->75567 75568 4625c5 75567->75568 75569 4246d0 13 API calls 75568->75569 75570 4625d7 75569->75570 75571 462cb8 118 API calls 75570->75571 75572 4625e4 75571->75572 75572->75511 75574 4635cf 75573->75574 75575 421488 42 API calls 75574->75575 75576 4635e5 75575->75576 75577 463690 LoadIconA 75576->75577 75649 42b9ec 75577->75649 75579 4636b3 GetModuleFileNameA OemToCharA 75580 4636fc 75579->75580 75581 463722 CharLowerA 75580->75581 75582 463745 75581->75582 75583 463756 75582->75583 75651 4638c8 75582->75651 75675 4656c4 11 API calls 75583->75675 75586 463778 75586->75513 75587->75515 75588->75517 75590 40a174 75589->75590 75591 40a19f 75590->75591 75602 409d44 42 API calls 75590->75602 75593 40a1f7 75591->75593 75600 40a1b4 75591->75600 75606 404830 75593->75606 75595 40a14b 75595->75532 75596 40a1ed 75605 404d8c 11 API calls 75596->75605 75597 404740 11 API calls 75597->75600 75600->75596 75600->75597 75603 404d8c 11 API calls 75600->75603 75604 409d44 42 API calls 75600->75604 75602->75591 75603->75600 75604->75600 75605->75595 75611 404804 75606->75611 75608 404840 75609 404740 11 API calls 75608->75609 75610 404858 75609->75610 75610->75595 75612 404808 75611->75612 75613 40482c 75611->75613 75616 402774 75612->75616 75613->75608 75617 402779 75616->75617 75618 40278c 75616->75618 75617->75618 75620 402884 11 API calls 75617->75620 75618->75608 75620->75618 75621->75534 75623 42148f 75622->75623 75624 4214b2 75623->75624 75635 421640 42 API calls 75623->75635 75624->75559 75627 4628b7 75626->75627 75628 4628d0 LoadCursorA 75627->75628 75630 46251f GetKeyboardLayout 75627->75630 75636 462950 75628->75636 75630->75562 75632 4246d6 75631->75632 75639 423c14 75632->75639 75634 4246f8 75634->75566 75635->75624 75637 402774 11 API calls 75636->75637 75638 462963 75637->75638 75638->75627 75640 423c2f 75639->75640 75647 423bfc RtlEnterCriticalSection 75640->75647 75643 423c39 75644 402774 11 API calls 75643->75644 75646 423c96 75643->75646 75644->75646 75645 423ce7 75645->75634 75648 423c08 RtlLeaveCriticalSection 75646->75648 75647->75643 75648->75645 75650 42b9f8 75649->75650 75650->75579 75652 463a53 75651->75652 75653 4638f1 75651->75653 75654 404740 11 API calls 75652->75654 75653->75652 75676 422518 75653->75676 75656 463a68 75654->75656 75656->75583 75657 46390a GetClassInfoA 75658 463930 RegisterClassA 75657->75658 75663 463965 75657->75663 75659 463949 75658->75659 75658->75663 75683 4067b4 42 API calls 75659->75683 75661 463956 75684 40cc2c 11 API calls 75661->75684 75679 407910 75663->75679 75665 4639bc 75666 404740 11 API calls 75665->75666 75667 4639ca SetWindowLongA 75666->75667 75668 463a15 GetSystemMenu DeleteMenu DeleteMenu 75667->75668 75669 4639ea 75667->75669 75668->75652 75671 463a46 DeleteMenu 75668->75671 75670 46454c 46 API calls 75669->75670 75672 4639f1 SendMessageA 75670->75672 75671->75652 75673 46454c 46 API calls 75672->75673 75674 463a09 SetClassLongA 75673->75674 75674->75668 75675->75586 75677 422528 VirtualAlloc 75676->75677 75678 422556 75676->75678 75677->75678 75678->75657 75685 402b78 75679->75685 75681 407923 CreateWindowExA 75682 40795b 75681->75682 75682->75665 75683->75661 75684->75663 75685->75681 75686 464bc0 75687 464bd3 75686->75687 75690 45d350 75687->75690 75688 464bf4 75692 45d366 75690->75692 75691 45d47a 75691->75688 75692->75691 75699 41a5c0 75692->75699 75694 45d43f 75694->75688 75695 45d3f6 75695->75694 75709 4067b4 42 API calls 75695->75709 75697 45d42d 75710 40cc68 42 API calls 75697->75710 75700 41a5d6 75699->75700 75701 41a60b 75700->75701 75723 41a434 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 75700->75723 75711 41a518 75701->75711 75705 41a636 75707 41a64e 75705->75707 75725 41a4bc 42 API calls 75705->75725 75707->75695 75709->75697 75710->75694 75712 41a596 75711->75712 75715 41a542 75711->75715 75713 404740 11 API calls 75712->75713 75714 41a5ad 75713->75714 75714->75705 75724 41a48c 42 API calls 75714->75724 75715->75712 75716 41a518 189 API calls 75715->75716 75717 41a55a 75716->75717 75726 405cd0 75717->75726 75721 41a588 75734 41a3b0 75721->75734 75723->75701 75724->75705 75725->75707 75743 405ca8 VirtualQuery 75726->75743 75729 405d20 75730 405d47 75729->75730 75731 405d2a 75729->75731 75730->75721 75731->75730 75732 405cd8 30 API calls 75731->75732 75733 405d40 75732->75733 75733->75721 75735 41a3c1 75734->75735 75736 41a3d0 FindResourceA 75735->75736 75737 41a3e0 75736->75737 75738 41a42d 75736->75738 75745 41d9f0 75737->75745 75738->75712 75740 41a3f1 75749 41d3c0 75740->75749 75742 41a40c 75742->75712 75744 405cc2 75743->75744 75744->75729 75746 41d9fa 75745->75746 75754 41dab8 FindResourceA 75746->75754 75748 41da28 75748->75740 75766 41db74 75749->75766 75751 41d3dc 75770 41fba8 75751->75770 75753 41d3f7 75753->75742 75755 41dae4 LoadResource 75754->75755 75756 41dadd 75754->75756 75758 41daf7 75755->75758 75759 41dafe SizeofResource LockResource 75755->75759 75764 41da48 42 API calls 75756->75764 75765 41da48 42 API calls 75758->75765 75762 41db1c 75759->75762 75760 41dae3 75760->75755 75762->75748 75763 41dafd 75763->75759 75764->75760 75765->75763 75767 41db7e 75766->75767 75768 402774 11 API calls 75767->75768 75769 41db97 75768->75769 75769->75751 75798 41ff90 75770->75798 75773 41fc20 75853 41ffb4 75773->75853 75774 41fc55 75775 41ffb4 42 API calls 75774->75775 75777 41fc66 75775->75777 75779 41fc7c 75777->75779 75780 41fc6f 75777->75780 75783 41ffb4 42 API calls 75779->75783 75782 41ffb4 42 API calls 75780->75782 75788 41fc48 75782->75788 75785 41fc97 75783->75785 75784 41fc33 75787 41ffb4 42 API calls 75784->75787 75863 41fb48 42 API calls 75785->75863 75787->75788 75803 419cb0 75788->75803 75792 41fcf0 75822 4452dc 75792->75822 75824 45da00 75792->75824 75793 41fdc0 75793->75753 75794 41fd80 75794->75793 75795 41a800 42 API calls 75794->75795 75795->75794 75864 41e754 75798->75864 75801 41fbe1 75801->75773 75801->75774 75804 419cbd 75803->75804 75870 419b9c RtlEnterCriticalSection 75804->75870 75806 419d97 75871 419c54 RtlLeaveCriticalSection 75806->75871 75807 41a800 42 API calls 75813 419cf4 75807->75813 75809 419dae 75814 406a20 75809->75814 75810 41a800 42 API calls 75812 419d56 75810->75812 75812->75806 75812->75810 75813->75807 75813->75812 75872 4196d8 42 API calls 75813->75872 75815 406a55 TlsGetValue 75814->75815 75816 406a2f 75814->75816 75817 406a3a 75815->75817 75818 406a5f 75815->75818 75816->75792 75873 4069dc LocalAlloc TlsSetValue 75817->75873 75818->75792 75820 406a3f TlsGetValue 75821 406a4e 75820->75821 75821->75792 75823 4452f6 KiUserCallbackDispatcher 75822->75823 75823->75794 75825 45da13 75824->75825 75874 447c64 75825->75874 75827 45dbca 75828 45dbe1 75827->75828 75882 444e6c KiUserCallbackDispatcher 75827->75882 75829 45dbf8 75828->75829 75883 444eb0 KiUserCallbackDispatcher 75828->75883 75835 45dc2f 75829->75835 75884 45d060 50 API calls 75829->75884 75830 45dacd 75879 45dd88 60 API calls 75830->75879 75831 45da5e 75831->75827 75831->75830 75841 45dabe MulDiv 75831->75841 75838 44663c 107 API calls 75835->75838 75836 45dae6 75836->75827 75880 45d060 50 API calls 75836->75880 75840 45dc40 75838->75840 75839 45dc1d 75885 44b734 42 API calls 75839->75885 75840->75794 75878 424a8c 15 API calls 75841->75878 75845 45db07 75881 44b734 42 API calls 75845->75881 75847 45db1a 75848 45db26 MulDiv 75847->75848 75849 45db49 75847->75849 75848->75849 75850 45db55 MulDiv 75849->75850 75851 45db78 75849->75851 75850->75851 75851->75827 75852 45db84 MulDiv MulDiv 75851->75852 75852->75827 75854 41e754 42 API calls 75853->75854 75855 41ffc9 75854->75855 75856 404830 11 API calls 75855->75856 75857 41ffd7 75856->75857 75887 404c58 75857->75887 75860 41e754 42 API calls 75861 41fc2b 75860->75861 75862 419f60 44 API calls 75861->75862 75862->75784 75863->75788 75867 41e75f 75864->75867 75865 41e799 75865->75801 75868 41e214 42 API calls 75865->75868 75867->75865 75869 41e7a0 42 API calls 75867->75869 75868->75801 75869->75867 75870->75813 75871->75809 75872->75813 75873->75820 75875 447c76 75874->75875 75886 44488c 170 API calls 75875->75886 75877 447c8e 75877->75831 75878->75830 75879->75836 75880->75845 75881->75847 75882->75828 75883->75829 75884->75839 75885->75835 75886->75877 75888 404c0c 75887->75888 75889 404804 11 API calls 75888->75889 75890 404c47 75888->75890 75891 404c23 75889->75891 75890->75860 75891->75890 75893 402794 11 API calls 75891->75893 75893->75890 75894 4647a0 75895 4647c2 75894->75895 75896 4647ff 75894->75896 75905 464754 75895->75905 75898 404794 11 API calls 75896->75898 75899 4647fd 75898->75899 75900 404740 11 API calls 75899->75900 75901 464821 75900->75901 75902 4647cc 75902->75899 75903 4647e8 SetWindowTextA 75902->75903 75904 404740 11 API calls 75903->75904 75904->75899 75906 464789 75905->75906 75907 464769 GetWindowTextA 75905->75907 75909 404794 11 API calls 75906->75909 75908 404830 11 API calls 75907->75908 75910 464787 75908->75910 75909->75910 75910->75902 75911 424768 75912 424783 75911->75912 75913 42482a 75912->75913 75914 42478b 75912->75914 75944 41adfc 42 API calls 75913->75944 75929 424428 75914->75929 75917 424835 75919 424428 RtlEnterCriticalSection 75920 4247ab 75919->75920 75932 423e20 75920->75932 75922 4247f0 75941 424438 75922->75941 75923 4247c9 75923->75922 75939 424b28 MulDiv 75923->75939 75926 4247e6 75940 424b44 16 API calls 75926->75940 75930 424435 75929->75930 75931 42442f RtlEnterCriticalSection 75929->75931 75930->75919 75931->75930 75945 423bfc RtlEnterCriticalSection 75932->75945 75934 423e66 75953 423c08 RtlLeaveCriticalSection 75934->75953 75936 423e36 75936->75934 75946 423cf8 75936->75946 75937 423e7b 75937->75923 75939->75926 75940->75922 75942 424445 75941->75942 75943 42443f RtlLeaveCriticalSection 75941->75943 75943->75942 75944->75917 75945->75936 75947 423da4 75946->75947 75948 423d0e 75946->75948 75947->75934 75954 423bfc RtlEnterCriticalSection 75948->75954 75951 423d1c 75955 423c08 RtlLeaveCriticalSection 75951->75955 75952 423d7e 75952->75934 75953->75937 75954->75951 75955->75952 75956 43b5a8 75958 43b5d1 75956->75958 75959 43b606 75958->75959 75977 404794 11 API calls 75958->75977 75960 43b63d OffsetRect 75959->75960 75961 43b6c3 75959->75961 75962 43b65a 75960->75962 75973 4258f8 75961->75973 75965 4258f8 59 API calls 75962->75965 75967 43b679 DrawTextA OffsetRect 75965->75967 75966 43b6e8 75968 404740 11 API calls 75966->75968 75970 43b69c 75967->75970 75969 43b6fd 75968->75969 75971 4258f8 59 API calls 75970->75971 75972 43b6bb DrawTextA 75971->75972 75972->75966 75974 425902 75973->75974 75978 4259cc 75974->75978 75977->75959 75979 42590f DrawTextA 75978->75979 75985 4259e5 75978->75985 75979->75966 75980 425a09 75981 425a1a 75980->75981 75989 425a68 18 API calls 75980->75989 75983 425a26 75981->75983 75990 425a94 6 API calls 75981->75990 75983->75979 75991 425ac4 10 API calls 75983->75991 75985->75980 75988 40cce8 42 API calls 75985->75988 75988->75980 75989->75981 75990->75983 75991->75979 75996 445370 75997 44537c 75996->75997 75999 44539c 75996->75999 75998 44663c 107 API calls 75997->75998 75998->75999 76000 453470 76001 453484 76000->76001 76003 4534bf 76000->76003 76016 40d47c 76001->76016 76005 453521 76003->76005 76006 4534e9 76003->76006 76004 45348e 76004->76003 76007 45349f GetModuleHandleA 76004->76007 76033 4523b8 43 API calls 76005->76033 76031 4523b8 43 API calls 76006->76031 76007->76003 76008 4534af GetProcAddress 76007->76008 76008->76003 76011 4534fd 76015 45351a 76011->76015 76032 40cce8 42 API calls 76011->76032 76012 453533 76012->76015 76034 40cce8 42 API calls 76012->76034 76035 4047d8 76016->76035 76020 40d4b1 76021 40d4c9 76020->76021 76022 40d53c 76020->76022 76023 402774 11 API calls 76021->76023 76024 404740 11 API calls 76022->76024 76026 40d4d0 76023->76026 76025 40d551 76024->76025 76025->76004 76027 40d4fc 751C1540 76026->76027 76028 40d516 76026->76028 76027->76028 76045 402794 11 API calls 76028->76045 76030 40d534 76030->76004 76031->76011 76032->76015 76033->76012 76034->76015 76037 4047dc 76035->76037 76036 404800 76039 404c50 76036->76039 76037->76036 76046 402794 11 API calls 76037->76046 76040 404c0c 76039->76040 76041 404c47 76040->76041 76042 404804 11 API calls 76040->76042 76041->76020 76043 404c23 76042->76043 76043->76041 76047 402794 11 API calls 76043->76047 76045->76030 76046->76036 76047->76041 76048 460e70 76049 460ec0 76048->76049 76050 460e98 76048->76050 76095 46563c 76049->76095 76050->76049 76104 4067b4 42 API calls 76050->76104 76054 460eb1 76105 40cc2c 11 API calls 76054->76105 76056 4612a0 76057 4612f2 76056->76057 76109 46001c 50 API calls 76056->76109 76059 4612fe 76057->76059 76060 46130b 76057->76060 76110 4491c8 42 API calls 76059->76110 76063 461336 76060->76063 76064 461317 76060->76064 76061 460f04 76086 461022 76061->76086 76091 460f6b 76061->76091 76069 461340 GetActiveWindow 76063->76069 76066 46132e SetWindowPos 76064->76066 76065 461306 76066->76065 76067 4611c6 76070 4611d2 76067->76070 76071 461208 76067->76071 76068 46127b 76076 461295 ShowWindow 76068->76076 76072 46136a 76069->76072 76073 46134b 76069->76073 76077 4611dc SendMessageA 76070->76077 76079 461222 ShowWindow 76071->76079 76074 461395 76072->76074 76075 461370 76072->76075 76078 461353 IsIconic 76073->76078 76084 46139f ShowWindow 76074->76084 76083 461387 SetWindowPos SetActiveWindow 76075->76083 76076->76065 76080 44bc70 76077->76080 76078->76072 76081 46135d 76078->76081 76082 44bc70 76079->76082 76087 461200 ShowWindow 76080->76087 76111 45bc80 GetCurrentThreadId 76081->76111 76088 461246 CallWindowProcA 76082->76088 76083->76065 76084->76065 76085 46101d 76085->76067 76085->76068 76086->76085 76107 45f2cc 42 API calls 76086->76107 76089 461259 SendMessageA 76087->76089 76108 4456b0 76088->76108 76089->76065 76091->76085 76106 45f2cc 42 API calls 76091->76106 76096 460ecf 76095->76096 76102 46564f 76095->76102 76096->76056 76096->76061 76096->76065 76097 4656b2 76098 4655e0 2 API calls 76097->76098 76098->76096 76100 4656a3 76115 4655e0 IsWindowVisible 76100->76115 76102->76097 76102->76100 76103 465699 IsChild 76102->76103 76112 462774 76102->76112 76103->76100 76103->76102 76104->76054 76105->76049 76106->76085 76107->76085 76108->76089 76109->76057 76110->76065 76111->76072 76113 41a800 42 API calls 76112->76113 76114 462784 76113->76114 76114->76102 76116 465637 76115->76116 76117 465603 76115->76117 76116->76096 76117->76116 76118 46560b SetWindowPos 76117->76118 76118->76116 76119 460530 76120 46053f 76119->76120 76125 45ef58 76120->76125 76123 46055f 76126 45efec 76125->76126 76138 45ef7c 76125->76138 76128 45effd 76126->76128 76156 458a68 58 API calls 76126->76156 76129 45f03d 76128->76129 76132 45f0d5 76128->76132 76130 45f0b0 76129->76130 76140 45f058 76129->76140 76133 45f0ef 76130->76133 76144 45f0c4 76130->76144 76131 462774 42 API calls 76131->76138 76132->76133 76139 45f0e9 SetMenu 76132->76139 76134 45f101 76133->76134 76135 45f0ae 76133->76135 76159 45ee90 48 API calls 76134->76159 76135->76133 76158 46001c 50 API calls 76135->76158 76138->76126 76138->76131 76154 4067b4 42 API calls 76138->76154 76155 40cc68 42 API calls 76138->76155 76139->76133 76140->76133 76148 45f07b GetMenu 76140->76148 76141 45f108 76143 404740 11 API calls 76141->76143 76145 45f11d 76143->76145 76147 45f0cd SetMenu 76144->76147 76145->76123 76153 460434 10 API calls 76145->76153 76147->76133 76149 45f085 76148->76149 76150 45f09e 76148->76150 76152 45f098 SetMenu 76149->76152 76157 458a68 58 API calls 76150->76157 76152->76150 76153->76123 76154->76138 76155->76138 76156->76128 76157->76135 76158->76134 76159->76141 76160 43c174 76163 448c28 76160->76163 76169 448c5b 76163->76169 76164 448cd4 GetClassInfoA 76165 448cfb 76164->76165 76166 448d39 76165->76166 76167 448d0c UnregisterClassA 76165->76167 76168 448d19 RegisterClassA 76165->76168 76193 448df8 76166->76193 76167->76168 76168->76166 76170 448d34 76168->76170 76169->76164 76177 448c88 76169->76177 76220 4067b4 42 API calls 76169->76220 76222 40e230 44 API calls 76170->76222 76174 448cbd 76221 40cc68 42 API calls 76174->76221 76175 448d5d GetWindowLongA 76179 448d72 GetWindowLongA 76175->76179 76180 448d93 76175->76180 76177->76164 76179->76180 76181 448d84 SetWindowLongA 76179->76181 76196 409cac 76180->76196 76181->76180 76185 448da7 76207 4248b8 76185->76207 76187 448db1 76188 44663c 107 API calls 76187->76188 76189 448dbf 76188->76189 76190 404740 11 API calls 76189->76190 76191 43c19b 76190->76191 76224 4078b8 76193->76224 76195 448d4f 76195->76175 76223 40e230 44 API calls 76195->76223 76197 409cb0 76196->76197 76198 409cba 76196->76198 76229 402794 11 API calls 76197->76229 76200 44bf80 IsIconic 76198->76200 76201 44bfbd GetWindowRect 76200->76201 76202 44bf98 GetWindowPlacement 76200->76202 76203 44bfca GetWindowLongA 76201->76203 76202->76203 76204 44bfdf GetWindowLongA 76203->76204 76206 44c005 76203->76206 76205 44bff3 ScreenToClient ScreenToClient 76204->76205 76204->76206 76205->76206 76206->76185 76208 424a20 76207->76208 76209 4248ed 76207->76209 76235 404764 11 API calls 76208->76235 76230 423bfc RtlEnterCriticalSection 76209->76230 76212 424a40 76212->76187 76213 424a01 76234 423c08 RtlLeaveCriticalSection 76213->76234 76215 424a18 76215->76187 76216 4248f7 76216->76213 76231 408cf4 76216->76231 76218 42498e 76219 4249f2 CreateFontIndirectA 76218->76219 76219->76213 76220->76174 76221->76177 76222->76166 76223->76175 76228 402b78 76224->76228 76226 4078cb CreateWindowExA 76227 407905 76226->76227 76227->76195 76228->76226 76229->76198 76230->76216 76232 408d01 76231->76232 76233 408d19 CompareStringA 76232->76233 76233->76218 76234->76215 76235->76212 76236 45c8bc 76237 45c8c5 76236->76237 76240 45cdfc 76237->76240 76239 45c8d2 76241 45ceee 76240->76241 76242 45ce13 76240->76242 76241->76239 76242->76241 76261 45c39c 76242->76261 76245 45ce73 76248 45c39c 2 API calls 76245->76248 76246 45ce4d 76247 45ca08 48 API calls 76246->76247 76249 45ce5f 76247->76249 76250 45ce81 76248->76250 76251 45ca08 48 API calls 76249->76251 76252 45ce85 76250->76252 76253 45ceab 76250->76253 76255 45ce71 76251->76255 76256 45ca08 48 API calls 76252->76256 76264 45ca08 76253->76264 76255->76239 76258 45ce97 76256->76258 76260 45ca08 48 API calls 76258->76260 76259 45ca08 48 API calls 76259->76255 76260->76255 76276 45c31c 76261->76276 76263 45c3aa 76263->76245 76263->76246 76265 45ca2e 76264->76265 76266 45c31c 2 API calls 76265->76266 76267 45ca47 76265->76267 76266->76267 76268 45c31c 2 API calls 76267->76268 76269 45ca95 76268->76269 76286 45c900 76269->76286 76271 45caaf 76290 45c784 45 API calls 76271->76290 76273 45cae0 76274 45c31c 2 API calls 76273->76274 76275 45caeb 76274->76275 76275->76259 76277 44bc70 76276->76277 76278 45c339 GetWindowLongA 76277->76278 76279 45c376 76278->76279 76280 45c356 76278->76280 76285 45c2a0 GetWindowLongA 76279->76285 76284 45c2a0 GetWindowLongA 76280->76284 76283 45c362 76283->76263 76284->76283 76285->76283 76288 45c93d 76286->76288 76291 4243e4 GetSysColor 76288->76291 76289 45c9e2 76289->76271 76290->76273 76291->76289 76292 45d7dc 76293 45d7f3 76292->76293 76294 45d813 76292->76294 76299 444c30 76293->76299 76302 444c0c 76293->76302 76295 45d852 76294->76295 76305 45e194 107 API calls 76294->76305 76306 481160 76299->76306 76304 481160 8 API calls 76302->76304 76303 444c25 76303->76294 76304->76303 76305->76295 76311 44b65c 76306->76311 76308 481175 76309 444c49 76308->76309 76320 481078 InterlockedIncrement RtlEnterCriticalSection RtlLeaveCriticalSection InterlockedDecrement 76308->76320 76309->76294 76312 44b670 76311->76312 76313 44b694 IsIconic 76312->76313 76314 44b6c0 76312->76314 76316 44b718 76312->76316 76313->76314 76315 44b6a4 SetWindowPos 76313->76315 76314->76316 76317 44b6dd GetWindowPlacement 76314->76317 76315->76316 76316->76308 76321 444df0 76317->76321 76319 44b6fe SetWindowPlacement 76319->76316 76320->76309 76321->76319 76322 4649fc PeekMessageA 76323 464a86 76322->76323 76324 464a18 76322->76324 76324->76323 76334 46495c 76324->76334 76333 464a78 TranslateMessage DispatchMessageA 76333->76323 76335 464987 76334->76335 76336 464970 76334->76336 76335->76323 76338 464854 76335->76338 76336->76335 76358 4658e4 8 API calls 76336->76358 76339 464864 76338->76339 76340 46489e 76338->76340 76339->76340 76341 46488b TranslateMDISysAccel 76339->76341 76340->76323 76342 4648a4 76340->76342 76341->76340 76343 464955 76342->76343 76344 4648bc 76342->76344 76343->76323 76355 464830 76343->76355 76344->76343 76345 4648c7 GetCapture 76344->76345 76346 4648d2 76345->76346 76347 464928 GetWindowLongA 76345->76347 76350 464903 76346->76350 76352 4648ec GetParent 76346->76352 76353 4648e3 76346->76353 76359 442330 7 API calls 76346->76359 76347->76343 76348 464938 SendMessageA 76347->76348 76348->76343 76354 464924 76348->76354 76351 464909 SendMessageA 76350->76351 76350->76353 76351->76343 76351->76354 76352->76346 76353->76351 76354->76343 76356 464843 IsDialogMessage 76355->76356 76357 464850 76355->76357 76356->76357 76357->76323 76357->76333 76358->76335 76359->76346 76360 40963c 76363 4095d4 76360->76363 76364 404c00 76363->76364 76365 4095ee FindFirstFileA 76364->76365 76366 4095f9 FindClose 76365->76366 76367 40962d 76365->76367 76366->76367 76368 409608 FileTimeToLocalFileTime FileTimeToDosDateTime 76366->76368 76368->76367

        Control-flow Graph

        APIs
        • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00405F30
        • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405F4E
        • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405F6C
        • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00405F8A
        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,00406019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00405FD3
        • RegQueryValueExA.ADVAPI32(?,00406180,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,00406019,?,80000001), ref: 00405FF1
        • RegCloseKey.ADVAPI32(?,00406020,00000000,00000000,00000005,00000000,00406019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406013
        • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00406030
        • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 0040603D
        • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 00406043
        • lstrlen.KERNEL32(00000000), ref: 0040606E
        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 004060B5
        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 004060C5
        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 004060ED
        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 004060FD
        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00406123
        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00406133
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
        • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
        • API String ID: 1759228003-3917250287
        • Opcode ID: dd3ca194a324f209d7dea3dec0006bfe6f1c7d5031058af567cc3c9e6805f411
        • Instruction ID: b1afeb856dea951c15522c0bd6632b498ddf59a7d963552d90492bf9f60f008d
        • Opcode Fuzzy Hash: dd3ca194a324f209d7dea3dec0006bfe6f1c7d5031058af567cc3c9e6805f411
        • Instruction Fuzzy Hash: 5851A375A4021D7EFB21D6A48C46FEF7BAC9B04748F0100B7BA45F65C2DA7C9E448B68

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 25 463e48-463e7c 26 463eb0-463ec5 call 463cfc 25->26 27 463e7e-463e7f 25->27 33 463ecb 26->33 34 463f79-463f7e 26->34 28 463e81-463e9d call 41a800 27->28 49 463e9f-463ea7 28->49 50 463eac-463eae 28->50 37 464417-46442c call 465010 33->37 38 463ed1-463ed4 33->38 35 463f80 34->35 36 463fcf-463fd4 34->36 43 463f86-463f8b 35->43 44 4642ef-4642f7 35->44 40 463fd6 36->40 41 463ff5-463ffa 36->41 59 4644f8-464500 37->59 45 463ed6 38->45 46 463f40-463f43 38->46 51 464431-464438 40->51 52 463fdc-463fe1 40->52 53 464000-464006 41->53 54 46446a-464471 41->54 56 463fb6-463fbb 43->56 57 463f8d 43->57 58 4642fd-464308 call 44bc70 44->58 44->59 60 4641dc-4641e3 45->60 61 463edc-463edf 45->61 47 463f45 46->47 48 463f62-463f65 46->48 64 4644bb-4644cc call 463300 call 463dc0 47->64 65 463f4b-463f4e 47->65 66 4640a7-4640b5 call 46454c 48->66 67 463f6b-463f6e 48->67 71 464517-46451d 49->71 50->26 50->28 69 464452-464465 call 464b2c 51->69 70 46443a-46444d call 464ad0 51->70 79 463fe7-463fea 52->79 80 4643d8-4643e6 IsIconic 52->80 81 4642ac-4642c8 call 465f4c 53->81 82 46400c 53->82 74 464484-464493 54->74 75 464473-464482 54->75 76 4643b0-4643bb 56->76 77 463fc1-463fc4 56->77 72 463f93-463f98 57->72 73 464388-464393 57->73 58->59 109 46430e-46431d call 44bc70 IsWindowEnabled 58->109 59->71 60->59 78 4641e9-4641f3 60->78 62 463ee5 61->62 63 4644f1-4644f2 call 463dc0 61->63 62->46 108 4644f7 63->108 64->59 84 463f54-463f57 65->84 85 464495-4644b9 call 4505a4 call 463d54 call 463dc0 65->85 66->59 87 463f74 67->87 88 4641f8-464204 67->88 69->59 70->59 92 464011-464021 72->92 93 463f9a-463fa0 72->93 73->59 99 464399-4643ab 73->99 74->59 75->59 76->59 101 4643c1-4643d3 76->101 96 4642cd-4642da call 464990 77->96 97 463fca 77->97 78->59 79->37 98 463ff0 79->98 80->59 83 4643ec-4643f7 GetFocus 80->83 81->59 82->63 83->59 102 4643fd-464406 call 45bc80 83->102 103 463f5d 84->103 104 4640db-4640fc call 463dc0 84->104 85->59 87->63 88->59 115 46420a-464214 88->115 116 464023-464028 92->116 117 46402c-464034 call 464568 92->117 112 463fa6-463fab 93->112 113 4641b0-4641d7 SendMessageA 93->113 96->59 139 4642e0-4642ea 96->139 97->63 98->63 99->59 101->59 102->59 148 46440c-464412 SetFocus 102->148 103->63 149 464120-46413d call 463c50 PostMessageA 104->149 150 4640fe-46411b call 463c60 PostMessageA 104->150 108->59 109->59 151 464323-464332 call 44bc70 IsWindowVisible 109->151 124 463fb1 112->124 125 4644ce-4644da call 437eb4 call 437f94 112->125 113->59 115->59 128 46421a-464224 115->128 130 46402a-46404d call 463dc0 116->130 131 464039-464041 call 464618 116->131 117->59 124->63 125->59 168 4644dc-4644e6 call 437eb4 call 437ff0 125->168 143 464226-464242 call 40e8ac 128->143 144 46429f-4642a7 128->144 130->59 131->59 139->59 166 464284-46429a GetLastError 143->166 167 464244-464266 GetProcAddress 143->167 144->59 148->59 149->59 150->59 151->59 169 464338-464383 GetFocus call 44bc70 SetFocus call 44663c SetFocus 151->169 166->59 167->59 170 46426c-46427f 167->170 168->59 169->59 170->59
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: RegisterAutomation$vcltest3.dll
        • API String ID: 0-2963190186
        • Opcode ID: 8f404a40ef8f317abbc70a23dba416e64577a72a97c24de321e735cd85c35eb2
        • Instruction ID: 583fc690577ecc690f831f8c4da13c89a5322495d62f871de0d8bc76e7124e11
        • Opcode Fuzzy Hash: 8f404a40ef8f317abbc70a23dba416e64577a72a97c24de321e735cd85c35eb2
        • Instruction Fuzzy Hash: 96E16170A04144DFDF50DB5DC58AB5EB7F0AF85314F1581A6E404AB352EB38EE41DB2A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 215 460e70-460e96 216 460ec5-460eee call 46563c 215->216 217 460e98-460ea2 215->217 222 460ef4-460efe 216->222 223 4613a5-4613bc 216->223 217->216 219 460ea4-460ec0 call 4067b4 call 40cc2c call 4040d8 217->219 219->216 225 460f04-460f49 call 403b48 222->225 226 4612a0-4612e6 call 403b48 222->226 238 460f6b-460f75 225->238 239 460f4b-460f55 225->239 236 4612f2-4612fc 226->236 237 4612e8-4612ed call 46001c 226->237 241 4612fe-461306 call 4491c8 236->241 242 46130b-461315 236->242 237->236 245 460f77-460f8e call 444e54 238->245 246 460faf-460fc3 call 462708 238->246 243 461022-461033 239->243 244 460f5b-460f65 239->244 241->223 251 461336-461349 call 44bc70 GetActiveWindow 242->251 252 461317-461334 call 44bc70 SetWindowPos 242->252 249 461107-461109 243->249 250 461039-46104b 243->250 244->238 244->243 274 460f93-460fa8 call 444e98 245->274 275 460f90 245->275 265 460fc5 246->265 266 460fc8-460fda call 4626fc 246->266 254 46110f-461119 249->254 255 4611ac-4611c0 249->255 258 46104d-461060 call 403ad8 250->258 259 461068-46106a 250->259 281 46136c-46136e 251->281 282 46134b-46135b call 44bc70 IsIconic 251->282 252->223 263 461153-461167 call 462738 254->263 264 46111b-461132 call 444e54 254->264 269 4611c6-4611d0 255->269 270 46127b-46129b call 44bc70 ShowWindow 255->270 258->259 301 461062-461065 258->301 271 461094-4610a8 call 462708 259->271 272 46106c-461077 259->272 303 46116c-46117e call 46272c 263->303 304 461169 263->304 315 461137-46114c call 444e98 264->315 316 461134 264->316 265->266 306 460fdf-460fe1 266->306 310 460fdc 266->310 279 4611d2-461206 call 44bc70 SendMessageA call 44bc70 ShowWindow 269->279 280 461208-461254 call 44bc70 ShowWindow call 44bc70 CallWindowProcA call 4456b0 269->280 270->223 308 4610ad-4610bf call 4626fc 271->308 309 4610aa 271->309 286 46107c-46108a 272->286 287 461079 272->287 274->306 307 460faa-460fad 274->307 275->274 343 461259-461276 SendMessageA 279->343 280->343 298 461395-4613a0 call 44bc70 ShowWindow 281->298 299 461370-461393 call 44bc70 SetWindowPos SetActiveWindow 281->299 282->281 325 46135d-46136a call 44bc70 call 45bc80 282->325 289 46108f-461092 286->289 290 46108c 286->290 287->286 305 4610c4-4610c6 289->305 290->289 298->223 299->223 301->259 340 461183-461185 303->340 341 461180 303->341 304->303 320 4610ca-4610cc 305->320 321 4610c8 305->321 322 460fe5-460fe7 306->322 323 460fe3 306->323 307->306 308->305 342 4610c1 308->342 309->308 310->306 315->340 346 46114e-461151 315->346 316->315 332 4610d0-4610f4 320->332 333 4610ce 320->333 321->320 334 460feb-46100f 322->334 335 460fe9 322->335 323->322 325->281 332->255 354 4610fa-461102 call 45f2cc 332->354 333->332 334->255 355 461015-46101d call 45f2cc 334->355 335->334 347 461187 340->347 348 461189-46118b 340->348 341->340 342->305 343->223 346->340 347->348 352 46118f-4611a4 348->352 353 46118d 348->353 352->255 353->352 354->255 355->255
        APIs
        • SendMessageA.USER32(?,00000223,00000000,00000000), ref: 004611F1
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: LoadMessageSendString
        • String ID:
        • API String ID: 1946433856-0
        • Opcode ID: 70cd7535d70ffc1023bb0bf2c57a55cb16a6320174523d7629c2def00a05633e
        • Instruction ID: d2447ad7c812cef7f355c5b8bf30f00bc73ed9e532e524666dd8404afffa1251
        • Opcode Fuzzy Hash: 70cd7535d70ffc1023bb0bf2c57a55cb16a6320174523d7629c2def00a05633e
        • Instruction Fuzzy Hash: 3CF17234A04244EFEB00DBA9D9C5F9E77F4AB09304F1941A6E900D73A2E779EE40DB59
        APIs
        • FindFirstFileA.KERNEL32(00000000,?), ref: 004095EF
        • FindClose.KERNEL32(00000000,00000000,?), ref: 004095FA
        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00409613
        • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 00409624
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileTime$Find$CloseDateFirstLocal
        • String ID:
        • API String ID: 2659516521-0
        • Opcode ID: 5be38ce4b54c9a34e2958bb37c5fa5d9521124c6ff4203c68b476d3a50e74fb5
        • Instruction ID: 8829e51eb595bbc14318a1cce09de129dbd2a7f851757a938066c81d4e645bb0
        • Opcode Fuzzy Hash: 5be38ce4b54c9a34e2958bb37c5fa5d9521124c6ff4203c68b476d3a50e74fb5
        • Instruction Fuzzy Hash: BBF012B2D0420C66DF10EBE58C85ACFB3AC9B08324F5146B7B559F32D2EA399F184B54
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Capture
        • String ID:
        • API String ID: 1145282425-3916222277
        • Opcode ID: 923e18214c8a00657f3384c6cd91179b72a0ac4cca02a0797efb9b6f60dbaafa
        • Instruction ID: cb7705ff0e372e502065e7eede82b890e9e884c0f9faa5684a2c3a519fb1f795
        • Opcode Fuzzy Hash: 923e18214c8a00657f3384c6cd91179b72a0ac4cca02a0797efb9b6f60dbaafa
        • Instruction Fuzzy Hash: 3831A171314201CBFB20AF3D8C8561B62919B81368F18866FB956C7B92DA3CDC09E74A
        APIs
        • GetVersion.KERNEL32(00000000,00450CDA), ref: 00450C6E
          • Part of subcall function 00450A04: GetCurrentProcessId.KERNEL32(?,00000000,00450B7C), ref: 00450A25
          • Part of subcall function 00450A04: GlobalAddAtomA.KERNEL32(00000000), ref: 00450A58
          • Part of subcall function 00450A04: GetCurrentThreadId.KERNEL32 ref: 00450A73
          • Part of subcall function 00450A04: GlobalAddAtomA.KERNEL32(00000000), ref: 00450AA9
          • Part of subcall function 00450A04: RegisterClipboardFormatA.USER32(00000000), ref: 00450ABF
          • Part of subcall function 00450A04: GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,00450B7C), ref: 00450B43
          • Part of subcall function 00450A04: GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 00450B54
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AtomCurrentGlobal$AddressClipboardFormatHandleModuleProcProcessRegisterThreadVersion
        • String ID: 0E$@ E
        • API String ID: 3775504709-3581582047
        • Opcode ID: f390beba46c0616a9bf84ffa27f236f24164c37965f54d0df47ea80dd5a6168b
        • Instruction ID: 92a494f15840cef22032a464db4778cee468f94faf7da8154a49d67c0d7d4e45
        • Opcode Fuzzy Hash: f390beba46c0616a9bf84ffa27f236f24164c37965f54d0df47ea80dd5a6168b
        • Instruction Fuzzy Hash: 9AF0313E2053408FC206EB25EE524557B64E74B3053A5053AED0043722CA799CBADA5E
        APIs
        • GetKeyboardState.USER32(?), ref: 0044683D
        • KiUserCallbackDispatcher.NTDLL ref: 00446890
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CallbackDispatcherKeyboardStateUser
        • String ID:
        • API String ID: 4281813569-0
        • Opcode ID: de6d012313b055398c831f40440e0fc7152c65810dec6393d35254adb44e0ad1
        • Instruction ID: 42d197ca61cba4adaacafbe77ce246ea256eb65a32fa0df192794913ce4d8160
        • Opcode Fuzzy Hash: de6d012313b055398c831f40440e0fc7152c65810dec6393d35254adb44e0ad1
        • Instruction Fuzzy Hash: 0741C130A006158BEB24EF69C4887AAB7F0EF46708F1641A7D404DB395C778ED49CB9B
        APIs
        • FindResourceA.KERNEL32(?,00000000,0000000A), ref: 0041A3D2
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FindResource
        • String ID:
        • API String ID: 1635176832-0
        • Opcode ID: de5499a6d0b4f7f7c416ee5ddefc97f75eba42f1ab41bb3e74b3356c65b91d08
        • Instruction ID: dcf4e022dc56ef2fa69b9cfc6607b2b11ab906fdb91ed97384872058890c6208
        • Opcode Fuzzy Hash: de5499a6d0b4f7f7c416ee5ddefc97f75eba42f1ab41bb3e74b3356c65b91d08
        • Instruction Fuzzy Hash: 0D01F7B13053006FE300DF2AFC82E6AB7EDDB89718711407BF90497381DA79AC119629
        APIs
        • GetSystemInfo.KERNEL32(?), ref: 004261E8
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: InfoSystem
        • String ID:
        • API String ID: 31276548-0
        • Opcode ID: e37eea4d624e4a15b4d87b1903d7472f96202aa565e9f47abd2a345879c0eba4
        • Instruction ID: 96d9e19c0cec0c59c8ab45d6da492939af4a61e81fc83928871648adb39060ba
        • Opcode Fuzzy Hash: e37eea4d624e4a15b4d87b1903d7472f96202aa565e9f47abd2a345879c0eba4
        • Instruction Fuzzy Hash: 04F09671F05119DFCB10EF99D48889DBBB4FB5630179242DAD404E7342EF34A554CB95
        APIs
        • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 00463DEA
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: NtdllProc_Window
        • String ID:
        • API String ID: 4255912815-0
        • Opcode ID: 51379d74e1d7d2546c9bb4836826d0445103396eed893cc688ab5cf76951b134
        • Instruction ID: c6e738f43c88711b7573282911cb01791f22a857cf2755f83a1c042f090b1e49
        • Opcode Fuzzy Hash: 51379d74e1d7d2546c9bb4836826d0445103396eed893cc688ab5cf76951b134
        • Instruction Fuzzy Hash: 7DF0C579605608AFCB40DF9DC588D8AFBE8BB4C260B058195BD88CB321C234FD80CF90

        Control-flow Graph

        APIs
        • GetCurrentProcessId.KERNEL32(?,00000000,00450B7C), ref: 00450A25
        • GlobalAddAtomA.KERNEL32(00000000), ref: 00450A58
        • GetCurrentThreadId.KERNEL32 ref: 00450A73
        • GlobalAddAtomA.KERNEL32(00000000), ref: 00450AA9
        • RegisterClipboardFormatA.USER32(00000000), ref: 00450ABF
          • Part of subcall function 0041AA6C: RtlInitializeCriticalSection.NTDLL(00418200), ref: 0041AA8B
          • Part of subcall function 00450608: SetErrorMode.KERNEL32(00008000), ref: 00450621
          • Part of subcall function 00450608: GetModuleHandleA.KERNEL32(USER32,00000000,0045076E,?,00008000), ref: 00450645
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 00450652
          • Part of subcall function 00450608: LoadLibraryA.KERNEL32(imm32.dll,00000000,0045076E,?,00008000), ref: 0045066E
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 00450690
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 004506A5
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 004506BA
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 004506CF
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 004506E4
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 004506F9
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0045070E
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 00450723
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 00450738
          • Part of subcall function 00450608: GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0045074D
          • Part of subcall function 00450608: SetErrorMode.KERNEL32(?,00450775,00008000), ref: 00450768
          • Part of subcall function 004624DC: GetKeyboardLayout.USER32(00000000), ref: 00462521
          • Part of subcall function 004624DC: 73E9A570.USER32(00000000,?,?,00000000,?,00450AFE,00000000,00000000,?,?,00000000,00450B7C), ref: 00462576
          • Part of subcall function 004635C0: LoadIconA.USER32(00400000,MAINICON), ref: 004636A5
          • Part of subcall function 004635C0: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00450B14,00000000,00000000,?,?,00000000,00450B7C), ref: 004636D7
          • Part of subcall function 004635C0: OemToCharA.USER32(?,?), ref: 004636EA
          • Part of subcall function 004635C0: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00450B14,00000000,00000000,?,?,00000000,00450B7C), ref: 0046372A
        • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,00450B7C), ref: 00450B43
        • GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 00450B54
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressProc$Module$AtomCharCurrentErrorGlobalHandleLoadMode$A570ClipboardCriticalFileFormatIconInitializeKeyboardLayoutLibraryLowerNameProcessRegisterSectionThread
        • String ID: AnimateWindow$ControlOfs%.8X%.8X$Delphi%.8X$USER32
        • API String ID: 715191208-1126952177
        • Opcode ID: 18ba7db59d07c119697f9478a5f348a8b9100910e2357087ceaf53fbb6adca32
        • Instruction ID: 6f0301116cec063f86df16c02b44e992d3a29500f28cbff857a9f390ce30218b
        • Opcode Fuzzy Hash: 18ba7db59d07c119697f9478a5f348a8b9100910e2357087ceaf53fbb6adca32
        • Instruction Fuzzy Hash: A24181746002449FC700EFBAEC92A9D77F5EB54308B51443AF500E73A2DB39A9189B69

        Control-flow Graph

        APIs
          • Part of subcall function 00422518: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 00422536
        • GetClassInfoA.USER32(00400000,004635B0,?), ref: 00463927
        • RegisterClassA.USER32(00534050), ref: 0046393F
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        • SetWindowLongA.USER32(0000000E,000000FC,10A40000), ref: 004639DB
        • SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 004639FD
        • SetClassLongA.USER32(0000000E,000000F2,00000000), ref: 00463A10
        • GetSystemMenu.USER32(0000000E,00000000,0000000E,000000FC,10A40000,0045B9B0), ref: 00463A1B
        • DeleteMenu.USER32(00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10A40000,0045B9B0), ref: 00463A2A
        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10A40000,0045B9B0), ref: 00463A37
        • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10A40000,0045B9B0), ref: 00463A4E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Menu$ClassDelete$Long$AllocInfoLoadMessageRegisterSendStringSystemVirtualWindow
        • String ID: t(B
        • API String ID: 2103932818-1765185416
        • Opcode ID: ed7393541091142b8fee76f1f8e24bc4b3f9191385328b195e6262c05086cdde
        • Instruction ID: 4e2f5335a1501f36c408db4760fdac89cd7e3a3c3bbe6170a9d3d40ceaeca4bc
        • Opcode Fuzzy Hash: ed7393541091142b8fee76f1f8e24bc4b3f9191385328b195e6262c05086cdde
        • Instruction Fuzzy Hash: 09418371B042406FE710EF69DC82F6637A8AB55704F404466FA40EF3D2DB79BC449B69

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 396 448c28-448c5f 398 448cd4-448cf9 GetClassInfoA 396->398 399 448c61-448c68 396->399 400 448d08-448d0a 398->400 401 448cfb-448d06 398->401 399->398 402 448c6a-448c6f 399->402 404 448d0c-448d14 UnregisterClassA 400->404 405 448d19-448d32 RegisterClassA 400->405 401->400 403 448d39-448d56 call 448df8 401->403 406 448c94-448ccf call 4067b4 call 40cc68 call 4040d8 402->406 407 448c71-448c75 402->407 416 448d5d-448d70 GetWindowLongA 403->416 417 448d58 call 40e230 403->417 404->405 405->403 409 448d34 call 40e230 405->409 406->398 407->406 408 448c77-448c86 call 403ad8 407->408 408->406 420 448c88-448c92 call 44bc70 408->420 409->403 422 448d72-448d82 GetWindowLongA 416->422 423 448d93-448dba call 409cac call 44bf80 call 4248b8 call 44663c 416->423 417->416 420->398 422->423 424 448d84-448d8e SetWindowLongA 422->424 435 448dbf-448dc3 423->435 424->423 436 448dc5-448dcb call 403b48 435->436 437 448dd0-448de8 call 404740 435->437 436->437
        APIs
        • GetClassInfoA.USER32(?,?,?), ref: 00448CEC
        • UnregisterClassA.USER32(?,?), ref: 00448D14
        • RegisterClassA.USER32(?), ref: 00448D2A
        • GetWindowLongA.USER32(00000000,000000F0), ref: 00448D66
        • GetWindowLongA.USER32(00000000,000000F4), ref: 00448D7B
        • SetWindowLongA.USER32(00000000,000000F4,00000000), ref: 00448D8E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ClassLongWindow$InfoRegisterUnregister
        • String ID: @
        • API String ID: 717780171-2766056989
        • Opcode ID: 44f79c3cf5b4c8bec9117fe7197f57a1413243f192d86c090bb1bb2e41820fd3
        • Instruction ID: 6a2be13d4589b8ea2962de4882f4b5f718a5682a6136de290158235c9772cc3f
        • Opcode Fuzzy Hash: 44f79c3cf5b4c8bec9117fe7197f57a1413243f192d86c090bb1bb2e41820fd3
        • Instruction Fuzzy Hash: 2951A270A003489BEB20EB69CC81B9E77F9AF45308F1045AEE545E73D1DB38AD44CB69

        Control-flow Graph

        APIs
        • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 00462D0C
        • CreateFontIndirectA.GDI32(?), ref: 00462D19
        • GetStockObject.GDI32(0000000D), ref: 00462D2F
          • Part of subcall function 00424B44: MulDiv.KERNEL32(00000000,?,00000048), ref: 00424B51
        • SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 00462D58
        • CreateFontIndirectA.GDI32(?), ref: 00462D68
        • CreateFontIndirectA.GDI32(?), ref: 00462D81
        • GetStockObject.GDI32(0000000D), ref: 00462DA7
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CreateFontIndirect$InfoObjectParametersStockSystem
        • String ID:
        • API String ID: 2891467149-0
        • Opcode ID: 4a6e7a6f2348574796b2311c02bf24aab0c11e06f306dbf0252e2a1823b46d75
        • Instruction ID: d7afdf5b2c628b190c15e80c45626dde664f19f76362368a46e0ed39360024e9
        • Opcode Fuzzy Hash: 4a6e7a6f2348574796b2311c02bf24aab0c11e06f306dbf0252e2a1823b46d75
        • Instruction Fuzzy Hash: F631A830748644ABDB50EB65EC52B9673F4BB84304F4440B6B908DB396EBB89D45CB3A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 471 442244-442281 SetWindowLongA GetWindowLongA 472 4422a1-4422ea SetPropA * 2 call 4224f0 471->472 473 442283-442290 GetWindowLongA 471->473 475 4422f0-4422f8 472->475 473->472 474 442292-44229c SetWindowLongA 473->474 474->472
        APIs
        • SetWindowLongA.USER32(?,000000FC,?), ref: 0044226C
        • GetWindowLongA.USER32(?,000000F0), ref: 00442277
        • GetWindowLongA.USER32(?,000000F4), ref: 00442289
        • SetWindowLongA.USER32(?,000000F4,?), ref: 0044229C
        • SetPropA.USER32(?,00000000,00000000), ref: 004422B3
        • SetPropA.USER32(?,00000000,00000000), ref: 004422CA
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: LongWindow$Prop
        • String ID:
        • API String ID: 3887896539-0
        • Opcode ID: 72e3cf06a27a8d0d19c1f90564693e2f8e07cf539f9d6f94a880299fa36e809b
        • Instruction ID: 125747be33099d6b0dad101e019a8ae1051cd75e8e790574a369fcfdc6eb5ccc
        • Opcode Fuzzy Hash: 72e3cf06a27a8d0d19c1f90564693e2f8e07cf539f9d6f94a880299fa36e809b
        • Instruction Fuzzy Hash: D211C975504208BFDB01DF99EC84EAA37A8BB1C3A4F108655F914DB3A1D738EA44AB64

        Control-flow Graph

        APIs
        • LoadIconA.USER32(00400000,MAINICON), ref: 004636A5
        • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00450B14,00000000,00000000,?,?,00000000,00450B7C), ref: 004636D7
        • OemToCharA.USER32(?,?), ref: 004636EA
        • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00450B14,00000000,00000000,?,?,00000000,00450B7C), ref: 0046372A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Char$FileIconLoadLowerModuleName
        • String ID: MAINICON
        • API String ID: 3935243913-2283262055
        • Opcode ID: c0368131bae60808a48fe04908a02c95101316b3cdd5c42d753aebc53d3a1703
        • Instruction ID: 319a1b27e1a313a84912d7ec13f5c74c061438d6f724cd3c6a4b3949ee5513b3
        • Opcode Fuzzy Hash: c0368131bae60808a48fe04908a02c95101316b3cdd5c42d753aebc53d3a1703
        • Instruction Fuzzy Hash: 4C5153706042849FDB10DF29D8857C57BE4AB15309F4480BAE848DF397EBB9DA88CB65

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 517 45da00-45da59 call 448508 call 447c64 521 45da5e-45da68 517->521 522 45da6e-45da78 521->522 523 45dbca-45dbd5 521->523 522->523 524 45da7e-45da88 522->524 525 45dbd7-45dbdc call 444e6c 523->525 526 45dbe1-45dbec 523->526 529 45dacd-45daf3 call 45dd88 524->529 530 45da8a-45da9c 524->530 525->526 527 45dbee-45dbf3 call 444eb0 526->527 528 45dbf8-45dc09 526->528 527->528 534 45dc2f-45dc55 call 44663c call 448510 528->534 535 45dc0b-45dc2a call 45d060 call 44b734 528->535 529->523 541 45daf9-45db24 call 45d060 call 44b734 529->541 530->529 536 45da9e-45dac8 call 424a84 MulDiv call 424a8c 530->536 535->534 536->529 553 45db26-45db43 MulDiv 541->553 554 45db49-45db53 541->554 553->554 555 45db55-45db72 MulDiv 554->555 556 45db78-45db82 554->556 555->556 556->523 557 45db84-45dbc4 MulDiv * 2 556->557 557->523
        APIs
        • MulDiv.KERNEL32(00000000,?,00000000), ref: 0045DABF
        • MulDiv.KERNEL32(?,00000000,00000000), ref: 0045DB3B
        • MulDiv.KERNEL32(?,00000000,00000000), ref: 0045DB6A
        • MulDiv.KERNEL32(?,00000000,00000000), ref: 0045DB99
        • MulDiv.KERNEL32(?,00000000,00000000), ref: 0045DBBC
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d75d5f95a503a9609f6f3764ca11e2110b4671cfdb13cf38f80fb8bb0c265ddf
        • Instruction ID: 6e2ad1fc434316b6342ecacd03c27254988ab4f16f81b772471c3f1ed57fb134
        • Opcode Fuzzy Hash: d75d5f95a503a9609f6f3764ca11e2110b4671cfdb13cf38f80fb8bb0c265ddf
        • Instruction Fuzzy Hash: E971E574A04104EFDB10DBA9C589EAEB3F5AF49304F2941F6E808DB362C735AE45DB54

        Control-flow Graph

        APIs
        • OffsetRect.USER32(?,00000001,00000001), ref: 0043B642
        • DrawTextA.USER32(00000000,00000000,00000000,?,00000000), ref: 0043B67A
        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0043B684
        • DrawTextA.USER32(00000000,00000000,00000000,?,00000000), ref: 0043B6BC
        • DrawTextA.USER32(00000000,00000000,00000000,?,00000000), ref: 0043B6E3
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: DrawText$OffsetRect
        • String ID:
        • API String ID: 1886049697-0
        • Opcode ID: cc14acc726de43096e31d73b9d68371fc2e7c2bcd5553615c3706f160ba04a90
        • Instruction ID: 1ea0d523809295977f0cd654b747192f750e042fe7fdf6a78ab76ae3c370d537
        • Opcode Fuzzy Hash: cc14acc726de43096e31d73b9d68371fc2e7c2bcd5553615c3706f160ba04a90
        • Instruction Fuzzy Hash: E2317770604144AFDB11EB6ADC86B8B77E8EF49314F5540BAB904EB396CB789D00C669

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 601 45ef58-45ef7a 602 45efec-45eff4 601->602 603 45ef7c-45ef89 call 462788 601->603 605 45eff6-45eff8 call 458a68 602->605 606 45effd-45f001 602->606 603->602 611 45ef8b-45ef8f 603->611 605->606 609 45f003-45f005 606->609 610 45f00d 606->610 612 45f007-45f00b 609->612 613 45f00f-45f017 609->613 610->613 614 45ef91-45efa3 call 462774 611->614 612->610 612->613 615 45f022-45f024 613->615 616 45f019-45f01d call 421558 613->616 625 45efa5-45efb3 call 462774 614->625 626 45efe6-45efea 614->626 619 45f0d5-45f0de call 44bf74 615->619 620 45f02a-45f02e 615->620 616->615 633 45f0e0-45f0ea call 44bc70 SetMenu 619->633 634 45f0ef-45f0f6 619->634 623 45f030-45f037 620->623 624 45f03d-45f047 620->624 623->619 623->624 628 45f052-45f056 624->628 629 45f049-45f050 624->629 625->626 645 45efb5-45efe1 call 4067b4 call 40cc68 call 4040d8 625->645 626->602 626->614 630 45f058-45f061 call 44bf74 628->630 631 45f0b0-45f0b7 628->631 629->628 629->630 630->634 647 45f067-45f083 call 44bc70 GetMenu 630->647 631->634 638 45f0b9-45f0c2 call 44bf74 631->638 633->634 635 45f101-45f11d call 45ee90 call 404740 634->635 636 45f0f8-45f0fc call 46001c 634->636 636->635 638->634 652 45f0c4-45f0d3 call 44bc70 SetMenu 638->652 645->626 663 45f085-45f099 call 44bc70 SetMenu 647->663 664 45f09e-45f0ae call 44bc70 call 458a68 647->664 652->634 663->664 664->634
        APIs
        • GetMenu.USER32(00000000), ref: 0045F07C
        • SetMenu.USER32(00000000,00000000), ref: 0045F099
        • SetMenu.USER32(00000000,00000000), ref: 0045F0CE
        • SetMenu.USER32(00000000,00000000), ref: 0045F0EA
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Menu$LoadString
        • String ID:
        • API String ID: 3688185913-0
        • Opcode ID: 2c81ceede61901455fb1a79435259bb8e73476fd07ad485d05fb2d09f672dcb1
        • Instruction ID: e7aa481a54ce0e755437a761022cfda8020e3e360ae4271687720fa4b9c50058
        • Opcode Fuzzy Hash: 2c81ceede61901455fb1a79435259bb8e73476fd07ad485d05fb2d09f672dcb1
        • Instruction Fuzzy Hash: 4C51C030A002449BDB20AB7AC98575A77A59F00709F0945BBBC04DB397CE7DDC4C8B9E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 672 4225d4-422602 GetClassInfoA 673 422604-42260c 672->673 674 42260e-422610 672->674 673->674 675 42262d-422662 call 4078b8 673->675 676 422612-42261e UnregisterClassA 674->676 677 422623-422628 RegisterClassA 674->677 680 422664-422673 call 422518 SetWindowLongA 675->680 681 422678-42267e 675->681 676->677 677->675 680->681
        APIs
        • GetClassInfoA.USER32(00400000,004225C4,?), ref: 004225F5
        • UnregisterClassA.USER32(004225C4,00400000), ref: 0042261E
        • RegisterClassA.USER32(00533598), ref: 00422628
        • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 00422673
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Class$InfoLongRegisterUnregisterWindow
        • String ID:
        • API String ID: 4025006896-0
        • Opcode ID: 146f6f52f2410d57444c6129e8a8c5d27ba1c02fc22bb8882a841222a0d3edf5
        • Instruction ID: e9c323d6891fc2a5740c800913631ac0d217a0a602bd95de30544362e39d76f1
        • Opcode Fuzzy Hash: 146f6f52f2410d57444c6129e8a8c5d27ba1c02fc22bb8882a841222a0d3edf5
        • Instruction Fuzzy Hash: 620188727042047BDB10EB68ED81F5A37ACE729304F508126F914E73D1D775E90897B9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 684 463b48-463b58 685 463bf2-463bf6 684->685 686 463b5e-463b65 684->686 687 463bec 686->687 688 463b6b-463b8c EnumWindows 686->688 687->685 688->687 689 463b8e-463ba9 GetWindow GetWindowLongA 688->689 690 463bb2-463bbf 689->690 691 463bab 689->691 690->687 692 463bc1-463bea call 41a800 SetWindowPos 690->692 691->690 692->687
        APIs
        • EnumWindows.USER32(Function_00063AD8), ref: 00463B7D
        • GetWindow.USER32(?,00000003), ref: 00463B95
        • GetWindowLongA.USER32(00000000,000000EC), ref: 00463BA2
        • SetWindowPos.USER32(00000000,000000EC,00000000,00000000,00000000,00000000,00000213,00000000,000000EC,?,00000003,Function_00063AD8), ref: 00463BE1
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$EnumLongWindows
        • String ID:
        • API String ID: 4191631535-0
        • Opcode ID: 3baa66b932f186fafe162d4a3e16f94bd6e2c1e604efad5acc8c8ceaab862362
        • Instruction ID: 60d335a4008e32ade57c48567cd6f048550e7f160f5309ccdc52ecb273c2b460
        • Opcode Fuzzy Hash: 3baa66b932f186fafe162d4a3e16f94bd6e2c1e604efad5acc8c8ceaab862362
        • Instruction Fuzzy Hash: D01177706082505FD710AE2CCC85F9677D8EB04765F140179F958AF2D3D374AD41C76A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 695 4263e0-4263f5 696 4263f7-42642d call 406f74 SelectObject GetDIBColorTable SelectObject DeleteDC 695->696 697 42642f-42643d call 402970 695->697 701 426442-426448 696->701 697->701 702 426475-426480 701->702 703 42644a-426450 701->703 704 426452-42645b call 426348 703->704 705 42645d-426466 call 4261d8 703->705 704->705 709 42646b-426473 call 406fac 704->709 705->709 709->702
        APIs
        • SelectObject.GDI32(00000000,00000000), ref: 00426402
        • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,00000000,?,?,0042A4A7,?,?,?,?,00428FA7), ref: 00426416
        • SelectObject.GDI32(00000000,00000000), ref: 00426422
        • DeleteDC.GDI32(00000000), ref: 00426428
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ObjectSelect$ColorDeleteTable
        • String ID:
        • API String ID: 3862836420-0
        • Opcode ID: 0e66ee76b0753fe676d599b2e826bcd4f567485647af1bbbba618aa9d84ad42d
        • Instruction ID: e6fa3b62824e86028c9e0b4fa6490d726c91a483e5615ae50653e852034d29ae
        • Opcode Fuzzy Hash: 0e66ee76b0753fe676d599b2e826bcd4f567485647af1bbbba618aa9d84ad42d
        • Instruction Fuzzy Hash: B501847160432061D614B76AAC43E6B71B88FC5758F42852FB5899B2C2E67C8804836F
        APIs
        • GetSystemMetrics.USER32(?), ref: 0042C992
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        • KiUserCallbackDispatcher.NTDLL(?), ref: 0042C958
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressCallbackDispatcherMetricsProcSystemUser
        • String ID: GetSystemMetrics
        • API String ID: 54681038-96882338
        • Opcode ID: 16089f308895e9cd93db6874e887d8bd9e174a74eeb99d363d0a41a0b2268b7f
        • Instruction ID: c543a70956c8356fe6399f74ce213c7bc3cc5d67e126ab1778cad81ea0fab205
        • Opcode Fuzzy Hash: 16089f308895e9cd93db6874e887d8bd9e174a74eeb99d363d0a41a0b2268b7f
        • Instruction Fuzzy Hash: 99F096F17156204ACB105B38FCC463FF9699796330FD09B23A511472D5C63D98C59A6D
        APIs
        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00464A0F
        • TranslateMessage.USER32 ref: 00464A79
        • DispatchMessageA.USER32 ref: 00464A7F
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Message$DispatchPeekTranslate
        • String ID:
        • API String ID: 4217535847-0
        • Opcode ID: 9de74814cbb9f11d2e8adb7079f27e41d5652403c91274b43d50496de083d7d8
        • Instruction ID: 3096e60bd803553d2f1b30a20ddc43961de7c568ea435bf4cf47eb58f8c003e3
        • Opcode Fuzzy Hash: 9de74814cbb9f11d2e8adb7079f27e41d5652403c91274b43d50496de083d7d8
        • Instruction Fuzzy Hash: 2B01F9207442402EEF3139AA484176BA6898FD272CF14405FF45597382EAAD5C46C2AF
        APIs
        • GetKeyboardLayout.USER32(00000000), ref: 00462521
        • 73E9A570.USER32(00000000,?,?,00000000,?,00450AFE,00000000,00000000,?,?,00000000,00450B7C), ref: 00462576
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: A570KeyboardLayout
        • String ID:
        • API String ID: 3858012219-0
        • Opcode ID: 3f03480722038deb279cc96129d11e629f2d6ce1d2fcb7f004bad91c82362d8e
        • Instruction ID: 31bfef86e5102864626f4edcdf5f1e0bf33d9b3ab48da7d7af604ea8c803fcae
        • Opcode Fuzzy Hash: 3f03480722038deb279cc96129d11e629f2d6ce1d2fcb7f004bad91c82362d8e
        • Instruction Fuzzy Hash: 37311970A00641AFD740EF2ADDC1B557BE4EB15308F44807AE808DF362EBB9AC059F59
        APIs
        • KillTimer.USER32(?,00000001,00000000,0043513F,?,?,?,00000000), ref: 004350DD
        • SetTimer.USER32(?,00000001,?,00000000), ref: 004350FF
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Timer$KillLoadString
        • String ID:
        • API String ID: 1423459280-0
        • Opcode ID: 47ce580c15a6be0f159c511a51d8bcaa6f1ccde657e032fbd2e9fbbabcb0f15a
        • Instruction ID: 6e6affbb021d6a873f6bba320d8fc623bb445d671ecd0db108fabe7508a3f5e1
        • Opcode Fuzzy Hash: 47ce580c15a6be0f159c511a51d8bcaa6f1ccde657e032fbd2e9fbbabcb0f15a
        • Instruction Fuzzy Hash: 4C01D830A04640ABEF10EF55DC91B593BFCEB09708F511476FD00AB2C2D779AC44C658
        APIs
        • LoadCursorA.USER32(00000000,00007F00), ref: 004628A5
        • LoadCursorA.USER32(00000000,00000000), ref: 004628D4
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CursorLoad
        • String ID:
        • API String ID: 3238433803-0
        • Opcode ID: 8569b0f5f9bb362022c28b7fd48258c18639e64c05b4f4789b6dcf96f0611aa7
        • Instruction ID: 27509eb95898745674b1639d9e74f95f13842c883bfd1498e20b4f548902231a
        • Opcode Fuzzy Hash: 8569b0f5f9bb362022c28b7fd48258c18639e64c05b4f4789b6dcf96f0611aa7
        • Instruction Fuzzy Hash: 9EF08251B04A842ADA20663E5DC197A73949BD1335F20033BFD39D73D1DB796C49426A
        APIs
        • GlobalAlloc.KERNEL32(00000002,00000000,0048D5A8,00000000,0048D5DF,?,00000000,0048D60C), ref: 0040780E
        • GlobalFix.KERNEL32(00000000), ref: 00407814
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Global$Alloc
        • String ID:
        • API String ID: 2558781224-0
        • Opcode ID: 8dae0130a77bade94b23423767f840ffd18641c58506406d304d276e50458e84
        • Instruction ID: e43fb00c8eeadb22627815713288e2186937ac3e4929602cb2b705aa7a0c4ff9
        • Opcode Fuzzy Hash: 8dae0130a77bade94b23423767f840ffd18641c58506406d304d276e50458e84
        • Instruction Fuzzy Hash: 0F9002DC801350A4DC1433B6CC0EC2B009C58C070C3C24C6E300AB61C3883C8C3014FC
        APIs
        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004018D5), ref: 004015FB
        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004018D5), ref: 00401622
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Virtual$AllocFree
        • String ID:
        • API String ID: 2087232378-0
        • Opcode ID: e8b08ba17e8aa1e4295fdf92a59f0b5c2ba9c048c7c0811e700258df5b612e4f
        • Instruction ID: 0694f22a86ef56aecd839763c502e7d790f68cdfe0d663ec15031d6fce3c51de
        • Opcode Fuzzy Hash: e8b08ba17e8aa1e4295fdf92a59f0b5c2ba9c048c7c0811e700258df5b612e4f
        • Instruction Fuzzy Hash: 07F0E272F00A2027EB20666A0C85B475AD4DB857D4F180076FE08FF3E9D2758C0142A8
        APIs
        • 751C1540.VERSION(?,0040D564,?,?,00000000,?,00000000,?,00000000,0040D535,?,00000000,?,00000000,0040D552), ref: 0040D50D
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: C1540
        • String ID:
        • API String ID: 783658592-0
        • Opcode ID: 121091e4ccf018a3275cf378aba05ab76e4d213103dbd5e3b6bff0667d239e49
        • Instruction ID: 5c0ec426fdedd67f92deae3c44cff002390f9c164fedf4756a9454d106b6c972
        • Opcode Fuzzy Hash: 121091e4ccf018a3275cf378aba05ab76e4d213103dbd5e3b6bff0667d239e49
        • Instruction Fuzzy Hash: E0213171A04209AFDB01EFE5DC519AEB7FCEB48704B524476B910F36D1E73899058A18
        APIs
        • 751C1540.VERSION(?,0040D564,?,?,00000000,?,00000000,?,00000000,0040D535,?,00000000,?,00000000,0040D552), ref: 0040D50D
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: C1540
        • String ID:
        • API String ID: 783658592-0
        • Opcode ID: 7b3d1b14849d9af620bf0b84a2c51dfd11cf8fe21308a04495f1ad8fc04ddc77
        • Instruction ID: 4fdf440b22ddcfe6103f586eb268e931f03a8eab76d147426d28f158d2a3dd6c
        • Opcode Fuzzy Hash: 7b3d1b14849d9af620bf0b84a2c51dfd11cf8fe21308a04495f1ad8fc04ddc77
        • Instruction Fuzzy Hash: AF211F71A04209BBDB01EFEADC519AEB7FCEB48704B524476B910F3691E738E9058A18
        APIs
        • IsChild.USER32(00000000,00000000), ref: 0046569A
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Child
        • String ID:
        • API String ID: 3815930669-0
        • Opcode ID: 23945db44b9c7b4befd4f3a0981d7c10f2be8b20304451147b014ab6c8cae829
        • Instruction ID: 231e27d69aaca4499f939f08954f94cfbf86e8b58e9cd39b6cd2cc645cd03708
        • Opcode Fuzzy Hash: 23945db44b9c7b4befd4f3a0981d7c10f2be8b20304451147b014ab6c8cae829
        • Instruction Fuzzy Hash: 5E01D8316046046BD711AA7AED89B9673DCDB40358F40017BE808C7226FA6CDC41C7AE
        APIs
        • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004078F7
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CreateWindow
        • String ID:
        • API String ID: 716092398-0
        • Opcode ID: e32a36ae7af9adaf8273a42f0dacc7712928de3b82eaac8874bd020c86ac78cc
        • Instruction ID: 2d39d2ad03997a08a3bba0488cf49b76c531a38edacea089955256e57a640c4d
        • Opcode Fuzzy Hash: e32a36ae7af9adaf8273a42f0dacc7712928de3b82eaac8874bd020c86ac78cc
        • Instruction Fuzzy Hash: E3F07FB2704118BF9B80DE9DDD85E9B77ECEB4D2A4B05412ABA08E3241D674ED108BA4
        APIs
          • Part of subcall function 00464754: GetWindowTextA.USER32(?,?,00000100), ref: 00464777
        • SetWindowTextA.USER32(?,00000000), ref: 004647ED
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: TextWindow
        • String ID:
        • API String ID: 530164218-0
        • Opcode ID: 3e977381fd22c75a2cf97ede32084c00ced17c1a491337bff7671248ff8f97b9
        • Instruction ID: fce5ddae57c6d689f06af8e61e6a08ef326468ed46e0f08c85a9f91ece175e28
        • Opcode Fuzzy Hash: 3e977381fd22c75a2cf97ede32084c00ced17c1a491337bff7671248ff8f97b9
        • Instruction Fuzzy Hash: C101F7746042409BEB01EB55C841B5A73A8EBC9704F514077FA00DB282EB7CAD04C67E
        APIs
        • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004078F7
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CreateWindow
        • String ID:
        • API String ID: 716092398-0
        • Opcode ID: 6169e78ed7e34be91b0c6fc9f08c9c54bc17dd6b7dc9bbe8fcfc44e6a65ecf05
        • Instruction ID: 077812030a20db4e82be2f78ba3f969b720b4ba0e1335c6f878cb06ddab6611f
        • Opcode Fuzzy Hash: 6169e78ed7e34be91b0c6fc9f08c9c54bc17dd6b7dc9bbe8fcfc44e6a65ecf05
        • Instruction Fuzzy Hash: 27F092B2604118BF9B80DE9DDD85EDB77ECEB4D2A4B05412AFA0CE3241D674ED108BB4
        APIs
        • CreateWindowExA.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0040794D
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CreateWindow
        • String ID:
        • API String ID: 716092398-0
        • Opcode ID: 884c3146d92be7d5137cb1d93b297dad52838cf3c39e11f7a1512683a972686d
        • Instruction ID: 3951a77991a2db3a611e8e5f75296c01a113cbf1e5ac85beafffc13e5192b40e
        • Opcode Fuzzy Hash: 884c3146d92be7d5137cb1d93b297dad52838cf3c39e11f7a1512683a972686d
        • Instruction Fuzzy Hash: 96F0A4B2704118BFDB80DE9EDD85E9B77ECEB4D6A4B00412ABA0CE7241D574ED1087B4
        APIs
        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00445317
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CallbackDispatcherUser
        • String ID:
        • API String ID: 2492992576-0
        • Opcode ID: 3e450580647ac04c52fe3c9217b9489fe8f4b0b89d3e34e1a1c747df32f352d3
        • Instruction ID: 2b489bd349fd00ef9accd65a6c2d7a08998cef0b38985eff922cf8e7109b24d4
        • Opcode Fuzzy Hash: 3e450580647ac04c52fe3c9217b9489fe8f4b0b89d3e34e1a1c747df32f352d3
        • Instruction Fuzzy Hash: CDF0D4362042019FC704DF5CC8C498ABBE5FF89255F0446A8FA89CB356DA32E814CB92
        APIs
        • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 00405CF6
          • Part of subcall function 00405F14: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00405F30
          • Part of subcall function 00405F14: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405F4E
          • Part of subcall function 00405F14: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405F6C
          • Part of subcall function 00405F14: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00405F8A
          • Part of subcall function 00405F14: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,00406019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00405FD3
          • Part of subcall function 00405F14: RegQueryValueExA.ADVAPI32(?,00406180,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,00406019,?,80000001), ref: 00405FF1
          • Part of subcall function 00405F14: RegCloseKey.ADVAPI32(?,00406020,00000000,00000000,00000005,00000000,00406019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406013
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Open$FileModuleNameQueryValue$Close
        • String ID:
        • API String ID: 2796650324-0
        • Opcode ID: f5be573f4c88fe3f99b670a1370d1c501bd094c16bc9f6adc8434252e78a74e1
        • Instruction ID: cfa8c2297ece92b03691fc6ccbf4bb16f7a8ea34d77b71d9b54f19b28b8bc056
        • Opcode Fuzzy Hash: f5be573f4c88fe3f99b670a1370d1c501bd094c16bc9f6adc8434252e78a74e1
        • Instruction Fuzzy Hash: 8EE06D71A006109BCF10EE58C8C5A8733D8AF48754F004966BC54DF386D3B4DD108BE8
        APIs
        • CompareStringA.KERNEL32(00000400,00000001,00000000,00000000,00000000,00000000,?,?,00408D3B,?,?,004093B5), ref: 00408D21
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CompareString
        • String ID:
        • API String ID: 1825529933-0
        • Opcode ID: 2d6f0b9b6c4f605d3213341a595fcda6846287e836ea736437d58c3df25e7a30
        • Instruction ID: 553064d2000f8717ede8e2a2475750edad8178e8d54f3ef3dc3a66d288523e41
        • Opcode Fuzzy Hash: 2d6f0b9b6c4f605d3213341a595fcda6846287e836ea736437d58c3df25e7a30
        • Instruction Fuzzy Hash: 3ED0C9E13496202AE250B67F3D83F5A008C8B8C719F22003BB30AF72C3C9BD9D0102AD
        APIs
        • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 004017CD
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: 54148feba9445860b034a8a92c21eb993f1d8e6655e76146f796d2101c1fdcb2
        • Instruction ID: 69c29e15885a535391498b133208a4a0a8de99cd79da40327ccd239ae62086aa
        • Opcode Fuzzy Hash: 54148feba9445860b034a8a92c21eb993f1d8e6655e76146f796d2101c1fdcb2
        • Instruction Fuzzy Hash: A5117C76A047019BC3209F29C8C0A5BBBE5EBC8760F15C63DE598A73A5D734AC40C695
        APIs
        • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 00422536
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: a67ba6861ca53b641f8abda3516f92bd19cb317e31c5a0902a42886d29f95d38
        • Instruction ID: 52ab548a04df867111032cb8c0d33e953e9109b50629be01a8b2f1f4fb8484d1
        • Opcode Fuzzy Hash: a67ba6861ca53b641f8abda3516f92bd19cb317e31c5a0902a42886d29f95d38
        • Instruction Fuzzy Hash: 0B115A74300315ABC710DF19E980B42FBE5EF98354F10C53AE9989B385E3B4E9448BA4
        APIs
        • SetErrorMode.KERNEL32(00008000), ref: 00450621
        • GetModuleHandleA.KERNEL32(USER32,00000000,0045076E,?,00008000), ref: 00450645
        • GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 00450652
        • LoadLibraryA.KERNEL32(imm32.dll,00000000,0045076E,?,00008000), ref: 0045066E
        • GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 00450690
        • GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 004506A5
        • GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 004506BA
        • GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 004506CF
        • GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 004506E4
        • GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 004506F9
        • GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0045070E
        • GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 00450723
        • GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 00450738
        • GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0045074D
        • SetErrorMode.KERNEL32(?,00450775,00008000), ref: 00450768
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressProc$ErrorMode$HandleLibraryLoadModule
        • String ID: ImmGetCompositionStringA$ImmGetContext$ImmGetConversionStatus$ImmIsIME$ImmNotifyIME$ImmReleaseContext$ImmSetCompositionFontA$ImmSetCompositionWindow$ImmSetConversionStatus$ImmSetOpenStatus$USER32$WINNLSEnableIME$imm32.dll
        • API String ID: 3397921170-3950384806
        • Opcode ID: ff937d978ebb106f54e8a3b972f839453409118848b1952555684fc0f1ccd067
        • Instruction ID: bcafe8d7a4dfb89b1f4beac3eec6cf7414ee6186ac4b167b60750b402a8a3453
        • Opcode Fuzzy Hash: ff937d978ebb106f54e8a3b972f839453409118848b1952555684fc0f1ccd067
        • Instruction Fuzzy Hash: C2317479604340BFDB00EB71ED56E1577F8EB58B05B12442BB80197392D6BC982CEF68
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: D9B$\AL$bmp$cel$dib$emf$eps$fax$ged$ico$jfif$jpe$jpeg$jpg$msk$pBL$pcc$pcd$pcx$pdd$pfr$pic$png$psd$psp$rgb$rgba$rla$rle$rpf$scr$sgi$tif$tiff$tub$wmf$EL$FL
        • API String ID: 0-726106878
        • Opcode ID: 43c2e0c1d5da1fe027cd1f7911c35e97468e286160ec6c93bf25047e5bd77a7d
        • Instruction ID: d4a99753215f9a036306e073b154d3fc0c66c20c2340656a9eff8c68a660e295
        • Opcode Fuzzy Hash: 43c2e0c1d5da1fe027cd1f7911c35e97468e286160ec6c93bf25047e5bd77a7d
        • Instruction Fuzzy Hash: 1D224FB5700144AFDB00EF99EDA1F9A73B9EB48305F148067FA119B3B5C674ED068B68
        APIs
        • MulDiv.KERNEL32(?,00000064,?), ref: 004CA450
        • MulDiv.KERNEL32(00000000,00000064,00000005), ref: 004CA578
        • MulDiv.KERNEL32(00000001,00000064,00000005), ref: 004CA5BD
        • MulDiv.KERNEL32(00000002,00000064,00000005), ref: 004CA602
        • MulDiv.KERNEL32(00000003,00000064,00000005), ref: 004CA651
        • MulDiv.KERNEL32(00000004,00000064,00000005), ref: 004CA696
        • MulDiv.KERNEL32(00000005,00000064,00000005), ref: 004CA6DB
        • MulDiv.KERNEL32(00000006,00000064,00000005), ref: 004CA72A
        • MulDiv.KERNEL32(00000007,00000064,00000005), ref: 004CA76F
        • MulDiv.KERNEL32(00000008,00000064,00000005), ref: 004CA7B4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: 8#L$PCD$t$7?
        • API String ID: 0-1344295584
        • Opcode ID: 533d9858bf58f0b850eaf22e34a8a38fe1cfa6b804e54c234256681c594b6506
        • Instruction ID: 19e49fa89494fe001ee7ad734b2a392fded8b8d0f3b84e664f101a418c842c80
        • Opcode Fuzzy Hash: 533d9858bf58f0b850eaf22e34a8a38fe1cfa6b804e54c234256681c594b6506
        • Instruction Fuzzy Hash: 0D82E875A00208AFDB40DB99C991FAEB7F5EF48704F20806AF904FB391C679AE41DB55
        APIs
        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00405D79
        • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 00405D8A
        • lstrcpyn.KERNEL32(?,?,?), ref: 00405DBA
        • lstrcpyn.KERNEL32(?,?,?,kernel32.dll), ref: 00405E1E
        • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll), ref: 00405E53
        • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00405E66
        • FindClose.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00405E73
        • lstrlen.KERNEL32(?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00405E7F
        • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 00405EB3
        • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 00405EBF
        • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 00405EE1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
        • String ID: GetLongPathNameA$\$kernel32.dll
        • API String ID: 3245196872-1565342463
        • Opcode ID: 622fca862ede482ad9ac39b9f014d34330fe16ee00285a254696d6776c3174e9
        • Instruction ID: 9dbc75c6d1bc213631ce3c7385af16737f0384cc68e9fa89e6e243b74f86982c
        • Opcode Fuzzy Hash: 622fca862ede482ad9ac39b9f014d34330fe16ee00285a254696d6776c3174e9
        • Instruction Fuzzy Hash: 81415C72900659ABDB10DBA8CD89ADFB7ECDF44304F1440B7A949F7281D6389F448F98
        APIs
          • Part of subcall function 0042A220: GdiFlush.GDI32(?,?,00538B08,?,004AD0FC), ref: 0042A256
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 004C6907
        • OffsetRect.USER32(?,00000000,00000001), ref: 004C6938
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 004C6A11
        • OffsetRect.USER32(?,00000000,00000001), ref: 004C6A42
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: OffsetRect$Flush
        • String ID: sgi, bw or rgb(a)
        • API String ID: 1672064848-1345870794
        • Opcode ID: a57402db46456260f65d86e29ddcd5d5990aef594f664050e0e5e78fa2a9d321
        • Instruction ID: 9c8109225f0d0729989a4b32241276541da6d05a20b13f06c2e9c1ce21a45027
        • Opcode Fuzzy Hash: a57402db46456260f65d86e29ddcd5d5990aef594f664050e0e5e78fa2a9d321
        • Instruction Fuzzy Hash: CF422175A00108AFDB50DF99C991F9EB7B5EF48704F1081AAF904EB386C735AE41DB58
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Object
        • String ID: is $Compression method $LCL$P"L$TIF/TIFF$d!L$ L
        • API String ID: 2936123098-777046359
        • Opcode ID: 96615393b8f026b32825321a12b1ea13dae628fd5ca572a6a53460ad13f5c01d
        • Instruction ID: 1d03d01537d6f8acac06e837614b14e4346c36ef671f4e6c5ccad7308bc8b4dc
        • Opcode Fuzzy Hash: 96615393b8f026b32825321a12b1ea13dae628fd5ca572a6a53460ad13f5c01d
        • Instruction Fuzzy Hash: ACA21A78A001089FDB44DFA9C981F9DB7F5FF48304F2480AAE805AB356DB39AE45CB54
        APIs
        • IsIconic.USER32(?), ref: 0044BF8F
        • GetWindowPlacement.USER32(?,0000002C), ref: 0044BFAC
        • GetWindowRect.USER32(?), ref: 0044BFC5
        • GetWindowLongA.USER32(?,000000F0), ref: 0044BFD3
        • GetWindowLongA.USER32(?,000000F8), ref: 0044BFE8
        • ScreenToClient.USER32(00000000), ref: 0044BFF5
        • ScreenToClient.USER32(00000000,?), ref: 0044C000
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$ClientLongScreen$IconicPlacementRect
        • String ID: ,
        • API String ID: 2266315723-3772416878
        • Opcode ID: cec151c7ba0a72cbdf91c47d8eeee423db3f624bbe190896f95f4532af70feaa
        • Instruction ID: 0cfc7e15ae5f44427199523bcaf605dfa69a415dbf9e1a176f1ee7a3f209578d
        • Opcode Fuzzy Hash: cec151c7ba0a72cbdf91c47d8eeee423db3f624bbe190896f95f4532af70feaa
        • Instruction Fuzzy Hash: F511B171908240ABCB01DE6DCC85A8B37D8AF49314F04097AFD18DB282D739E9048B66
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: :memory$ABIT$ACBM$BMHD$BODY$CMAP$FORM$ILBM$PBM $\BH
        • API String ID: 0-3273259247
        • Opcode ID: e63e111e292f8c9da6f84c8284c40a001ccdc45ecc429e619b21ef55bf68c1eb
        • Instruction ID: 170ccc5ec994dd161e66b05bf9a913f959f91103e0ed67d8a13c0ad4ce3e67c3
        • Opcode Fuzzy Hash: e63e111e292f8c9da6f84c8284c40a001ccdc45ecc429e619b21ef55bf68c1eb
        • Instruction Fuzzy Hash: AE025CB0A042598FCF10EFA9C8A16AEBBB1FF88304F11456BE544EB345D7389D52CB59
        APIs
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 004CE6DB
        • OffsetRect.USER32(?,00000000,00000001), ref: 004CE70C
        • MulDiv.KERNEL32(?,00000064,?), ref: 004CE87C
        • OffsetRect.USER32(?,00000000,00000001), ref: 004CE8AD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: OffsetRect
        • String ID: PSP$s$~
        • API String ID: 177026234-855822502
        • Opcode ID: 436180e9c4ae5a88adb797c0005c5cf507e335220d96df181ded2c1277e40846
        • Instruction ID: 1276425662c3928a6284c79b34bf3df77af0061c0a8521b7ce5a76c6854a2bda
        • Opcode Fuzzy Hash: 436180e9c4ae5a88adb797c0005c5cf507e335220d96df181ded2c1277e40846
        • Instruction Fuzzy Hash: CD520978A002189FDB60DF69CC91B9EB7B5FF49304F1041AAE508A7382D735AE85CF59
        APIs
          • Part of subcall function 0041ABC4: RtlEnterCriticalSection.NTDLL(00AA09A8), ref: 0041ABCB
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 00498E79
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 00498F5C
        • IntersectRect.USER32(?,?,?), ref: 00499046
        • EqualRect.USER32(?,?), ref: 00499057
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 00499081
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 0049915F
        • MulDiv.KERNEL32(00000000,00000064,?), ref: 004992AD
        • MulDiv.KERNEL32(?,00000064,?), ref: 004994ED
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Rect$CriticalEnterEqualIntersectLoadSectionString
        • String ID:
        • API String ID: 2871691274-0
        • Opcode ID: b70ca2c81184e8ce7939d4921e389c45249e2fd90384ebfff846be145ba6485c
        • Instruction ID: ee2ea7f554c50058bfaddc461285cdf78886f3ce5aba17cf87995140d7357b60
        • Opcode Fuzzy Hash: b70ca2c81184e8ce7939d4921e389c45249e2fd90384ebfff846be145ba6485c
        • Instruction Fuzzy Hash: CF421E75A142149FDF00EBA9C981E9E77F5AF49314F11857EF800AB356CA38EE05CB58
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: RestoreSave$NtdllProc_Window
        • String ID:
        • API String ID: 2725519021-0
        • Opcode ID: 155dce203e39d1e00a8573cbe09c778f533d07570171b30726b7a1e09b05e4e6
        • Instruction ID: 5e56a682ac468ab9ed30c6f40fa2f39614c259c53882d5771ea16a7acdf91520
        • Opcode Fuzzy Hash: 155dce203e39d1e00a8573cbe09c778f533d07570171b30726b7a1e09b05e4e6
        • Instruction Fuzzy Hash: A5E16234A04609EFDB10DF69C48199EB7F5FF48305B2085AAEC05A7362DB38ED46CB59
        APIs
        • IsIconic.USER32(?), ref: 00464620
        • SetActiveWindow.USER32(?,?,?,?,00464041,00000000,00464502), ref: 00464631
        • IsWindowEnabled.USER32(00000000), ref: 00464654
        • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F120,00000000,00000000,?,?,?,?,00464041,00000000,00464502), ref: 0046466D
        • SetWindowPos.USER32(?,00000000,00000000,?,?,00464041,00000000,00464502), ref: 004646B3
        • SetFocus.USER32(00000000,?,00000000,00000000,?,?,00464041,00000000,00464502), ref: 004646F8
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$ActiveEnabledFocusIconicNtdllProc_
        • String ID:
        • API String ID: 3996302123-0
        • Opcode ID: 87af3c71f6ebae3eee10bb87f8e9895c06a8152d9c6099cdfe72c840e57f6208
        • Instruction ID: 4b9307d71d97944f0ec320865191d040b9571bf88ad4fb051efc852eada53655
        • Opcode Fuzzy Hash: 87af3c71f6ebae3eee10bb87f8e9895c06a8152d9c6099cdfe72c840e57f6208
        • Instruction Fuzzy Hash: 3E310370B002409BEF14AA69CDC5B563798AB45714F0804ABBD00DF2D7EB7DEC548B1E
        APIs
        • OpenClipboard.USER32(00000000), ref: 004320F4
        • GlobalAlloc.KERNEL32(00002002,00000001,00000000,004321CA,?,00000000,004321FE), ref: 0043211E
        • GlobalFix.KERNEL32(?), ref: 00432138
        • EmptyClipboard.USER32 ref: 00432167
        • SetClipboardData.USER32(00000001,?), ref: 00432172
        • GlobalUnWire.KERNEL32(?), ref: 00432188
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ClipboardGlobal$AllocDataEmptyOpenWire
        • String ID:
        • API String ID: 461592451-0
        • Opcode ID: 0c05ae93e8a0b09c1d336c1568b08b2e9762d2e162be79ea9e6070695479ca9a
        • Instruction ID: 948efbce9353a7f339553a55d759969dd059f300a2cc52529e5fafb2752a3cf0
        • Opcode Fuzzy Hash: 0c05ae93e8a0b09c1d336c1568b08b2e9762d2e162be79ea9e6070695479ca9a
        • Instruction Fuzzy Hash: 4521E270604644BFEB01EB66DE52A69B7A8EB4D704F520476FA00E26D1CA786D10D968
        APIs
        • IsIconic.USER32(?), ref: 0044B69B
        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 0044B6B9
        • GetWindowPlacement.USER32(?,0000002C), ref: 0044B6EF
        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 0044B713
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$Placement$Iconic
        • String ID: ,
        • API String ID: 568898626-3772416878
        • Opcode ID: 496f2bcd46d5e10f64a8709201f179e0f6ceb8eba7e3ae3c1d5c41b962619f06
        • Instruction ID: 9ace06089765310ea8430f20cf88cc9d2dfb6b5727772981840069b901abef6a
        • Opcode Fuzzy Hash: 496f2bcd46d5e10f64a8709201f179e0f6ceb8eba7e3ae3c1d5c41b962619f06
        • Instruction Fuzzy Hash: A6215371A00108ABDF14DE69C8C19DA77A8EF48354F05846AFD04EF346D779ED048BA5
        APIs
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        • MonitorFromWindow.USER32(?,?), ref: 0042CA78
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressFromMonitorProcWindow
        • String ID: MonitorFromWindow
        • API String ID: 2184870004-2842599566
        • Opcode ID: f3ff6349f829b9b9c5b6ee483603810676dc2d5df8a3fcb0b7e989887f64fb7c
        • Instruction ID: 0561238ea2f5e74d18e7200604dfc8b3d0b181c54bfae8a013891814795f2012
        • Opcode Fuzzy Hash: f3ff6349f829b9b9c5b6ee483603810676dc2d5df8a3fcb0b7e989887f64fb7c
        • Instruction Fuzzy Hash: 6F014F72A0512C6AC700EB94BCC1BEF736CEB19314B844117F81696341D728AD0557FE
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: RestoreSave$Focus
        • String ID:
        • API String ID: 1675357626-0
        • Opcode ID: a972d4d6926d3cb9d967d4ec819330f60277329ce33ffa7006e03a813a6f5272
        • Instruction ID: 116817842a3f137b9ae286985c504dcf126f1001fd5f92cfbb97c96aff50a967
        • Opcode Fuzzy Hash: a972d4d6926d3cb9d967d4ec819330f60277329ce33ffa7006e03a813a6f5272
        • Instruction Fuzzy Hash: 23B17274A04104EFCB18DF6AC985AAE73F5EB55345F9540B6E8009B362CB38EF45CB19
        APIs
        • IsIconic.USER32(?), ref: 00464570
        • SetActiveWindow.USER32(?,?,?,?,00464034,00000000,00464502), ref: 00464588
        • IsWindowEnabled.USER32(00000000), ref: 004645AB
        • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000040,00000000,?,?,?,?,00464034,00000000,00464502), ref: 004645D4
        • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F020,00000000,?,00000000,?,?,?,00000000,00000040,00000000,?,?,?,?), ref: 004645E9
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$ActiveEnabledIconicNtdllProc_
        • String ID:
        • API String ID: 1720852555-0
        • Opcode ID: dd704523bdd94101e3dbae2f7be5e1fcd6c0df2763598b3f9ed0d81305289f62
        • Instruction ID: 4adf2dd4120f17eb57c65e4b7f3fc8835ae384b5d5f50e44b729d7ad2582a0fa
        • Opcode Fuzzy Hash: dd704523bdd94101e3dbae2f7be5e1fcd6c0df2763598b3f9ed0d81305289f62
        • Instruction Fuzzy Hash: E611E671600240ABDF54EE6DC9C6B973798AF45714F0804AABF05DF287E67DEC40876A
        APIs
        • MulDiv.KERNEL32(00000006,?,00000033), ref: 00493BFB
        • MulDiv.KERNEL32(00000024,?,00000033), ref: 00493C1D
        • MulDiv.KERNEL32(0000001F,00000064,?), ref: 00493D25
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: LoadString
        • String ID: D9B
        • API String ID: 2948472770-511987976
        • Opcode ID: 40eeef612a46da1fa27e4e3a0f40b07093a14bad35cc4d75cef0fe56f7d8a281
        • Instruction ID: a048172999bbc5417f8a8aae1427575fe6d0c139d4fb9d2599e5140d06a7992b
        • Opcode Fuzzy Hash: 40eeef612a46da1fa27e4e3a0f40b07093a14bad35cc4d75cef0fe56f7d8a281
        • Instruction Fuzzy Hash: 33025A74E042889FDF01DFA9C851BAEBBF1AF4A305F1440AAE480EB391D7799E05DB54
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: $2S$01S$1S$<1S$\2S
        • API String ID: 0-149574985
        • Opcode ID: 70b3abb95aff017a04c1ee5bc4ac58da5ef5d4d6634a843272392e369f5f8a30
        • Instruction ID: f6501dd7d72c50b274b827287878c4ef2b1db5be743b011efb20a9307363de5d
        • Opcode Fuzzy Hash: 70b3abb95aff017a04c1ee5bc4ac58da5ef5d4d6634a843272392e369f5f8a30
        • Instruction Fuzzy Hash: 04D1365054E7C00FC7029B349DA16967F74AF93214F0A80EBED849F2E7D62C990ADB36
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: F$J$J$X$X
        • API String ID: 0-2166313073
        • Opcode ID: 12fdb1c193f4f78136981c133ba371dc7561109d75048bcbb9abb70116e7edbf
        • Instruction ID: cb50cea485c934ec49e5e53e8114f428ebdae18fbcd81dd9b80710b9bae49a38
        • Opcode Fuzzy Hash: 12fdb1c193f4f78136981c133ba371dc7561109d75048bcbb9abb70116e7edbf
        • Instruction Fuzzy Hash: 54718F706042809FD729CF29C094692BFE5AF5A304F19C0DED4C98F367CA7AD946CBA5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: DDS $DXT1$DXT3$DXT5
        • API String ID: 0-3267405239
        • Opcode ID: f74bb1975a12dd2a3e95e6515129a5e131b654520b448eea3d48ae96e239f3bf
        • Instruction ID: ff6f2f7a5391d551f37923a6f9b0f124b4022aa9ad2e57414e88b0603458f506
        • Opcode Fuzzy Hash: f74bb1975a12dd2a3e95e6515129a5e131b654520b448eea3d48ae96e239f3bf
        • Instruction Fuzzy Hash: D3D26C74B042988FDB21EF69C8503DEBBB1EB99300F1045EAD588E7342EA394E91CF55
        APIs
          • Part of subcall function 0043F680: WinHelpA.USER32(00000000,0043F698,00000002,00000000), ref: 0043F68F
        • GetTickCount.KERNEL32 ref: 0043FC3E
        • Sleep.KERNEL32(00000000,00000000,0043FC9D,?,?,00000000,00000000,?,0043FC16), ref: 0043FC47
        • GetTickCount.KERNEL32 ref: 0043FC4C
        • WinHelpA.USER32(00000000,?,?,00000000), ref: 0043FC82
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CountHelpTick$Sleep
        • String ID:
        • API String ID: 2438605093-0
        • Opcode ID: 2e09e3a0159fc9bb47ff531349d46ddcc0b1a5f356e2dca7038df03d29cc0344
        • Instruction ID: 272eafc7eb77bc650f6e3b237f321e37de92822cdd720c079227e355fa858e1c
        • Opcode Fuzzy Hash: 2e09e3a0159fc9bb47ff531349d46ddcc0b1a5f356e2dca7038df03d29cc0344
        • Instruction Fuzzy Hash: 8A01A230B44348AFE711EBA6CC42B6E72E8EF4C704F62547BF500A76D2DB78AD048559
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: 4"N$:memory$\BH$t"N
        • API String ID: 0-541200545
        • Opcode ID: 67ab41e76ce30632a85fcc21e74501e69039dfdcbf60c105b81bb7ed92fd59ef
        • Instruction ID: 9c60e18e9f04b079c12d0b553845fc6fb427938709971e497ba86c1fdc71f370
        • Opcode Fuzzy Hash: 67ab41e76ce30632a85fcc21e74501e69039dfdcbf60c105b81bb7ed92fd59ef
        • Instruction Fuzzy Hash: 14D18374E00199DFCF10EFAAC581AAEB7B4FF59314F20056AE550AB351C778AE42CB58
        APIs
        • GetLastError.KERNEL32(00000000,0048CD1B), ref: 0048CC6A
        • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,0048CD1B), ref: 0048CC90
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ErrorFormatLastMessage
        • String ID: 4(B
        • API String ID: 3479602957-430709320
        • Opcode ID: 29ec30ae1a9c5dab48625a55f99b00e736f25ac2b3f0a8727ca4d171e8ba9169
        • Instruction ID: 21de85b321d5d12c73622067ed9fa72f734b4305f2b92a17a377a8e65b12fdb5
        • Opcode Fuzzy Hash: 29ec30ae1a9c5dab48625a55f99b00e736f25ac2b3f0a8727ca4d171e8ba9169
        • Instruction Fuzzy Hash: B311CF7160420897E711FB21CDC1BDA73B99B94304F10847BBA44B73C1DEB85DC48A6D
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 004633C4
        • GetCursorPos.USER32(?), ref: 004633E1
        • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00463401
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CurrentCursorObjectSingleThreadWait
        • String ID:
        • API String ID: 1359611202-0
        • Opcode ID: 664a6452fc786f82fbc53645dbe0589f19e86cc2fbb28b7711a9a3ce75ab3ccd
        • Instruction ID: 819a01418f0c647f3e2eed0683132e65660bb55d3e2120cece08bb092a2107d8
        • Opcode Fuzzy Hash: 664a6452fc786f82fbc53645dbe0589f19e86cc2fbb28b7711a9a3ce75ab3ccd
        • Instruction Fuzzy Hash: D2F054315042449BDB14AF69E886B4A73F8EB10315F40017BF900DB3D1FB7D9994DA2E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: IDATPLTEgAMA$P"L$PNG
        • API String ID: 0-1994570322
        • Opcode ID: 6cca6cf87b806be2d73a2b23ae08558700118e33edda0b32d2e4973c6b1a67d6
        • Instruction ID: 5f06a131fae6b7adc36e85fe6148b9e0724636680eb05b0b5154d85527a4a21d
        • Opcode Fuzzy Hash: 6cca6cf87b806be2d73a2b23ae08558700118e33edda0b32d2e4973c6b1a67d6
        • Instruction Fuzzy Hash: 22E12C38A00108EFDB44DF99D981FDEB7F6AF48304F2481BAE904A7351D778AE459B58
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: 8BPS$:memory$\BH
        • API String ID: 0-136306569
        • Opcode ID: 31745a3e93939be329f28df52a05dfecf2b141a5d60ee4a467b5aa515c3d503d
        • Instruction ID: f855c3aac6d3ffcf0f28410a3a19a8fbc5577cb00a4e86b15ae6c00db16bfc8c
        • Opcode Fuzzy Hash: 31745a3e93939be329f28df52a05dfecf2b141a5d60ee4a467b5aa515c3d503d
        • Instruction Fuzzy Hash: 22B18070A041999FCB04EFAAC8816EEB7B5EF99305F10446BF454FB352CA7899418B68
        APIs
        • MulDiv.KERNEL32(0000001F,00000064,?), ref: 004941BF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: D9B
        • API String ID: 0-511987976
        • Opcode ID: 726b4ee48fee1da2e516786783af02e9bdc1514140e62d66cc66e5c6397d8f34
        • Instruction ID: 22eba4e66bd2efecc3abafa21ab19a58a9355e5876b7d4efa8459f464f8a192d
        • Opcode Fuzzy Hash: 726b4ee48fee1da2e516786783af02e9bdc1514140e62d66cc66e5c6397d8f34
        • Instruction Fuzzy Hash: 19B180B0A042859FDF11DBA9C851BBEBFB5AF89308F1440BAE48097381C77D9D46DB58
        APIs
          • Part of subcall function 0042B060: DeleteObject.GDI32(00000000), ref: 0042B1A7
        • DeleteObject.GDI32(?), ref: 004AD549
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: DeleteObject
        • String ID: D9B
        • API String ID: 1531683806-511987976
        • Opcode ID: 2def474d8c090931b2b0a3e6ea33710286f8bfab9a27e6ea6418e2e93058602b
        • Instruction ID: 22e02bae3b0573867318dbfe425c92a03ef4854afd4847c63ff928d213dbc9c1
        • Opcode Fuzzy Hash: 2def474d8c090931b2b0a3e6ea33710286f8bfab9a27e6ea6418e2e93058602b
        • Instruction Fuzzy Hash: BCC13634E00158DFCB15DB69C984BDEB7F5AF5A304F5081EAE809AB351DA38AE85CF44
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: :memory$\BH
        • API String ID: 0-3878241749
        • Opcode ID: c110cf2f942b31a7ce4fe0e6b5da32b5316121b3a9f55455c8f3af154f7c0f03
        • Instruction ID: 7c45833a859b037d6fd5c088ad2cf74f00e4431de1791d3d9001c3263f8c08f3
        • Opcode Fuzzy Hash: c110cf2f942b31a7ce4fe0e6b5da32b5316121b3a9f55455c8f3af154f7c0f03
        • Instruction Fuzzy Hash: 05222570E001599FCB10FFEAD891AAEBBB5EF54304F10456BE844EB356D738AD428B58
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CaptureIconic
        • String ID:
        • API String ID: 2277910766-0
        • Opcode ID: df094401348f258267f7563dd6672625206778f69b43bc59dfd101cbad4f3f6e
        • Instruction ID: f10aca7f425c3d9b41fa13570cd981c84bdbc37e66fcfcbbc1a1dd9d5cf7ff17
        • Opcode Fuzzy Hash: df094401348f258267f7563dd6672625206778f69b43bc59dfd101cbad4f3f6e
        • Instruction Fuzzy Hash: 051182327802059BEB20DF9DD9859AAB3E8EF04318B34407AF814DB352DB39EE509759
        APIs
        • SetClipboardData.USER32(?,?), ref: 004360C9
        • SetClipboardData.USER32(00000009,00000000), ref: 004360DA
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ClipboardData
        • String ID:
        • API String ID: 2952336681-0
        • Opcode ID: c0c249b93a80f01d7a77dcb6c6e27970668b16a2d4efd4169c3e2b12b5479d66
        • Instruction ID: 9bc4a1954aa3f8f85bf8343aebba444bf9c0fae8aa93a1c8945b2513e688d129
        • Opcode Fuzzy Hash: c0c249b93a80f01d7a77dcb6c6e27970668b16a2d4efd4169c3e2b12b5479d66
        • Instruction Fuzzy Hash: 3F016970A04209EFCB04DFA9C8859AEB7F8FF0C300F1145A6E504E72A1EB75AE40CB65
        APIs
        • SetClipboardData.USER32(?,?), ref: 00436045
        • SetClipboardData.USER32(00000009,00000000), ref: 00436056
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ClipboardData
        • String ID:
        • API String ID: 2952336681-0
        • Opcode ID: 6a4e89b28675ec8855bd96b4d220eb8446444ee5ebf35fa90772ec6d79dce0ca
        • Instruction ID: eca456fb170219eb53b8b610f2df9fa7066a5ae54d8d7e4d431b3acf5aef5265
        • Opcode Fuzzy Hash: 6a4e89b28675ec8855bd96b4d220eb8446444ee5ebf35fa90772ec6d79dce0ca
        • Instruction Fuzzy Hash: 27016970A04609AFCB04DBA9C881AAEB7F8FF08300F1149A6B404E7291DB74AE40CB65
        APIs
        • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,0040DB80), ref: 0040DB42
        • GetACP.KERNEL32(?,?,00001004,?,00000007,00000000,0040DB80), ref: 0040DB5B
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: InfoLocale
        • String ID:
        • API String ID: 2299586839-0
        • Opcode ID: 1884172b494ef64e61d5d87ac41e70bb733ce7e18e2f04438fc916fe4af58f1b
        • Instruction ID: 8ae3de11b30185b591dbfbdb903b861d682c93104a8713605b6a6178693530df
        • Opcode Fuzzy Hash: 1884172b494ef64e61d5d87ac41e70bb733ce7e18e2f04438fc916fe4af58f1b
        • Instruction Fuzzy Hash: E9F09671E043047FDB00EBE2D85299EB3BADBC4718F51C57AB610A76C1DA7C65048658
        APIs
        • FindFirstFileA.KERNEL32(00000000,?,?,?,?,004EC2D8,?,?,?,00000000,004EC327), ref: 004096CB
        • GetLastError.KERNEL32(00000000,?,?,?,?,004EC2D8,?,?,?,00000000,004EC327), ref: 004096F0
          • Part of subcall function 0040964C: FileTimeToLocalFileTime.KERNEL32(?), ref: 00409679
          • Part of subcall function 0040964C: FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 00409688
          • Part of subcall function 00409724: FindClose.KERNEL32(?,?,004096EE,00000000,?,?,?,?,004EC2D8,?,?,?,00000000,004EC327), ref: 00409730
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileTime$Find$CloseDateErrorFirstLastLocal
        • String ID:
        • API String ID: 976985129-0
        • Opcode ID: 657082f0d3cee3eafa1d391f08072548a3622d5f3db13b2cc92ee2c836ca67ac
        • Instruction ID: e5e222ae4b3e1edca6e7e69f6ad0f42d122d8570d28140a71d9f916234369ba4
        • Opcode Fuzzy Hash: 657082f0d3cee3eafa1d391f08072548a3622d5f3db13b2cc92ee2c836ca67ac
        • Instruction Fuzzy Hash: 95E06DB2B0256007CB15AF6E5CC159B61D88A847A830A067BB915FB3C7D63ECC1293D9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: LCL$MM
        • API String ID: 0-1966558449
        • Opcode ID: 63a05b47c84527a6d2d4db66216ba569a0f64dd7a088f7c5ceb86575037aa6e0
        • Instruction ID: 8abfefa7dfa2d5050556067eaf24452c438bc4cca268861650448c65f3fddbb7
        • Opcode Fuzzy Hash: 63a05b47c84527a6d2d4db66216ba569a0f64dd7a088f7c5ceb86575037aa6e0
        • Instruction Fuzzy Hash: 9B02A638604185DBEB55DF68C489FAF7BA1AB05304F14809FD8419B386CB7DDE41CB9A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: |gS
        • API String ID: 0-2054468872
        • Opcode ID: aeb144ef3b1690433ff582404c58d8e31139980a1cd54db4af01818ec1723c01
        • Instruction ID: 23b0ceeb8c8c38199f0b7e032bf8f99960272fd32bb32a687a2ed38e24ef23eb
        • Opcode Fuzzy Hash: aeb144ef3b1690433ff582404c58d8e31139980a1cd54db4af01818ec1723c01
        • Instruction Fuzzy Hash: 30524D70508341CFDB19CF18C48475ABBE2FFA6304F158A5EE8958B3A6D778D885CB86
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: PIXT
        • API String ID: 0-2338726976
        • Opcode ID: 95933a5cf607175a5f0df57d9fde8ae2841e41078bc2c60fa48b58b52608e0b2
        • Instruction ID: 88cf564ce8e3f10311d61e2a5024f4aca63768c446ef14bb0c4c54c77ca50a66
        • Opcode Fuzzy Hash: 95933a5cf607175a5f0df57d9fde8ae2841e41078bc2c60fa48b58b52608e0b2
        • Instruction Fuzzy Hash: 3F126170E041899FDB10EFAEC441AAEBBB1EF68314F11456AE854E7342D638DE41DB58
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FlushOffsetRect
        • String ID: PSD/PDD
        • API String ID: 1860502862-3902352457
        • Opcode ID: 4406275225f4c49322fc2eb0d048eeacba47579bf734749fb83f331ca2c1c8ac
        • Instruction ID: 0b68088b644d553491eca00efdf287c559d1d25d6c73a1c6d0ec1f6fee1f28c3
        • Opcode Fuzzy Hash: 4406275225f4c49322fc2eb0d048eeacba47579bf734749fb83f331ca2c1c8ac
        • Instruction Fuzzy Hash: A922AE78E002099FCB80DFA9D581ADDBBF1FF48314F2481AAE919A7351D734AE418F58
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4a75ef5eaf5fa4e396d24ababcd9a4a772aa66962c398cdc752cc07dd21660eb
        • Instruction ID: 6f32e376c423b0c08d3ad0a121c0b39aa4ca2e1e70502d77f32762e573e770a0
        • Opcode Fuzzy Hash: 4a75ef5eaf5fa4e396d24ababcd9a4a772aa66962c398cdc752cc07dd21660eb
        • Instruction Fuzzy Hash: E0A1FB75A00208DFCB04DFA9C581A9EBBF5FF89304F2181AAED04AB356D735AE41DB54
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3916222277
        • Opcode ID: 7ef2f9938fcf5fb3bbddd0854b1012eecedf511c46242ac48360cbcda20a709e
        • Instruction ID: 13af1216db14f48b5102094643a1e310b0aec9de3d34a03e247ad3e02972eebc
        • Opcode Fuzzy Hash: 7ef2f9938fcf5fb3bbddd0854b1012eecedf511c46242ac48360cbcda20a709e
        • Instruction Fuzzy Hash: 67027E78608245DFD349DF18C094A2AB7F2EF99304F24CA9ED5854B366C736E882CF52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3916222277
        • Opcode ID: 557200104f406de20ec338f1439a1d9b9578e08132c0d23b19a10e718a0d9e01
        • Instruction ID: b5a9eade2d722d9f739d22ed67a01db5b56ea310a437d5108f3e7f7ff996aa24
        • Opcode Fuzzy Hash: 557200104f406de20ec338f1439a1d9b9578e08132c0d23b19a10e718a0d9e01
        • Instruction Fuzzy Hash: 94129174E0424A9FCB04CFA8C5909EEBBF2FF49314F24815AD855AB355D734A982CF94
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: @=G
        • API String ID: 0-227264607
        • Opcode ID: 057c7c8c7be3ee7c4c579042b0bd0c7ae2efb1d06f792d9b252e868233b09bab
        • Instruction ID: cd18552fb84c155f6026860be6e684354b0895a7ae7e60110256bee86ae74bd4
        • Opcode Fuzzy Hash: 057c7c8c7be3ee7c4c579042b0bd0c7ae2efb1d06f792d9b252e868233b09bab
        • Instruction Fuzzy Hash: 93F1E374A0060A9FCB20DF99C4819AEF7F2FF88314F24866AE459A7355D734E982CF54
        APIs
        • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 004099B9
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: DiskFreeSpace
        • String ID:
        • API String ID: 1705453755-0
        • Opcode ID: 56636f80f8176e7f785ab2a29698e1686f14b4106ad9e8c3892e951ff906e81c
        • Instruction ID: 4e5c451eefbaba04fd70ce62acaf46e057f6f7fb0e0251704f51b4bfef687198
        • Opcode Fuzzy Hash: 56636f80f8176e7f785ab2a29698e1686f14b4106ad9e8c3892e951ff906e81c
        • Instruction Fuzzy Hash: 7011C3B5A00109AFDB04CF99C8819AFB7F9EFC8314B54C569A509EB255E6319E018BA4
        APIs
        • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 004350B1
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: NtdllProc_Window
        • String ID:
        • API String ID: 4255912815-0
        • Opcode ID: 975482edda59c58fea9316b157a1b29263a1dfa51b0a883583f099fb3179b404
        • Instruction ID: c7e2ca23b72e6199a4e3fcd80179c9d53998486e017de9dfd02be68c9f78b085
        • Opcode Fuzzy Hash: 975482edda59c58fea9316b157a1b29263a1dfa51b0a883583f099fb3179b404
        • Instruction Fuzzy Hash: CDF06276608644AF9B14DE9AD881C96B7FCEB4D72075140B6F904D7641D276AD008BA4
        APIs
        • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00406872), ref: 00406832
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: InfoLocale
        • String ID:
        • API String ID: 2299586839-0
        • Opcode ID: 733e2c765f3ca7fca0ae6c3ff36b10117c3136072b099959121336a536d9372c
        • Instruction ID: a185853ff122ada5d9580153f7d5c4a023c2652e370531f0f3f577c2d6a0da46
        • Opcode Fuzzy Hash: 733e2c765f3ca7fca0ae6c3ff36b10117c3136072b099959121336a536d9372c
        • Instruction Fuzzy Hash: EAF0CD71A04309AFE715EFA1CC51AAFB3B6F7C4714F40C57AA510B75C0E7786A04C684
        APIs
        • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00406872), ref: 00406832
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: InfoLocale
        • String ID:
        • API String ID: 2299586839-0
        • Opcode ID: a2c06219047754c5ea57ba583d72bf084450101058aa4234e4a89dcfa73a95ff
        • Instruction ID: 29b3bcc85a639fb1690354b5c198fe638388a697aa86c3154c0e8a448105b031
        • Opcode Fuzzy Hash: a2c06219047754c5ea57ba583d72bf084450101058aa4234e4a89dcfa73a95ff
        • Instruction Fuzzy Hash: E3F0CD71904309AFE715EFA1CC51A9FB3B6F7C4714F40C57AA510775C0D7786A04C684
        APIs
        • SetClipboardData.USER32(00000000), ref: 004361D4
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ClipboardData
        • String ID:
        • API String ID: 2952336681-0
        • Opcode ID: 4c74228df97f1ca86c96fbec362272866c204f43c05151ab457dad0846295d5e
        • Instruction ID: ca68ab202b34ee1b1b9aeb8a001f24e4b73df0a80b401aaf2eac34e6c41abdae
        • Opcode Fuzzy Hash: 4c74228df97f1ca86c96fbec362272866c204f43c05151ab457dad0846295d5e
        • Instruction Fuzzy Hash: 5BF0EC70A14204BFCB04CF69CA51C2ABBFCEF4D30072240B6F800D7211DAB4ED00DAA4
        APIs
        • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040C46A
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: InfoLocale
        • String ID:
        • API String ID: 2299586839-0
        • Opcode ID: e2f6bb85904c992d27eff5d43d45629a3a7acb5d68e57777ec72ae42e4d601af
        • Instruction ID: 1a6c4334858c2ea06db05b4b52c564b52ef175afc32ef90a0b9268abf89bb910
        • Opcode Fuzzy Hash: e2f6bb85904c992d27eff5d43d45629a3a7acb5d68e57777ec72ae42e4d601af
        • Instruction Fuzzy Hash: 2DE0D87270421457D310AA699CC69FA735CAB58310F00427FBE09E73C6EEB89D4442ED
        APIs
        • GetClipboardData.USER32(00000000), ref: 00436176
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ClipboardData
        • String ID:
        • API String ID: 2952336681-0
        • Opcode ID: f54cd5da21a965272d5e437543ae66cca70342109594b4038ee0ea3b12fe329a
        • Instruction ID: 80f17d0e1c1e8a01532270f1bc5f9065a281d764f5768e6df9b0f994ba75cba3
        • Opcode Fuzzy Hash: f54cd5da21a965272d5e437543ae66cca70342109594b4038ee0ea3b12fe329a
        • Instruction Fuzzy Hash: 3BF0A070A04604AFCB00CF65C89581ABBF8FB4D71072284B2F804D7291DA34AD00DAA5
        APIs
        • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040DE2E,00000000,0040E047,?,?,00000000,00000000), ref: 0040C4AB
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: InfoLocale
        • String ID:
        • API String ID: 2299586839-0
        • Opcode ID: 5d32ee54b27713dae6b558668f0811b1e9cea28660a1d26a28ad1fd658e51286
        • Instruction ID: 3dd52887d224f80f985d3a2f6d69d6c1a9fc16c0feb5374f8aac7370db0e9f18
        • Opcode Fuzzy Hash: 5d32ee54b27713dae6b558668f0811b1e9cea28660a1d26a28ad1fd658e51286
        • Instruction Fuzzy Hash: CDD05E6630D2506AE310965B6DC5DBB4AECDAC97A0F14453BFA49D6342D2288C0693B5
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: LocalTime
        • String ID:
        • API String ID: 481472006-0
        • Opcode ID: 2c87f4ff2cc428fb1c68881bde1edcb6d3676a9583b7079f7252e17f393d4b2c
        • Instruction ID: d973a8048538195aa8490dbf47e6e2eca0501678c53f9d62c484e185f3a071f9
        • Opcode Fuzzy Hash: 2c87f4ff2cc428fb1c68881bde1edcb6d3676a9583b7079f7252e17f393d4b2c
        • Instruction Fuzzy Hash: 50E0A568408603A6C200BF55C4414AEB7A5AE98B44F408C5DF8D4423A1EB3584A9C76B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: xVN
        • API String ID: 0-3626399423
        • Opcode ID: e5a704862a3d997e7c1f8c2ace096e143210de171bc767c008cf56e2fb00348c
        • Instruction ID: 1cb3bac7b6e680e48246064168c967fe8097807bfe071df5cb78895e084ebc13
        • Opcode Fuzzy Hash: e5a704862a3d997e7c1f8c2ace096e143210de171bc767c008cf56e2fb00348c
        • Instruction Fuzzy Hash: 54916F71E005489FCB01DFAAC891AEEBBF5FF49315F14846AE845EB312D634AD41CB64
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: DeleteObject
        • String ID: D9B
        • API String ID: 1531683806-511987976
        • Opcode ID: 1a024186b6dec4ed6105e1f26f2e25f519c06650f1fa43d9b8fd1deb823e75d2
        • Instruction ID: 2f746e531044ec849fcae0d2e62cc9f749fbaa576a57d275cc1f793b8bbe758c
        • Opcode Fuzzy Hash: 1a024186b6dec4ed6105e1f26f2e25f519c06650f1fa43d9b8fd1deb823e75d2
        • Instruction Fuzzy Hash: 32A14974A002189FDB10DF65C981B8EB7F5FB49304F1081EAE808AB391DB75AE85CF54
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: dKS
        • API String ID: 0-1366305902
        • Opcode ID: 05a6f3d2f6d93237ef63789cc9b9b867dc037cc9c82022b3073baae83ee7a861
        • Instruction ID: 85771b9530ade3d3eb8c50114095c935901e982d19fc58e12f0f7aaea0ba793c
        • Opcode Fuzzy Hash: 05a6f3d2f6d93237ef63789cc9b9b867dc037cc9c82022b3073baae83ee7a861
        • Instruction Fuzzy Hash: 78A17F70A042498FDB04DBA9C594BEEBBF1EF49304F1481BAD504BB3A1D7785E05CBA6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: Unable to decode file
        • API String ID: 0-79868684
        • Opcode ID: 51ed837cc558d0eae20c792c27a255b6757bdea12cd02ea62d52723f70fcc0ce
        • Instruction ID: d50f06ac5b5073a298528e7734878d97b8ee1f6a80d975e2e9b37b1f961e42aa
        • Opcode Fuzzy Hash: 51ed837cc558d0eae20c792c27a255b6757bdea12cd02ea62d52723f70fcc0ce
        • Instruction Fuzzy Hash: 4761CE70B101098FDB10DFADC891AAEB7F6FB89304F158567E440D7315C638EE128B9A
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f1c1e7f41d66ceda069363c7a0d61e3f21f3a2219595d87f372ebe0eff8ade29
        • Instruction ID: e98965c999073b177c5eef82bc11799985b62577169fc5a43ec71e9f38c59600
        • Opcode Fuzzy Hash: f1c1e7f41d66ceda069363c7a0d61e3f21f3a2219595d87f372ebe0eff8ade29
        • Instruction Fuzzy Hash: 45822535E042299FCB50CFA9D980AEEBBF1FF49304F1541AAE448AB352E6349A41CF55
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7e8bdd94459022f74a568e8a61ac222b3146e5318b4763d5bd0df5197e5b7df3
        • Instruction ID: 61593093bd14fb0615663c97ae36eb6bedaad7103cb6353b525b37a498e49df6
        • Opcode Fuzzy Hash: 7e8bdd94459022f74a568e8a61ac222b3146e5318b4763d5bd0df5197e5b7df3
        • Instruction Fuzzy Hash: 0E22A075A0455A9FDB00DFA9C890AAEB7F1FB99304F10416BE845EB352C738AE05CB94
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4b3bf51fb7542270328da32e46674860bab60a060f3a79d3bb8115602655b9c1
        • Instruction ID: 52ecd567e70f2e4235fd3c5558dada698b345ea4248a813446fdb15a2a94fb5b
        • Opcode Fuzzy Hash: 4b3bf51fb7542270328da32e46674860bab60a060f3a79d3bb8115602655b9c1
        • Instruction Fuzzy Hash: 09328E74E00259DFCF09CF98D9909EEBBB2BF89314F20826AD416AB254D734A946CF54
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9ef712e3723d42f3fe4e68b050d81d9892adab74770c0323719135ac28422940
        • Instruction ID: 66642db0f5b76f20ee48bfa151f6308c63a38ff2424f66133dd97b59234062b9
        • Opcode Fuzzy Hash: 9ef712e3723d42f3fe4e68b050d81d9892adab74770c0323719135ac28422940
        • Instruction Fuzzy Hash: 02E113716047019FC714DF29C888A5BB7E1FB98309F108A2DF4A9CB355DB34EA4ADB46
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 704610c9ed082730d53bb9740c889caed42b57dcfc5a11d89a91384c28dc2e1e
        • Instruction ID: b8ab103aade638a93bbd1328185ab59070d35630c9d8daaad1bd625a0b17be76
        • Opcode Fuzzy Hash: 704610c9ed082730d53bb9740c889caed42b57dcfc5a11d89a91384c28dc2e1e
        • Instruction Fuzzy Hash: B8A1E231A001495BEB14EBAAC8413BFB7B2EF85314F50817AEA54EB782D63CDE46C754
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4703f985dcb42d6b1e477d1e58354ef7b9e1ad737f684bfdaad8ed53c2967c6e
        • Instruction ID: 8135948989ec9c5b989201541f8eb00510bdbcc0a05156797a8957d1b56a8f5d
        • Opcode Fuzzy Hash: 4703f985dcb42d6b1e477d1e58354ef7b9e1ad737f684bfdaad8ed53c2967c6e
        • Instruction Fuzzy Hash: A6915E71B00149DBDB00DFA9C991AAEB7F5EB88304F15817AE814B7392C739ED05CB98
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: eef7286dc15d362924f4be3c5d309ce6a490f2189785fb1e25b0287770ab66b1
        • Instruction ID: ab91c1130d9f585de852848002cb28e17ca1c2f7cb40bec8a1d25e51fe2216f8
        • Opcode Fuzzy Hash: eef7286dc15d362924f4be3c5d309ce6a490f2189785fb1e25b0287770ab66b1
        • Instruction Fuzzy Hash: 61B130B15042008FE74CCF19D489B85BBE1BF49318F1680AAD9098F3A7D7BAD985CF95
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8edbc22c7405612587b3705b247d0bc703d12d156190f4babee4519dbdbef6d2
        • Instruction ID: 88e71a2509e5cf245dd950556713d9586b7b5854b55d3e6faef91fcd4eba11f7
        • Opcode Fuzzy Hash: 8edbc22c7405612587b3705b247d0bc703d12d156190f4babee4519dbdbef6d2
        • Instruction Fuzzy Hash: 1561632278D68103E33D8E7D6CE02B7DAD35FD631862ED57DA4DAC3F42E86EA4165108
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 541b5c93655ccc8afebc73664aad9e6f334c45aedf271df2dc3f292001414c40
        • Instruction ID: 2317bd4cf965034dacd6dcd7e49cc6edc3f612d01cfa9199504e39982549d98d
        • Opcode Fuzzy Hash: 541b5c93655ccc8afebc73664aad9e6f334c45aedf271df2dc3f292001414c40
        • Instruction Fuzzy Hash: 4D817C73D104774BEB628EA88C443A17392AFDD39EF5B42B0ED04BB64AD538BD5182C0
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5852e1992767a40f11465aaf82952d6fea3d7ed543abeb2f2b95017b6ae57e60
        • Instruction ID: 436b682a475362257544aae6ce2f0cc71f9c6202330ef3948b8e845e24ca7c83
        • Opcode Fuzzy Hash: 5852e1992767a40f11465aaf82952d6fea3d7ed543abeb2f2b95017b6ae57e60
        • Instruction Fuzzy Hash: 198184B1600B108BD7B4DF39C582A0BB7F4FF886483444A2EE096DBB96D675F915CB48
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2945ffd980141f8c97937d932ae03df8929420310ccb1ca70e5017797f4d2253
        • Instruction ID: 6a3d1eca5f7106a9b3fe82219fab7eef90cf1ad858b257a773d69962a5c3988f
        • Opcode Fuzzy Hash: 2945ffd980141f8c97937d932ae03df8929420310ccb1ca70e5017797f4d2253
        • Instruction Fuzzy Hash: 59712673D204779BEF608EA888443617392EFD925CFAF46B0DE05BB646C634BC5296D0
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 62346620ab677d3d95cd496c1290bc255244a89bf9595c847f234708a113b76f
        • Instruction ID: 4a3bbb392f4c130e15ed9e04f768be9019e8f56de0c1126e32751b6e70ee6978
        • Opcode Fuzzy Hash: 62346620ab677d3d95cd496c1290bc255244a89bf9595c847f234708a113b76f
        • Instruction Fuzzy Hash: 2B317E327682D25BC761AE6CCCC0676B7D6FB4A301B244B79EE98CB346C139D9469390
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3061623392b8b2c4a8ad746e9052c9e6da9aefd593d9a449f64d6345f7cba9e4
        • Instruction ID: f03a963fb8cac62d9ac7e670dd05319ff93cca1af7888db2988f9552ccd1b647
        • Opcode Fuzzy Hash: 3061623392b8b2c4a8ad746e9052c9e6da9aefd593d9a449f64d6345f7cba9e4
        • Instruction Fuzzy Hash: A0211C33D684F206DB74ADFD4C4023AB6D08B4A162B5B47B2DDC5FB586E11C9C9293E1
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 929e65f0c90fbbc04021c26ed16fa91a7616c920a609b2e2ae2b9c4c207d77e9
        • Instruction ID: 18786e2d680a08836a65d3bc23d62983b0e63d208fea493891718a41fee39235
        • Opcode Fuzzy Hash: 929e65f0c90fbbc04021c26ed16fa91a7616c920a609b2e2ae2b9c4c207d77e9
        • Instruction Fuzzy Hash: FC21AD3490C1999BDB14CFA994A05EEBFB19F4A208F2481FAC8A1D7356E1344615D784
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a35edd85d241dc68653b4c380b6aa8caa8bd952efb0c9537444741b00ada9645
        • Instruction ID: 0e40c4513e33e78aa59b481bc9cc09f98931429571f6ef5fbecb416ebf8ef550
        • Opcode Fuzzy Hash: a35edd85d241dc68653b4c380b6aa8caa8bd952efb0c9537444741b00ada9645
        • Instruction Fuzzy Hash:
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b12964de0a963589df2cc3d312907d68ad20bed97cff7c39fb39673166ab926c
        • Instruction ID: 11cbac9f05c0bec0d23d4d1fe477ff06d069409e0a4ea82d5a05209bc21fa05c
        • Opcode Fuzzy Hash: b12964de0a963589df2cc3d312907d68ad20bed97cff7c39fb39673166ab926c
        • Instruction Fuzzy Hash:
        APIs
        • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,0042FB97), ref: 0042F81A
        • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0042F832
        • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0042F844
        • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0042F856
        • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0042F868
        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0042F87A
        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0042F88C
        • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0042F89E
        • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0042F8B0
        • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0042F8C2
        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0042F8D4
        • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0042F8E6
        • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0042F8F8
        • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0042F90A
        • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0042F91C
        • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0042F92E
        • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0042F940
        • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0042F952
        • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0042F964
        • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0042F976
        • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0042F988
        • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0042F99A
        • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0042F9AC
        • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0042F9BE
        • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0042F9D0
        • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0042F9E2
        • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0042F9F4
        • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0042FA06
        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0042FA18
        • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0042FA2A
        • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0042FA3C
        • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0042FA4E
        • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0042FA60
        • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0042FA72
        • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0042FA84
        • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0042FA96
        • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0042FAA8
        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0042FABA
        • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0042FACC
        • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0042FADE
        • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0042FAF0
        • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0042FB02
        • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0042FB14
        • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0042FB26
        • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0042FB38
        • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0042FB4A
        • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0042FB5C
        • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0042FB6E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressProc$LibraryLoad
        • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
        • API String ID: 2238633743-2910565190
        • Opcode ID: 59f864e6a618093bc764ec02e6e258cda9e9137c8b18c183cf093a543bdac21c
        • Instruction ID: 4a4d3c8dae220b8c10cc1b562dd6f309b2270a84d7ee490acf332df04daffbf1
        • Opcode Fuzzy Hash: 59f864e6a618093bc764ec02e6e258cda9e9137c8b18c183cf093a543bdac21c
        • Instruction Fuzzy Hash: 91A125B1B54660AFDF00EBB5FA82E2537B8EF95700391057BB401DF291C6BC9818DB29
        APIs
        • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 0040F2D9
          • Part of subcall function 0040F2A4: GetProcAddress.KERNEL32(00000000), ref: 0040F2BD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
        • API String ID: 1646373207-1918263038
        • Opcode ID: 22f3c063ca6793b496059884c4234611d99649a1a2678124d16dc5dc8016fda9
        • Instruction ID: a90c8b490043de3605a1bf824df29d9c861a51eb077e70e58ebe5cfb0e2291ad
        • Opcode Fuzzy Hash: 22f3c063ca6793b496059884c4234611d99649a1a2678124d16dc5dc8016fda9
        • Instruction Fuzzy Hash: 774140615042086BD324BB6E790252673E8DAA4704360C47FB404FBFE6DB3DAC4D9A7C
        APIs
        • timeGetTime.WINMM(?,?,00000000,004989AE,?,00000000,004989BF), ref: 004984A8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Timetime
        • String ID: d
        • API String ID: 17336451-2564639436
        • Opcode ID: e98bf90b20905a5916708a2b840fb684f572ea029c6e0c1236aeccb4747347a8
        • Instruction ID: 914b57a91b480fac3c148384d4dacffd4509fe0f0b45473e3449e659cf57cab9
        • Opcode Fuzzy Hash: e98bf90b20905a5916708a2b840fb684f572ea029c6e0c1236aeccb4747347a8
        • Instruction Fuzzy Hash: D7120C74A04248EFDF10DFACC585B9DBBF1AF06304F2540AAE404AB362C7789E45DB55
        APIs
          • Part of subcall function 00431FD4: SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 00432011
          • Part of subcall function 00431FD4: CreateFontIndirectA.GDI32(?), ref: 0043201E
          • Part of subcall function 00431E08: GetTextExtentPointA.GDI32(00000000,00000034,00000034,?), ref: 00431E43
        • MulDiv.KERNEL32(00000008,?,00000004), ref: 00432559
        • MulDiv.KERNEL32(00000008,?,00000008), ref: 00432569
        • MulDiv.KERNEL32(0000000A,?,00000004), ref: 00432576
        • MulDiv.KERNEL32(0000000A,?,00000008), ref: 00432583
        • MulDiv.KERNEL32(00000032,?,00000004), ref: 00432590
        • DrawTextA.USER32(00000000,00000000,000000FF,?,00000000), ref: 00432603
        • MulDiv.KERNEL32(0000000E,?,00000008), ref: 00432636
        • MulDiv.KERNEL32(00000004,?,00000004), ref: 00432646
        • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 0043266C
        • DrawTextA.USER32(00000000,00000000,00000001,?,00000000), ref: 004326A4
        • LoadIconA.USER32(00000000), ref: 00432800
          • Part of subcall function 00464754: GetWindowTextA.USER32(?,?,00000100), ref: 00464777
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Text$Draw$CreateExtentFontIconIndirectInfoLoadParametersPointRectSystemWindow
        • String ID: $Image$Message$t9S
        • API String ID: 4220236395-2498284466
        • Opcode ID: 77e726f3df7e77a4137a2298774c71c58e5aa5f982384f5c90285d6ea62ab55a
        • Instruction ID: 0103f07d2410f192d4bb29aa767b0ccf560501507b91fba281c250d7c99e4aa5
        • Opcode Fuzzy Hash: 77e726f3df7e77a4137a2298774c71c58e5aa5f982384f5c90285d6ea62ab55a
        • Instruction Fuzzy Hash: 15027F74E002089FDB00EFA9C985B9DB7F5FF48308F14916AE914AB392C778AD45CB59
        APIs
        • SelectObject.GDI32(?,?), ref: 00425EEC
        • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00425F67,?,?), ref: 00425F3B
        • SelectObject.GDI32(?,?), ref: 00425F55
        • DeleteObject.GDI32(?), ref: 00425F61
        • SelectObject.GDI32(?,?), ref: 00425FAB
        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 0042602A
        • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 0042604C
        • SetTextColor.GDI32(?,00000000), ref: 00426054
        • SetBkColor.GDI32(?,00FFFFFF), ref: 00426062
        • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 0042608E
        • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 004260B3
        • SetTextColor.GDI32(?,?), ref: 004260BD
        • SetBkColor.GDI32(?,?), ref: 004260C7
        • SelectObject.GDI32(?,00000000), ref: 004260DA
        • DeleteObject.GDI32(?), ref: 004260E3
        • DeleteDC.GDI32(?), ref: 0042610E
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Object$ColorSelectStretch$Delete$Text$Mask
        • String ID:
        • API String ID: 326492243-0
        • Opcode ID: f67a84046814da034142ce65a94de746e492c4cb41b415a422b6f27899265fc9
        • Instruction ID: e1db017f6df555e443f6397a59335503b0a83ad8602761020ac2475941837167
        • Opcode Fuzzy Hash: f67a84046814da034142ce65a94de746e492c4cb41b415a422b6f27899265fc9
        • Instruction Fuzzy Hash: 6681B4B1A04259AFDB50EFA9DD81EAF77FCAB0D714F110459FA18E7281C638ED008B65
        APIs
        • FindWindowA.USER32(MouseZ,Magellan MSWHEEL), ref: 00407980
        • RegisterClipboardFormatA.USER32(MSWHEEL_ROLLMSG), ref: 0040798C
        • RegisterClipboardFormatA.USER32(MSH_WHEELSUPPORT_MSG), ref: 0040799B
        • RegisterClipboardFormatA.USER32(MSH_SCROLL_LINES_MSG), ref: 004079A7
        • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004079BF
        • SendMessageA.USER32(00000000,?,00000000,00000000), ref: 004079E3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ClipboardFormatRegister$MessageSend$FindWindow
        • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
        • API String ID: 1416857345-3736581797
        • Opcode ID: a652a34ccefb31ca474db751a83e47dbac5200056c08899811b8f5108a11fdf2
        • Instruction ID: a7ea0b2a7ab190df046fa92e9e2b0d8567f960b8ef129492408548317461016b
        • Opcode Fuzzy Hash: a652a34ccefb31ca474db751a83e47dbac5200056c08899811b8f5108a11fdf2
        • Instruction Fuzzy Hash: D21112B0B48305AFE7109F69CC82B6AB798EF54710F20453BB9456B3C0D6B97D408B6A
        APIs
        • GetObjectA.GDI32(?,00000054,?), ref: 004298FF
        • 73E9A570.USER32(00000000,00000000,00429AD7,?,?,00000054,?), ref: 0042992D
        • SelectObject.GDI32(?,00000000), ref: 00429973
        • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 00429995
        • SelectObject.GDI32(?), ref: 004299EB
        • SetBkColor.GDI32(?), ref: 00429A26
        • SetBkColor.GDI32(?,00000000), ref: 00429A54
        • SelectObject.GDI32(?,00000000), ref: 00429A67
        • DeleteObject.GDI32 ref: 00429A73
        • DeleteDC.GDI32(?), ref: 00429A89
        • SelectObject.GDI32(?,00000000), ref: 00429AA4
        • DeleteDC.GDI32(00000000), ref: 00429AC0
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Object$Select$Delete$Color$A570
        • String ID:
        • API String ID: 3306858847-0
        • Opcode ID: 221a9b3f053d7484b8942ccfde4768bfd80d89e98cefe2f398227f7b141480f9
        • Instruction ID: 8c7ab3196d1779cf978a3bb94e077fc9b431080fa161f55c99d378178522c799
        • Opcode Fuzzy Hash: 221a9b3f053d7484b8942ccfde4768bfd80d89e98cefe2f398227f7b141480f9
        • Instruction Fuzzy Hash: A3512D71F04355ABDB10DBE99C46FAFB7FCAB08704F50446AB604EB2C1D678A940CB68
        APIs
        • EnumDisplayMonitors.USER32(?,?,?,?), ref: 0042CE2D
        • GetSystemMetrics.USER32(00000000), ref: 0042CE52
        • GetSystemMetrics.USER32(00000001), ref: 0042CE5D
        • GetClipBox.GDI32(?,?), ref: 0042CE6F
        • GetDCOrgEx.GDI32(?,?), ref: 0042CE7C
        • OffsetRect.USER32(?,?,?), ref: 0042CE95
        • IntersectRect.USER32(?,?,?), ref: 0042CEA6
        • IntersectRect.USER32(?,?,?), ref: 0042CEBC
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Rect$IntersectMetricsSystem$AddressClipDisplayEnumMonitorsOffsetProc
        • String ID: EnumDisplayMonitors
        • API String ID: 362875416-2491903729
        • Opcode ID: faae1c3df708dc615496fd283e33454bc787157529d7898d7411b3e28c500f6c
        • Instruction ID: de622c9c875c87ed24c822475d17d8763186b133f7b1dcc1ce7bfe2907808bcd
        • Opcode Fuzzy Hash: faae1c3df708dc615496fd283e33454bc787157529d7898d7411b3e28c500f6c
        • Instruction Fuzzy Hash: F6314F72E00219AFDB11DBA9EC80AEFB7BCEB19310F514127F915E3241D6389A058BB5
        APIs
        • GetClientRect.USER32(00000000,?), ref: 0044CADB
        • GetWindowRect.USER32(00000000,?), ref: 0044CAED
        • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0044CB03
        • OffsetRect.USER32(?,?,?), ref: 0044CB18
        • ExcludeClipRect.GDI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00000002,00000000,?,00000000,0044CCEA), ref: 0044CB31
        • InflateRect.USER32(?,00000000,00000000), ref: 0044CB4F
        • GetWindowLongA.USER32(00000000,000000F0), ref: 0044CBA5
        • DrawEdge.USER32(?,?,00000000,00000008), ref: 0044CC71
        • IntersectClipRect.GDI32(?,?,?,?,?), ref: 0044CC8A
        • OffsetRect.USER32(?,?,?), ref: 0044CCA9
        • FillRect.USER32(?,?,00000000), ref: 0044CCC5
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Rect$Window$ClipOffset$ClientDrawEdgeExcludeFillInflateIntersectLongPoints
        • String ID:
        • API String ID: 1573515177-0
        • Opcode ID: 287aa888fc3452c0f103b9c58a62bcbe6bc5483369055ad282bba400be49e9b5
        • Instruction ID: bfa61d8a80e37062637b0d33e2982eb7c37940c3b901d68276bb02a2c93baf0e
        • Opcode Fuzzy Hash: 287aa888fc3452c0f103b9c58a62bcbe6bc5483369055ad282bba400be49e9b5
        • Instruction Fuzzy Hash: 70912871E04148AFDB41DBA9C985FEEB7F9AF09304F1440A6F904E7251C739AE44DB64
        APIs
        • CharNextA.USER32(00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 004029E7
        • CharNextA.USER32(00000000,00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 004029F1
        • CharNextA.USER32(00000000,00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 00402A0E
        • CharNextA.USER32(00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 00402A18
        • CharNextA.USER32(00000000,00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 00402A41
        • CharNextA.USER32(00000000,00000000,00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 00402A4B
        • CharNextA.USER32(00000000,00000000,00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 00402A6F
        • CharNextA.USER32(00000000,00000000,?,?,00000000,?,00402AC0,00000000,00402AED,?,?,?,00000000), ref: 00402A79
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CharNext
        • String ID: "$"
        • API String ID: 3213498283-3758156766
        • Opcode ID: 247e1fc6fd185e1701208ee6e0e989fa5825e317732fa7958044c18824aab2c7
        • Instruction ID: bfd035978699741461f7618ae54848c9b94a9bcf328f5d827199bdd2b2a4da68
        • Opcode Fuzzy Hash: 247e1fc6fd185e1701208ee6e0e989fa5825e317732fa7958044c18824aab2c7
        • Instruction Fuzzy Hash: CA2105847447811ADB312AB80EC87677B894B1A314B2801BF9491F73CBD8FC4C47976E
        APIs
        • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00505B00
        • GetClipRgn.GDI32(00000000,00000000), ref: 00505B10
        • CreateRectRgn.GDI32(?,?,?,?), ref: 00505B31
        • SelectClipRgn.GDI32(00000000,00000000), ref: 00505B45
        • DeleteObject.GDI32(00000000), ref: 00505B4E
        • DrawFrameControl.USER32(00000000,?,00000004,00000000), ref: 00505C41
        • SelectClipRgn.GDI32(00000000,00000000), ref: 00505C5C
        • DeleteObject.GDI32(00000000), ref: 00505C62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Clip$CreateDeleteObjectRectSelect$ControlDrawFrame
        • String ID: 4YP
        • API String ID: 1967790632-3694207927
        • Opcode ID: 7384ecd6d5a5a27b648058c169d5ac85870a1182e1d01d816e90ec92fea2af31
        • Instruction ID: 2fa11a3b6589b523852c21dc6379652358754729f924101bfb3538797668613a
        • Opcode Fuzzy Hash: 7384ecd6d5a5a27b648058c169d5ac85870a1182e1d01d816e90ec92fea2af31
        • Instruction Fuzzy Hash: AF619571A046045FDF14EFB9D882BDEBBB5BF09308F44845AF411E7282DA78AC04CB29
        APIs
        • RectVisible.GDI32(00000000,?), ref: 00449B35
        • SaveDC.GDI32(00000000), ref: 00449B4B
        • IntersectClipRect.GDI32(00000000,00000000,00000000,?,?), ref: 00449B6E
        • RestoreDC.GDI32(00000000,00000000), ref: 00449B89
        • CreateSolidBrush.GDI32(00000000), ref: 00449C0A
        • FrameRect.USER32(00000000,?,?), ref: 00449C3D
        • DeleteObject.GDI32(?), ref: 00449C47
        • CreateSolidBrush.GDI32(00000000), ref: 00449C57
        • FrameRect.USER32(00000000,?,00000000), ref: 00449C8A
        • DeleteObject.GDI32(00000000), ref: 00449C94
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
        • String ID:
        • API String ID: 375863564-0
        • Opcode ID: a9f51c1f53d2916aeb308c3ca33560b1706fa79161aa027cdcd67acd36fc038c
        • Instruction ID: 0d97f0ad5badd73d44ddf2754bca7e3de2a868c73ed3c3cc95e6f31bb03fb13b
        • Opcode Fuzzy Hash: a9f51c1f53d2916aeb308c3ca33560b1706fa79161aa027cdcd67acd36fc038c
        • Instruction Fuzzy Hash: 97514C716042459BEB14EF29C8C4B5B77E8AF88308F04445EFE898B386DB39EC45DB59
        APIs
        • GetWindowLongA.USER32(00000000,000000EC), ref: 00438563
        • GetWindowRect.USER32(00000000,?), ref: 0043857E
        • OffsetRect.USER32(?,?,?), ref: 00438593
        • GetWindowLongA.USER32(00000000,000000F0), ref: 004385D2
        • GetSystemMetrics.USER32(00000002), ref: 004385E7
        • GetSystemMetrics.USER32(00000003), ref: 004385F0
        • InflateRect.USER32(?,000000FE,000000FE), ref: 004385FF
        • GetSysColorBrush.USER32(0000000F), ref: 0043862C
        • FillRect.USER32(?,?,00000000), ref: 0043863A
        • ExcludeClipRect.GDI32(?,?,?,?,?,00000000,004386A3,?,00000000,?,?,?,00000000,?,00000000,000000EC), ref: 0043865F
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Rect$Window$LongMetricsSystem$BrushClipColorExcludeFillInflateOffset
        • String ID:
        • API String ID: 239630386-0
        • Opcode ID: f08a6797b143668b0c95f807d8c7eab55a30b9f8294e3d0a32f8e3f61b6b8b61
        • Instruction ID: d863946502bf7c4f4a957e009e65fd5f45e32e3fe4a3f9f06bca7e6111d8745f
        • Opcode Fuzzy Hash: f08a6797b143668b0c95f807d8c7eab55a30b9f8294e3d0a32f8e3f61b6b8b61
        • Instruction Fuzzy Hash: 9B412271E04149ABDB01EAE9CD86EDFB7BDEF49314F10056AF904F7191CA38AD418768
        APIs
        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402DC0
        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402DE4
        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402E00
        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000), ref: 00402E21
        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00402E4A
        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00402E58
        • GetStdHandle.KERNEL32(000000F5), ref: 00402E93
        • GetFileType.KERNEL32(?,000000F5), ref: 00402EA9
        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00402EC4
        • GetLastError.KERNEL32(000000F5), ref: 00402EDC
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
        • String ID:
        • API String ID: 1694776339-0
        • Opcode ID: 7c24209f2cf2d84b1f84bf29237fe32a02acf0e79bb2e12492c6d9ff63ba5fc0
        • Instruction ID: b8a3fdf711eef59d8ad8504431a6a0cbfa232888b3ac76dcfd5dab3ab586f966
        • Opcode Fuzzy Hash: 7c24209f2cf2d84b1f84bf29237fe32a02acf0e79bb2e12492c6d9ff63ba5fc0
        • Instruction Fuzzy Hash: 9E417E30544701AAE7306B24CA0DB6776A5BB00714F248A3FE4A6B66E0E7FD9881879D
        APIs
        • GetSystemMenu.USER32(00000000,00000000), ref: 0046047F
        • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 0046049D
        • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004604AA
        • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004604B7
        • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004604C4
        • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004604D1
        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004604DE
        • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004604EB
        • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 00460509
        • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00460525
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Menu$Delete$EnableItem$System
        • String ID:
        • API String ID: 3985193851-0
        • Opcode ID: 7b84cc764a934028e84db4b7ac003af528aafc471e83085afaf84b609a5303bf
        • Instruction ID: 4411743394293c15471ab9a23b16fd20c28961f583d2939724077bc83005abf5
        • Opcode Fuzzy Hash: 7b84cc764a934028e84db4b7ac003af528aafc471e83085afaf84b609a5303bf
        • Instruction Fuzzy Hash: B82150707443047EE320EA64CC8EF5A7BD89F04718F1480A9BA057F2D3D6B8F980865D
        APIs
        • 73E9A570.USER32(00000000,?,00000000,0042AC01,?,?), ref: 0042A94E
        • SelectObject.GDI32(?,00000000), ref: 0042A9D2
        • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,0042AA8B,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 0042AA40
        • SelectObject.GDI32(?,?), ref: 0042AA7F
        • DeleteObject.GDI32(00000000), ref: 0042AA85
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Object$Select$A570DeleteErrorLast
        • String ID: ($BM
        • API String ID: 2612784382-2980357723
        • Opcode ID: 34ed1f50ef2280744e5929652e31c2e03dbc59f7906271d5229b2aca82724ecc
        • Instruction ID: 5b4090eb44ed676c0641fb7e9264032050046bf9ecb97a5452f96abd07c6b867
        • Opcode Fuzzy Hash: 34ed1f50ef2280744e5929652e31c2e03dbc59f7906271d5229b2aca82724ecc
        • Instruction Fuzzy Hash: 67D14B74F002189FDF04DFA9D885AAEBBB5EF48304F50846AE905EB391D7389850CB69
        APIs
        • 73E9A570.USER32(00000000), ref: 00449E4B
        • SelectObject.GDI32()C,?), ref: 00449E91
        • BeginPaint.USER32(00000000,?,00000000,00449F52,?,)C,?,00000000,00000000,00000000,00000000,?), ref: 00449EB3
        • EndPaint.USER32(00000000,?,00000000,00000000,00000000,?,?,)C,?,00000000,00000000,00000000,00000000,?), ref: 00449F20
        • SelectObject.GDI32()C,?), ref: 00449F3A
        • DeleteDC.GDI32()C), ref: 00449F43
        • DeleteObject.GDI32(?), ref: 00449F4C
          • Part of subcall function 00449924: BeginPaint.USER32(00000000,?,?,?,00000000), ref: 0044994A
          • Part of subcall function 00449924: EndPaint.USER32(00000000,?,00449A4B,?,?,00000000), ref: 00449A3E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Paint$Object$BeginDeleteSelect$A570
        • String ID: )C
        • API String ID: 3982538872-4099117812
        • Opcode ID: ad3e68ddc6dcacf0c87b446897da101322be30fd9adc85a4cb43d2d42bf63dcd
        • Instruction ID: 0b9b828483245cba80446af68dcd76790693591bc84e2b893b812bbd2b7be71a
        • Opcode Fuzzy Hash: ad3e68ddc6dcacf0c87b446897da101322be30fd9adc85a4cb43d2d42bf63dcd
        • Instruction Fuzzy Hash: DF413E71B00204AFDB10EBA9CD85F9EB7F8AB49704F10447AB909EB381DA78ED05D759
        APIs
          • Part of subcall function 00431E08: GetTextExtentPointA.GDI32(00000000,00000034,00000034,?), ref: 00431E43
        • MulDiv.KERNEL32(000000B4,?,00000004), ref: 00432C00
        • MulDiv.KERNEL32(00000008,?,00000004), ref: 00432C45
        • MulDiv.KERNEL32(00000008,?,00000008), ref: 00432C5B
        • MulDiv.KERNEL32(000000A4,?,00000004), ref: 00432C74
        • MulDiv.KERNEL32(000000A4,?,00000004), ref: 00432CD1
          • Part of subcall function 0043BEF4: SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 0043BF08
        • MulDiv.KERNEL32(00000032,?,00000004), ref: 00432D0F
        • MulDiv.KERNEL32(0000000E,?,00000008), ref: 00432D1F
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        • MulDiv.KERNEL32(00000026,?,00000004), ref: 00432D7C
        • MulDiv.KERNEL32(0000005C,?,00000004), ref: 00432DE2
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ExtentLoadMessagePointSendStringText
        • String ID:
        • API String ID: 3563132563-0
        • Opcode ID: c8e42cb2de1c7b63844c5c1f7dfc08a307831f7219f0e0d27d161c19f738a789
        • Instruction ID: e0b32944a47380bcd3f98e584992fe7bec1e1920a1ecf347abc5764ce97989b4
        • Opcode Fuzzy Hash: c8e42cb2de1c7b63844c5c1f7dfc08a307831f7219f0e0d27d161c19f738a789
        • Instruction Fuzzy Hash: 3E913174B006059FDB00EF69C882B9EB7F5EF48708F204169FA05AB356CB75AD05CB99
        APIs
        • MulDiv.KERNEL32(?,?,?), ref: 004450A5
        • MulDiv.KERNEL32(?,?,?), ref: 004450BF
        • MulDiv.KERNEL32(?,?,?), ref: 004450ED
        • MulDiv.KERNEL32(?,?,?), ref: 00445103
        • MulDiv.KERNEL32(?,?,?), ref: 0044513B
        • MulDiv.KERNEL32(?,?,?), ref: 00445153
        • MulDiv.KERNEL32(?,?,0000001F), ref: 0044519D
        • MulDiv.KERNEL32(?,?,0000001F), ref: 004451C6
        • MulDiv.KERNEL32(00000000,?,0000001F), ref: 004451EC
          • Part of subcall function 00424B44: MulDiv.KERNEL32(00000000,?,00000048), ref: 00424B51
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9d308ff55eab104072aad7d6131274e082dca374d3b187c7003ba7568a20c160
        • Instruction ID: 39fa0f2b82bda0c46b83642ca3711108bd6145c639a0ae722daf793db15b1e90
        • Opcode Fuzzy Hash: 9d308ff55eab104072aad7d6131274e082dca374d3b187c7003ba7568a20c160
        • Instruction Fuzzy Hash: FF513C75604B406FD720EB69C881B6BB7E8AF4A704F04485EB9DAC7353C679EC40CB69
        APIs
        • GetObjectA.GDI32(?,00000018,?), ref: 00425D41
        • 73E9A570.USER32(00000000,00000000,00425E4E,?,00000000,00000000), ref: 00425D64
        • SelectObject.GDI32(?,?), ref: 00425DD2
        • SelectObject.GDI32(?,00000000), ref: 00425DE1
        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 00425E0D
        • SelectObject.GDI32(?,00000000), ref: 00425E1B
        • SelectObject.GDI32(?,00000000), ref: 00425E29
        • DeleteDC.GDI32(?), ref: 00425E3F
        • DeleteDC.GDI32(?), ref: 00425E48
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Object$Select$Delete$A570Stretch
        • String ID:
        • API String ID: 1268976527-0
        • Opcode ID: 9388b17367c2ba0dd6f2715468a09f4364c7b9aca32e360079633af8fd65e6db
        • Instruction ID: 185bde9043df893a8ea57d6fe8e66cc7a87e24244276ee129d79240e58786593
        • Opcode Fuzzy Hash: 9388b17367c2ba0dd6f2715468a09f4364c7b9aca32e360079633af8fd65e6db
        • Instruction Fuzzy Hash: 56411F71E04619AFDB10EBE9DC46FAFB7BCEB08704F514466B604F7281D67869008769
        APIs
        • GetThreadLocale.KERNEL32(00000000,0040E047,?,?,00000000,00000000), ref: 0040DDB2
          • Part of subcall function 0040C44C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040C46A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Locale$InfoThread
        • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
        • API String ID: 4232894706-2493093252
        • Opcode ID: bfcdeefa77e3e2c252ea586e7129a8d4cd3a0ff328cbc81b8d97d3cc11de56e5
        • Instruction ID: 61faac803b5bbd7a324eb0e1d928bdfba3b3ce7d89adf05980ac74c7e7707700
        • Opcode Fuzzy Hash: bfcdeefa77e3e2c252ea586e7129a8d4cd3a0ff328cbc81b8d97d3cc11de56e5
        • Instruction Fuzzy Hash: E26167707001549BDB00F7AAD891A9E77B6EB85304F10893BB111BB3C6CA3DDD19572D
        APIs
        • InsertMenuItemA.USER32(?,000000FF,000000FF,0000002C), ref: 004551B8
        • GetVersion.KERNEL32(00000000,00455267), ref: 004550A8
          • Part of subcall function 0045551C: CreatePopupMenu.USER32 ref: 00455537
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Menu$CreateInsertItemPopupVersion
        • String ID: ,$?$L?E
        • API String ID: 133695497-579155727
        • Opcode ID: b58483071477a620e0972ccab4907c267015f9d930d5689d710cbcd17a0cd75f
        • Instruction ID: 1153c4311d25c4f90da5bedb0801a6a5d6996579d9a95ef1f7e923829736c84e
        • Opcode Fuzzy Hash: b58483071477a620e0972ccab4907c267015f9d930d5689d710cbcd17a0cd75f
        • Instruction Fuzzy Hash: 0C612230A046449BDB10EF79DC916AA7BF6AF49304F0540BAED40E7397D738D809CB58
        APIs
        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0041056D
        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00410589
        • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 004105C2
        • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0041063F
        • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00410658
        • VariantCopy.OLEAUT32(?), ref: 0041068D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ArraySafe$BoundIndex$CopyCreateVariant
        • String ID:
        • API String ID: 351091851-3916222277
        • Opcode ID: 234b679ea6aacadab84f5360780f84a9e732a236cef452c0c7f4b9654739461b
        • Instruction ID: 02ffaedf14b6740128310bfd8605a9abfb1ff67a79af41414e017534beb6e736
        • Opcode Fuzzy Hash: 234b679ea6aacadab84f5360780f84a9e732a236cef452c0c7f4b9654739461b
        • Instruction Fuzzy Hash: 0D511E7590021D9BCB22DB59D881BD9B3BDAF4C304F0041EAF648E7212D678AFC48F69
        APIs
        • GetActiveWindow.USER32 ref: 00464DE3
        • GetWindowRect.USER32(?,?), ref: 00464E3D
        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 00464E75
        • MessageBoxA.USER32(?,?,?,?), ref: 00464EB6
        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,00464F2C), ref: 00464F06
        • SetActiveWindow.USER32(?,00464F2C), ref: 00464F17
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$Active$MessageRect
        • String ID: (
        • API String ID: 3147912190-3887548279
        • Opcode ID: 4803ee09c0254806ebd25409800c1a916c1ee0c05509a1e66bedccf116ad3eb7
        • Instruction ID: 7213369d51f7633061b81c78b6ea98f79b9665fdde096b74b0c46334232de19f
        • Opcode Fuzzy Hash: 4803ee09c0254806ebd25409800c1a916c1ee0c05509a1e66bedccf116ad3eb7
        • Instruction Fuzzy Hash: E7412A75E00108AFDB04DBA9CD81FAEB7F9FB88300F14846AF500E7791DA78AE048B55
        APIs
        • MulDiv.KERNEL32(?,000009EC,00000000), ref: 00428576
        • MulDiv.KERNEL32(?,000009EC,00000000), ref: 00428593
        • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 004285BF
        • GetEnhMetaFileHeader.GDI32(00000016,00000064,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 004285DF
        • DeleteEnhMetaFile.GDI32(00000016), ref: 00428600
        • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,00000016,00000064,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC), ref: 00428613
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileMeta$Bits$DeleteHeader
        • String ID: `
        • API String ID: 1990453761-2679148245
        • Opcode ID: d7eb93d330d0970479c3822882001caf25050a33c59e84d5d21de4e9a818d4c2
        • Instruction ID: 720ff8cb1d1229494b2dc8aebe285825cc547ebdf4b84877a901d25684682fd6
        • Opcode Fuzzy Hash: d7eb93d330d0970479c3822882001caf25050a33c59e84d5d21de4e9a818d4c2
        • Instruction Fuzzy Hash: 86411F75E00218AFDB00DFA9D885AAEB7F9EF48710F51816AF904FB241D7399D40CB69
        APIs
          • Part of subcall function 0040D47C: 751C1540.VERSION(?,0040D564,?,?,00000000,?,00000000,?,00000000,0040D535,?,00000000,?,00000000,0040D552), ref: 0040D50D
        • GetModuleHandleA.KERNEL32(comctl32.dll), ref: 004534A4
        • GetProcAddress.KERNEL32(00000000,ImageList_WriteEx), ref: 004534B5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressC1540HandleModuleProc
        • String ID: ImageList_WriteEx$\~A$comctl32.dll$comctl32.dll$d(B
        • API String ID: 1553222790-3981968051
        • Opcode ID: 93f5aee790a24f47c583df5069b50c1de62e3ea30a43bfe475c46b958b62fdbd
        • Instruction ID: f1f616d778e6143c4459c6953d3745a6164c061cca038d9838260607f6d035f7
        • Opcode Fuzzy Hash: 93f5aee790a24f47c583df5069b50c1de62e3ea30a43bfe475c46b958b62fdbd
        • Instruction Fuzzy Hash: C3219570300204ABD701EF7ADC51A1A76B8AB55787B11143AFC05D73E2EB7C9E0CDA28
        APIs
        • GetMonitorInfoA.USER32(?,?), ref: 0042CBA9
        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0042CBD0
        • GetSystemMetrics.USER32(00000000), ref: 0042CBE5
        • GetSystemMetrics.USER32(00000001), ref: 0042CBF0
        • lstrcpy.KERNEL32(?,DISPLAY), ref: 0042CC1A
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: System$InfoMetrics$AddressMonitorParametersProclstrcpy
        • String ID: DISPLAY$GetMonitorInfo
        • API String ID: 1539801207-1633989206
        • Opcode ID: 5f5d0c040e78c559501352974bc987694680289211ec8ddd5292ba72e6c48047
        • Instruction ID: 53ac5f5868e1425f8ec0b3d63ae51212c46c81455a52d884a4e843dee85f1667
        • Opcode Fuzzy Hash: 5f5d0c040e78c559501352974bc987694680289211ec8ddd5292ba72e6c48047
        • Instruction Fuzzy Hash: 6611AF327013255ED720CF66BC84BABB7B8EB05710F40892BFD4997340D6B4A8449BA9
        APIs
        • RtlEnterCriticalSection.NTDLL(0053D5C8), ref: 00401BA5
        • LocalFree.KERNEL32(008C3A88,00000000,M$), ref: 00401BB7
        • VirtualFree.KERNEL32(?,00000000,00008000,008C3A88,00000000,M$), ref: 00401BD6
        • LocalFree.KERNEL32(008C0E38,?,00000000,00008000,008C3A88,00000000,M$), ref: 00401C15
        • RtlLeaveCriticalSection.NTDLL(0053D5C8), ref: 00401C3E
        • RtlDeleteCriticalSection.NTDLL(0053D5C8), ref: 00401C48
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
        • String ID: M$
        • API String ID: 3782394904-2649047301
        • Opcode ID: 4edd6c7ec0c2ec91341a55bd26b0b1e13ad33f8b0fb671cc910aac9d542a86b0
        • Instruction ID: 2d3450d33bfc8c8a3598e13e4e1ba3781a7d55c91203b354bdb38b74eca926b9
        • Opcode Fuzzy Hash: 4edd6c7ec0c2ec91341a55bd26b0b1e13ad33f8b0fb671cc910aac9d542a86b0
        • Instruction Fuzzy Hash: 23119DB1248A405BE325BB69BC46B163BB5F79574CF40003AF000A73F2E77C98549778
        APIs
        • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004045EE,00000000,00000000,?,00000002,0040468E,00402883,004028CB,00000000,00000000), ref: 00404559
        • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004045EE,00000000,00000000,?,00000002,0040468E,00402883,004028CB,00000000), ref: 0040455F
        • GetStdHandle.KERNEL32(000000F5,004045A8,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004045EE,00000000,00000000), ref: 00404574
        • WriteFile.KERNEL32(00000000,000000F5,004045A8,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004045EE,00000000,00000000), ref: 0040457A
        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404598
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileHandleWrite$Message
        • String ID: Error$Runtime error at 00000000
        • API String ID: 1570097196-2970929446
        • Opcode ID: ba491f1a775f50c8a2c60eb9f278c47d8a63e26e4360bbbd5b3bead34659e73c
        • Instruction ID: 6f9f2faf2e5b0b18d84477bed5677b1030923aa7d3df58365b8bc40e225edff5
        • Opcode Fuzzy Hash: ba491f1a775f50c8a2c60eb9f278c47d8a63e26e4360bbbd5b3bead34659e73c
        • Instruction Fuzzy Hash: 7DF0F6E468034039EB2073B1AD4BF5B2A785794B15F10467FB710F41E286BC85C89629
        APIs
          • Part of subcall function 0042A45C: 73E9A570.USER32(00000000,?,?,?,?,00428FA7,00000000,00429033), ref: 0042A4B2
          • Part of subcall function 0042A45C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,00428FA7,00000000,00429033), ref: 0042A4F5
        • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 00429E85
        • SetStretchBltMode.GDI32(?,00000004), ref: 00429E93
        • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 00429EAB
        • SetStretchBltMode.GDI32(00000000,00000003), ref: 00429EC8
        • SelectObject.GDI32(?,?), ref: 00429F3D
        • SelectObject.GDI32(?,00000000), ref: 00429F9C
        • DeleteDC.GDI32(00000000), ref: 00429FAB
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: BrushModeObjectSelectStretch$A570CreateDeleteHalftonePalette
        • String ID:
        • API String ID: 3467007361-0
        • Opcode ID: c6df95427e6415bdcde3adb1048860d6f2af673e8321a872812c87a12d8f96bc
        • Instruction ID: 9353c46e3c15fa8c8701dba72a7d6c36ebd38e76106e4f604d2a86ffa01ee243
        • Opcode Fuzzy Hash: c6df95427e6415bdcde3adb1048860d6f2af673e8321a872812c87a12d8f96bc
        • Instruction Fuzzy Hash: 4B713B71B04205AFCB50DFA9D985F5AB7F8AF0C304F5185AAB908EB391D638ED00CB59
        APIs
        • GlobalUnWire.KERNEL32(?), ref: 0042E8A4
        • GlobalFree.KERNEL32(?), ref: 0042E8AD
        • GlobalFix.KERNEL32(?), ref: 0042E8BD
        • 74AF6000.WINSPOOL.DRV(?,?,00000000,?,00000000,00000000,00000000), ref: 0042E9E6
        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 0042EA1B
        • GlobalFix.KERNEL32(00000000), ref: 0042EA2A
        • GlobalUnWire.KERNEL32(00000000), ref: 0042EA4F
        • GlobalFree.KERNEL32(00000000), ref: 0042EA58
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Global$FreeWire$AllocF6000.
        • String ID:
        • API String ID: 3325778411-0
        • Opcode ID: 26b0192c1cb008ccc3046e3b4746045688865abaf6a9fdb5cc540c253ba67297
        • Instruction ID: bce736e3731dab0e38c57d6178e435befcaafabe6c8ab9d7617fd50507bc27ff
        • Opcode Fuzzy Hash: 26b0192c1cb008ccc3046e3b4746045688865abaf6a9fdb5cc540c253ba67297
        • Instruction Fuzzy Hash: 79714EB5A002249FDB10DF6AD880B9A77F9BF48314F5141AAE808DB346D734DD41CBA9
        APIs
        • GetCapture.USER32 ref: 004617C9
        • GetCapture.USER32 ref: 004617D8
        • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 004617DE
        • ReleaseCapture.USER32 ref: 004617E3
        • GetActiveWindow.USER32 ref: 0046180A
        • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 004618A0
        • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 0046190D
        • GetActiveWindow.USER32 ref: 0046191C
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CaptureMessageSend$ActiveWindow$Release
        • String ID:
        • API String ID: 862346643-0
        • Opcode ID: 68e40ec1c56af53d0122211941642d2f277e2fdd4df5519f035eb7dd4fb58af6
        • Instruction ID: 1df3cd161e8221f339d730eff6ed483fb4abfb3a6a97dc460540cdab2c34296e
        • Opcode Fuzzy Hash: 68e40ec1c56af53d0122211941642d2f277e2fdd4df5519f035eb7dd4fb58af6
        • Instruction Fuzzy Hash: FD515D74A00244EFDB00EF6AD996B9EB7F5EB45704F1540BAF500A73A2D738AD04DB19
        APIs
        • SaveDC.GDI32 ref: 00449CC2
          • Part of subcall function 00443D8C: GetWindowOrgEx.GDI32(00000000), ref: 00443D9A
          • Part of subcall function 00443D8C: SetWindowOrgEx.GDI32(00000000,00000000,00000000,00000000), ref: 00443DB0
        • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00449CE3
        • GetWindowLongA.USER32(00000000,000000EC), ref: 00449CF9
        • GetWindowLongA.USER32(00000000,000000F0), ref: 00449D1B
        • SetRect.USER32(?,00000000,00000000,?,?), ref: 00449D47
        • DrawEdge.USER32(?,?,?,00000000), ref: 00449D56
        • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00449D7B
        • RestoreDC.GDI32(?,?), ref: 00449DEC
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$Rect$ClipIntersectLong$DrawEdgeRestoreSave
        • String ID:
        • API String ID: 2976466617-0
        • Opcode ID: 8165518b29ffe1b30565c5ac5f6cbd1f7e8d5a9a9282f3965eb7ae2a3f0ac3dc
        • Instruction ID: 03dd98818d507dd29d73a09491a475434bab1c8e7879643574f392e7bf68955c
        • Opcode Fuzzy Hash: 8165518b29ffe1b30565c5ac5f6cbd1f7e8d5a9a9282f3965eb7ae2a3f0ac3dc
        • Instruction Fuzzy Hash: 1E414471B04105ABEB10EEA9CC81F9F77B9AF45704F10416AF904EB382DA7CED0197A9
        APIs
        • SelectObject.GDI32(?,?), ref: 00495934
        • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,004959AF,?,?), ref: 00495983
        • SelectObject.GDI32(?,?), ref: 0049599D
        • DeleteObject.GDI32(?), ref: 004959A9
        • SelectObject.GDI32(?,?), ref: 00495A09
        • SelectObject.GDI32(?,?), ref: 00495A6F
        • SelectObject.GDI32(?,00000000), ref: 00495B73
          • Part of subcall function 0048CC3C: GetLastError.KERNEL32(00000000,0048CD1B), ref: 0048CC6A
          • Part of subcall function 0048CC3C: FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,0048CD1B), ref: 0048CC90
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Object$Select$DeleteErrorFormatLastMaskMessage
        • String ID:
        • API String ID: 3567892783-0
        • Opcode ID: ca63879169974d15482942c38e9293439ed4b635795f6ffe4323442a0dbdb6a4
        • Instruction ID: 172b58c118f3631039cc06e5481bd4bde04f7b2eff4e767383fe09fe91a9eb17
        • Opcode Fuzzy Hash: ca63879169974d15482942c38e9293439ed4b635795f6ffe4323442a0dbdb6a4
        • Instruction Fuzzy Hash: EA91A0B1A00609AFDB51DFA9DC91EAF7BFCEB0D704F114465FA18E7681C238E8108B65
        APIs
        • SetWindowPos.USER32(00000000,000000FF,?,?,?,?,00000010,00000000,0044D47D), ref: 0044D389
        • GetTickCount.KERNEL32 ref: 0044D38E
        • SystemParametersInfoA.USER32(00001016,00000000,?,00000000), ref: 0044D3C9
        • SystemParametersInfoA.USER32(00001018,00000000,00000000,00000000), ref: 0044D3E1
        • AnimateWindow.USER32(00000000,00000064,00000001), ref: 0044D427
        • ShowWindow.USER32(00000000,00000004,00000000,000000FF,?,?,?,?,00000010,00000000,0044D47D), ref: 0044D44A
          • Part of subcall function 004504F8: GetCursorPos.USER32(?), ref: 004504FC
        • GetTickCount.KERNEL32 ref: 0044D464
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$CountInfoParametersSystemTick$AnimateCursorShow
        • String ID:
        • API String ID: 3024527889-0
        • Opcode ID: 184ac248c92e2c0d0330a5361ed3bf91f2904f9e0bddcd8045c70450f3852705
        • Instruction ID: 69d1a046b261efe233482c0add9d748ead9e3fe8da34d9f316f5b3acb09b869f
        • Opcode Fuzzy Hash: 184ac248c92e2c0d0330a5361ed3bf91f2904f9e0bddcd8045c70450f3852705
        • Instruction Fuzzy Hash: F3512C74A00109EFEB10DFA9C986E9EB7F5EF05344F20446AE500EB391D779AE40DB99
        APIs
        • GetLastError.KERNEL32(00000001,00000000,00000005,00000000,00000000,?,?,00000000,0042F091,?,00000000,?,?,?,0042EC6C), ref: 0042EF0A
        • GetLastError.KERNEL32(00000001,00000000,00000005,00000000,00000000,?,?,00000000,0042F091,?,00000000,?,?,?,0042EC6C), ref: 0042EF14
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        • GetProfileStringA.KERNEL32(windows,device,0042F0A0,?,000003FF), ref: 0042EF9F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ErrorLastString$LoadProfile
        • String ID: device$windows$zB
        • API String ID: 1759087498-2908805104
        • Opcode ID: 2d9938ac1c18159c8556ad8fa7a6982f86879950b618a5395ef3391ca9102822
        • Instruction ID: 1af2ce5cb2658a0b1bf5f20b61a60f15fbacef7dc96cf19b4f64c5fa56dec5a2
        • Opcode Fuzzy Hash: 2d9938ac1c18159c8556ad8fa7a6982f86879950b618a5395ef3391ca9102822
        • Instruction Fuzzy Hash: 9B516170B00218AFDB10EF66DC42B9EB7F8EF48304FA144BBF604E7291D6789D458A59
        APIs
          • Part of subcall function 00443214: WindowFromPoint.USER32(0D,?,00000000,00442DDE,?,-0000000C,?), ref: 0044321A
          • Part of subcall function 00443214: GetParent.USER32(00000000), ref: 00443231
        • GetWindow.USER32(00000000,00000004), ref: 00442DE6
        • GetCurrentThreadId.KERNEL32 ref: 00442EBA
        • GetWindowRect.USER32(00000000,?), ref: 00442ED7
        • IntersectRect.USER32(?,?,?), ref: 00442F45
          • Part of subcall function 00442330: GetWindowThreadProcessId.USER32(00000000), ref: 0044233D
          • Part of subcall function 00442330: GetCurrentProcessId.KERNEL32(?,?,00000000,004648FB,?,?,00AA16DC,00000001,00464A67,?,?,?,00AA16DC), ref: 00442346
          • Part of subcall function 00442330: GlobalFindAtomA.KERNEL32(00000000), ref: 0044235B
          • Part of subcall function 00442330: GetPropA.USER32(00000000,00000000), ref: 00442372
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$CurrentProcessRectThread$AtomFindFromGlobalIntersectParentPointProp
        • String ID: 0D$0D
        • API String ID: 2049660638-1020036159
        • Opcode ID: 86758aeca54fdede1fc69109b90139f809b35c6f88d14a5e45f6c3ae973b21e6
        • Instruction ID: 17b57300639ab20a751792f5ab4bf8eb9b3789a90c7ccb95a58c24a00ef01663
        • Opcode Fuzzy Hash: 86758aeca54fdede1fc69109b90139f809b35c6f88d14a5e45f6c3ae973b21e6
        • Instruction Fuzzy Hash: F6517C31A002099FDB10DFA9C980AAFB7F4AF05354FA44166F844EB351D778EE45CBA9
        APIs
        • GetKeyboardLayoutList.USER32(00000040,?,00000000,00462B23,?,00AA12E8,?,00462B85,00000000,?,00447A3F), ref: 004629CE
        • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,?,00000040,?,00000000,00462B23,?,00AA12E8,?,00462B85,00000000,?,00447A3F), ref: 00462A36
        • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,?,00000000,00462ADF,?,80000002,00000000,00000000,00020019,?,00000040,?), ref: 00462A70
        • RegCloseKey.ADVAPI32(?,00462AE6,00000000,?,?,00000000,00462ADF,?,80000002,00000000,00000000,00020019,?,00000040,?,00000000), ref: 00462AD9
        Strings
        • layout text, xrefs: 00462A67
        • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 00462A20
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CloseKeyboardLayoutListOpenQueryValue
        • String ID: System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
        • API String ID: 1703357764-2652665750
        • Opcode ID: cfcecd160974a5ebc6f9d4fa128f91d7c499dcbf1a36445fe45b6aefa09f70bc
        • Instruction ID: 2c3dcaa53d4d5a0f863340afa259cb3a8887150a850a3e669054f079543414ea
        • Opcode Fuzzy Hash: cfcecd160974a5ebc6f9d4fa128f91d7c499dcbf1a36445fe45b6aefa09f70bc
        • Instruction Fuzzy Hash: C4418F74A04609AFDB10DF95CE81B9EB7F8FB48704F5040A6E900E7381E7B4AE44CB69
        APIs
        • GetDesktopWindow.USER32 ref: 00445F7B
        • SelectObject.GDI32(?,00000000), ref: 00445FB1
        • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 00445FD7
        • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 00445FF9
        • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 00446018
        • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 00446032
        • SelectObject.GDI32(?,?), ref: 0044603F
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ObjectSelect$DesktopWindow
        • String ID:
        • API String ID: 2666862715-0
        • Opcode ID: 6779dfd26fac2593bf7ae4a5ee94555976eb251571dbfb40dbd8e372b7b5e999
        • Instruction ID: f8fbb216217f6811247560b636bd0aeff7d60d7f41a2b6b374945b5a3ed68121
        • Opcode Fuzzy Hash: 6779dfd26fac2593bf7ae4a5ee94555976eb251571dbfb40dbd8e372b7b5e999
        • Instruction Fuzzy Hash: 3D311DB5E04619AFDB00DEEDCC85DAFBBBCEF4A744B004465B504F7282C679AD048BA5
        APIs
        • MulDiv.KERNEL32(?,?,000009EC), ref: 00428ADA
        • MulDiv.KERNEL32(?,?,000009EC), ref: 00428AF1
        • 73E9A570.USER32(00000000,?,?,000009EC,?,?,000009EC), ref: 00428B08
        • GetWinMetaFileBits.GDI32(?,00000000,00000000,00000008,?,00000000,00428BC3,?,00000000,?,?,000009EC,?,?,000009EC), ref: 00428B2C
        • GetWinMetaFileBits.GDI32(?,?,?,00000008,?,00000000,00428BA3,?,?,00000000,00000000,00000008,?,00000000,00428BC3), ref: 00428B5F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: BitsFileMeta$A570
        • String ID: `
        • API String ID: 2497453717-2679148245
        • Opcode ID: e7978a01d5d367e8828d13deb8e6f4df71f917b703b8b563afc475dbdd08b62f
        • Instruction ID: 878f2aeeaf24aaa9e1b96208363617e15f6ea7b5134d3d2fd55e52dacc6912fd
        • Opcode Fuzzy Hash: e7978a01d5d367e8828d13deb8e6f4df71f917b703b8b563afc475dbdd08b62f
        • Instruction Fuzzy Hash: 60316675B00218AFDB00DFD5D881EAEB7B8EF09704F5144AAF904FB281D639AE41D769
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: L?E
        • API String ID: 0-3634967189
        • Opcode ID: de27a2290cb824ad3858b92a65c30b807e1b41ac68918c61bb67cfe9fdc86541
        • Instruction ID: af7043b00f252190add70e867cbd2f586c873116a434f4286dd7fb4d51f7aeea
        • Opcode Fuzzy Hash: de27a2290cb824ad3858b92a65c30b807e1b41ac68918c61bb67cfe9fdc86541
        • Instruction Fuzzy Hash: B111A130A01A8856DA60BE3A8C25BBF2B895F5275BF04006BBC41DB347DA6CDC898658
        APIs
        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0042CCA4
        • GetSystemMetrics.USER32(00000000), ref: 0042CCB9
        • GetSystemMetrics.USER32(00000001), ref: 0042CCC4
        • lstrcpy.KERNEL32(?,DISPLAY), ref: 0042CCEE
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: System$Metrics$AddressInfoParametersProclstrcpy
        • String ID: DISPLAY$GetMonitorInfoA
        • API String ID: 2545840971-1370492664
        • Opcode ID: 018ecb2043b52690f35dee35e80fb29322ed08f3e363ba916b0bbbde2fefc9fc
        • Instruction ID: 94f7c848bcfefb1fbe5e516b75e01b8d3b199e990b730b28d7bb93400fb79419
        • Opcode Fuzzy Hash: 018ecb2043b52690f35dee35e80fb29322ed08f3e363ba916b0bbbde2fefc9fc
        • Instruction Fuzzy Hash: 7911B4727013159FD7208F66BC847ABBBB9EF15310F40452BED5AA7340D7B5A90487A8
        APIs
        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0042CD78
        • GetSystemMetrics.USER32(00000000), ref: 0042CD8D
        • GetSystemMetrics.USER32(00000001), ref: 0042CD98
        • lstrcpy.KERNEL32(?,DISPLAY), ref: 0042CDC2
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: System$Metrics$AddressInfoParametersProclstrcpy
        • String ID: DISPLAY$GetMonitorInfoW
        • API String ID: 2545840971-2774842281
        • Opcode ID: 38640024d3738cbcb5639a4191d073947bb7a9093cdb9a4740f4adf3a6ec4c1f
        • Instruction ID: 7b48b18dd3b62cd01769088c5c1cac7dbd775fdb747bf6a5a9a15d142a581dcf
        • Opcode Fuzzy Hash: 38640024d3738cbcb5639a4191d073947bb7a9093cdb9a4740f4adf3a6ec4c1f
        • Instruction Fuzzy Hash: E711DF767117219ED3208F20BC807ABBBF8EF49310F40453AEC4997380D2B4AA04CBB9
        APIs
        • 73E9A570.USER32(00000000), ref: 0043C27A
        • GetTextMetricsA.GDI32(00000000), ref: 0043C283
          • Part of subcall function 004248B8: CreateFontIndirectA.GDI32(?), ref: 004249F6
        • SelectObject.GDI32(00000000,00000000), ref: 0043C292
        • GetTextMetricsA.GDI32(00000000,?), ref: 0043C29F
        • SelectObject.GDI32(00000000,00000000), ref: 0043C2A6
        • GetSystemMetrics.USER32(00000006), ref: 0043C2D4
        • GetSystemMetrics.USER32(00000006), ref: 0043C2EE
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Metrics$ObjectSelectSystemText$A570CreateFontIndirect
        • String ID:
        • API String ID: 1816951023-0
        • Opcode ID: 7f6303f277fec4e4e5963eb9ea79e46bb52593b62fd25ad46842a9bf9a48579a
        • Instruction ID: eecda416f773f89ea3cd1f80e06f162105c665fc9d0ded8e8aedf1ed3703e0dd
        • Opcode Fuzzy Hash: 7f6303f277fec4e4e5963eb9ea79e46bb52593b62fd25ad46842a9bf9a48579a
        • Instruction Fuzzy Hash: 6011A561B083442BF31066BA8CC2F6B66CCDB59358F44157AFA45E63D3D96CAC40C36A
        APIs
        • GetCursorPos.USER32 ref: 00462C43
        • WindowFromPoint.USER32(?,?), ref: 00462C50
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00462C5E
        • GetCurrentThreadId.KERNEL32 ref: 00462C65
        • SendMessageA.USER32(00000000,00000084,00000000,00000000), ref: 00462C7E
        • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00462C95
        • SetCursor.USER32(00000000), ref: 00462CA7
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
        • String ID:
        • API String ID: 1770779139-0
        • Opcode ID: adf4d0a0a7cbfedc8a98a898bde044678db7537ac1559609abe2b1235279df0f
        • Instruction ID: aa37844adf9978e8f818134fb47f0326c184120bf352d339c796bc51ee6eb38e
        • Opcode Fuzzy Hash: adf4d0a0a7cbfedc8a98a898bde044678db7537ac1559609abe2b1235279df0f
        • Instruction Fuzzy Hash: 3F0188226196103AD6213A750D86B7F3568DF84B64F10447FB904761C2F97EAC01526F
        APIs
          • Part of subcall function 0040C9B8: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040C9D5
          • Part of subcall function 0040C9B8: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040C9F9
          • Part of subcall function 0040C9B8: GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040CA14
          • Part of subcall function 0040C9B8: LoadStringA.USER32(00000000,0000FFEF,?,00000100), ref: 0040CAAA
        • CharToOemA.USER32(?,?), ref: 0040CB77
        • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 0040CB94
        • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0040CB9A
        • GetStdHandle.KERNEL32(000000F4,0040CC04,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0040CBAF
        • WriteFile.KERNEL32(00000000,000000F4,0040CC04,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0040CBB5
        • LoadStringA.USER32(00000000,0000FFD0,?,00000040), ref: 0040CBD7
        • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0040CBED
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
        • String ID:
        • API String ID: 185507032-0
        • Opcode ID: 46e9a7fc103f3c3570b0ee59e1d2ec6e1d6b0856096fb765799defaee1b1bd2d
        • Instruction ID: 527d5ea13da49c69ccbf14a011ddfcef9924fbd70789ff534f640700b21b38af
        • Opcode Fuzzy Hash: 46e9a7fc103f3c3570b0ee59e1d2ec6e1d6b0856096fb765799defaee1b1bd2d
        • Instruction Fuzzy Hash: 65115EB2508200BAE200F7A5DD86F8B77EC9B44304F40463BB755F61E2DB78E9448B7A
        APIs
        • FillRect.USER32(?,?), ref: 0045E7F5
        • GetClientRect.USER32(00000000,?), ref: 0045E820
        • FillRect.USER32(?,?,00000000), ref: 0045E83F
          • Part of subcall function 0045E6F0: CallWindowProcA.USER32(?,?,?,?,?), ref: 0045E72A
        • BeginPaint.USER32(?,?), ref: 0045E8B7
        • GetWindowRect.USER32(?,?), ref: 0045E8E4
        • EndPaint.USER32(?,?,0045E958), ref: 0045E944
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Rect$FillPaintWindow$BeginCallClientProc
        • String ID:
        • API String ID: 901200654-0
        • Opcode ID: 8eb3cae9139913e8de327428884a9301b3e05bf132240d44ac53330a50be15f7
        • Instruction ID: 9126647342d40bfd23a756d9691c7c5b9e6e39b9fdd851de095e8a0c9ec4f4fd
        • Opcode Fuzzy Hash: 8eb3cae9139913e8de327428884a9301b3e05bf132240d44ac53330a50be15f7
        • Instruction Fuzzy Hash: 76513070D04109EFDB54DF9AC585E9DB7F4AF08315F1481A6E808EB352D738AE49DB08
        APIs
        • CharNextA.USER32(?,?,00000000,0041C923), ref: 0041C824
        • CharNextA.USER32(?,?,00000000,0041C923), ref: 0041C89C
        • CharNextA.USER32(?,?,?,00000000,0041C923), ref: 0041C8BD
        • CharNextA.USER32(00000000,?,?,?,00000000,0041C923), ref: 0041C8D4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CharNext
        • String ID:
        • API String ID: 3213498283-3916222277
        • Opcode ID: bcaeb892402b0107be382b875a23f9c42b6480e65c5e54dfb82c42c93133c44a
        • Instruction ID: 22bef8333e448b53336447e5195f7f381797901fe8f79ee7033e5a41e89e0862
        • Opcode Fuzzy Hash: bcaeb892402b0107be382b875a23f9c42b6480e65c5e54dfb82c42c93133c44a
        • Instruction Fuzzy Hash: 36415B74A44184DFCB20EFA9C9D19A9B7F5EF5A30072404AAF4C1D7351C738AD81DB59
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: ,H$D9B$TH
        • API String ID: 0-4050845589
        • Opcode ID: ae02e7d2a932f06cca074e53cf2eba3512b53e53ff0015ab655bd089af8275a1
        • Instruction ID: 078b9a43aa0aefe11835cdee8cbbe539dd71178a2a62b56c87c0c4e9506d61bd
        • Opcode Fuzzy Hash: ae02e7d2a932f06cca074e53cf2eba3512b53e53ff0015ab655bd089af8275a1
        • Instruction Fuzzy Hash: B4E12C70A0410ADFCB00DFA9D8819AEBBF5FB49304F20457AE905EB351DB39AD41DB69
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 00420DE3
        • GetCurrentThreadId.KERNEL32 ref: 00420DF2
          • Part of subcall function 00420D8C: ResetEvent.KERNEL32(000000E4,00420E2D), ref: 00420D92
        • RtlEnterCriticalSection.NTDLL(0053D868), ref: 00420E37
        • InterlockedExchange.KERNEL32(00533574,?), ref: 00420E53
        • RtlLeaveCriticalSection.NTDLL(0053D868), ref: 00420EAC
        • RtlEnterCriticalSection.NTDLL(0053D868), ref: 00420F0B
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalSection$CurrentEnterThread$EventExchangeInterlockedLeaveReset
        • String ID:
        • API String ID: 2189153385-0
        • Opcode ID: 48c928a74a06e8eded7d43de6fd25e10ef6bd0e84dac0bd832250aa5eb3b4d77
        • Instruction ID: 01d31c055e12c0dae44944bb330aaef60a45828d3e8d2421e85588c189767800
        • Opcode Fuzzy Hash: 48c928a74a06e8eded7d43de6fd25e10ef6bd0e84dac0bd832250aa5eb3b4d77
        • Instruction Fuzzy Hash: 0E31B730B44304AFD711DF65E852A6EBBF4EB49714F9288B6F400A3692D77D5C50CA29
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 00421256
        • CreateEventA.KERNEL32(00000000,000000FF,00000000,00000000), ref: 0042127B
        • RtlEnterCriticalSection.NTDLL(0053D868), ref: 00421296
        • RtlLeaveCriticalSection.NTDLL(0053D868), ref: 004212FB
        • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00421331,?,0053D868,00000000,00421350,?,0053D868,00000000,0042136E,?,00000000,000000FF,00000000), ref: 00421314
        • RtlEnterCriticalSection.NTDLL(0053D868), ref: 0042132B
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalSection$Enter$CreateCurrentEventLeaveObjectSingleThreadWait
        • String ID:
        • API String ID: 1504017990-0
        • Opcode ID: cdc541c3c24f7246882cc5ee8aff9edf1728e4d05a09e17feeb0341d0b617926
        • Instruction ID: 2c7b93ceaaa123ccd3e893fc5a7f5e2ae3de92b82470b9c01303b32ea1db2353
        • Opcode Fuzzy Hash: cdc541c3c24f7246882cc5ee8aff9edf1728e4d05a09e17feeb0341d0b617926
        • Instruction Fuzzy Hash: E7212530B00300EFDB11DF65EC82E59BBB5FB19714F6146A6F800A77E0C6796D10DA69
        APIs
        • GlobalSize.KERNEL32(00000000), ref: 00431BC9
        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00431BD3
        • GlobalFix.KERNEL32(00000000), ref: 00431BF3
        • GlobalFix.KERNEL32(00000000), ref: 00431BFE
        • GlobalUnWire.KERNEL32(00000000), ref: 00431C27
        • GlobalUnWire.KERNEL32(00000000), ref: 00431C30
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Global$Wire$AllocSize
        • String ID:
        • API String ID: 3044844065-0
        • Opcode ID: ea4032ff48a94be2143a545390936b50206f2c3e5f5dadd887e9f8c1a7ed5634
        • Instruction ID: 7ac5a20b542a9835d376f772973c080fcdece298206ca554adb3d4cf7e9ef2ac
        • Opcode Fuzzy Hash: ea4032ff48a94be2143a545390936b50206f2c3e5f5dadd887e9f8c1a7ed5634
        • Instruction Fuzzy Hash: 6411C275A44318AFDB10EBB9C946A9E77E8DB0C714F20147AB504E32C0DA3C9D50C758
        APIs
        • SetTextColor.GDI32(00000000,00000000), ref: 0047BA05
        • SetBkMode.GDI32(00000000,00000001), ref: 0047BA14
        • SelectObject.GDI32(00000000,00000000), ref: 0047B9E8
          • Part of subcall function 004243E4: GetSysColor.USER32(?), ref: 004243EE
        • SelectObject.GDI32(00000000,00000000), ref: 0047BA3C
        • SetTextColor.GDI32(00000000,00000000), ref: 0047BA59
        • SetBkMode.GDI32(00000000,00000001), ref: 0047BA68
          • Part of subcall function 004248B8: CreateFontIndirectA.GDI32(?), ref: 004249F6
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Color$ModeObjectSelectText$CreateFontIndirect
        • String ID:
        • API String ID: 1727930112-0
        • Opcode ID: fd846bdce2b059ab7fcb2423a1d68a7c3cd299acc3857e977fcea282d9708da6
        • Instruction ID: 3da182a7289163915b05c23ec23749d2ba6118d49374c199a8b0da7b57f9826d
        • Opcode Fuzzy Hash: fd846bdce2b059ab7fcb2423a1d68a7c3cd299acc3857e977fcea282d9708da6
        • Instruction Fuzzy Hash: D40155B0B442455AD600BF7B5C96F8911589F45308F80987F7949EF6ABCE3CE84486AD
        APIs
          • Part of subcall function 004250C4: CreateBrushIndirect.GDI32(?), ref: 0042516E
        • UnrealizeObject.GDI32(00000000), ref: 00425AD0
        • SelectObject.GDI32(?,00000000), ref: 00425AE2
        • SetBkColor.GDI32(?,00000000), ref: 00425B05
        • SetBkMode.GDI32(?,00000002), ref: 00425B10
        • SetBkColor.GDI32(?,00000000), ref: 00425B2B
        • SetBkMode.GDI32(?,00000001), ref: 00425B36
          • Part of subcall function 004243E4: GetSysColor.USER32(?), ref: 004243EE
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
        • String ID:
        • API String ID: 3527656728-0
        • Opcode ID: fbb699258950ca24fb31083ed274a2ef0b22220ae275d2b822ac5a2bee1d24b4
        • Instruction ID: 0f75828e81133c144eac778142af1c21e42b9febf03229908901f3aa3198a07f
        • Opcode Fuzzy Hash: fbb699258950ca24fb31083ed274a2ef0b22220ae275d2b822ac5a2bee1d24b4
        • Instruction Fuzzy Hash: 21F0BBB57012109BDA00FFBAEDC6D0B27A86F08309740449AB904DF29BC93CE811877A
        APIs
          • Part of subcall function 0040378C: GetKeyboardType.USER32(00000000), ref: 00403791
          • Part of subcall function 0040378C: GetKeyboardType.USER32(00000001), ref: 0040379D
        • GetCommandLineA.KERNEL32 ref: 0040693B
        • GetVersion.KERNEL32 ref: 0040694F
        • GetVersion.KERNEL32 ref: 00406960
        • GetCurrentThreadId.KERNEL32 ref: 0040699C
          • Part of subcall function 004037BC: RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 004037DE
          • Part of subcall function 004037BC: RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,0040382D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403811
          • Part of subcall function 004037BC: RegCloseKey.ADVAPI32(?,00403834,00000000,?,00000004,00000000,0040382D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403827
        • GetThreadLocale.KERNEL32 ref: 0040697C
          • Part of subcall function 0040680C: GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00406872), ref: 00406832
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: KeyboardLocaleThreadTypeVersion$CloseCommandCurrentInfoLineOpenQueryValue
        • String ID:
        • API String ID: 3734044017-0
        • Opcode ID: da802a4acc14e8ce3e969fd2c00984414c46d67bd95a8de8f68d1205a7744866
        • Instruction ID: d101f47a9a4845e70a77bd054437b378b78de5e7d6f44ade2170f308f84314d9
        • Opcode Fuzzy Hash: da802a4acc14e8ce3e969fd2c00984414c46d67bd95a8de8f68d1205a7744866
        • Instruction Fuzzy Hash: C5015EF580528189E714BFB2B84A3583A70AB21308F11847FA8416A7F2F73D411DAF7E
        APIs
        • DrawFrameControl.USER32(00000000,?,00000003,00000000), ref: 00471246
        • FillRect.USER32(00000000,?,00000000), ref: 004712CA
        • FillRect.USER32(00000000,?,00000000), ref: 00471381
        • FillRect.USER32(00000000,?,00000000), ref: 004713F8
          • Part of subcall function 004250C4: CreateBrushIndirect.GDI32(?), ref: 0042516E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FillRect$BrushControlCreateDrawFrameIndirect
        • String ID: BS
        • API String ID: 2881406452-3558652245
        • Opcode ID: 70105dac61909c590ca701bad4b4322ac4fedbc71058d22882493b9141a0c61f
        • Instruction ID: 4ee228cd91ce23ddc4fee6ab813c99c71734066ba1891034cd904fc54ea8c9b5
        • Opcode Fuzzy Hash: 70105dac61909c590ca701bad4b4322ac4fedbc71058d22882493b9141a0c61f
        • Instruction Fuzzy Hash: A171B2306047049FD710EBA8DC95FDB77E8AF49310F40462AB4A9D73A2CB78B849CB64
        APIs
        • SetTextColor.GDI32(00000000,00FFFFFF), ref: 00452829
        • SetBkColor.GDI32(00000000,00000000), ref: 00452831
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Color$Text
        • String ID: D9B
        • API String ID: 657580467-511987976
        • Opcode ID: 845dc0967a2eeb83428e7afbe3f71402ce8cd48cc01aed508383d1becfe5ea78
        • Instruction ID: caf2c13c3b6147a2c1068a04975f49f9108eea05e755136bfc0b238ce7408eac
        • Opcode Fuzzy Hash: 845dc0967a2eeb83428e7afbe3f71402ce8cd48cc01aed508383d1becfe5ea78
        • Instruction Fuzzy Hash: C3512D71701215ABCB40FF69DD82F5E37A8AF09314F50016AFD04EB386CA78EC558B69
        APIs
        • GetClipboardData.USER32(00000000), ref: 0049A3B9
        • GlobalSize.KERNEL32(00000000), ref: 0049A3DC
        • GlobalFix.KERNEL32(00000000), ref: 0049A3E7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Global$ClipboardDataSize
        • String ID: ,(B$D9B
        • API String ID: 3883663762-2452140183
        • Opcode ID: 0fd263615e5dfb8f3822832488f1e0d9005db0e2b952a397faf464073ff822d1
        • Instruction ID: 29955305e4ae14cabca3e244b94cc8bf70332ddcab5d36c1d27d9245ea7aa51e
        • Opcode Fuzzy Hash: 0fd263615e5dfb8f3822832488f1e0d9005db0e2b952a397faf464073ff822d1
        • Instruction Fuzzy Hash: D2419174B00204AFCB00DF69D89596EBBF8FB89714BA184BAF800E7791D678AD10DB55
        APIs
        • GetKeyState.USER32(00000011), ref: 00442FC7
        • IsWindowVisible.USER32(00000000), ref: 00443045
          • Part of subcall function 00442F5C: IsChild.USER32(00000000,00000000), ref: 00442F8C
        • PtInRect.USER32(?,?,?), ref: 004430A0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ChildRectStateVisibleWindow
        • String ID: v2D$v2D
        • API String ID: 2086824273-368615219
        • Opcode ID: 9f5b21d4e126521a4f6a4fef42126da44afa7a61907db46da55d2cb991178c09
        • Instruction ID: 953e1a30aed7577064e81aa3d5d44619de54438c2ca322721f986de361957b2b
        • Opcode Fuzzy Hash: 9f5b21d4e126521a4f6a4fef42126da44afa7a61907db46da55d2cb991178c09
        • Instruction Fuzzy Hash: 8A41E630A041098FEB10EF99D981ADFF7F5AF00315F1402A6E500A7356D735AE45CBA5
        APIs
        • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 004037DE
        • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,0040382D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403811
        • RegCloseKey.ADVAPI32(?,00403834,00000000,?,00000004,00000000,0040382D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403827
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CloseOpenQueryValue
        • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
        • API String ID: 3677997916-4173385793
        • Opcode ID: 424e2b8a8011753df0c036b2dd939be4e47eabbd8e4c82b230d68772e49f862a
        • Instruction ID: 2ae8515d3de74d9156670e2f2254b0c851129a6067a190d8579be2bfc431f93e
        • Opcode Fuzzy Hash: 424e2b8a8011753df0c036b2dd939be4e47eabbd8e4c82b230d68772e49f862a
        • Instruction Fuzzy Hash: 8B017976940348BAE711EF91CD42FA977ECEB08701F1041B6B900E76D0E6785B14D758
        APIs
        • RtlInitializeCriticalSection.NTDLL(0053D5C8), ref: 00401ACA
        • RtlEnterCriticalSection.NTDLL(0053D5C8), ref: 00401ADD
        • LocalAlloc.KERNEL32(00000000,00000FF8,00000000,1%), ref: 00401B07
        • RtlLeaveCriticalSection.NTDLL(0053D5C8), ref: 00401B64
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
        • String ID: 1%
        • API String ID: 730355536-1768441705
        • Opcode ID: e14f617ac8df99f3c0aa0fc7897efde2739acf0e446a4b0004ff17612f3cd299
        • Instruction ID: e9e4e5671b1e06996e0894820e83410eec8309045aa88d00e830df15344794fe
        • Opcode Fuzzy Hash: e14f617ac8df99f3c0aa0fc7897efde2739acf0e446a4b0004ff17612f3cd299
        • Instruction Fuzzy Hash: 8401ADB0A046005EE315AB7AB80AB253FF5E7AA708F80403AE004A73F1D77C54548B39
        APIs
        • FreeLibrary.KERNEL32(00000000,00000000,00437C7B), ref: 00437C34
        • FreeLibrary.KERNEL32(00000000,00000000,00437C7B), ref: 00437C48
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FreeLibrary
        • String ID: X{C$X{C$p{C
        • API String ID: 3664257935-188954857
        • Opcode ID: ceba55c3a60528cbc97ce3b50033a31ef078a1f15cb491101e043323cea43b11
        • Instruction ID: c5fab5d12dc97593affa39518c13bc3daef7e0a7b10c844c8b000a16791dc76f
        • Opcode Fuzzy Hash: ceba55c3a60528cbc97ce3b50033a31ef078a1f15cb491101e043323cea43b11
        • Instruction Fuzzy Hash: 50F090B02082409BE7359B25FCB5A16B7B8E319304F52683AE540963A1C63C6C14DF68
        APIs
        • DrawEdge.USER32(00000000,?,00000006,00000002), ref: 0045567B
        • OffsetRect.USER32(?,00000001,00000001), ref: 004556CC
        • DrawTextA.USER32(00000000,00000000,00000000,?,?), ref: 00455701
        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0045570E
        • DrawTextA.USER32(00000000,00000000,00000000,?,?), ref: 00455775
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Draw$OffsetRectText$Edge
        • String ID:
        • API String ID: 3610532707-0
        • Opcode ID: c28341d78fc23ea05296c532d3bb5fd77140812b65a2f996bbbc21aa19f72f65
        • Instruction ID: 94562264dd035c3b88cd461f29f21a60b8e057ff9c6625640df891e218cf921d
        • Opcode Fuzzy Hash: c28341d78fc23ea05296c532d3bb5fd77140812b65a2f996bbbc21aa19f72f65
        • Instruction Fuzzy Hash: 9A519270A00A44AFDB10EBA9D891BAE77E5EF48324F54416BFD14E7392C778ED048B19
        APIs
        • BeginPaint.USER32(00000000,?,?,?,00000000), ref: 0044994A
        • SaveDC.GDI32(00000000), ref: 0044997E
        • ExcludeClipRect.GDI32(00000000,?,?,?,?,00000000,00449A44,?,?,?,00000000), ref: 004499E0
        • RestoreDC.GDI32(00000000,?), ref: 00449A0A
        • EndPaint.USER32(00000000,?,00449A4B,?,?,00000000), ref: 00449A3E
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Paint$BeginClipExcludeRectRestoreSave
        • String ID:
        • API String ID: 3808407030-0
        • Opcode ID: e8065bc40e3a79e3bcdd671fa19ab696cc8cfd947b9ba551c43ea94fe5df797f
        • Instruction ID: 2939045f509a1a639ba6687182a8caa615d5b25059c53e5fe23eb9ba55e0bc4b
        • Opcode Fuzzy Hash: e8065bc40e3a79e3bcdd671fa19ab696cc8cfd947b9ba551c43ea94fe5df797f
        • Instruction Fuzzy Hash: D9415D70A04244AFEB14DF99C885F9FB7F9EF49304F1480AAE504A7362D739AD40DB58
        APIs
        • GetLastError.KERNEL32(00000000,0041D651,?,?,00418A1C,00000001), ref: 0041D59D
          • Part of subcall function 004094B8: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,00418A1C,0041D5DD,00000000,0041D651,?,?,00418A1C), ref: 00409506
          • Part of subcall function 0040995C: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,00418A1C,0041D5F8,00000000,0041D651,?,?,00418A1C,00000001), ref: 0040997B
        • GetLastError.KERNEL32(00000000,0041D651,?,?,00418A1C,00000001), ref: 0041D602
          • Part of subcall function 0040C400: FormatMessageA.KERNEL32(00003200,00000000,00000000,00000000,?,00000100,00000000,00000000,0040E266,00000000,0040E2C0), ref: 0040C41F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ErrorLast$CreateFileFormatFullMessageNamePath
        • String ID: 8`A$P`A$T}A
        • API String ID: 1652710734-218184577
        • Opcode ID: a40289f3a0af55cbbaddf434d9ab74dd69e9549ed3552f8fa2ae8cc63bcf38fd
        • Instruction ID: e5d77a07013a7c0971da30eda95baf9895d08632da60c58cd82095a1a54c6e57
        • Opcode Fuzzy Hash: a40289f3a0af55cbbaddf434d9ab74dd69e9549ed3552f8fa2ae8cc63bcf38fd
        • Instruction Fuzzy Hash: BA316170E046099FDB00EFA5C8816EEBBF5AF48308F51813AE504B7382D7795D45CBA9
        APIs
        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 0043C624
        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 0043C653
        • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 0043C66F
        • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0043C69A
        • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0043C6B8
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: MessageSend
        • String ID:
        • API String ID: 3850602802-0
        • Opcode ID: 36599383f52809a098aad449d30bd6a312c55ef4e938b533c590c16f02546285
        • Instruction ID: 1273efc3fa2c2057f07e10b5279cf71471bf709be64dbcab16c27cd73d612936
        • Opcode Fuzzy Hash: 36599383f52809a098aad449d30bd6a312c55ef4e938b533c590c16f02546285
        • Instruction Fuzzy Hash: 372160B0644704BBE710AAB68CC6F5B76ACEB85714F10187EB901B76C2DB79ED00866D
        APIs
        • GetCapture.USER32 ref: 004648C7
        • SendMessageA.USER32(00000000,-0000BBEE,00AA16DC,?), ref: 0046491B
        • GetWindowLongA.USER32(00000000,000000FA), ref: 0046492B
        • SendMessageA.USER32(00000000,-0000BBEE,00AA16DC,?), ref: 0046494A
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: MessageSend$CaptureLongWindow
        • String ID:
        • API String ID: 1158686931-0
        • Opcode ID: 91684f954b50b1f67e03243a35c0e7921911955dd319d5177395ae552c86d354
        • Instruction ID: f08b0608d4da1021af6879189eca49eb2ec238adb360515a61165939514cd166
        • Opcode Fuzzy Hash: 91684f954b50b1f67e03243a35c0e7921911955dd319d5177395ae552c86d354
        • Instruction Fuzzy Hash: 2C115EB524460A5FDB60BA6ACD80B1773DC9B95364B20043AF969C3742FA6CFC04477A
        APIs
          • Part of subcall function 00426484: GetObjectA.GDI32(?,00000004), ref: 0042649B
        • 73E9A570.USER32(00000000), ref: 0042914A
        • SelectObject.GDI32(?), ref: 00429163
        • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,004291BB,?,?,?,?,00000000), ref: 00429187
        • SelectObject.GDI32(?,?), ref: 004291A1
        • DeleteDC.GDI32(?), ref: 004291AA
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Object$Select$A570ColorDeleteTable
        • String ID:
        • API String ID: 1418124628-0
        • Opcode ID: aa73fd7085e106145292a48fa3dd85ed7bdc26d286b28a5f66ecf77f07c6a881
        • Instruction ID: b33cbc6f381e21be718910a743bb353d8e74972da4eef66ba5b97ee997f1b262
        • Opcode Fuzzy Hash: aa73fd7085e106145292a48fa3dd85ed7bdc26d286b28a5f66ecf77f07c6a881
        • Instruction Fuzzy Hash: 4C116371F042196BEB10EBE9DC55EAEB3BCEF08704F4048BAF504E7291D6789D508769
        APIs
        • GetThreadLocale.KERNEL32(?,00000000,0040C76B,?,?,00000000), ref: 0040C6EC
          • Part of subcall function 0040C44C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040C46A
        • GetThreadLocale.KERNEL32(00000000,00000004,00000000,0040C76B,?,?,00000000), ref: 0040C71C
        • EnumCalendarInfoA.KERNEL32(Function_0000C620,00000000,00000000,00000004), ref: 0040C727
        • GetThreadLocale.KERNEL32(00000000,00000003,00000000,0040C76B,?,?,00000000), ref: 0040C745
        • EnumCalendarInfoA.KERNEL32(Function_0000C65C,00000000,00000000,00000003), ref: 0040C750
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Locale$InfoThread$CalendarEnum
        • String ID:
        • API String ID: 4102113445-0
        • Opcode ID: 4f089ebef5878702126541596a15c7d66edd5f983145b4d8b4a72fefd7115e6e
        • Instruction ID: 5af87b3a7293b1194f7ef19f93a4114888ee582e09f3d8846b18260b20e46c2a
        • Opcode Fuzzy Hash: 4f089ebef5878702126541596a15c7d66edd5f983145b4d8b4a72fefd7115e6e
        • Instruction Fuzzy Hash: 6C01F271604604BBE711B775CC92F5A36ACEB46B18F210676F501BB6C2E77D9E0086AC
        APIs
        • UnhookWindowsHookEx.USER32(00000000), ref: 004634DB
        • SetEvent.KERNEL32(00000000,00465902,00000000,00464987,?,?,00AA16DC,00000001,00464A47,?,?,?,00AA16DC), ref: 004634F6
        • GetCurrentThreadId.KERNEL32 ref: 004634FB
        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,00465902,00000000,00464987,?,?,00AA16DC,00000001,00464A47,?,?,?,00AA16DC), ref: 00463510
        • CloseHandle.KERNEL32(00000000,00000000,00465902,00000000,00464987,?,?,00AA16DC,00000001,00464A47,?,?,?,00AA16DC), ref: 0046351B
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CloseCurrentEventHandleHookObjectSingleThreadUnhookWaitWindows
        • String ID:
        • API String ID: 2429646606-0
        • Opcode ID: 59a1c0792b72c3302a8386fde3d8edea116c1dec7b7a5f745065638928fe8423
        • Instruction ID: fd8e5e6f2b3dc1594a6b6390324ebaf60c2074ccbda6d5802e2769b19709a681
        • Opcode Fuzzy Hash: 59a1c0792b72c3302a8386fde3d8edea116c1dec7b7a5f745065638928fe8423
        • Instruction Fuzzy Hash: 2DF0C0B59001429AC750EF79FCA9E06F2FCA754319B134926B021D73E1D63C9598EF35
        APIs
        • GetTextMetricsA.GDI32(?,?), ref: 0047A550
        • GetGlyphOutlineW.GDI32(?,00000020,00000000,?,00000000,00000000,0055DD7C), ref: 0047A5F9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: GlyphMetricsOutlineText
        • String ID: $
        • API String ID: 2286437433-227171996
        • Opcode ID: 52cfa2b73540d35051fb187fac57e0a4bc43b0eaee52ae23dbe48aaf490a77cd
        • Instruction ID: 5cab512b9e904298cdca5ac70d774549e5790517355480f9d9b1160e432da0de
        • Opcode Fuzzy Hash: 52cfa2b73540d35051fb187fac57e0a4bc43b0eaee52ae23dbe48aaf490a77cd
        • Instruction Fuzzy Hash: 80025070900209DFCB20DFA9C584ADEBBB5FF84314F2584AAE448A7352D7349EA5CF56
        APIs
        • MulDiv.KERNEL32(00000000,00000064,00000000), ref: 004C623A
        • OffsetRect.USER32(?,00000000,00000001), ref: 004C6265
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: OffsetRect
        • String ID: $Autodesk
        • API String ID: 177026234-2270613959
        • Opcode ID: f95a1237a251960973c6dfc4bffababd266986c37e066f373f722098d6d713bf
        • Instruction ID: c4c7449c62672275d6b578dd1e6774d2804f5af9f11a8d3e9d2eaeb337153dba
        • Opcode Fuzzy Hash: f95a1237a251960973c6dfc4bffababd266986c37e066f373f722098d6d713bf
        • Instruction Fuzzy Hash: 8E615175B002049FDB10DF69C885B9AB7B9FF48304F5081BAFA08EB351DA759E49CB54
        APIs
        • GetThreadLocale.KERNEL32(?,00000000,0040C94E,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040C7B3
          • Part of subcall function 0040C44C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040C46A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Locale$InfoThread
        • String ID: eeee$ggg$yyyy
        • API String ID: 4232894706-1253427255
        • Opcode ID: 7cbe0e61bc7c4c6cdb7ce4303924ee6c0bf0eb44aa5b044dc543ff8aa7226f51
        • Instruction ID: bbe616d2e19d99ddf3031d9cf468c96e5b1121923b0ec5fe95598fbef1dab483
        • Opcode Fuzzy Hash: 7cbe0e61bc7c4c6cdb7ce4303924ee6c0bf0eb44aa5b044dc543ff8aa7226f51
        • Instruction Fuzzy Hash: D141E5B5704145CBC711BB7A88C16BEB3A9EB85304B64473BA581B33D2D73C9D02966D
        APIs
        • GlobalAlloc.KERNEL32(C08B0002,00000000), ref: 0049A59F
        • GlobalFix.KERNEL32(00000000), ref: 0049A5BF
        • GlobalUnWire.KERNEL32(00000000), ref: 0049A5FB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Global$AllocWire
        • String ID: $0S
        • API String ID: 924321537-3978363283
        • Opcode ID: f50f012bbe90d44498f02dc34236a401448a53de855bc5e646152aed7bba2450
        • Instruction ID: f3dadeb5906a8a39c79780da6c431b29622be7baa2ccec0611864cc50eaca293
        • Opcode Fuzzy Hash: f50f012bbe90d44498f02dc34236a401448a53de855bc5e646152aed7bba2450
        • Instruction Fuzzy Hash: 3F31C075704204AFDB01DF69C851A6EBBF8FB89710B5244B6F804D77A0DB38AC21CB59
        APIs
        • 73E9A570.USER32(00000000), ref: 0042B11D
        • CreateHalftonePalette.GDI32(00000000,00000000), ref: 0042B12A
        • DeleteObject.GDI32(00000000), ref: 0042B1A7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: A570CreateDeleteHalftoneObjectPalette
        • String ID: (
        • API String ID: 1897567740-3887548279
        • Opcode ID: 87d3bc4c60f0e18b57ba3177af2d90d7c2167be08cbc8384d1d724152418c1b9
        • Instruction ID: a053b3ea12c5a3ce958495125e14ac93e2685088d5cdf40176453a6440d27510
        • Opcode Fuzzy Hash: 87d3bc4c60f0e18b57ba3177af2d90d7c2167be08cbc8384d1d724152418c1b9
        • Instruction Fuzzy Hash: CC41E430B04218DFDB00DFA9D855BAEBBF6EF49344F5040AAE404A7351D7785E15DB89
        APIs
        Strings
        • K:\TomsEditor desktop\delf1\GraphicEx-master\GraphicEx.pas, xrefs: 004C5640, 004C5663
        • Start progress display first using InitProgress., xrefs: 004C5645
        • Initialize a progress section first using StartProgressSection., xrefs: 004C5668
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: OffsetRect
        • String ID: Initialize a progress section first using StartProgressSection.$K:\TomsEditor desktop\delf1\GraphicEx-master\GraphicEx.pas$Start progress display first using InitProgress.
        • API String ID: 177026234-2002869065
        • Opcode ID: 6ecb4afa2ef47beaab19c2dec355ef4b02220a29d681f7a47c4c8af73f11f51a
        • Instruction ID: 3efea98d2136278272cb6105295ceb4ea5f62b37e5d511f6b55e70756e949204
        • Opcode Fuzzy Hash: 6ecb4afa2ef47beaab19c2dec355ef4b02220a29d681f7a47c4c8af73f11f51a
        • Instruction Fuzzy Hash: E1218E75202504EFD7509F55E888F9E7BA8FF50310F64C47AE98D9B245DA74A8908B28
        APIs
        • GetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 0045884A
        • SetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 0045889C
        • DrawMenuBar.USER32(00000000), ref: 004588A9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Menu$InfoItem$Draw
        • String ID: P
        • API String ID: 3227129158-3110715001
        • Opcode ID: 574032eb00c8d0ef5d685dda439e2f4a4f19196a96f347763cfa1bf0ef713e88
        • Instruction ID: ba749c7175bca6b4e9ac51a98d48b6fdf308954bc6cb853349374d68b9ed8368
        • Opcode Fuzzy Hash: 574032eb00c8d0ef5d685dda439e2f4a4f19196a96f347763cfa1bf0ef713e88
        • Instruction Fuzzy Hash: 0711B2706052005FD3209B28CC81B4B7AD4AF84365F588A6DF894E73DACB39D848C78A
        APIs
        • GetClipboardData.USER32(0000000E), ref: 00428BDD
        • CopyEnhMetaFileA.GDI32(00000000,00000000), ref: 00428BFF
        • GetEnhMetaFileHeader.GDI32(?,00000064,?,00000000,00000000), ref: 00428C11
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileMeta$ClipboardCopyDataHeader
        • String ID: ,(B
        • API String ID: 1752724394-194635904
        • Opcode ID: baadab77a9dca474f06048a11739ca374c50c39b362e0ca208207e20cd309471
        • Instruction ID: 599a9f678d68ffeda96944ba16cea45cb765bd0ede1c1b36a894265290379eda
        • Opcode Fuzzy Hash: baadab77a9dca474f06048a11739ca374c50c39b362e0ca208207e20cd309471
        • Instruction Fuzzy Hash: 86112A72B002048FD710EF6ED885A9ABBF8AF49310B50416EF949DB352DA75EC05CB99
        APIs
        Strings
        • Assertion failure, xrefs: 004708BD
        • K:\TomsEditor desktop\delf1\graphics32-master\Source\GR32_RangeBars.pas, xrefs: 004708B8
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Color
        • String ID: Assertion failure$K:\TomsEditor desktop\delf1\graphics32-master\Source\GR32_RangeBars.pas
        • API String ID: 2811717613-3946103339
        • Opcode ID: bd4574764b42f27b68dc36ddaf72d66198838425f48c5f6f8b374bcd32fde7ea
        • Instruction ID: 5d39edc94f32615f3189b200d94a2011e131f4109af9e36bb491dbe99edcbcdc
        • Opcode Fuzzy Hash: bd4574764b42f27b68dc36ddaf72d66198838425f48c5f6f8b374bcd32fde7ea
        • Instruction Fuzzy Hash: F4F028E3FA2A1A07E32464AA9C813B26449CFD4325F09803B6E18D7397DC5C9C0521DC
        APIs
          • Part of subcall function 00415A78: RtlEnterCriticalSection.NTDLL(0053D824), ref: 00415A87
          • Part of subcall function 00415A78: RtlLeaveCriticalSection.NTDLL(0053D824), ref: 00415AD3
        • RtlDeleteCriticalSection.NTDLL(0053D824), ref: 00415EE7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalSection$DeleteEnterLeave
        • String ID: (4S$PIA$XZA
        • API String ID: 655268472-1648536688
        • Opcode ID: 5943dc16dcc6b696d463c42498cefbf24e56c705369e9bfd7708e768214bb91a
        • Instruction ID: fcfd0c2176e8dd8b94e16b5f64319f048be524182d4b9e8b584acc72c2dad556
        • Opcode Fuzzy Hash: 5943dc16dcc6b696d463c42498cefbf24e56c705369e9bfd7708e768214bb91a
        • Instruction Fuzzy Hash: 16F0A030754A409FE701BB66BD134A677F8EBC1708B91803BB5009B691CA7C9C528ABD
        APIs
          • Part of subcall function 00415A78: RtlEnterCriticalSection.NTDLL(0053D824), ref: 00415A87
          • Part of subcall function 00415A78: RtlLeaveCriticalSection.NTDLL(0053D824), ref: 00415AD3
        • RtlDeleteCriticalSection.NTDLL(0053D824), ref: 00415EE7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalSection$DeleteEnterLeave
        • String ID: (4S$PIA$XZA
        • API String ID: 655268472-1648536688
        • Opcode ID: 2ff6c6fe0847e25a0433e610e4fc2cba7c74f204beff717170cce895fc37f617
        • Instruction ID: 5cb3ce660bef98bb6cdbe2360b71d2e6411638f45af40c53eb374df6b05dcf60
        • Opcode Fuzzy Hash: 2ff6c6fe0847e25a0433e610e4fc2cba7c74f204beff717170cce895fc37f617
        • Instruction Fuzzy Hash: 74F0A030654A409FE701BB66BD134A677B8EBC1708B91803BB5009B691CA7C9C528ABD
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CreateMenu$Popup
        • String ID: 0BE$4(B
        • API String ID: 257293969-775028033
        • Opcode ID: 0e802584aeac7a01942712ef025b2323d32e073488ba35cdb26a41c12bf371fe
        • Instruction ID: 3ccb5b4851db2ebeee6221ef8a8bf3497091280c749e8d3eea8b14f5967ec6b2
        • Opcode Fuzzy Hash: 0e802584aeac7a01942712ef025b2323d32e073488ba35cdb26a41c12bf371fe
        • Instruction Fuzzy Hash: 95E0ED70602504DBCB40FF65C6D66253BA9AB4430AF4424AFBC019F35BE77CD888DB59
        APIs
        • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040EDD5,00000000,0040EDE8), ref: 0040E31E
        • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 0040E32F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: GetDiskFreeSpaceExA$kernel32.dll
        • API String ID: 1646373207-3712701948
        • Opcode ID: 1ab90790e9638472e26b056e7b625fbacac3f72932dc6d460e2ec535226e92f8
        • Instruction ID: 9e6ab07ed63e5a84859d2e81e84ab6aba5bde930afd86e306366fd9412bce8ad
        • Opcode Fuzzy Hash: 1ab90790e9638472e26b056e7b625fbacac3f72932dc6d460e2ec535226e92f8
        • Instruction Fuzzy Hash: FCD09EB1B023859ADB10ABF699C17156A949B60314F142C3FA401773D2DABC9964E61C
        APIs
        • GetDesktopWindow.USER32 ref: 004433D4
        • GetDesktopWindow.USER32 ref: 004434F9
        • SetCursor.USER32(00000000), ref: 0044354E
          • Part of subcall function 0044D868: ShowCursor.USER32(000000FF,00000000,?,00443529), ref: 0044D89F
        • SetCursor.USER32(00000000), ref: 00443539
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Cursor$DesktopWindow$Show
        • String ID:
        • API String ID: 110329033-0
        • Opcode ID: c844eff5e2adb55e67a3f6cf157bffc3f72b97fceda53d18d6a13ec6482fc0e8
        • Instruction ID: 33d86b365cd0e34458838efa4763e71f7cbc602c46d8cf27e0bae10d94a46b65
        • Opcode Fuzzy Hash: c844eff5e2adb55e67a3f6cf157bffc3f72b97fceda53d18d6a13ec6482fc0e8
        • Instruction Fuzzy Hash: 2A91B478600241DFD300DF6AE8A4A16FBF1BF69705F06805AE444873A2C739ED59DF69
        APIs
        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 004102E3
        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 004102FF
        • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00410376
        • VariantClear.OLEAUT32(?), ref: 0041039F
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ArraySafe$Bound$ClearIndexVariant
        • String ID:
        • API String ID: 920484758-0
        • Opcode ID: 98738b091a786ce6b36dc1dc9d640032da7a27ca7c01776b982fbf5dc2e8be24
        • Instruction ID: 1617b1551acd1be1fbacdd9e5877533f3d2330b7dd25f20dc83ee0a4dfdbed84
        • Opcode Fuzzy Hash: 98738b091a786ce6b36dc1dc9d640032da7a27ca7c01776b982fbf5dc2e8be24
        • Instruction Fuzzy Hash: 9E41FB75A0121D9FCB61DB59C894BC9B3BCAB4C304F0041EAE648E7212DA78AFC48F58
        APIs
        • DeleteObject.GDI32(?), ref: 0047B2C7
        • SelectObject.GDI32(?,?), ref: 0047B302
        • DeleteDC.GDI32(?), ref: 0047B312
        • DeleteObject.GDI32(?), ref: 0047B31B
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: DeleteObject$LoadSelectString
        • String ID:
        • API String ID: 2724564707-0
        • Opcode ID: 1f083e4a812b530ab77a5e2bff8976e2e89c32ff6830f04428c10bad27cdfeea
        • Instruction ID: 1a59201442db9016deec8a170a616c3e193fb20fccf17061411e7bac484c720a
        • Opcode Fuzzy Hash: 1f083e4a812b530ab77a5e2bff8976e2e89c32ff6830f04428c10bad27cdfeea
        • Instruction Fuzzy Hash: 31413FB1A002049FDB54EF65D881B5977F9FB48304F0184BAFE19EB396DB34A904CB54
        APIs
        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000002,08000080,00000000), ref: 004C53F2
        • GetFileSize.KERNEL32(00000000,?,00000000,80000000,00000001,00000000,00000002,08000080,00000000), ref: 004C540D
        • CreateFileMappingA.KERNEL32(00000002,00000000,00000002,00000000,00000000,00000000), ref: 004C5441
        • MapViewOfFile.KERNEL32(00000002,00000004,00000000,00000000,00000000), ref: 004C5460
          • Part of subcall function 0040E230: GetLastError.KERNEL32(00000000,0040E2C0), ref: 0040E24A
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: File$Create$ErrorLastMappingSizeView
        • String ID:
        • API String ID: 4192862406-0
        • Opcode ID: b895e9d9684607f515abd3e366047e4a265fc67d4cad6ac07519b37128152c10
        • Instruction ID: 7ce6a60c028cf649fe65190ef70219930bc68b70838029b93626bdd0580c0a6e
        • Opcode Fuzzy Hash: b895e9d9684607f515abd3e366047e4a265fc67d4cad6ac07519b37128152c10
        • Instruction Fuzzy Hash: 7F310875A442046BEB10DFA9CC42F5E7BA49B40754F14816EF904FF3C2D6B8AD818BAD
        APIs
        • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040C9D5
        • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040C9F9
        • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040CA14
        • LoadStringA.USER32(00000000,0000FFEF,?,00000100), ref: 0040CAAA
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileModuleName$LoadQueryStringVirtual
        • String ID:
        • API String ID: 3990497365-0
        • Opcode ID: e3556ad5e61d47adf35561a3173eaaf3563349c0018ac661601a2581f26e51f4
        • Instruction ID: 755d68ab95d1bdafea0286407d4d324641174ce365d4d9a707a43c3d22ce26ae
        • Opcode Fuzzy Hash: e3556ad5e61d47adf35561a3173eaaf3563349c0018ac661601a2581f26e51f4
        • Instruction Fuzzy Hash: 13417070A0025C9BDB21DB69CC85BCAB7BCAB08304F0041FBA548F7282D778AF848F54
        APIs
        • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040C9D5
        • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040C9F9
        • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040CA14
        • LoadStringA.USER32(00000000,0000FFEF,?,00000100), ref: 0040CAAA
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileModuleName$LoadQueryStringVirtual
        • String ID:
        • API String ID: 3990497365-0
        • Opcode ID: 49d4297400e2d0b52047a0869caf2408bad9bb9a47bc139b5c486ed1706d3ab5
        • Instruction ID: 7bda89aceb654925a6635a61ea737fa8614718537118f2faead7ab08db6631a0
        • Opcode Fuzzy Hash: 49d4297400e2d0b52047a0869caf2408bad9bb9a47bc139b5c486ed1706d3ab5
        • Instruction Fuzzy Hash: 6C418270A0025C9BDB10DB69CC85BDAB7BC9B08304F0041FAA548F7282D778AF848F54
        APIs
        • GetStringTypeA.KERNEL32(00000C00,00000002,?,00000080,?), ref: 0040DCFC
        • GetThreadLocale.KERNEL32 ref: 0040DC32
          • Part of subcall function 0040DB90: GetCPInfo.KERNEL32(00000000,?), ref: 0040DBA9
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: InfoLocaleStringThreadType
        • String ID:
        • API String ID: 1505017576-0
        • Opcode ID: 5d4a59c179c48849a46ce5e7bc8019d86a182f3825205bce1e5e8b584fa45e85
        • Instruction ID: 4b4fefabd10199f53e171133ebc6be2c53a1c4e6b00b65a9bd7bcf62bbc4fc46
        • Opcode Fuzzy Hash: 5d4a59c179c48849a46ce5e7bc8019d86a182f3825205bce1e5e8b584fa45e85
        • Instruction Fuzzy Hash: C9312921D043548AEB21ABA5BC017B23BB4EBA1304F04807BE584AB3D6D77C495DE77A
        APIs
        • MulDiv.KERNEL32(?,?,?), ref: 00496074
        • MulDiv.KERNEL32(?,?,00000000), ref: 00496091
        • MulDiv.KERNEL32(?,?,?), ref: 004960CA
        • MulDiv.KERNEL32(?,?,00000000), ref: 004960F9
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1639d70337249250a49c6a92bfac82fba3813e5c2b9343205ca744677a06c840
        • Instruction ID: c3bfafe4ee7594ea0f900ba74d74ef3f4eb36d05e1c51aee4286fe5aa3c24be8
        • Opcode Fuzzy Hash: 1639d70337249250a49c6a92bfac82fba3813e5c2b9343205ca744677a06c840
        • Instruction Fuzzy Hash: AA21F9B5604210AFC700DF29C881A2BB7E9AFC9715F10887EB889C7341D67AE8059B61
        APIs
          • Part of subcall function 0047B9BC: SelectObject.GDI32(00000000,00000000), ref: 0047B9E8
          • Part of subcall function 0047B9BC: SetTextColor.GDI32(00000000,00000000), ref: 0047BA05
          • Part of subcall function 0047B9BC: SetBkMode.GDI32(00000000,00000001), ref: 0047BA14
        • GetTextExtentPoint32A.GDI32(00000000,00000000,00000000), ref: 0047B4BD
        • SelectObject.GDI32(?,00000000), ref: 0047B50B
        • GetTextExtentPoint32A.GDI32(?,00000000,00000000), ref: 0047B527
        • SelectObject.GDI32(?,00000000), ref: 0047B531
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ObjectSelectText$ExtentPoint32$ColorMode
        • String ID:
        • API String ID: 599825263-0
        • Opcode ID: 4268e09a9098b8f1446f4a618dbd9f5931aac673da2db652ab013a11e06ad7e3
        • Instruction ID: f7c802c4f90829c212c7ffdad493dad4775d9075efad0a91d1d5d38bde650b88
        • Opcode Fuzzy Hash: 4268e09a9098b8f1446f4a618dbd9f5931aac673da2db652ab013a11e06ad7e3
        • Instruction Fuzzy Hash: 0E21FC71704210AF9340FBBEAD42B5A76EDDF49318351447BB508E3252DA3CEC04576A
        APIs
          • Part of subcall function 0047B9BC: SelectObject.GDI32(00000000,00000000), ref: 0047B9E8
          • Part of subcall function 0047B9BC: SetTextColor.GDI32(00000000,00000000), ref: 0047BA05
          • Part of subcall function 0047B9BC: SetBkMode.GDI32(00000000,00000001), ref: 0047BA14
        • GetTextExtentPoint32W.GDI32(00000000,00000000,00000000), ref: 0047B5A5
        • SelectObject.GDI32(?,00000000), ref: 0047B5F3
        • GetTextExtentPoint32W.GDI32(?,00000000,00000000), ref: 0047B60F
        • SelectObject.GDI32(?,00000000), ref: 0047B619
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ObjectSelectText$ExtentPoint32$ColorMode
        • String ID:
        • API String ID: 599825263-0
        • Opcode ID: 85ab8aa2c6f1696041c4472cfbf86cb7ac7d54dd0f572b4ff339b7106fa359c2
        • Instruction ID: 0d852485fbb16822ca631ca5349b222f07a9f0ac104134f9888e83a04192d3c8
        • Opcode Fuzzy Hash: 85ab8aa2c6f1696041c4472cfbf86cb7ac7d54dd0f572b4ff339b7106fa359c2
        • Instruction Fuzzy Hash: 97213BB1704210AF8740FBBE9D42A5E76ECDF89308351447BBA08E3352DA7CED04976A
        APIs
        • GetMenuState.USER32(?,?,?), ref: 00458E77
        • GetSubMenu.USER32(?,?), ref: 00458E82
        • GetMenuItemID.USER32(?,?), ref: 00458E9B
        • GetMenuStringA.USER32(?,?,?,?,?), ref: 00458EEE
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Menu$ItemStateString
        • String ID:
        • API String ID: 306270399-0
        • Opcode ID: e3383dcb107a40e43420fff3ced1630ca2424b328b68ee56dd8777bda8bec6af
        • Instruction ID: 269c12fbc1a68bd625b996c05ac8934d1896b227f0e2018adffe5275ea51860f
        • Opcode Fuzzy Hash: e3383dcb107a40e43420fff3ced1630ca2424b328b68ee56dd8777bda8bec6af
        • Instruction Fuzzy Hash: 93116031605148BFC700EA6D8C859AF7BE8AB493A5B10446EFC08E7393DE789D069769
        APIs
        • EnumClipboardFormats.USER32(00000000), ref: 00435E3C
        • GetClipboardData.USER32(00000000), ref: 00435E5C
        • GetClipboardData.USER32(00000009), ref: 00435E65
        • EnumClipboardFormats.USER32(00000000), ref: 00435E81
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Clipboard$DataEnumFormats
        • String ID:
        • API String ID: 1256399260-0
        • Opcode ID: 295b667a9e06dd5810dee4bb26ef7859cd17efac8bd5897a3d96790a37c4cb6b
        • Instruction ID: 15e53a84bd04ddb8be76eaa439b7033ea85c8464af052dd938e5f14b446d3fcc
        • Opcode Fuzzy Hash: 295b667a9e06dd5810dee4bb26ef7859cd17efac8bd5897a3d96790a37c4cb6b
        • Instruction Fuzzy Hash: BA11E371B08200AFD714AB6ADD52A2A77E9EB8D359B10007BF904D7391D939ED01E269
        APIs
        • GetWindowLongA.USER32(00000000,000000EC), ref: 00461ED0
        • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 00461F02
        • SetLayeredWindowAttributes.USER32(00000000,?,?,00000000,00000000,000000EC,?,?,0045FA90), ref: 00461F3C
        • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 00461F55
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Window$Long$AttributesLayered
        • String ID:
        • API String ID: 2169480361-0
        • Opcode ID: 9eff9f5b1ab494ddbdf7630dedeec9d6dc2f1f3d7a3614e7a06254be100c5ec5
        • Instruction ID: 1cd7612b9bbfd0eb403be84ffe12e1717fd5e5d26d919150ca347b5c6b81dc14
        • Opcode Fuzzy Hash: 9eff9f5b1ab494ddbdf7630dedeec9d6dc2f1f3d7a3614e7a06254be100c5ec5
        • Instruction Fuzzy Hash: B311CA60E0428065DB10AE799CCDB8A165C4F06358F1819BEBC45EB3E7DB7CD888C7AD
        APIs
        • FindResourceA.KERNEL32(?,?,?), ref: 0041DACF
        • LoadResource.KERNEL32(?,0041DB5C,?,?,?,00418C10,?,00000001,00000000,?,0041DA28,?), ref: 0041DAE9
        • SizeofResource.KERNEL32(?,0041DB5C,?,0041DB5C,?,?,?,00418C10,?,00000001,00000000,?,0041DA28,?), ref: 0041DB03
        • LockResource.KERNEL32(0041D6F0,00000000,?,0041DB5C,?,0041DB5C,?,?,?,00418C10,?,00000001,00000000,?,0041DA28,?), ref: 0041DB0D
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Resource$FindLoadLockSizeof
        • String ID:
        • API String ID: 3473537107-0
        • Opcode ID: 3dd4578c533c9bb1ee7e7209456605291599365772d49284f3076edfcb1d13e5
        • Instruction ID: a28442adcc77be8333304f47a6c32bf68428842b84274882699db08da1a5bd46
        • Opcode Fuzzy Hash: 3dd4578c533c9bb1ee7e7209456605291599365772d49284f3076edfcb1d13e5
        • Instruction Fuzzy Hash: A0F062B2A042046F5704EE6DE841D9B77ECEE883A4311006FF908D7242DA39DD51837C
        APIs
        • CreateSolidBrush.GDI32(00000000), ref: 004709C8
        • CreatePatternBrush.GDI32(00000000), ref: 004709ED
        • FillRect.USER32(00000000,?,00000000), ref: 004709FF
        • DeleteObject.GDI32(00000000), ref: 00470A05
          • Part of subcall function 004243E4: GetSysColor.USER32(?), ref: 004243EE
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: BrushCreate$ColorDeleteFillObjectPatternRectSolid
        • String ID:
        • API String ID: 4088857295-0
        • Opcode ID: 912885ba514c66db21d54f9bed359243197574b95a4d319d874e64614eaae102
        • Instruction ID: a2d988ad04d5a381a8c322df22dc8cf6bb544f8a41c31f61a14bd4ab21eadf56
        • Opcode Fuzzy Hash: 912885ba514c66db21d54f9bed359243197574b95a4d319d874e64614eaae102
        • Instruction Fuzzy Hash: EFF081B1704305AFD700BB7AAC8589AB7DC9F59358311447FBA09E7313D9B9EC0583A8
        APIs
        • FindNextFileA.KERNEL32(?,?), ref: 0040965C
        • GetLastError.KERNEL32(?,?), ref: 00409665
        • FileTimeToLocalFileTime.KERNEL32(?), ref: 00409679
        • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 00409688
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: FileTime$DateErrorFindLastLocalNext
        • String ID:
        • API String ID: 2103556486-0
        • Opcode ID: 2b923fe597d71e023a705f5c3f0cb832aab3556db9965e022921584ddfaf3d14
        • Instruction ID: e162e89522690ffbe5e57cc9b1466d741ad06980228809ebf5bcad7f5c826590
        • Opcode Fuzzy Hash: 2b923fe597d71e023a705f5c3f0cb832aab3556db9965e022921584ddfaf3d14
        • Instruction Fuzzy Hash: 30F01DB25042009FDF44DFA4C9C2C8733ECEB4831471085B7EE46DB28BE639D9558BA9
        APIs
        • GetWindowThreadProcessId.USER32(00000000), ref: 004431C1
        • GetCurrentProcessId.KERNEL32(00000000,?,?,-0000000C,00000000,0044322C,0D,?,00000000,00442DDE,?,-0000000C,?), ref: 004431CA
        • GlobalFindAtomA.KERNEL32(00000000), ref: 004431DF
        • GetPropA.USER32(00000000,00000000), ref: 004431F6
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
        • String ID:
        • API String ID: 2582817389-0
        • Opcode ID: 2e2cfc40d3c1a72b926ec1b64a227bb3408532998e90b859b9ab037d3700fd17
        • Instruction ID: 5401e2f5639f62fd114a0c5522b1c2004ca6879ea75d9e8e2961d2a300d0a079
        • Opcode Fuzzy Hash: 2e2cfc40d3c1a72b926ec1b64a227bb3408532998e90b859b9ab037d3700fd17
        • Instruction Fuzzy Hash: 2EF05C6120652113F220BBBBAC4197F75FCBE40B15302007BFD00D2296C66CCD99A1BE
        APIs
        • GetWindowThreadProcessId.USER32(00000000), ref: 0044233D
        • GetCurrentProcessId.KERNEL32(?,?,00000000,004648FB,?,?,00AA16DC,00000001,00464A67,?,?,?,00AA16DC), ref: 00442346
        • GlobalFindAtomA.KERNEL32(00000000), ref: 0044235B
        • GetPropA.USER32(00000000,00000000), ref: 00442372
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
        • String ID:
        • API String ID: 2582817389-0
        • Opcode ID: 413488d6062358ab8bc4cd576c72d73d858eeec4885931172e7551ddca18d9ed
        • Instruction ID: 699ca30d0c793ca57b3f0432a7980b6298a175ddb3a644150c4aecf18aed7baf
        • Opcode Fuzzy Hash: 413488d6062358ab8bc4cd576c72d73d858eeec4885931172e7551ddca18d9ed
        • Instruction Fuzzy Hash: B4F0A76160515257EA10BBBAAE8193B61FC9940394342043BBD01EA252C56C8C0492BD
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 00463470
        • SetWindowsHookExA.USER32(00000003,00463414,00000000,00000000), ref: 00463480
        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0046349B
        • CreateThread.KERNEL32(00000000,000003E8,004633B8,00000000,00000000), ref: 004634BF
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CreateThread$CurrentEventHookWindows
        • String ID:
        • API String ID: 1195359707-0
        • Opcode ID: b0f4e89a32fc9d2bf60b6df09868a2b548d96585f81a359d15cdc0de8a0696bd
        • Instruction ID: e265a0768a1807d9aafc7dff4f6274120428cecbe54900555d4b9f1dc5f9ecb4
        • Opcode Fuzzy Hash: b0f4e89a32fc9d2bf60b6df09868a2b548d96585f81a359d15cdc0de8a0696bd
        • Instruction Fuzzy Hash: 99F054B06843417EF7116F21BC16F12F5B89720B1AF12406AF1156A3D1D6F815989E3E
        APIs
        • GlobalHandle.KERNEL32 ref: 0040781F
        • GlobalUnWire.KERNEL32(00000000), ref: 00407826
        • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040782B
        • GlobalFix.KERNEL32(00000000), ref: 00407831
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Global$AllocHandleWire
        • String ID:
        • API String ID: 2210401237-0
        • Opcode ID: bf5ea3c2541c201097959473381bd350e13ea196bb2b4f9484afcac6c9d8c525
        • Instruction ID: 6bbbd635c96f592fcceee2221d872c94be36c58ca2949d8e70e53d0fd1d4d0ef
        • Opcode Fuzzy Hash: bf5ea3c2541c201097959473381bd350e13ea196bb2b4f9484afcac6c9d8c525
        • Instruction Fuzzy Hash: BBB004C8A11361B9E91933BACC0EE7B049D9990B08392496E381AF20C3E97D9C6410B9
        APIs
          • Part of subcall function 00423BFC: RtlEnterCriticalSection.NTDLL(?), ref: 00423C00
        • CreateFontIndirectA.GDI32(?), ref: 004249F6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CreateCriticalEnterFontIndirectSection
        • String ID: MS Sans Serif$Default
        • API String ID: 2931345757-2137701257
        • Opcode ID: 4a856f1f2d5f2633581e5c56d13048f93d28c390df8a791ddf3f0a1364645265
        • Instruction ID: be504f7e177fbb719631c1ce2555df02bd40e40eb7931595ccda63f087269ea1
        • Opcode Fuzzy Hash: 4a856f1f2d5f2633581e5c56d13048f93d28c390df8a791ddf3f0a1364645265
        • Instruction Fuzzy Hash: C9513E70B04298DFDB01CFA8E541B8EBBF5EF88304F6540AAE440A7352D3789E45DB69
        APIs
        • GetKeyState.USER32(00000010), ref: 004586FC
        • GetKeyState.USER32(00000011), ref: 0045870E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: State
        • String ID:
        • API String ID: 1649606143-3916222277
        • Opcode ID: 7227640e5d3e6ccb6f6a3283693616de59f706344136089dc3cf9172ef3ffd8e
        • Instruction ID: 2be1bf3d41b12b548972c2fbdf53e1df71106c389cb7c94c5bd37be768bf279c
        • Opcode Fuzzy Hash: 7227640e5d3e6ccb6f6a3283693616de59f706344136089dc3cf9172ef3ffd8e
        • Instruction Fuzzy Hash: D231F634A04248AFDB11DFA5DC5269EF7F5EB48305F6184AAEC00B6692EF785A08C664
        APIs
          • Part of subcall function 004067B4: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004067E5
        • RegisterClipboardFormatA.USER32(00000000), ref: 0049AD9A
        • 73E9A570.USER32(00000000,00000000,0049AE46,?,?,00000000,00000000), ref: 0049ADBE
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: A570ClipboardFormatLoadRegisterString
        • String ID: GIF
        • API String ID: 1473950484-881873598
        • Opcode ID: 78f5ed4434428343c2a3ff2588b20eb83b01f2aca0eec0743426c75da30d7ea2
        • Instruction ID: 700e6ce80a3d81a22f4ca927e45b8089e42fba3a64e6971ed507559f7745d970
        • Opcode Fuzzy Hash: 78f5ed4434428343c2a3ff2588b20eb83b01f2aca0eec0743426c75da30d7ea2
        • Instruction Fuzzy Hash: 9921F174208740ABDB10EB71FCA6F1A3BACE748704F51487AF901973E2D6386904E76D
        APIs
        • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,0040B1E6), ref: 0040B18E
        • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,0040B1E6), ref: 0040B194
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: DateFormatLocaleThread
        • String ID: yyyy
        • API String ID: 3303714858-3145165042
        • Opcode ID: 29e4bbe2f65c637743aa91cbb56b14d7ad440abb234d48ea55ed5f83871914cc
        • Instruction ID: 6f1ea2e294de028c3090534ad8d6d3c127c0d87c895e77c83702dc9062ff581d
        • Opcode Fuzzy Hash: 29e4bbe2f65c637743aa91cbb56b14d7ad440abb234d48ea55ed5f83871914cc
        • Instruction Fuzzy Hash: 8B215E746042089BDB00EB69D892AAEB3B8EF49340F51407BF905FB791D7789E40C7AD
        APIs
        • RtlEnterCriticalSection.NTDLL(0053D8AC), ref: 0042A65F
        • RtlLeaveCriticalSection.NTDLL(0053D8AC), ref: 0042A69D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID: 8B
        • API String ID: 3168844106-1803290843
        • Opcode ID: 5b584aef5b6a0cccb5612602d9cb795b9ec88ee646a1f1f0dfcfab0a19899327
        • Instruction ID: 3136ebb7a22f2c794d2da69e8510d6a777be9d04c101dd0776e9a34900c88a3e
        • Opcode Fuzzy Hash: 5b584aef5b6a0cccb5612602d9cb795b9ec88ee646a1f1f0dfcfab0a19899327
        • Instruction Fuzzy Hash: 2D219079B04308EFC701DF69D881889BBF5FB48324F5581AAF844A7351D778EE90CA58
        APIs
        • RtlEnterCriticalSection.NTDLL(0053D8AC), ref: 00429BB7
        • RtlLeaveCriticalSection.NTDLL(0053D8AC), ref: 00429C3E
          • Part of subcall function 0042A5BC: RtlEnterCriticalSection.NTDLL(0053D8AC), ref: 0042A65F
          • Part of subcall function 0042A5BC: RtlLeaveCriticalSection.NTDLL(0053D8AC), ref: 0042A69D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID: D9B
        • API String ID: 3168844106-511987976
        • Opcode ID: de64013050d0aab4e926824cbb0242fbc633da893fe5285388f6136390974581
        • Instruction ID: 4ae5b6e0bdcfc2ab7ff77b611567e2a82ec299dd2f5f592c5ab91c2ea021d992
        • Opcode Fuzzy Hash: de64013050d0aab4e926824cbb0242fbc633da893fe5285388f6136390974581
        • Instruction Fuzzy Hash: 1721C234704244EFC714DFAAE982A9ABBF9EF48310FA041BAA84597751C638ED41CA58
        APIs
        • SendMessageA.USER32(?,00000234,00000000,00000000), ref: 0045851E
        • DrawMenuBar.USER32(00000000), ref: 0045852F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: DrawMenuMessageSend
        • String ID: 0BE
        • API String ID: 2625368238-533963802
        • Opcode ID: c987462ad0be6c913c5c6341cc74d63b430a8e172fb4af7445a5fc3506da90c9
        • Instruction ID: 9d16f98497fe61f240f9ec8a0a2700b0933145f62f70e77fb8fc341d9e1ba0b7
        • Opcode Fuzzy Hash: c987462ad0be6c913c5c6341cc74d63b430a8e172fb4af7445a5fc3506da90c9
        • Instruction Fuzzy Hash: 5511A2303016481BDB11EA2A9C8576A67965F9535AF08007EFD04EF353EE7CEC0A9B98
        APIs
        • RtlInitializeCriticalSection.NTDLL(00428D0C), ref: 00425200
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: CriticalInitializeSection
        • String ID: $1B$$2B
        • API String ID: 32694325-775798600
        • Opcode ID: 87fe9c0af1b6edc2249ff161582ca9c23e8a5b6f012ac03f09e7617ea12d8e0f
        • Instruction ID: b59138d0af6b3d84eb818eee654e7480245cf05c5f3af63157d10fcc4d66c3f8
        • Opcode Fuzzy Hash: 87fe9c0af1b6edc2249ff161582ca9c23e8a5b6f012ac03f09e7617ea12d8e0f
        • Instruction Fuzzy Hash: D0116071700B159FC320DF2AE440552BBF9BF84764384862BE459C7B11D379F9698FA8
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Rect$EqualIntersect
        • String ID: @
        • API String ID: 3291753422-2766056989
        • Opcode ID: b82b3dad8e0ee5e036f52823eda6b128f05401d3a8e80f1322fc3c9b8054e7d7
        • Instruction ID: 1f7484e598e537fa6c35e0bacf55813b83400421c5047ff3b49ffcf1bb0f175a
        • Opcode Fuzzy Hash: b82b3dad8e0ee5e036f52823eda6b128f05401d3a8e80f1322fc3c9b8054e7d7
        • Instruction Fuzzy Hash: 7A119131A04A48ABDB11EA6CC884BDF7BE89F48358F040296FD04EB343DB39DD068795
        APIs
        • GetSystemMetrics.USER32(00000000), ref: 0042CB2E
        • GetSystemMetrics.USER32(00000001), ref: 0042CB40
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: MetricsSystem$AddressProc
        • String ID: MonitorFromPoint
        • API String ID: 1792783759-1072306578
        • Opcode ID: 6f81f084d4afc8aa7eb44ed05ea3070c6db6b052b1d53f3ae2a25bfb36df7864
        • Instruction ID: b102c027d1c4c413bd7656d0c577a3d478be47482dce60b3c1706ce6531400e8
        • Opcode Fuzzy Hash: 6f81f084d4afc8aa7eb44ed05ea3070c6db6b052b1d53f3ae2a25bfb36df7864
        • Instruction Fuzzy Hash: C7015A32301228ABDB109F55B8C6B9EBB74EB507A4F908026F9049B251C278B8459AB8
        APIs
        • GetSystemMetrics.USER32(00000000), ref: 0042CA09
        • GetSystemMetrics.USER32(00000001), ref: 0042CA15
          • Part of subcall function 0042C848: GetProcAddress.KERNEL32(76910000,00000000), ref: 0042C8C8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: MetricsSystem$AddressProc
        • String ID: MonitorFromRect
        • API String ID: 1792783759-4033241945
        • Opcode ID: 61b0e691ae2ca9e9d73c79d9392d3fd5745886e1f0f065c30e1483d92387d5a0
        • Instruction ID: 9b19bdc2017e1b0667b92dcbce1154c53ad48c76a498d214fe98b1038b913a49
        • Opcode Fuzzy Hash: 61b0e691ae2ca9e9d73c79d9392d3fd5745886e1f0f065c30e1483d92387d5a0
        • Instruction Fuzzy Hash: A1016D3270023C9BD720DB14F9C9B6ABBB8EB55355F948056E904DB302CA78EC449BB6
        APIs
        • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00437971
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: Value
        • String ID: ,vC$`A
        • API String ID: 3702945584-1192799466
        • Opcode ID: e29b0d2cbc9ec3c4c8ca2aff6d608f2f5fa7c7496656df309b48c28480bc0baf
        • Instruction ID: 1fce8ba1216819b4375aee3f451261840c8ee90dbeb93ce18da6fe462e9131c0
        • Opcode Fuzzy Hash: e29b0d2cbc9ec3c4c8ca2aff6d608f2f5fa7c7496656df309b48c28480bc0baf
        • Instruction Fuzzy Hash: 23F0A4B2A041086BD710EB9EDC81F9ABBEC9F59314F144166FA58D7381D6359D0087A4
        APIs
        • WindowFromPoint.USER32(0D,?,00000000,00442DDE,?,-0000000C,?), ref: 0044321A
          • Part of subcall function 004431B4: GetWindowThreadProcessId.USER32(00000000), ref: 004431C1
          • Part of subcall function 004431B4: GetCurrentProcessId.KERNEL32(00000000,?,?,-0000000C,00000000,0044322C,0D,?,00000000,00442DDE,?,-0000000C,?), ref: 004431CA
          • Part of subcall function 004431B4: GlobalFindAtomA.KERNEL32(00000000), ref: 004431DF
          • Part of subcall function 004431B4: GetPropA.USER32(00000000,00000000), ref: 004431F6
        • GetParent.USER32(00000000), ref: 00443231
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3328743713.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.3328725906.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000533000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000055F000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000561000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.000000000057A000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000589000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000593000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3328743713.0000000000597000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3329019865.00000000005B2000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Yara matches
        Similarity
        • API ID: ProcessWindow$AtomCurrentFindFromGlobalParentPointPropThread
        • String ID: 0D
        • API String ID: 383691619-1254500326
        • Opcode ID: f71d28c6adf0ffd93dbe3729035335ecb369e990b943da9de01104844a64a445
        • Instruction ID: ccae8d0c26528655460a805121580a192774b7c7b686a9d75ec127e72fdbd595
        • Opcode Fuzzy Hash: f71d28c6adf0ffd93dbe3729035335ecb369e990b943da9de01104844a64a445
        • Instruction Fuzzy Hash: 66D0C9613043421FBF123EF65CC1917BA986F2474A31494FBB6005B323DEADDD29562E