Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
R2T8ccXCek.exe

Overview

General Information

Sample name:R2T8ccXCek.exe
renamed because original name is a hash value
Original sample name:e788c2cf1c0760d6672ea1ff733581f31c9a2e05019dec1ed1eaa341c8710a05.exe
Analysis ID:1554994
MD5:a8dfbb9f5cf96f742c05776b0a5b4fe8
SHA1:600e98dad7e474b7c49557516dfd398087e49914
SHA256:e788c2cf1c0760d6672ea1ff733581f31c9a2e05019dec1ed1eaa341c8710a05
Tags:ConsolHQLTDexeuser-JAMESWT_MHT
Infos:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • R2T8ccXCek.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\R2T8ccXCek.exe" MD5: A8DFBB9F5CF96F742C05776B0A5B4FE8)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: R2T8ccXCek.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: R2T8ccXCek.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\JobRelease\win\Release\stubs\x86\Decoder.pdb source: R2T8ccXCek.exe, decoder.dll.0.dr
Source: Binary string: C:\JobRelease\win\Release\stubs\x86\Decoder.pdb5 source: R2T8ccXCek.exe, decoder.dll.0.dr
Source: Binary string: C:\JobRelease\win\Release\stubs\x86\ExternalUi.pdb source: R2T8ccXCek.exe
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF43B0 FindFirstFileW,GetLastError,FindClose,0_2_00AF43B0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B12380 FindFirstFileW,FindClose,0_2_00B12380
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A0A950 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,PathIsUNCW,0_2_00A0A950
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B114D0 FindFirstFileW,FindClose,CloseHandle,CloseHandle,CloseHandle,CreateEventW,CreateThread,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,0_2_00B114D0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF3DE0 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,GetFileAttributesW,FindNextFileW,0_2_00AF3DE0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AFC0B0 FindFirstFileW,FindClose,FindClose,0_2_00AFC0B0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B0E3A0 FindFirstFileW,FindClose,0_2_00B0E3A0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1E610 FindFirstFileW,FindClose,0_2_00B1E610
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1B3D0 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B1B3D0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1B7D0 FindFirstFileW,FindClose,0_2_00B1B7D0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF3A50 FindFirstFileW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00AF3A50
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B2FB20 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B2FB20
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1A620 _wcschr,GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,0_2_00B1A620
Source: R2T8ccXCek.exeString found in binary or memory: RShlwapi.dllShell32.dllmsiexec.exebinJavaHomeSoftware\JavaSoft\Java Development Kit\Software\JavaSoft\Java Runtime Environment\FlashWindowExFlashWindowKernel32.dllGetPackagePathhttp://www.example.comTESThttp://www.google.comhttp://www.yahoo.comtin9999.tmp.part= "GETattachmentDLD123filenamecharsetutf-16ISO-8859-1POSTutf-8Local Network ServerFTP ServerUS-ASCIIAdvancedInstallerRange: bytes=%u- equals www.yahoo.com (Yahoo)
Source: R2T8ccXCek.exe, 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmp, R2T8ccXCek.exe, 00000000.00000000.2113182248.0000000000C08000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Shlwapi.dllShell32.dllmsiexec.exebinJavaHomeSoftware\JavaSoft\Java Development Kit\Software\JavaSoft\Java Runtime Environment\FlashWindowExFlashWindowKernel32.dllGetPackagePathhttp://www.example.comTESThttp://www.google.comhttp://www.yahoo.comtin9999.tmp.part= "GETattachmentDLD123filenamecharsetutf-16ISO-8859-1POSTutf-8Local Network ServerFTP ServerUS-ASCIIAdvancedInstallerRange: bytes=%u- equals www.yahoo.com (Yahoo)
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B315E0 NtdllDefWindowProc_W,0_2_00B315E0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AB1FB0 GetSystemDirectoryW,_wcschr,LoadLibraryExW,NtdllDefWindowProc_W,0_2_00AB1FB0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A50010 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00A50010
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A02250 NtdllDefWindowProc_W,0_2_00A02250
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A0C4F0 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DeleteCriticalSection,0_2_00A0C4F0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A08720 NtdllDefWindowProc_W,0_2_00A08720
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A08890 IsWindow,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00A08890
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_009FEBE0 GetWindowLongW,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,GetWindowTextLengthW,GetWindowTextW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,NtdllDefWindowProc_W,0_2_009FEBE0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A46EE0 NtdllDefWindowProc_W,0_2_00A46EE0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_009FF190 SysFreeString,SysAllocString,GetWindowLongW,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,GetWindowTextLengthW,GetWindowTextW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,SysFreeString,NtdllDefWindowProc_W,SysFreeString,0_2_009FF190
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A1D320 NtdllDefWindowProc_W,0_2_00A1D320
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A115F0 NtdllDefWindowProc_W,0_2_00A115F0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A01670 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DestroyWindow,0_2_00A01670
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_009FF7C0 NtdllDefWindowProc_W,0_2_009FF7C0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A01C90 NtdllDefWindowProc_W,0_2_00A01C90
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A97F20 NtdllDefWindowProc_W,0_2_00A97F20
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_3_006D4F090_3_006D4F09
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A0A9500_2_00A0A950
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B2B3500_2_00B2B350
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B07D700_2_00B07D70
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A141B00_2_00A141B0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B8E2BE0_2_00B8E2BE
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A0E2900_2_00A0E290
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B8E64C0_2_00B8E64C
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AD2A500_2_00AD2A50
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00BA8B950_2_00BA8B95
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A08CD00_2_00A08CD0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_009F2F400_2_009F2F40
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A252F00_2_00A252F0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A135A00_2_00A135A0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A655700_2_00A65570
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A176300_2_00A17630
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00ACB7A00_2_00ACB7A0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A218600_2_00A21860
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A4FA400_2_00A4FA40
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B9DD6A0_2_00B9DD6A
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A63FC00_2_00A63FC0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: String function: 009F8800 appears 187 times
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: String function: 00B83CF9 appears 33 times
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: String function: 009F99C0 appears 69 times
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: String function: 009F6FF0 appears 39 times
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: String function: 009F9390 appears 41 times
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: String function: 00A23810 appears 112 times
Source: R2T8ccXCek.exe, 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameInstaller.exe4 vs R2T8ccXCek.exe
Source: R2T8ccXCek.exeBinary or memory string: OriginalFileNameInstaller.exe4 vs R2T8ccXCek.exe
Source: R2T8ccXCek.exeBinary or memory string: OriginalFilenameDecoder.dllF vs R2T8ccXCek.exe
Source: R2T8ccXCek.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: clean6.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF2230 FormatMessageW,GetLastError,0_2_00AF2230
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1C990 GetDiskFreeSpaceExW,0_2_00B1C990
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B36D50 CoCreateInstance,0_2_00B36D50
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A8AB40 FindResourceW,LoadResource,LockResource,SizeofResource,0_2_00A8AB40
Source: C:\Users\user\Desktop\R2T8ccXCek.exeFile created: C:\Users\user\AppData\Roaming\ConsolHQ LTDJump to behavior
Source: R2T8ccXCek.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\R2T8ccXCek.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeFile read: C:\Users\user\Desktop\R2T8ccXCek.exeJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: lpk.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeAutomated click: OK
Source: C:\Users\user\Desktop\R2T8ccXCek.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: R2T8ccXCek.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: R2T8ccXCek.exeStatic file information: File size 50171956 > 1048576
Source: R2T8ccXCek.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x216e00
Source: R2T8ccXCek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: R2T8ccXCek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: R2T8ccXCek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: R2T8ccXCek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: R2T8ccXCek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: R2T8ccXCek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: R2T8ccXCek.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: R2T8ccXCek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\JobRelease\win\Release\stubs\x86\Decoder.pdb source: R2T8ccXCek.exe, decoder.dll.0.dr
Source: Binary string: C:\JobRelease\win\Release\stubs\x86\Decoder.pdb5 source: R2T8ccXCek.exe, decoder.dll.0.dr
Source: Binary string: C:\JobRelease\win\Release\stubs\x86\ExternalUi.pdb source: R2T8ccXCek.exe
Source: R2T8ccXCek.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: R2T8ccXCek.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: R2T8ccXCek.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: R2T8ccXCek.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: R2T8ccXCek.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF2350 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_00AF2350
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_3_006DC879 push 00000000h; ret 0_3_006DC87C
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_3_006D8E36 push 00000000h; iretd 0_3_006D8E38
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_3_006E060C pushfd ; ret 0_3_006E0675
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B86C6E push ecx; ret 0_2_00B86C81
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A05BE0 push ecx; mov dword ptr [esp], ecx0_2_00A05BE1
Source: C:\Users\user\Desktop\R2T8ccXCek.exeFile created: C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\decoder.dllJump to dropped file
Source: C:\Users\user\Desktop\R2T8ccXCek.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\decoder.dllJump to dropped file
Source: C:\Users\user\Desktop\R2T8ccXCek.exeEvaded block: after key decisiongraph_0-64709
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-66711
Source: C:\Users\user\Desktop\R2T8ccXCek.exeFile Volume queried: C:\Users\user\AppData\Roaming FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeFile Volume queried: C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF43B0 FindFirstFileW,GetLastError,FindClose,0_2_00AF43B0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B12380 FindFirstFileW,FindClose,0_2_00B12380
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00A0A950 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,PathIsUNCW,0_2_00A0A950
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B114D0 FindFirstFileW,FindClose,CloseHandle,CloseHandle,CloseHandle,CreateEventW,CreateThread,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,0_2_00B114D0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF3DE0 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,GetFileAttributesW,FindNextFileW,0_2_00AF3DE0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AFC0B0 FindFirstFileW,FindClose,FindClose,0_2_00AFC0B0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B0E3A0 FindFirstFileW,FindClose,0_2_00B0E3A0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1E610 FindFirstFileW,FindClose,0_2_00B1E610
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1B3D0 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B1B3D0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1B7D0 FindFirstFileW,FindClose,0_2_00B1B7D0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF3A50 FindFirstFileW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00AF3A50
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B2FB20 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00B2FB20
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1A620 _wcschr,GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,0_2_00B1A620
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B8365A VirtualQuery,GetSystemInfo,0_2_00B8365A
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B8AD13 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B8AD13
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B277C0 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,FlushFileBuffers,WriteFile,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,OutputDebugStringW,WriteFile,WriteFile,FlushFileBuffers,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,0_2_00B277C0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00AF2350 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_00AF2350
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B9C66D mov ecx, dword ptr fs:[00000030h]0_2_00B9C66D
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00BA783E mov eax, dword ptr fs:[00000030h]0_2_00BA783E
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B85CA1 mov esi, dword ptr fs:[00000030h]0_2_00B85CA1
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B85D0D GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_00B85D0D
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B86738 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B86738
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B8AD13 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B8AD13
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B1EAB0 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,CloseHandle,0_2_00B1EAB0
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetLocaleInfoW,GetLocaleInfoW,MsgWaitForMultipleObjectsEx,MsgWaitForMultipleObjectsEx,PeekMessageW,TranslateMessage,DispatchMessageW,PeekMessageW,TranslateMessage,DispatchMessageW,MsgWaitForMultipleObjectsEx,0_2_00B14050
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetLocaleInfoW,0_2_00BA0186
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetLocaleInfoW,0_2_00BA41E6
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00BA430F
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00BA44E4
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetLocaleInfoW,0_2_00BA4415
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00BA3B80
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: EnumSystemLocalesW,0_2_00B9FC09
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetLocaleInfoW,0_2_00BA3D7B
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: EnumSystemLocalesW,0_2_00BA3E22
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: EnumSystemLocalesW,0_2_00BA3E6D
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00BA3F93
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: EnumSystemLocalesW,0_2_00BA3F08
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B2BB20 CreateNamedPipeW,CreateFileW,0_2_00B2BB20
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B872F4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B872F4
Source: C:\Users\user\Desktop\R2T8ccXCek.exeCode function: 0_2_00B2A240 GetUserNameW,GetUserNameW,GetLastError,GetUserNameW,GetEnvironmentVariableW,GetEnvironmentVariableW,0_2_00B2A240
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Native API
1
DLL Side-Loading
1
Scheduled Task/Job
1
Process Injection
LSASS Memory3
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets3
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials15
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
R2T8ccXCek.exe0%ReversingLabs
R2T8ccXCek.exe3%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\decoder.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\decoder.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1554994
Start date and time:2024-11-13 10:08:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:R2T8ccXCek.exe
renamed because original name is a hash value
Original Sample Name:e788c2cf1c0760d6672ea1ff733581f31c9a2e05019dec1ed1eaa341c8710a05.exe
Detection:CLEAN
Classification:clean6.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 64%
  • Number of executed functions: 60
  • Number of non-executed functions: 154
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded IPs from analysis (whitelisted): 4.245.163.56
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\R2T8ccXCek.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):209920
Entropy (8bit):6.447659228395253
Encrypted:false
SSDEEP:3072:tScXkSa4E7uzTK+NbkuO2DcUC1myXxskH9Xq4fa2KbDI0lSmb9D:Q7sO+EZ9LH2j7Mmb9
MD5:A5FFDCF45D3D123139C49017B22F444E
SHA1:7B3D3D293F9A34570FC91500A6580496147C7658
SHA-256:8F49245444B02BF0E103C5A5850A0B2FB1F2880C917261D146E3B8BC3C166E40
SHA-512:5FF195A70825EFCED761ACEEEC5A6F0D0E18C1A4074482F584EFABEF7166C957C728D71D6185E3487A1405C608D820EFA4E07C584D60A8D51625E5D8A9A89397
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
  • Antivirus: Virustotal, Detection: 0%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n..a*..2*..2*..2..3 ..2..3...2x.3...2x.3:..2x.3?..2..3?..2..3-..2*..2...2..3v..2..3+..2..^2+..2*.62+..2..3+..2Rich*..2................PE..L...?..b.........."!.....`...................p............................................@......................... ...........<....p.. .......................0 ......p...........................`...@............p..t............................text....^.......`.................. ..`.rdata.......p.......d..............@..@.data...dV..........................@....rsrc... ....p......................@..@.reloc..0 ......."..................@..B........................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.977439534348002
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:R2T8ccXCek.exe
File size:50'171'956 bytes
MD5:a8dfbb9f5cf96f742c05776b0a5b4fe8
SHA1:600e98dad7e474b7c49557516dfd398087e49914
SHA256:e788c2cf1c0760d6672ea1ff733581f31c9a2e05019dec1ed1eaa341c8710a05
SHA512:0ea8aa8886c493815cb3eb016fd3ff0ec4d4d1c76015cc0c5f7d72993c512f6bc0eea5893944637b58d20a8d838f6ecf45cbfa16877939df85da89b1e477aee4
SSDEEP:786432:aVGyFtrCko6pqBZAgycX1vEDBW9qLvKrt7VOHMrS93SaJ9+BQF6gjQH:6b+kHpBgycFpRflaCIXZjQH
TLSH:96B72330364EC52BDA6615B02A2C9A9F542C7E710F7168C7B3DC2E6E1BB49C25731E27
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............{...{...{.3.x...{.3.~.X.{.3.}...{.......{...x...{...~...{.3.....{.3.z...{.3.|...{...z.8.{.\.r...{.\.....{.......{.\.y...{
Icon Hash:9713331b4d3b2f0c
Entrypoint:0x596c64
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x6213B2EE [Mon Feb 21 15:42:38 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:836688c7d21e39394af41ce9a8c2d728
Instruction
call 00007FF0646CA66Dh
jmp 00007FF0646C9E0Fh
mov ecx, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], ecx
pop ecx
pop edi
pop edi
pop esi
pop ebx
mov esp, ebp
pop ebp
push ecx
ret
mov ecx, dword ptr [ebp-10h]
xor ecx, ebp
call 00007FF0646C9463h
jmp 00007FF0646C9F72h
push eax
push dword ptr fs:[00000000h]
lea eax, dword ptr [esp+0Ch]
sub esp, dword ptr [esp+0Ch]
push ebx
push esi
push edi
mov dword ptr [eax], ebp
mov ebp, eax
mov eax, dword ptr [0069E01Ch]
xor eax, ebp
push eax
push dword ptr [ebp-04h]
mov dword ptr [ebp-04h], FFFFFFFFh
lea eax, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], eax
ret
push eax
push dword ptr fs:[00000000h]
lea eax, dword ptr [esp+0Ch]
sub esp, dword ptr [esp+0Ch]
push ebx
push esi
push edi
mov dword ptr [eax], ebp
mov ebp, eax
mov eax, dword ptr [0069E01Ch]
xor eax, ebp
push eax
mov dword ptr [ebp-10h], eax
push dword ptr [ebp-04h]
mov dword ptr [ebp-04h], FFFFFFFFh
lea eax, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], eax
ret
push eax
push dword ptr fs:[00000000h]
lea eax, dword ptr [esp+0Ch]
sub esp, dword ptr [esp+0Ch]
push ebx
push esi
push edi
mov dword ptr [eax], ebp
mov ebp, eax
mov eax, dword ptr [0069E01Ch]
xor eax, ebp
push eax
mov dword ptr [ebp-10h], esp
push dword ptr [ebp-04h]
mov dword ptr [ebp-04h], FFFFFFFFh
lea eax, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x29cb940x28.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x2a70000x3d55c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e50000x256bc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x2467780x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x2468000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x219f380x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x2180000x2c0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x299f880x260.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x216c3f0x216e00b670db57563315716440578ee99e5466unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x2180000x85b8c0x85c0059a6fbcfc1f150b26bf16fdd47452e43False0.3120947721962617data4.605894063170113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x29e0000x89f00x6a001cea180402edcf39ea7c6193312cce32False0.14180424528301888DOS executable (block device driver 0aY)2.8670521481443174IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x2a70000x3d55c0x3d6009c215b5617dafedde9588bb2401248caFalse0.2635724287169043data5.856059532970926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x2e50000x256bc0x2580008f0f06260e93e98732bfb4145f07ccaFalse0.446171875data6.512576488264422IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
IMAGE_FILE0x2a7bf00x6ISO-8859 text, with no line terminatorsEnglishUnited States2.1666666666666665
IMAGE_FILE0x2a7bf80x6ISO-8859 text, with no line terminatorsEnglishUnited States2.1666666666666665
RTF_FILE0x2a7c000x2e9Rich Text Format data, version 1, ANSI, code page 1252EnglishUnited States0.5503355704697986
RTF_FILE0x2a7eec0xa1Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033EnglishUnited States0.906832298136646
RT_BITMAP0x2a7f900x13eDevice independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colorsEnglishUnited States0.25471698113207547
RT_BITMAP0x2a80d00x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.03017241379310345
RT_BITMAP0x2a88f80x48a8Device independent bitmap graphic, 290 x 16 x 32, image size 0EnglishUnited States0.11881720430107527
RT_BITMAP0x2ad1a00xa6aDevice independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/mEnglishUnited States0.21680420105026257
RT_BITMAP0x2adc0c0x152Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colorsEnglishUnited States0.5295857988165681
RT_BITMAP0x2add600x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.4875478927203065
RT_ICON0x2ae5880x7c5aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9958534899792675
RT_ICON0x2b61e40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.142848692771797
RT_ICON0x2c6a0c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.29470954356846474
RT_ICON0x2c8fb40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3621013133208255
RT_ICON0x2ca05c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.45819672131147543
RT_MENU0x2ca9e40x5cdataEnglishUnited States0.8478260869565217
RT_MENU0x2caa400x2adataEnglishUnited States1.0714285714285714
RT_DIALOG0x2caa6c0xacdataEnglishUnited States0.7151162790697675
RT_DIALOG0x2cab180x2a6dataEnglishUnited States0.5132743362831859
RT_DIALOG0x2cadc00x3b4dataEnglishUnited States0.43248945147679324
RT_DIALOG0x2cb1740xbcdataEnglishUnited States0.7180851063829787
RT_DIALOG0x2cb2300x204dataEnglishUnited States0.560077519379845
RT_DIALOG0x2cb4340x282dataEnglishUnited States0.48598130841121495
RT_DIALOG0x2cb6b80xccdataEnglishUnited States0.6911764705882353
RT_DIALOG0x2cb7840x146dataEnglishUnited States0.5736196319018405
RT_DIALOG0x2cb8cc0x226dataEnglishUnited States0.4690909090909091
RT_DIALOG0x2cbaf40x388dataEnglishUnited States0.45464601769911506
RT_DIALOG0x2cbe7c0x1b4dataEnglishUnited States0.5458715596330275
RT_DIALOG0x2cc0300x136dataEnglishUnited States0.6064516129032258
RT_DIALOG0x2cc1680x4cdataEnglishUnited States0.8289473684210527
RT_STRING0x2cc1b40x45cdataEnglishUnited States0.3844086021505376
RT_STRING0x2cc6100x344dataEnglishUnited States0.37320574162679426
RT_STRING0x2cc9540x2f8dataEnglishUnited States0.4039473684210526
RT_STRING0x2ccc4c0x598dataEnglishUnited States0.2807262569832402
RT_STRING0x2cd1e40x3aaStarOffice Gallery theme i, 1627418368 objects, 1st nEnglishUnited States0.4211087420042644
RT_STRING0x2cd5900x5c0dataEnglishUnited States0.3498641304347826
RT_STRING0x2cdb500x568dataEnglishUnited States0.32875722543352603
RT_STRING0x2ce0b80x164dataEnglishUnited States0.5421348314606742
RT_STRING0x2ce21c0x520dataEnglishUnited States0.39176829268292684
RT_STRING0x2ce73c0x1a0dataEnglishUnited States0.45913461538461536
RT_STRING0x2ce8dc0x18adataEnglishUnited States0.5228426395939086
RT_STRING0x2cea680x216Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.46254681647940077
RT_STRING0x2cec800x624dataEnglishUnited States0.3575063613231552
RT_STRING0x2cf2a40x660dataEnglishUnited States0.3474264705882353
RT_STRING0x2cf9040x2e2dataEnglishUnited States0.4037940379403794
RT_GROUP_ICON0x2cfbe80x4cdataEnglishUnited States0.7763157894736842
RT_VERSION0x2cfc340x2dcdataEnglishUnited States0.453551912568306
RT_HTML0x2cff100x37c8ASCII text, with very long lines (443), with CRLF line terminatorsEnglishUnited States0.08291316526610644
RT_HTML0x2d36d80x1316ASCII text, with CRLF line terminatorsEnglishUnited States0.18399508800654932
RT_HTML0x2d49f00x4faHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3626373626373626
RT_HTML0x2d4eec0x6acdHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10679931238798873
RT_HTML0x2db9bc0x6a2HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3486454652532391
RT_HTML0x2dc0600x104aHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.2170263788968825
RT_HTML0x2dd0ac0x15b1HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.17612101566720692
RT_HTML0x2de6600x205cexported SGML document, ASCII text, with very long lines (659), with CRLF line terminatorsEnglishUnited States0.13604538870111058
RT_HTML0x2e06bc0x368dHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10834228428213391
RT_MANIFEST0x2e3d4c0x80fXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.40814348036839554
DLLImport
KERNEL32.dllCreateFileW, CloseHandle, WriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, RemoveDirectoryW, GetTempPathW, GetTempFileNameW, CreateDirectoryW, MoveFileW, GetLastError, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, SetEvent, InitializeCriticalSection, lstrcpynW, CreateThread, WaitForSingleObject, GetProcAddress, LoadLibraryExW, Sleep, GetDiskFreeSpaceExW, DecodePointer, GetExitCodeThread, GetCurrentProcessId, FreeLibrary, GetSystemDirectoryW, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, GetModuleHandleW, LoadLibraryW, GetDriveTypeW, CompareStringW, FindNextFileW, GetLogicalDriveStringsW, GetFileSize, GetFileAttributesW, GetShortPathNameW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SystemTimeToFileTime, MultiByteToWideChar, WideCharToMultiByte, GetCurrentProcess, GetSystemInfo, WaitForMultipleObjects, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, SetUnhandledExceptionFilter, FormatMessageW, FileTimeToSystemTime, GetEnvironmentVariableW, GetEnvironmentStringsW, LocalFree, InitializeCriticalSectionEx, LoadLibraryA, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, FlushFileBuffers, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, OutputDebugStringW, CreateProcessW, GetExitCodeProcess, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetLocaleInfoW, GetSystemDefaultLangID, GetUserDefaultLangID, GetWindowsDirectoryW, GetSystemTime, GetDateFormatW, GetTimeFormatW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, GetLocalTime, CreateNamedPipeW, ConnectNamedPipe, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, TerminateThread, LocalAlloc, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, QueryPerformanceCounter, QueryPerformanceFrequency, EncodePointer, LCMapStringEx, GetSystemTimeAsFileTime, CompareStringEx, GetCPInfo, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, WaitForSingleObjectEx, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, GetModuleHandleExW, GetFileType, GetTimeZoneInformation, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleMode, IsValidCodePage, GetACP, GetOEMCP, GetFileSizeEx, SetFilePointerEx, FindFirstFileExW, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, WriteConsoleW
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:04:09:00
Start date:13/11/2024
Path:C:\Users\user\Desktop\R2T8ccXCek.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\R2T8ccXCek.exe"
Imagebase:0x9f0000
File size:50'171'956 bytes
MD5 hash:A8DFBB9F5CF96F742C05776B0A5B4FE8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:28%
    Total number of Nodes:2000
    Total number of Limit Nodes:108
    execution_graph 64345 b09490 64435 b0a570 424 API calls 4 library calls 64345->64435 64347 b094c5 64436 b0db70 128 API calls 2 library calls 64347->64436 64349 b094cd 64374 b14350 64349->64374 64353 b094e6 64354 b094ea 64353->64354 64417 afab60 59 API calls 64353->64417 64356 b09514 64418 b06200 64356->64418 64437 a0b330 64374->64437 64376 b1437e 64377 a0b330 46 API calls 64376->64377 64378 b14387 64377->64378 64446 b31080 64378->64446 64380 b1438f 64471 b1c7e0 69 API calls _ValidateLocalCookies 64380->64471 64382 b1439c 64472 9f8e30 79 API calls 64382->64472 64384 b094df 64385 b0e0a0 64384->64385 64386 b0e0f8 64385->64386 64391 b0e0d7 64385->64391 64387 b0e126 CreateFileW 64386->64387 64388 b0e2ae 64386->64388 64392 b0e118 64386->64392 64389 b0e14f 64387->64389 64390 9f9b10 2 API calls 64388->64390 64393 b0e176 GetLastError 64389->64393 64394 b0e1f7 64389->64394 64395 b0e2b8 64390->64395 64391->64386 64391->64388 64538 a0b4c0 46 API calls 64391->64538 64392->64387 64539 a0b4c0 46 API calls 64392->64539 64540 af2230 81 API calls 64393->64540 64525 b2f2f0 64394->64525 64399 b0e18d 64541 af44f0 126 API calls 64399->64541 64401 b0e200 64403 b0e20a 64401->64403 64404 b0e28e 64401->64404 64407 b0e255 64403->64407 64408 b0e20f GetLastError 64403->64408 64533 b0ff30 64404->64533 64405 b0e1a5 64542 afdf00 79 API calls 64405->64542 64407->64353 64543 af2230 81 API calls 64408->64543 64411 b0e229 64544 af44f0 126 API calls 64411->64544 64414 b0e1bb 64414->64353 64415 b0e23d 64545 afdf00 79 API calls 64415->64545 64417->64356 64612 b0e3a0 64418->64612 64421 b06253 CreateFileW 64423 b06280 64421->64423 64424 b06291 SetFilePointer 64421->64424 64422 b06346 64434 afbe90 281 API calls 64422->64434 64423->64422 64425 b06339 CloseHandle 64423->64425 64424->64423 64426 b062ba 64424->64426 64425->64422 64642 ad5030 64426->64642 64428 b062c9 64429 b062e4 ReadFile 64428->64429 64667 9f97c0 46 API calls 64428->64667 64429->64423 64432 b062f7 64429->64432 64431 b062e1 64431->64429 64432->64423 64668 b28a60 137 API calls 64432->64668 64435->64347 64436->64349 64438 a0b393 64437->64438 64439 a0b346 64437->64439 64438->64376 64440 a0b380 64439->64440 64441 a0b356 64439->64441 64484 9f99c0 46 API calls 3 library calls 64440->64484 64473 9f9650 64441->64473 64443 a0b38b 64443->64376 64445 a0b35c 64445->64376 64447 9f9650 46 API calls 64446->64447 64448 b310bf 64447->64448 64449 b310e0 GetFileVersionInfoSizeW 64448->64449 64487 9f97c0 46 API calls 64448->64487 64452 b31105 64449->64452 64453 b310f8 64449->64453 64451 b310dd 64451->64449 64452->64380 64453->64452 64454 b3112a GetFileVersionInfoW 64453->64454 64488 9f97c0 46 API calls 64453->64488 64454->64452 64456 b31141 64454->64456 64489 9f9e50 64456->64489 64457 b31127 64457->64454 64459 b31146 64460 b31290 64459->64460 64465 b31150 64459->64465 64507 9f9b10 64460->64507 64462 b3129a 64511 b312c0 WaitForSingleObject GetExitCodeThread TerminateThread CloseHandle 64462->64511 64464 b312a8 64464->64380 64504 9f8e30 79 API calls 64465->64504 64467 b311a8 64469 b311bf 64467->64469 64505 9f97c0 46 API calls 64467->64505 64469->64452 64506 9f99c0 46 API calls 3 library calls 64469->64506 64471->64382 64472->64384 64474 9f965b 64473->64474 64475 9f966a 64474->64475 64476 9f9683 64474->64476 64477 9f96a2 64474->64477 64475->64445 64485 9f9910 45 API calls 3 library calls 64476->64485 64486 9f9850 46 API calls 64477->64486 64480 9f96a7 64482 9f9650 46 API calls 64480->64482 64481 9f969a 64481->64445 64483 9f96e6 64482->64483 64483->64445 64484->64443 64485->64481 64486->64480 64487->64451 64488->64457 64490 9f9edc 64489->64490 64491 9f9e88 64489->64491 64494 b86662 6 API calls 64490->64494 64503 9f9f67 64490->64503 64512 b86662 EnterCriticalSection 64491->64512 64493 9f9e92 64493->64490 64495 9f9e9e GetProcessHeap 64493->64495 64496 9f9ef6 64494->64496 64517 b8651a 45 API calls 64495->64517 64496->64503 64519 b8651a 45 API calls 64496->64519 64498 9f9ecb 64518 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64498->64518 64500 9f9f56 64520 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64500->64520 64503->64459 64504->64467 64505->64469 64506->64452 64508 9f9b1d 64507->64508 64522 b87f9e 64508->64522 64510 9f9b2a RtlAllocateHeap 64510->64462 64511->64464 64515 b86676 64512->64515 64513 b8667b LeaveCriticalSection 64513->64493 64515->64513 64521 b866ea SleepConditionVariableCS LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 64515->64521 64517->64498 64518->64490 64519->64500 64520->64503 64521->64515 64523 b87fb8 64522->64523 64524 b87fe5 RaiseException 64522->64524 64523->64524 64524->64510 64530 b2f336 64525->64530 64526 b2f38b SetFilePointer 64528 b2f3b2 ReadFile 64526->64528 64529 b2f3a4 GetLastError 64526->64529 64527 b2f33d 64527->64401 64528->64527 64528->64530 64529->64527 64529->64528 64530->64526 64530->64527 64531 b2f466 SetFilePointer 64530->64531 64531->64527 64532 b2f48e ReadFile 64531->64532 64532->64527 64546 b10b10 64533->64546 64535 b0ff3f 64536 b0e29c 64535->64536 64565 b10ff0 64535->64565 64536->64353 64538->64386 64539->64387 64540->64399 64541->64405 64542->64414 64543->64411 64544->64415 64545->64407 64547 b10b5b SetFilePointer 64546->64547 64548 b10bfd 64546->64548 64547->64548 64549 b10c11 64547->64549 64548->64535 64550 9f9e50 57 API calls 64549->64550 64551 b10c31 64550->64551 64552 b10f5a 64551->64552 64555 b10e20 64551->64555 64556 b10c6f ReadFile 64551->64556 64553 9f9b10 2 API calls 64552->64553 64554 b10f64 64553->64554 64601 a02970 RaiseException 64554->64601 64555->64535 64556->64555 64558 b10edc GetLastError 64556->64558 64598 af2230 81 API calls 64558->64598 64559 b10f70 64559->64535 64561 b10ef9 64599 af44f0 126 API calls 64561->64599 64563 b10f13 64600 afdf00 79 API calls 64563->64600 64566 b1102b SetFilePointer 64565->64566 64570 b112ac 64565->64570 64567 b11056 GetLastError 64566->64567 64568 b110da 64566->64568 64602 af2230 81 API calls 64567->64602 64569 b11100 ReadFile 64568->64569 64568->64570 64572 b11383 GetLastError 64569->64572 64595 b11122 64569->64595 64570->64536 64609 af2230 81 API calls 64572->64609 64573 b11070 64603 af44f0 126 API calls 64573->64603 64576 b113a0 64610 af44f0 126 API calls 64576->64610 64577 9f9e50 57 API calls 64577->64595 64578 b11088 64604 afdf00 79 API calls 64578->64604 64580 b113b5 64611 afdf00 79 API calls 64580->64611 64581 b113f9 64584 9f9b10 2 API calls 64581->64584 64583 b1109e 64583->64536 64585 b11403 64584->64585 64587 b11182 ReadFile 64588 b112d9 GetLastError 64587->64588 64587->64595 64606 af2230 81 API calls 64588->64606 64590 b112f6 64607 af44f0 126 API calls 64590->64607 64591 b11323 64591->64570 64594 b1130b 64608 afdf00 79 API calls 64594->64608 64595->64569 64595->64570 64595->64572 64595->64577 64595->64581 64595->64587 64595->64588 64595->64591 64597 9f9650 46 API calls 64595->64597 64605 9f99c0 46 API calls 3 library calls 64595->64605 64597->64595 64598->64561 64599->64563 64600->64552 64601->64559 64602->64573 64603->64578 64604->64583 64605->64595 64606->64590 64607->64594 64608->64591 64609->64576 64610->64580 64611->64591 64613 b0e403 64612->64613 64614 b0e447 64612->64614 64676 b0fd20 RaiseException 64613->64676 64677 b0fd80 RaiseException 64614->64677 64617 b0e40c 64619 b0e416 64617->64619 64620 b0e50a 64617->64620 64618 b0e44e 64618->64620 64621 b0e456 64618->64621 64622 b0e563 64619->64622 64623 b0e41f 64619->64623 64624 9f9e50 57 API calls 64620->64624 64621->64622 64625 b0e462 64621->64625 64679 a02970 RaiseException 64622->64679 64628 9f9650 46 API calls 64623->64628 64629 b0e51e 64624->64629 64678 b0fdd0 144 API calls 64625->64678 64632 b0e43d 64628->64632 64631 b0e56f 64629->64631 64629->64632 64630 b0e477 FindFirstFileW 64633 b0e4a9 64630->64633 64634 9f9b10 2 API calls 64631->64634 64669 b8615a 64632->64669 64635 9f9650 46 API calls 64633->64635 64636 b0e579 64634->64636 64638 b0e4b9 64635->64638 64640 b0e4e6 64638->64640 64641 b0e4d8 FindClose 64638->64641 64639 b0623c 64639->64421 64639->64422 64640->64632 64641->64640 64643 9f9e50 57 API calls 64642->64643 64649 ad506e 64643->64649 64644 ad51e0 64645 9f9b10 2 API calls 64644->64645 64646 ad51ea 64645->64646 64647 9f9b10 2 API calls 64646->64647 64650 ad51f4 64647->64650 64648 ad51af 64651 b8615a _ValidateLocalCookies 5 API calls 64648->64651 64649->64644 64649->64648 64652 ad51d6 64649->64652 64655 ad50e7 64649->64655 64653 ad520b 64650->64653 64685 b8f5b6 64650->64685 64654 ad51d0 64651->64654 64657 9f9b10 2 API calls 64652->64657 64653->64428 64654->64428 64658 ad50f5 64655->64658 64681 ad5250 RtlAllocateHeap RaiseException __Getctype 64655->64681 64657->64644 64682 b8f527 45 API calls 3 library calls 64658->64682 64662 ad510d 64662->64646 64664 ad5141 64662->64664 64683 9f98a0 46 API calls 64662->64683 64664->64646 64664->64664 64665 ad5191 64664->64665 64665->64648 64684 ad5210 14 API calls ___vcrt_freefls@4 64665->64684 64667->64431 64668->64423 64670 b86162 64669->64670 64671 b86163 IsProcessorFeaturePresent 64669->64671 64670->64639 64673 b86775 64671->64673 64680 b86738 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64673->64680 64675 b86858 64675->64639 64676->64617 64677->64618 64678->64630 64679->64631 64680->64675 64681->64658 64682->64662 64683->64664 64684->64648 64688 b9dbdd 64685->64688 64689 b9dbe8 RtlFreeHeap 64688->64689 64690 ad5239 64688->64690 64689->64690 64691 b9dbfd GetLastError 64689->64691 64690->64428 64692 b9dc0a ___free_lconv_mon 64691->64692 64694 b8b02f 14 API calls __Getctype 64692->64694 64694->64690 64695 b07d70 65002 b2ba80 64695->65002 64697 b07da0 64698 9f9e50 57 API calls 64697->64698 64699 b07dac 64698->64699 64700 b080c3 64699->64700 64703 b07dd4 64699->64703 64704 b07ddf 64699->64704 64701 9f9b10 2 API calls 64700->64701 64702 b080cd 64701->64702 64705 b08163 64702->64705 64708 9f9e50 57 API calls 64702->64708 65397 9f9390 56 API calls 64703->65397 65398 9f99c0 46 API calls 3 library calls 64704->65398 64709 b08104 64708->64709 64711 b08176 64709->64711 64712 b0810a 64709->64712 64710 b07ddd 65008 af8fc0 64710->65008 64715 9f9b10 2 API calls 64711->64715 64719 a0a950 144 API calls 64712->64719 64714 b07e13 64716 9f9e50 57 API calls 64714->64716 64717 b08180 64715->64717 64720 b07e1b 64716->64720 65077 b1cf70 64717->65077 64722 b0812b 64719->64722 64720->64700 65015 adbc00 64720->65015 65403 b147e0 144 API calls 64722->65403 64724 a06990 68 API calls 64727 b081f2 64724->64727 64725 b08136 65404 b274c0 267 API calls 64725->65404 64726 b08598 64728 b0865d 64726->64728 64731 9f9e50 57 API calls 64726->64731 65405 b13e40 64727->65405 65218 b13470 64728->65218 64736 b085ad 64731->64736 64732 b08141 64732->64705 64742 b085b7 64736->64742 64743 b086ac 64736->64743 64737 b07e4d 65028 afdab0 64737->65028 64739 b08669 64740 b8615a _ValidateLocalCookies 5 API calls 64739->64740 64748 b08686 64740->64748 65094 a0a950 64742->65094 64749 9f9b10 2 API calls 64743->64749 64745 9f9e50 57 API calls 64750 b083ba 64745->64750 64754 b086b6 64749->64754 64751 b083c4 64750->64751 64752 b0868e 64750->64752 64763 adbc00 13 API calls 64751->64763 64756 9f9b10 2 API calls 64752->64756 64757 b086fa 64754->64757 64761 9f9e50 57 API calls 64754->64761 64760 b08698 64756->64760 64764 9f9b10 2 API calls 64760->64764 64766 b08748 64761->64766 64762 b085d8 65197 b14050 64762->65197 64768 b083dc 64763->64768 64769 b086a2 64764->64769 64771 b08946 64766->64771 64783 b08770 64766->64783 64784 b0877b 64766->64784 64774 b083e9 64768->64774 65425 adc5a0 46 API calls 4 library calls 64768->65425 64776 9f9b10 2 API calls 64769->64776 64775 9f9b10 2 API calls 64771->64775 64772 b085e7 64773 b0860f 64772->64773 64785 b08601 64772->64785 65429 b274c0 267 API calls 64773->65429 64782 b8f5b6 ___vcrt_freefls@4 14 API calls 64774->64782 64817 b083fd 64774->64817 64780 b08950 64775->64780 64776->64743 64777 b08357 64777->64726 64777->64739 65082 b0c6b0 64777->65082 65250 a02970 RaiseException 64780->65250 64782->64817 65430 9f9390 56 API calls 64783->65430 65431 9f99c0 46 API calls 3 library calls 64784->65431 64791 a0a950 144 API calls 64785->64791 64786 b08620 64786->64728 64789 b08211 64789->64777 65424 b13a00 63 API calls 64789->65424 64791->64773 64793 b0895c 65251 b0a780 424 API calls 2 library calls 64793->65251 64794 b07e7f 64797 b07f72 SetEvent 64794->64797 64798 b07f1d 64794->64798 64795 b08779 65432 af1c00 127 API calls 64795->65432 65060 b2c100 64797->65060 65400 b12ab0 18 API calls ___vcrt_freefls@4 64798->65400 64800 b08991 64804 9f9e50 57 API calls 64800->64804 64801 b084dd 64801->64726 64814 b08506 64801->64814 64904 b089a2 64804->64904 64805 9f9e50 57 API calls 64807 b0847e 64805->64807 64807->64760 64811 b08488 64807->64811 64809 b07f25 64813 9f9e50 57 API calls 64809->64813 64810 b07fd7 64815 b08064 64810->64815 64816 b07fdf 64810->64816 64833 a0a950 144 API calls 64811->64833 64822 b07f2a 64813->64822 65428 b13a00 63 API calls 64814->65428 65073 b2c020 149 API calls 64815->65073 65401 b12ab0 18 API calls ___vcrt_freefls@4 64816->65401 64817->64801 64817->64805 64818 b08907 64829 adc9e0 14 API calls 64818->64829 64819 b08bee 64823 9f9b10 2 API calls 64819->64823 64822->64700 64827 b07f32 64822->64827 64828 b08bf8 64823->64828 64826 b08082 65074 b2bc20 64826->65074 64848 b14730 98 API calls 64827->64848 65252 b1c7e0 69 API calls _ValidateLocalCookies 64828->65252 64835 b08923 64829->64835 64831 b07fe7 64836 9f9e50 57 API calls 64831->64836 64832 b08a5a 64844 9f9e50 57 API calls 64832->64844 64838 b084a6 64833->64838 64841 adc9e0 14 API calls 64835->64841 64843 b07fec 64836->64843 65426 b147e0 144 API calls 64838->65426 64840 b08c41 64849 9f9e50 57 API calls 64840->64849 64850 b08932 64841->64850 64843->64700 64852 b07ff4 64843->64852 64874 b08a62 64844->64874 64847 b080ad 64857 b07f54 64848->64857 64858 b08c4d 64849->64858 64867 b0e580 346 API calls 64852->64867 64853 9f9e50 57 API calls 64903 b08799 64853->64903 64854 a0b4c0 46 API calls 64854->64904 64855 b084af 65427 b274c0 267 API calls 64855->65427 64862 b0e580 346 API calls 64857->64862 64863 b091e9 64858->64863 65253 b0a780 424 API calls 2 library calls 64858->65253 64866 b07f61 SetEvent 64862->64866 64868 9f9b10 2 API calls 64863->64868 64864 b084ba 64864->64801 64866->64826 64872 b08017 64867->64872 64873 b091f3 64868->64873 65402 b2bdb0 149 API calls std::_Locinfo::_Locinfo_ctor 64872->65402 65460 a02970 RaiseException 64873->65460 64874->64819 64875 b08a8c 64874->64875 65443 9f97c0 46 API calls 64874->65443 64876 b08aa3 64875->64876 65444 9f97c0 46 API calls 64875->65444 65445 b1c7e0 69 API calls _ValidateLocalCookies 64876->65445 64877 a0a950 144 API calls 64877->64904 64887 b08c71 65254 9f8e30 79 API calls 64887->65254 64889 b08028 64889->64815 64890 b091ff 64891 b08ab3 65446 9f8e30 79 API calls 64891->65446 64897 b08c83 65450 b0a570 424 API calls 4 library calls 64897->65450 64900 b08ac4 64906 9f9e50 57 API calls 64900->64906 64903->64771 64903->64780 64903->64818 64903->64853 64918 b08896 64903->64918 65433 adc9e0 64903->65433 65437 9f9390 56 API calls 64903->65437 65438 9f99c0 46 API calls 3 library calls 64903->65438 65439 af1c00 127 API calls 64903->65439 65440 b0c790 47 API calls 64903->65440 64904->64819 64904->64832 64904->64854 64904->64877 65442 b1c7e0 69 API calls _ValidateLocalCookies 64904->65442 64908 b08aea 64906->64908 64907 b08cb1 65451 b0db70 128 API calls 2 library calls 64907->65451 64908->64819 64910 b08af2 64908->64910 64915 b08b17 64910->64915 65447 9f97c0 46 API calls 64910->65447 64912 b08cb9 64913 9f9e50 57 API calls 64912->64913 64914 b08cc2 64913->64914 64914->64863 64921 b08cf6 64914->64921 64922 b08ce8 64914->64922 65448 b1c7e0 69 API calls _ValidateLocalCookies 64915->65448 64920 9f9e50 57 API calls 64918->64920 64919 b08b27 65449 9f8e30 79 API calls 64919->65449 64924 b0889e 64920->64924 64926 b08cf3 64921->64926 64928 b0e0a0 155 API calls 64921->64928 65452 b0db70 128 API calls 2 library calls 64922->65452 64924->64771 64931 b088a6 64924->64931 64926->64921 64927 b08b37 MessageBoxW 64936 b08b7c 64927->64936 64930 b08d26 64928->64930 64933 9f9e50 57 API calls 64930->64933 64932 adbc00 13 API calls 64931->64932 64934 b088c0 64932->64934 64935 b08d2b 64933->64935 64938 b088cd 64934->64938 65441 adba20 48 API calls 64934->65441 64935->64863 64939 b1cf70 RaiseException 64935->64939 64938->64780 64938->64818 64940 b08d53 64939->64940 64941 b08d66 64940->64941 64942 b08d57 64940->64942 64944 9f9e50 57 API calls 64941->64944 64943 a0b330 46 API calls 64942->64943 64943->64941 64945 b08d6b 64944->64945 64945->64863 65255 b14730 64945->65255 64949 b08da7 64950 9f9e50 57 API calls 64949->64950 64951 b08db9 64950->64951 64951->64863 65321 a06990 64951->65321 64955 b08ded 64956 b08e03 64955->64956 64957 9f9e50 57 API calls 64955->64957 64956->64955 64958 b08e10 64957->64958 64958->64863 64959 b08e43 64958->64959 64960 b08e38 64958->64960 65454 9f99c0 46 API calls 3 library calls 64959->65454 65453 9f9390 56 API calls 64960->65453 64963 b08e41 64964 b08e4f 64963->64964 65334 b2b350 64964->65334 64966 b08e63 64967 9f9e50 57 API calls 64966->64967 64968 b08e9f 64967->64968 64968->64863 64969 b08ed2 64968->64969 64970 b08ec7 64968->64970 65456 9f99c0 46 API calls 3 library calls 64969->65456 65455 9f9390 56 API calls 64970->65455 64973 b08ed0 65457 af1c00 127 API calls 64973->65457 64975 b08f69 64976 9f9e50 57 API calls 64975->64976 64986 b08f75 64976->64986 64977 b08ef1 64977->64873 64977->64975 65458 a02420 61 API calls 64977->65458 64979 b08ffe 64979->64873 64980 b14050 86 API calls 64979->64980 64982 b0901e 64980->64982 64981 b14050 86 API calls 64981->64986 64983 a0a950 144 API calls 64982->64983 64985 b09030 64983->64985 64984 a0a950 144 API calls 64984->64986 64986->64863 64986->64873 64986->64979 64986->64981 64986->64984 65003 9f9e50 57 API calls 65002->65003 65004 b2babc 65003->65004 65005 9f9b10 2 API calls 65004->65005 65007 b2bac2 65004->65007 65006 b2bb18 65005->65006 65007->64697 65009 af8fce 65008->65009 65010 af9029 65009->65010 65011 af8fe8 WideCharToMultiByte 65009->65011 65010->64714 65012 af9025 65011->65012 65013 af9004 65011->65013 65012->64714 65014 af900a WideCharToMultiByte 65013->65014 65014->65012 65016 adbc14 65015->65016 65019 adbcbc 65015->65019 65016->65019 65461 9f9190 9 API calls 65016->65461 65018 adbc29 65018->65019 65020 adbc33 FindResourceW 65018->65020 65019->64737 65399 adc5a0 46 API calls 4 library calls 65019->65399 65020->65019 65021 adbc47 65020->65021 65462 9f9250 LoadResource LockResource SizeofResource 65021->65462 65023 adbc51 65023->65019 65024 adbc5a WideCharToMultiByte 65023->65024 65024->65019 65025 adbcc7 65024->65025 65026 9f9b10 2 API calls 65025->65026 65027 adbcd1 65026->65027 65029 9f9e50 57 API calls 65028->65029 65030 afdade 65029->65030 65031 afdae4 65030->65031 65032 afdb33 65030->65032 65035 afdb10 65031->65035 65036 afdb03 65031->65036 65033 9f9b10 2 API calls 65032->65033 65034 afdb3d 65033->65034 65464 af5170 50 API calls 65035->65464 65463 9f9390 56 API calls 65036->65463 65039 afdb0e 65040 aefde0 65039->65040 65041 aefe25 65040->65041 65042 9f9e50 57 API calls 65041->65042 65044 aefe42 65041->65044 65043 aefe35 65042->65043 65043->65044 65045 aefe85 65043->65045 65465 ad9730 65044->65465 65046 9f9b10 2 API calls 65045->65046 65048 aefe8f 65046->65048 65049 aefe6f 65050 b2bb20 65049->65050 65051 b2bb61 65050->65051 65052 b2bb4c 65050->65052 65053 a0b330 46 API calls 65051->65053 65052->64794 65054 b2bb72 65053->65054 65479 b2c490 65054->65479 65056 b2bb7d 65057 b2bb8b CreateNamedPipeW 65056->65057 65058 b2bbb8 CreateFileW 65056->65058 65057->65058 65059 b2bbd3 65057->65059 65058->65059 65059->64794 65061 b2c130 65060->65061 65062 b2c146 65060->65062 65061->64810 65063 9f9e50 57 API calls 65062->65063 65064 b2c14b 65063->65064 65065 b2c232 65064->65065 65066 b2c155 65064->65066 65067 9f9b10 2 API calls 65065->65067 65498 b2c240 65066->65498 65068 b2c23c 65067->65068 65070 b2c177 65071 a0b330 46 API calls 65070->65071 65072 b2c184 65071->65072 65072->64810 65073->64826 65075 b2bc58 CloseHandle 65074->65075 65076 b2bc5f 65074->65076 65075->65076 65076->64847 65078 b1cf7d 65077->65078 65080 b081d8 65077->65080 65078->65080 65550 a02970 RaiseException 65078->65550 65080->64724 65080->64777 65081 b1cfb2 65083 b083ac 65082->65083 65084 b0c6ca 65082->65084 65083->64745 65551 b0cbd0 16 API calls 2 library calls 65084->65551 65086 b0c6f9 WideCharToMultiByte 65087 b0c766 65086->65087 65088 b0c71c GetLastError 65086->65088 65087->65083 65552 b0cfa0 GetLastError 65087->65552 65088->65087 65089 b0c727 WideCharToMultiByte 65088->65089 65566 b0cbd0 16 API calls 2 library calls 65089->65566 65091 b0c74b WideCharToMultiByte 65091->65087 65093 b0c783 65095 a0a9cd 65094->65095 65097 a0a972 std::_Locinfo::_Locinfo_ctor 65094->65097 65096 9f9b10 2 API calls 65095->65096 65107 a0a9d7 65095->65107 65099 a0a9f4 65096->65099 65097->65095 65098 a0a9b0 65097->65098 65602 9f98a0 46 API calls 65097->65602 65603 9f9910 45 API calls 3 library calls 65098->65603 65101 a0aa75 65099->65101 65102 a0aa5e FindClose 65099->65102 65597 9f9710 65101->65597 65102->65101 65106 a06990 68 API calls 65108 a0aa9d 65106->65108 65107->64762 65109 a0addb 65108->65109 65110 a0aac2 PathIsUNCW 65108->65110 65111 a0ad05 FindFirstFileW 65108->65111 65109->64762 65113 a0aad7 65110->65113 65114 a0ac0e 65110->65114 65111->65109 65112 a0ad1d GetFullPathNameW 65111->65112 65115 a0ad36 65112->65115 65179 a0ae72 std::_Locinfo::_Locinfo_ctor 65112->65179 65604 9fe820 126 API calls 65113->65604 65608 9fe820 126 API calls 65114->65608 65118 a0ad53 GetFullPathNameW 65115->65118 65612 9f98a0 46 API calls 65115->65612 65123 a0ad6e std::_Locinfo::_Locinfo_ctor 65118->65123 65119 9f9b10 2 API calls 65121 a0aeed 65119->65121 65124 9f9650 46 API calls 65121->65124 65122 a0ad51 65122->65118 65127 a0ae15 65123->65127 65134 a0ada5 65123->65134 65123->65179 65126 a0af2d 65124->65126 65125 a0aadf 65125->65111 65605 9fead0 126 API calls 65125->65605 65128 a0af41 65126->65128 65146 a0af90 65126->65146 65140 a0ae27 65127->65140 65613 9f97c0 46 API calls 65127->65613 65130 9f9650 46 API calls 65128->65130 65129 a0ac16 65129->65111 65137 a0acab 65129->65137 65129->65179 65609 9f98a0 46 API calls 65129->65609 65136 a0af4b 65130->65136 65133 a0add3 SetLastError 65133->65109 65134->65133 65141 a0adca FindClose 65134->65141 65135 9f9b10 2 API calls 65157 a0b25f 65135->65157 65136->64762 65610 a0b3a0 45 API calls 3 library calls 65137->65610 65138 a0ab5e 65144 a0b330 46 API calls 65138->65144 65139 a0ae48 65153 a0ae76 65139->65153 65154 a0ae5c 65139->65154 65140->65139 65614 9f97c0 46 API calls 65140->65614 65141->65133 65158 a0ab71 65144->65158 65145 a0afc1 65618 a0b410 58 API calls 65145->65618 65146->65145 65174 a0b23e 65146->65174 65617 a0b4c0 46 API calls 65146->65617 65148 a0abfd 65611 a068f0 45 API calls 3 library calls 65148->65611 65150 a0afcc 65152 a0a950 136 API calls 65150->65152 65156 a0afde 65152->65156 65153->65179 65616 9f97c0 46 API calls 65153->65616 65154->65109 65154->65179 65615 9f97c0 46 API calls 65154->65615 65163 a0b00d PathIsUNCW 65156->65163 65196 a0b21a 65156->65196 65162 a0b2fb 65157->65162 65177 a0b2c3 65157->65177 65182 a0b30c 65157->65182 65627 9f98a0 46 API calls 65157->65627 65159 a0abd9 65158->65159 65158->65179 65606 9f98a0 46 API calls 65158->65606 65607 a0b3a0 45 API calls 3 library calls 65159->65607 65164 9f9b10 2 API calls 65162->65164 65162->65182 65167 a0b022 65163->65167 65168 a0b149 65163->65168 65172 a0b32b 65164->65172 65619 9fe820 126 API calls 65167->65619 65623 9fe820 126 API calls 65168->65623 65171 a0ace1 65171->65111 65171->65179 65173 9f9650 46 API calls 65173->65174 65174->65135 65628 a0b3a0 45 API calls 3 library calls 65177->65628 65178 a0b2ec 65629 a068f0 45 API calls 3 library calls 65178->65629 65179->65109 65179->65119 65181 a0b02a 65181->65196 65620 9fead0 126 API calls 65181->65620 65182->64762 65183 a0b151 65183->65174 65185 a0b1e4 65183->65185 65183->65196 65624 9f98a0 46 API calls 65183->65624 65625 a0b3a0 45 API calls 3 library calls 65185->65625 65186 a0b0a0 65189 a0b330 46 API calls 65186->65189 65193 a0b0b3 65189->65193 65190 a0b138 65626 a068f0 45 API calls 3 library calls 65190->65626 65192 a0b117 65622 a0b3a0 45 API calls 3 library calls 65192->65622 65193->65174 65193->65192 65621 9f98a0 46 API calls 65193->65621 65196->65173 65196->65174 65198 9f9e50 57 API calls 65197->65198 65199 b14092 65198->65199 65200 b1414b 65199->65200 65201 b1409c GetLocaleInfoW 65199->65201 65202 9f9b10 2 API calls 65200->65202 65207 ad5030 58 API calls 65201->65207 65203 b14155 MsgWaitForMultipleObjectsEx 65202->65203 65205 b141f1 65203->65205 65206 b14187 65203->65206 65205->64772 65209 b141a5 PeekMessageW 65206->65209 65210 b141fb 65206->65210 65208 b140d8 65207->65208 65211 b140f6 GetLocaleInfoW 65208->65211 65630 9f97c0 46 API calls 65208->65630 65214 b141db MsgWaitForMultipleObjectsEx 65209->65214 65215 b141cd TranslateMessage DispatchMessageW 65209->65215 65210->64772 65631 9f8e30 79 API calls 65211->65631 65214->65205 65214->65206 65215->65214 65216 b140f3 65216->65211 65217 b14112 65217->64772 65219 b13e40 63 API calls 65218->65219 65220 b134a7 65219->65220 65221 b134c3 65220->65221 65222 b134ad 65220->65222 65632 b13a60 275 API calls 65221->65632 65222->64739 65224 b134ce 65633 b13c80 11 API calls _ValidateLocalCookies 65224->65633 65226 b134e9 65227 b13567 65226->65227 65230 9f9e50 57 API calls 65226->65230 65228 b13650 65227->65228 65229 b135ae 65227->65229 65637 a02970 RaiseException 65228->65637 65231 b135c1 65229->65231 65635 b13660 59 API calls 65229->65635 65233 b134fe 65230->65233 65241 b135ea 65231->65241 65636 b13660 59 API calls 65231->65636 65236 b13646 65233->65236 65237 b13508 65233->65237 65235 b1365c 65238 9f9b10 2 API calls 65236->65238 65240 a0a950 144 API calls 65237->65240 65238->65228 65242 b13526 65240->65242 65243 b13600 65241->65243 65245 b8f5b6 ___vcrt_freefls@4 14 API calls 65241->65245 65244 b14050 86 API calls 65242->65244 65243->64739 65248 b13530 65244->65248 65245->65243 65246 b13559 65634 b274c0 267 API calls 65246->65634 65248->65246 65249 a0a950 144 API calls 65248->65249 65249->65246 65250->64793 65251->64800 65252->64840 65253->64887 65254->64897 65256 b1475c 65255->65256 65260 b08d96 65255->65260 65638 b86199 65256->65638 65261 b0e580 65260->65261 65262 b0e5b5 65261->65262 65268 b0e6dc 65261->65268 65264 b0e664 65262->65264 65281 b0e5bd 65262->65281 65263 b0e92f 65266 b0c580 16 API calls 65263->65266 65813 b0fd80 RaiseException 65264->65813 65270 b0e93e 65266->65270 65267 b0e762 65273 b0e772 65267->65273 65274 b0e80d 65267->65274 65268->65263 65268->65267 65269 b0e66b 65272 b0ea30 65269->65272 65276 b0e67f 65269->65276 65271 b0c580 16 API calls 65270->65271 65275 b0e808 65271->65275 65820 a02970 RaiseException 65272->65820 65278 b0c580 16 API calls 65273->65278 65740 b0c580 65274->65740 65296 b0e973 65275->65296 65297 b0e97e 65275->65297 65814 b0fdd0 144 API calls 65276->65814 65285 b0e77d 65278->65285 65812 b0f950 346 API calls ___vcrt_freefls@4 65281->65812 65282 b0ea3c 65286 9f9b10 2 API calls 65282->65286 65284 b0e60d 65284->64949 65308 b0e925 65285->65308 65815 b0fd20 RaiseException 65285->65815 65290 b0ea46 65286->65290 65287 b0e694 65291 a0b330 46 API calls 65287->65291 65289 b0e8b3 65294 b0e8ce 65289->65294 65747 b12380 65289->65747 65293 b0e6a4 65291->65293 65292 b0e798 65292->65272 65299 b0e7a9 65292->65299 65293->64949 65298 b0e8ed 65294->65298 65302 b8f5b6 ___vcrt_freefls@4 14 API calls 65294->65302 65816 9f9390 56 API calls 65296->65816 65817 af5170 50 API calls 65297->65817 65778 b12810 65298->65778 65300 aefde0 58 API calls 65299->65300 65305 b0e7be 65300->65305 65302->65298 65307 a0b330 46 API calls 65305->65307 65306 b0e818 65306->65272 65306->65289 65310 b0c580 16 API calls 65306->65310 65309 b0e7d0 65307->65309 65312 b0ea02 65308->65312 65314 b8f5b6 ___vcrt_freefls@4 14 API calls 65308->65314 65313 b0e9c2 65309->65313 65317 9f9e50 57 API calls 65309->65317 65310->65306 65311 b0e97c 65311->65313 65818 aeff20 80 API calls _ValidateLocalCookies 65311->65818 65312->64949 65819 b0ef10 335 API calls ___vcrt_freefls@4 65313->65819 65314->65312 65319 b0e7fe 65317->65319 65318 b0e9b7 65320 a0a950 144 API calls 65318->65320 65319->65275 65319->65282 65320->65313 65322 9f9e50 57 API calls 65321->65322 65323 a069bf 65322->65323 65324 a069c5 65323->65324 65325 a06a2f 65323->65325 65328 a069f2 65324->65328 65329 a069e5 65324->65329 65326 9f9b10 2 API calls 65325->65326 65327 a06a39 65326->65327 65972 9f99c0 46 API calls 3 library calls 65328->65972 65971 9f9390 56 API calls 65329->65971 65332 a069f0 65333 b2b200 57 API calls _ValidateLocalCookies 65332->65333 65333->64955 65335 b2b395 65334->65335 65336 b2b37f 65334->65336 65337 9f9e50 57 API calls 65335->65337 65336->64966 65338 b2b39a 65337->65338 65339 b2b3a4 65338->65339 65340 b2b56a 65338->65340 65973 9f8e30 79 API calls 65339->65973 65341 9f9b10 2 API calls 65340->65341 65342 b2b574 65341->65342 65343 9f9e50 57 API calls 65342->65343 65387 b2b5b5 std::_Locinfo::_Locinfo_ctor 65343->65387 65345 b2b769 65346 9f9b10 2 API calls 65345->65346 65347 b2b773 65346->65347 65348 9f9b10 2 API calls 65347->65348 65349 b2b77d 65348->65349 65350 b2b965 65349->65350 65351 b2b802 65349->65351 65352 b2b79b 65349->65352 65350->64966 65351->65350 65355 b2b877 65351->65355 65356 b2b81c GetDlgItem GetDlgItem SendMessageW 65351->65356 65353 af0f40 5 API calls 65352->65353 65354 b2b7aa SetWindowTextW 65353->65354 65357 a559b0 14 API calls 65354->65357 65359 b2b881 EndDialog 65355->65359 65360 b2b8a4 65355->65360 65358 b2b851 SendMessageW 65356->65358 65362 b2b7c2 GetDlgItem SendMessageW 65357->65362 65370 b2b872 65358->65370 65359->64966 65360->65350 65361 b2b8b2 GetDlgItem 65360->65361 65364 b2b8c7 GetWindowTextLengthW 65361->65364 65365 b2b93c 65361->65365 65366 b2b7e6 SetFocus 65362->65366 65368 b2b8d9 65364->65368 65369 b2b96d 65364->65369 65367 9f9710 2 API calls 65365->65367 65366->64966 65370->65366 65374 9f9e50 57 API calls 65374->65387 65377 b2b3c9 65383 b2b443 65377->65383 65384 b2b4b5 65377->65384 65383->64966 65385 9f9e50 57 API calls 65384->65385 65388 b2b4bd 65385->65388 65386 9f98a0 46 API calls 65386->65387 65387->65345 65387->65347 65387->65374 65387->65386 65394 b2b702 65387->65394 65395 b2b712 65387->65395 65975 9fe780 65387->65975 65974 9febe0 114 API calls 3 library calls 65388->65974 65390 b2b4c8 65391 a0b330 46 API calls 65390->65391 65393 b2b4d8 65391->65393 65393->65383 65394->65395 65396 a0b330 46 API calls 65394->65396 65395->64966 65396->65395 65397->64710 65398->64710 65399->64737 65400->64809 65401->64831 65402->64889 65403->64725 65404->64732 65406 b13fe1 65405->65406 65407 b13e7e EnumResourceLanguagesW 65405->65407 65406->64789 65408 b13f01 65407->65408 65418 b13ebd 65407->65418 65409 b13f0e 65408->65409 65423 b13f50 65408->65423 65412 b8f5b6 ___vcrt_freefls@4 14 API calls 65409->65412 65415 b13f1b __Getctype 65409->65415 65410 b14011 65985 a02970 RaiseException 65410->65985 65412->65415 65413 b13fbf 65413->65406 65416 b8f5b6 ___vcrt_freefls@4 14 API calls 65413->65416 65414 b1401d 65417 b14042 65414->65417 65986 a02420 61 API calls 65414->65986 65415->65410 65415->65413 65984 a02420 61 API calls 65415->65984 65416->65406 65417->64789 65418->65408 65418->65410 65982 a02420 61 API calls 65418->65982 65423->65415 65983 a0b3a0 45 API calls 3 library calls 65423->65983 65425->64774 65426->64855 65427->64864 65429->64786 65430->64795 65431->64795 65432->64903 65434 adca0d 65433->65434 65435 adca4b 65433->65435 65436 b8f5b6 ___vcrt_freefls@4 14 API calls 65434->65436 65435->64903 65436->65435 65437->64903 65438->64903 65439->64903 65440->64903 65441->64938 65442->64904 65443->64875 65444->64876 65445->64891 65446->64900 65447->64915 65448->64919 65449->64927 65450->64907 65451->64912 65452->64926 65453->64963 65454->64964 65455->64973 65456->64973 65457->64977 65458->64977 65460->64890 65461->65018 65462->65023 65463->65039 65464->65039 65466 ad9746 65465->65466 65473 ad9785 65465->65473 65470 ad9762 65466->65470 65476 9f98a0 46 API calls 65466->65476 65467 9f9b10 2 API calls 65474 ad97aa 65467->65474 65477 9f9910 45 API calls 3 library calls 65470->65477 65471 ad9772 65478 9f9910 45 API calls 3 library calls 65471->65478 65473->65467 65475 ad9790 65473->65475 65474->65049 65475->65049 65476->65470 65477->65471 65478->65473 65480 9f9e50 57 API calls 65479->65480 65481 b2c4ca 65480->65481 65482 b2c4d0 65481->65482 65483 b2c53a 65481->65483 65486 b2c4f2 65482->65486 65487 b2c4fd 65482->65487 65484 9f9b10 2 API calls 65483->65484 65485 b2c544 65484->65485 65497 b2bdb0 149 API calls std::_Locinfo::_Locinfo_ctor 65485->65497 65495 9f9390 56 API calls 65486->65495 65496 9f99c0 46 API calls 3 library calls 65487->65496 65491 b2c4fb 65492 a0a950 144 API calls 65491->65492 65494 b2c525 65492->65494 65493 b2c588 65493->65056 65494->65056 65495->65491 65496->65491 65497->65493 65499 b2c277 ConnectNamedPipe 65498->65499 65500 b2c2b8 ReadFile 65498->65500 65499->65500 65503 b2c284 GetLastError 65499->65503 65501 b2c2e0 65500->65501 65502 b2c34c 65500->65502 65501->65502 65504 b2c2e5 65501->65504 65506 9f9e50 57 API calls 65502->65506 65503->65500 65505 b2c291 65503->65505 65507 a06990 68 API calls 65504->65507 65505->65500 65508 b2c297 65505->65508 65509 b2c351 65506->65509 65510 b2c2f0 65507->65510 65511 9f9e50 57 API calls 65508->65511 65512 b2c29c 65509->65512 65513 b2c357 65509->65513 65515 9f9650 46 API calls 65510->65515 65511->65512 65514 9f9b10 2 API calls 65512->65514 65518 b2c2a4 65512->65518 65513->65518 65516 b2c391 65514->65516 65517 b2c302 65515->65517 65519 b2c3d6 65516->65519 65520 b2c415 WriteFile 65516->65520 65517->65070 65518->65070 65523 9f9e50 57 API calls 65519->65523 65521 b2c432 65520->65521 65522 b2c44c 65520->65522 65524 9f9e50 57 API calls 65521->65524 65526 b2c240 145 API calls 65522->65526 65525 b2c3db 65523->65525 65527 b2c437 65524->65527 65528 b2c3e3 65525->65528 65530 9f9b10 2 API calls 65525->65530 65526->65527 65527->65070 65527->65525 65529 b2c43d 65527->65529 65528->65070 65529->65528 65531 b2c487 65530->65531 65532 9f9e50 57 API calls 65531->65532 65533 b2c4ca 65532->65533 65534 b2c4d0 65533->65534 65535 b2c53a 65533->65535 65538 b2c4f2 65534->65538 65539 b2c4fd 65534->65539 65536 9f9b10 2 API calls 65535->65536 65537 b2c544 65536->65537 65549 b2bdb0 149 API calls std::_Locinfo::_Locinfo_ctor 65537->65549 65547 9f9390 56 API calls 65538->65547 65548 9f99c0 46 API calls 3 library calls 65539->65548 65543 b2c4fb 65544 a0a950 144 API calls 65543->65544 65545 b2c525 65544->65545 65545->65070 65546 b2c588 65546->65070 65547->65543 65548->65543 65549->65546 65550->65081 65551->65086 65553 b0cfaa 65552->65553 65554 9f9b10 2 API calls 65553->65554 65555 b0cfb8 65554->65555 65556 b0d016 65555->65556 65557 b0cfde 65555->65557 65562 b0d01d 65555->65562 65559 b0d054 DestroyWindow 65556->65559 65556->65562 65567 af0f40 65557->65567 65559->65093 65560 b0cfed 65572 b0d210 6 API calls 65560->65572 65562->65093 65566->65091 65592 af2350 LoadLibraryW 65567->65592 65570 af2350 3 API calls 65571 af0f70 SendMessageW SendMessageW 65570->65571 65571->65560 65573 b0d2a2 SetWindowPos 65572->65573 65575 b8615a _ValidateLocalCookies 5 API calls 65573->65575 65576 b0cff7 65575->65576 65577 a559b0 GetWindowLongW 65576->65577 65578 a55a06 GetWindowRect 65577->65578 65579 a55a4f GetWindow GetWindowRect 65577->65579 65591 a55a22 SetWindowPos 65578->65591 65580 a55a6a GetWindowLongW 65579->65580 65581 a55a7f MonitorFromWindow 65579->65581 65580->65581 65584 a55b55 65581->65584 65585 a55a93 GetMonitorInfoW 65581->65585 65587 b8615a _ValidateLocalCookies 5 API calls 65584->65587 65585->65584 65586 a55aad 65585->65586 65588 a55ac4 GetWindowRect 65586->65588 65586->65591 65589 a55b6e 65587->65589 65588->65591 65589->65093 65591->65584 65593 af23ab GetProcAddress 65592->65593 65594 af23bb 65592->65594 65593->65594 65595 af242e FreeLibrary 65594->65595 65596 af0f5e 65594->65596 65595->65596 65596->65570 65598 9f9743 65597->65598 65599 9f9752 65597->65599 65598->65599 65600 9f9b10 2 API calls 65598->65600 65599->65106 65601 9f97ac 65600->65601 65602->65098 65603->65095 65604->65125 65605->65138 65606->65159 65607->65148 65608->65129 65609->65137 65610->65148 65611->65171 65612->65122 65613->65140 65614->65139 65615->65179 65616->65179 65617->65145 65618->65150 65619->65181 65620->65186 65621->65192 65622->65190 65623->65183 65624->65185 65625->65190 65626->65196 65627->65177 65628->65178 65629->65162 65630->65216 65631->65217 65632->65224 65633->65226 65634->65227 65637->65235 65640 b8619e __Getctype 65638->65640 65639 b14766 65645 b315e0 65639->65645 65640->65639 65642 b861ba std::_Facet_Register 65640->65642 65664 b9c243 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 65640->65664 65643 b87f9e Concurrency::cancel_current_task RaiseException 65642->65643 65644 b86ec8 65643->65644 65646 9f9e50 57 API calls 65645->65646 65647 b31688 65646->65647 65648 b317e9 65647->65648 65652 9f9e50 57 API calls 65647->65652 65649 9f9b10 2 API calls 65648->65649 65650 b317f3 65649->65650 65670 b318e0 IsWindow 65650->65670 65654 b316ab 65652->65654 65653 b31808 65653->65260 65654->65648 65655 9f9e50 57 API calls 65654->65655 65656 b31717 65655->65656 65656->65648 65657 9f9e50 57 API calls 65656->65657 65658 b3178c 65657->65658 65658->65648 65659 9f9e50 57 API calls 65658->65659 65660 b317ae 65659->65660 65660->65648 65661 b317b2 65660->65661 65665 b36d50 65661->65665 65664->65640 65677 af2890 65665->65677 65667 b317cd 65667->65260 65669 b36db9 CoCreateInstance 65669->65667 65671 b3193b EndDialog 65670->65671 65672 b31946 65670->65672 65671->65672 65738 b31830 10 API calls 65672->65738 65674 b319e2 65675 b31a4f 65674->65675 65739 b85db9 10 API calls 65674->65739 65675->65653 65684 af2b00 65677->65684 65680 b86662 6 API calls 65682 af28e0 __Getctype 65680->65682 65681 af2975 65681->65667 65681->65669 65682->65681 65692 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 65682->65692 65685 af2b37 65684->65685 65691 af28b9 65684->65691 65686 b86662 6 API calls 65685->65686 65687 af2b41 65686->65687 65687->65691 65693 af2ba0 65687->65693 65691->65680 65691->65681 65692->65681 65694 af2bf6 RegOpenKeyExW 65693->65694 65695 af2c1c RegQueryValueExW RegQueryValueExW 65694->65695 65696 af2f36 65694->65696 65697 af2c7f RegQueryValueExW 65695->65697 65698 af2cdb RegQueryValueExW 65695->65698 65699 af2f62 65696->65699 65700 af2f51 RegCloseKey 65696->65700 65697->65698 65702 af2cb3 65697->65702 65703 af2d1e 65698->65703 65701 b8615a _ValidateLocalCookies 5 API calls 65699->65701 65700->65699 65704 af2b6a 65701->65704 65702->65698 65705 af2dbd RegQueryValueExW 65703->65705 65708 af2d5a RegQueryValueExW 65703->65708 65724 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 65704->65724 65706 af2e0f RegQueryValueExW 65705->65706 65707 af2dea 65705->65707 65711 af2e3c 65706->65711 65707->65706 65735 b90c26 55 API calls 3 library calls 65708->65735 65710 af2d94 65716 af2dac 65710->65716 65736 b90c26 55 API calls 3 library calls 65710->65736 65712 af2ef6 65711->65712 65713 b86662 6 API calls 65711->65713 65714 af2f2a 65712->65714 65715 af2f00 GetCurrentProcess IsWow64Process 65712->65715 65717 af2eb9 65713->65717 65725 af2f80 65714->65725 65715->65714 65718 af2f1e 65715->65718 65716->65705 65717->65712 65720 af2ec5 GetModuleHandleW GetProcAddress 65717->65720 65718->65714 65737 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 65720->65737 65723 af2ef3 65723->65712 65724->65691 65726 af2fd8 RegOpenKeyExW 65725->65726 65727 af2ffe RegQueryValueExW 65726->65727 65734 af30b0 65726->65734 65730 af307f RegQueryValueExW 65727->65730 65733 af3031 65727->65733 65728 af328e 65731 b8615a _ValidateLocalCookies 5 API calls 65728->65731 65729 af327d RegCloseKey 65729->65728 65730->65734 65732 af32a6 65731->65732 65732->65696 65733->65730 65734->65728 65734->65729 65735->65710 65736->65716 65737->65723 65738->65674 65739->65675 65741 b0c5ba 65740->65741 65742 b0c5cb 65740->65742 65741->65742 65743 9f9b10 2 API calls 65741->65743 65742->65306 65745 b0c65a 65743->65745 65744 b0c691 65744->65306 65745->65744 65746 b8f5b6 ___vcrt_freefls@4 14 API calls 65745->65746 65746->65744 65748 9f9e50 57 API calls 65747->65748 65749 b123cc 65748->65749 65750 b127e4 65749->65750 65821 b11410 65749->65821 65751 9f9b10 2 API calls 65750->65751 65752 b127ee 65751->65752 65830 a02970 RaiseException 65752->65830 65755 b127fa 65757 9f9b10 2 API calls 65755->65757 65758 b12804 65757->65758 65779 b12859 65778->65779 65780 b1284f 65778->65780 65833 b1c990 65779->65833 65843 9f97c0 46 API calls 65780->65843 65783 b12862 65784 b12952 65783->65784 65785 b128a8 65783->65785 65844 af44f0 126 API calls 65783->65844 65794 b1296e 65784->65794 65846 af4920 65784->65846 65788 b12939 65785->65788 65791 9f9e50 57 API calls 65785->65791 65787 b12a8f 65787->65285 65788->65285 65790 b1288d 65790->65784 65790->65785 65793 b128ba 65791->65793 65792 9f9e50 57 API calls 65792->65794 65795 b12aa5 65793->65795 65797 b128c2 65793->65797 65794->65787 65794->65792 65794->65795 65800 b1298f 65794->65800 65796 9f9b10 2 API calls 65795->65796 65798 b12aaf 65796->65798 65799 a0a950 144 API calls 65797->65799 65801 b128e5 65799->65801 65800->65787 65800->65794 65810 b12a28 SetFilePointer SetEndOfFile 65800->65810 65867 9f8e30 79 API calls 65800->65867 65803 b12909 65801->65803 65807 b128fb 65801->65807 65845 b274c0 267 API calls 65803->65845 65804 b129b8 CreateFileW 65868 aef300 47 API calls __Getctype 65804->65868 65809 a0a950 144 API calls 65807->65809 65808 b12917 65808->65788 65809->65803 65810->65800 65811 b12a51 CloseHandle 65810->65811 65811->65800 65812->65284 65813->65269 65814->65287 65815->65292 65816->65311 65817->65311 65818->65318 65819->65308 65820->65282 65822 9f9710 2 API calls 65821->65822 65823 b11423 65822->65823 65831 b0fd20 RaiseException 65823->65831 65825 b1142e 65826 a0b330 46 API calls 65825->65826 65827 b1144e 65826->65827 65832 a02970 RaiseException 65827->65832 65829 b114c2 65830->65755 65831->65825 65832->65829 65834 b1cada 65833->65834 65838 b1c9b5 65833->65838 65835 b8615a _ValidateLocalCookies 5 API calls 65834->65835 65836 b1caed 65835->65836 65836->65783 65837 b1ca51 GetDiskFreeSpaceExW 65837->65838 65839 b1caaf 65837->65839 65838->65834 65838->65837 65839->65834 65840 b1cac3 65839->65840 65841 b8615a _ValidateLocalCookies 5 API calls 65840->65841 65842 b1cad6 65841->65842 65842->65783 65843->65779 65844->65790 65845->65808 65869 af4370 65846->65869 65849 af4969 PathIsUNCW 65872 af45a0 65849->65872 65850 af4955 65850->65794 65852 af499e 65853 af4b31 65852->65853 65855 9f9650 46 API calls 65852->65855 65945 a02970 RaiseException 65853->65945 65862 af49b5 65855->65862 65856 af4b3d 65857 adc9e0 14 API calls 65858 9f9650 46 API calls 65858->65862 65860 a0a950 144 API calls 65861 af4a24 CreateDirectoryW 65860->65861 65861->65862 65862->65853 65862->65858 65862->65860 65865 af4a56 65862->65865 65866 a0a950 144 API calls 65862->65866 65944 aef300 47 API calls __Getctype 65862->65944 65865->65857 65866->65862 65867->65804 65868->65800 65946 af43b0 65869->65946 65873 9f9e50 57 API calls 65872->65873 65874 af45d9 65873->65874 65875 af48fe 65874->65875 65878 9f9e50 57 API calls 65874->65878 65876 9f9b10 2 API calls 65875->65876 65877 af4908 65876->65877 65959 a02970 RaiseException 65877->65959 65880 af45fa 65878->65880 65880->65875 65882 af4602 65880->65882 65881 af4914 65883 af4370 10 API calls 65881->65883 65960 af44f0 126 API calls 65882->65960 65884 af4951 65883->65884 65886 af4969 PathIsUNCW 65884->65886 65887 af4955 65884->65887 65888 af45a0 159 API calls 65886->65888 65887->65852 65890 af499e 65888->65890 65889 af461a 65891 af4729 65889->65891 65892 af4625 65889->65892 65894 af4b31 65890->65894 65898 9f9650 46 API calls 65890->65898 65893 a0b330 46 API calls 65891->65893 65895 af46ba 65892->65895 65906 af464b 65892->65906 65897 af4732 PathIsUNCW 65893->65897 65970 a02970 RaiseException 65894->65970 65962 9fead0 126 API calls 65895->65962 65902 af474c _wcschr 65897->65902 65931 af49b5 65898->65931 65901 af46d4 65903 a0b330 46 API calls 65901->65903 65963 9fead0 126 API calls 65902->65963 65905 af46e7 65903->65905 65913 a0a950 144 API calls 65905->65913 65961 9fead0 126 API calls 65906->65961 65908 af4778 65912 a0a950 144 API calls 65908->65912 65915 af46b8 65913->65915 65914 af4665 65916 a0b330 46 API calls 65914->65916 65915->65897 65918 af4678 65916->65918 65921 a0a950 144 API calls 65918->65921 65921->65915 65931->65894 65937 af4a56 65931->65937 65944->65862 65945->65856 65951 af43f4 65946->65951 65957 af43ec 65946->65957 65947 b8615a _ValidateLocalCookies 5 API calls 65950 af4398 65947->65950 65948 af44e3 65949 9f9b10 2 API calls 65948->65949 65952 af44ed 65949->65952 65950->65849 65950->65850 65951->65948 65953 af4414 __Getctype 65951->65953 65951->65957 65954 af4444 FindFirstFileW 65953->65954 65953->65957 65955 af4473 65954->65955 65956 af4490 GetLastError 65954->65956 65955->65957 65958 af44ad FindClose 65955->65958 65956->65955 65957->65947 65958->65957 65959->65881 65960->65889 65961->65914 65962->65901 65963->65908 65971->65332 65972->65332 65973->65377 65974->65390 65976 9fe801 65975->65976 65979 9fe7a8 65975->65979 65977 9f9b10 2 API calls 65976->65977 65978 9fe80b 65977->65978 65979->65387 65982->65418 65983->65423 65984->65415 65985->65414 65986->65417 66153 b03cc0 66154 b03cf2 66153->66154 66155 b03d1a GetShortPathNameW 66153->66155 66206 adbb60 RtlAllocateHeap RaiseException 66154->66206 66157 b03d2b 66155->66157 66177 b03cff 66155->66177 66159 9f9e50 57 API calls 66157->66159 66158 b03cf7 66160 9f9710 2 API calls 66158->66160 66165 b03d30 66159->66165 66160->66177 66161 b03e17 66162 9f9b10 2 API calls 66161->66162 66163 b03e21 66162->66163 66164 9f9e50 57 API calls 66163->66164 66167 b03e61 66164->66167 66165->66161 66166 b03e0d 66165->66166 66168 b03d71 66165->66168 66207 9f98a0 46 API calls 66165->66207 66169 9f9b10 2 API calls 66166->66169 66171 b0402f 66167->66171 66176 b03e6b 66167->66176 66168->66166 66170 b03d7d GetShortPathNameW 66168->66170 66169->66161 66175 b03d97 std::_Locinfo::_Locinfo_ctor 66170->66175 66170->66177 66173 9f9b10 2 API calls 66171->66173 66174 b04039 66173->66174 66175->66166 66178 b03db4 66175->66178 66209 b04040 66176->66209 66208 adba20 48 API calls 66178->66208 66181 b03dca 66183 a0b330 46 API calls 66181->66183 66182 b03ec2 66184 b03fe5 66182->66184 66342 9f7070 66182->66342 66183->66177 66358 9f69d0 45 API calls 66184->66358 66187 b03f02 66189 b04040 340 API calls 66187->66189 66188 b03ff1 66191 b8615a _ValidateLocalCookies 5 API calls 66188->66191 66190 b03f15 66189->66190 66354 9f77d0 66190->66354 66193 b04029 66191->66193 66194 b03f24 66194->66184 66195 9f7070 45 API calls 66194->66195 66196 b03f66 66195->66196 66197 b04040 340 API calls 66196->66197 66198 b03f79 66197->66198 66199 9f77d0 45 API calls 66198->66199 66200 b03f88 66199->66200 66200->66184 66201 9f7070 45 API calls 66200->66201 66202 b03fc6 66201->66202 66203 b04040 340 API calls 66202->66203 66204 b03fd9 66203->66204 66205 9f77d0 45 API calls 66204->66205 66205->66184 66206->66158 66207->66168 66208->66181 66210 9f9e50 57 API calls 66209->66210 66211 b04078 66210->66211 66212 b04082 66211->66212 66213 b042e3 66211->66213 66217 a06990 68 API calls 66212->66217 66214 9f9b10 2 API calls 66213->66214 66215 b042ed 66214->66215 66216 9f9b10 2 API calls 66215->66216 66218 b042f7 66216->66218 66219 b040ac 66217->66219 66221 b04399 66218->66221 66222 b0461e 66218->66222 66297 b0471a 66218->66297 66224 a06990 68 API calls 66219->66224 66220 9f9e50 57 API calls 66223 b04740 66220->66223 66359 b1fc00 180 API calls _ValidateLocalCookies 66221->66359 66226 9f9e50 57 API calls 66222->66226 66228 b04a5b 66223->66228 66240 b04764 66223->66240 66254 b047ab 66223->66254 66229 b040c6 66224->66229 66227 b04623 66226->66227 66227->66228 66390 b0ea50 66227->66390 66233 9f9b10 2 API calls 66228->66233 66234 9f9e50 57 API calls 66229->66234 66230 b0439e 66231 b043a6 66230->66231 66232 b0449c 66230->66232 66235 9f9e50 57 API calls 66231->66235 66476 9faf80 75 API calls _ValidateLocalCookies 66232->66476 66236 b04a65 66233->66236 66238 b040cf 66234->66238 66239 b043ab 66235->66239 66238->66215 66242 b040d9 66238->66242 66239->66228 66360 afdf00 79 API calls 66239->66360 66484 ae3c70 56 API calls 2 library calls 66240->66484 66241 b044b0 66245 b044ca 66241->66245 66246 9f77d0 45 API calls 66241->66246 66250 b04104 66242->66250 66251 b040f9 66242->66251 66247 9f77d0 45 API calls 66245->66247 66246->66245 66252 b0450f 66247->66252 66248 b04675 66482 af44f0 126 API calls 66248->66482 66249 b04776 66485 9f8e30 79 API calls 66249->66485 66472 9f99c0 46 API calls 3 library calls 66250->66472 66471 9f9390 56 API calls 66251->66471 66477 b1ff90 60 API calls 66252->66477 66262 9f9e50 57 API calls 66254->66262 66260 b04794 66263 9f77d0 45 API calls 66260->66263 66261 b0451e 66478 ae3c70 56 API calls 2 library calls 66261->66478 66291 b047fd 66262->66291 66268 b047a6 66263->66268 66264 b04102 66270 a06990 68 API calls 66264->66270 66266 b043e2 66267 b0446f 66266->66267 66271 9f9e50 57 API calls 66266->66271 66361 afdb40 66267->66361 66281 9f9e50 57 API calls 66268->66281 66269 b04534 66278 a06990 68 API calls 66269->66278 66274 b0412a 66270->66274 66275 b043f9 66271->66275 66273 b04686 66277 9f7070 45 API calls 66273->66277 66473 aef980 80 API calls 2 library calls 66274->66473 66275->66228 66300 b04403 66275->66300 66276 b0447c 66283 9f77d0 45 API calls 66276->66283 66280 b046f5 66277->66280 66284 b0454c 66278->66284 66483 ae3e80 55 API calls _ValidateLocalCookies 66280->66483 66282 b048c9 66281->66282 66282->66228 66303 9f9e50 57 API calls 66282->66303 66287 b04a3c 66283->66287 66479 aef300 47 API calls __Getctype 66284->66479 66285 b04149 66295 a06990 68 API calls 66285->66295 66292 b8615a _ValidateLocalCookies 5 API calls 66287->66292 66289 b0470b 66290 9f77d0 45 API calls 66289->66290 66290->66297 66291->66228 66486 9f8e30 79 API calls 66291->66486 66299 b04a55 66292->66299 66293 b04584 66306 adc9e0 14 API calls 66293->66306 66294 b0443c 66475 b274c0 267 API calls 66294->66475 66296 b0415c 66295->66296 66308 a06990 68 API calls 66296->66308 66297->66220 66299->66182 66300->66294 66300->66300 66301 b0442b 66300->66301 66307 a0a950 144 API calls 66301->66307 66309 b048f8 66303->66309 66304 b04453 66304->66267 66311 b045b4 66306->66311 66307->66294 66312 b04173 66308->66312 66309->66228 66313 b04902 66309->66313 66310 b04873 66487 9f8e30 79 API calls 66310->66487 66318 9f77d0 45 API calls 66311->66318 66474 b1f880 150 API calls std::_Locinfo::_Locinfo_ctor 66312->66474 66324 b04982 66313->66324 66325 b0492f 66313->66325 66317 b0488b 66488 9f69d0 45 API calls 66317->66488 66319 b045ed 66318->66319 66321 b045f6 66319->66321 66322 b0460a 66319->66322 66480 b04a70 16 API calls 66321->66480 66481 b04a70 16 API calls 66322->66481 66490 b24900 167 API calls 66324->66490 66325->66324 66332 b04945 PathFileExistsW 66325->66332 66328 b04619 66328->66297 66329 b04196 66334 b0425c PathFileExistsW 66329->66334 66335 b0428c 66329->66335 66330 b04998 66331 b04605 66330->66331 66333 afdb40 274 API calls 66330->66333 66331->66276 66332->66324 66336 b04956 66332->66336 66333->66331 66334->66335 66337 b04267 66334->66337 66339 b8615a _ValidateLocalCookies 5 API calls 66335->66339 66489 9f99c0 46 API calls 3 library calls 66336->66489 66337->66335 66341 9f7070 45 API calls 66337->66341 66340 b042dd 66339->66340 66340->66182 66341->66335 66345 9f70bd 66342->66345 66347 9f7081 std::_Locinfo::_Locinfo_ctor 66342->66347 66343 9f7171 66561 9f7060 45 API calls std::_Locinfo::_Locinfo_ctor 66343->66561 66345->66343 66545 9f7650 66345->66545 66346 9f7176 66349 9f7070 45 API calls 66346->66349 66347->66187 66350 9f71d4 66349->66350 66350->66187 66351 9f7106 std::_Locinfo::_Locinfo_ctor 66352 9f7155 66351->66352 66560 b8af1f 45 API calls 2 library calls 66351->66560 66352->66187 66355 9f77fd 66354->66355 66356 9f781e 66354->66356 66355->66354 66355->66356 66564 b8af1f 45 API calls 2 library calls 66355->66564 66356->66194 66358->66188 66359->66230 66360->66266 66362 afdb7b 66361->66362 66363 afdbf2 66361->66363 66364 9f9e50 57 API calls 66362->66364 66365 afdbff 66363->66365 66366 afdcd6 OutputDebugStringW 66363->66366 66367 afdb80 66364->66367 66368 9f9e50 57 API calls 66365->66368 66389 afdc8a 66366->66389 66369 afdcf0 66367->66369 66373 afdb8a 66367->66373 66370 afdc10 66368->66370 66372 9f9b10 2 API calls 66369->66372 66371 afdcfa 66370->66371 66377 afdc1a 66370->66377 66374 9f9b10 2 API calls 66371->66374 66372->66371 66376 afdbc0 66373->66376 66381 afdbb2 66373->66381 66375 afdd04 66374->66375 66500 b274c0 267 API calls 66376->66500 66379 a06990 68 API calls 66377->66379 66382 afdc36 GetActiveWindow 66379->66382 66380 afdbd1 66380->66363 66383 a0a950 144 API calls 66381->66383 66384 afdc4a GetForegroundWindow 66382->66384 66385 afdc56 66382->66385 66383->66376 66384->66385 66491 a9bda0 66385->66491 66387 afdc7a 66388 afdc83 SetForegroundWindow 66387->66388 66387->66389 66388->66389 66389->66276 66391 b0ea81 66390->66391 66392 b0eb04 66390->66392 66518 b0fd20 RaiseException 66391->66518 66521 b0fd80 RaiseException 66392->66521 66395 b0ea8a 66397 b0eb73 66395->66397 66399 b0ea9d 66395->66399 66396 b0eb0b 66396->66397 66400 b0eb17 66396->66400 66501 a02970 RaiseException 66397->66501 66402 aefde0 58 API calls 66399->66402 66522 b0fdd0 144 API calls 66400->66522 66401 b0eb7f 66404 9f9650 46 API calls 66401->66404 66405 b0eab4 66402->66405 66407 b0ebb4 66404->66407 66408 a0b330 46 API calls 66405->66408 66406 b0eb2c 66409 a0b330 46 API calls 66406->66409 66410 b0ec27 66407->66410 66411 b0ebcc 66407->66411 66412 b0eac7 66408->66412 66413 b0eb02 66409->66413 66414 b0ec22 66410->66414 66525 b12090 126 API calls 66410->66525 66523 b0fd20 RaiseException 66411->66523 66519 aef300 47 API calls __Getctype 66412->66519 66413->66248 66502 af3de0 66414->66502 66418 b0ebee 66422 b0ed43 66418->66422 66426 b0ebff 66418->66426 66420 b0eaf7 66520 b10000 RtlAllocateHeap RaiseException RaiseException 66420->66520 66421 b0ec3b 66424 a0a950 144 API calls 66421->66424 66529 a02970 RaiseException 66422->66529 66439 b0ec4d 66424->66439 66524 af39b0 126 API calls 66426->66524 66427 b0ed4f 66429 b0ed81 66427->66429 66447 b0ee46 66427->66447 66530 b0ff90 RtlAllocateHeap RaiseException RaiseException 66429->66530 66430 b0ec10 66435 a0a950 144 API calls 66430->66435 66431 b0ecff 66431->66248 66433 b0ec99 66527 b0fd80 RaiseException 66433->66527 66434 b0ee93 66532 b0fdd0 144 API calls 66434->66532 66435->66414 66438 b0ed8c 66456 b0ed9c 66438->66456 66531 b0ff90 RtlAllocateHeap RaiseException RaiseException 66438->66531 66439->66433 66440 b0ed39 66439->66440 66446 b0ec88 66439->66446 66444 9f9b10 2 API calls 66440->66444 66441 b0eef4 66443 9f9b10 2 API calls 66441->66443 66442 b0eca2 66442->66422 66454 b0ecb6 66442->66454 66449 b0eefe 66443->66449 66444->66422 66445 b0ee9f 66451 a0b330 46 API calls 66445->66451 66446->66433 66526 a0b4c0 46 API calls 66446->66526 66447->66434 66447->66441 66448 b0ee7c 66447->66448 66453 b0ee6a 66447->66453 66448->66441 66450 b0ee81 66448->66450 66450->66434 66455 b0ee88 66450->66455 66463 b0ee7a 66451->66463 66453->66450 66458 b0ee71 66453->66458 66528 af39b0 126 API calls 66454->66528 66462 a0b330 46 API calls 66455->66462 66460 aefde0 58 API calls 66456->66460 66456->66463 66469 b0ee01 66456->66469 66464 a0b330 46 API calls 66458->66464 66465 b0edee 66460->66465 66462->66463 66463->66248 66464->66463 66467 a0b330 46 API calls 66465->66467 66466 b0ecc7 66468 a0a950 144 API calls 66466->66468 66467->66469 66468->66414 66470 b0ee2c 66469->66470 66533 a02970 RaiseException 66469->66533 66470->66248 66471->66264 66472->66264 66473->66285 66474->66329 66475->66304 66476->66241 66477->66261 66478->66269 66479->66293 66480->66331 66481->66328 66482->66273 66483->66289 66484->66249 66485->66260 66486->66310 66487->66317 66488->66268 66489->66324 66490->66330 66496 a9bde0 66491->66496 66497 a9be50 66491->66497 66492 a9bf11 MessageBoxW 66495 a9bf27 66492->66495 66493 a9bedb 66493->66387 66494 a9be36 LoadStringW 66494->66496 66494->66497 66495->66387 66496->66493 66496->66494 66497->66492 66497->66493 66498 a9beef LoadStringW 66497->66498 66498->66497 66499 a9bf09 66498->66499 66499->66492 66500->66380 66501->66401 66503 9f9650 46 API calls 66502->66503 66504 af3e23 66503->66504 66505 a0a950 144 API calls 66504->66505 66506 af3e6a 66505->66506 66534 ad7720 66506->66534 66508 af3f84 66541 ad77d0 66508->66541 66511 af3f20 GetFileAttributesW 66513 af3efa 66511->66513 66512 b8615a _ValidateLocalCookies 5 API calls 66514 af3fcd 66512->66514 66515 af3e72 66513->66515 66516 af3de0 145 API calls 66513->66516 66514->66431 66515->66508 66515->66511 66515->66513 66517 af3f69 FindNextFileW 66515->66517 66516->66511 66517->66508 66517->66515 66518->66395 66519->66420 66521->66396 66522->66406 66523->66418 66524->66430 66525->66421 66526->66433 66527->66442 66528->66466 66529->66427 66530->66438 66531->66456 66532->66445 66533->66441 66535 ad7782 __Getctype 66534->66535 66536 9f9e50 57 API calls 66535->66536 66537 ad779a 66536->66537 66538 ad77a0 66537->66538 66539 9f9b10 2 API calls 66537->66539 66538->66515 66540 ad77ce 66539->66540 66542 ad7821 66541->66542 66543 ad786a 66542->66543 66544 ad785d FindClose 66542->66544 66543->66512 66544->66543 66546 9f769b 66545->66546 66547 9f765b 66545->66547 66562 9f7630 45 API calls 2 library calls 66546->66562 66549 9f7686 66547->66549 66550 9f7664 66547->66550 66551 9f7696 66549->66551 66555 b86199 std::_Facet_Register 3 API calls 66549->66555 66550->66546 66553 9f766b 66550->66553 66551->66351 66552 9f7671 66559 9f767a 66552->66559 66563 b8af1f 45 API calls 2 library calls 66552->66563 66554 b86199 std::_Facet_Register 3 API calls 66553->66554 66554->66552 66557 9f7690 66555->66557 66557->66351 66559->66351 66561->66346 66562->66552 66565 b06660 66629 b064d0 66565->66629 66567 b066ac 66715 b2a240 GetUserNameW 66567->66715 66570 9f7070 45 API calls 66571 b06729 66570->66571 66572 b86662 6 API calls 66571->66572 66583 b067a6 66571->66583 66574 b0674c 66572->66574 66576 9f7070 45 API calls 66574->66576 66574->66583 66575 b067b5 66578 b86199 std::_Facet_Register 3 API calls 66575->66578 66577 b0678b 66576->66577 66744 b8651a 45 API calls 66577->66744 66582 b06870 66578->66582 66580 b06795 66745 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 66580->66745 66584 9f7070 45 API calls 66582->66584 66739 9f6540 66583->66739 66585 b068cc 66584->66585 66586 9f7070 45 API calls 66585->66586 66587 b06929 66586->66587 66588 9f6540 45 API calls 66587->66588 66589 b06945 66588->66589 66590 9f6540 45 API calls 66589->66590 66591 b06958 66590->66591 66592 9f6540 45 API calls 66591->66592 66593 b06968 66592->66593 66594 9f6540 45 API calls 66593->66594 66595 b0697a 66594->66595 66596 9f77d0 45 API calls 66595->66596 66597 b069be 66596->66597 66598 9f77d0 45 API calls 66597->66598 66599 b069d6 66598->66599 66602 9f77d0 45 API calls 66599->66602 66621 b06a37 66599->66621 66600 9f77d0 45 API calls 66603 b06aae 66600->66603 66601 9f77d0 45 API calls 66604 b06a6b 66601->66604 66605 b06a14 66602->66605 66606 9f77d0 45 API calls 66603->66606 66607 9f77d0 45 API calls 66604->66607 66608 9f77d0 45 API calls 66605->66608 66609 b06aba 66606->66609 66610 b06a77 66607->66610 66611 b06a20 66608->66611 66612 9f77d0 45 API calls 66609->66612 66613 9f77d0 45 API calls 66610->66613 66614 9f77d0 45 API calls 66611->66614 66615 b06ac9 66612->66615 66616 b06a83 66613->66616 66617 b06a2c 66614->66617 66618 b06ad8 66615->66618 66623 b06b06 GetCurrentProcess OpenProcessToken 66615->66623 66619 9f77d0 45 API calls 66616->66619 66620 9f77d0 45 API calls 66617->66620 66624 b8615a _ValidateLocalCookies 5 API calls 66618->66624 66622 b06a8e 66619->66622 66620->66621 66621->66601 66621->66622 66622->66600 66625 b06b20 GetTokenInformation 66623->66625 66626 b06b4c 66623->66626 66627 b06bd3 66624->66627 66625->66626 66626->66618 66628 b06b82 CloseHandle 66626->66628 66628->66618 66630 9f9e50 57 API calls 66629->66630 66631 b0650a 66630->66631 66632 b0664f 66631->66632 66746 b1ce80 60 API calls 66631->66746 66633 9f9b10 2 API calls 66632->66633 66634 b06659 66633->66634 66637 b064d0 155 API calls 66634->66637 66636 b06533 66638 b06554 GetTickCount 66636->66638 66639 b0654c 66636->66639 66640 b066ac 66637->66640 66747 b85347 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __Xtime_get_ticks 66638->66747 66639->66638 66641 b2a240 50 API calls 66640->66641 66643 b066be 66641->66643 66645 9f7070 45 API calls 66643->66645 66644 b06561 66646 9f9e50 57 API calls 66644->66646 66647 b06729 66645->66647 66648 b06581 66646->66648 66649 b86662 6 API calls 66647->66649 66665 b067a6 66647->66665 66648->66632 66654 b06589 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 66648->66654 66651 b0674c 66649->66651 66650 9f6540 45 API calls 66652 b067b5 66650->66652 66653 9f7070 45 API calls 66651->66653 66651->66665 66657 b86199 std::_Facet_Register 3 API calls 66652->66657 66655 b0678b 66653->66655 66748 9f8e30 79 API calls 66654->66748 66751 b8651a 45 API calls 66655->66751 66660 b06870 66657->66660 66659 b065bb 66749 b1ce80 60 API calls 66659->66749 66667 9f7070 45 API calls 66660->66667 66661 b06795 66752 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 66661->66752 66664 b065cc 66750 b1cfc0 147 API calls 66664->66750 66665->66650 66669 b068cc 66667->66669 66668 b065da 66670 9f9650 46 API calls 66668->66670 66672 9f7070 45 API calls 66669->66672 66671 b065e9 66670->66671 66671->66567 66673 b06929 66672->66673 66674 9f6540 45 API calls 66673->66674 66675 b06945 66674->66675 66676 9f6540 45 API calls 66675->66676 66677 b06958 66676->66677 66678 9f6540 45 API calls 66677->66678 66679 b06968 66678->66679 66680 9f6540 45 API calls 66679->66680 66681 b0697a 66680->66681 66682 9f77d0 45 API calls 66681->66682 66683 b069be 66682->66683 66684 9f77d0 45 API calls 66683->66684 66685 b069d6 66684->66685 66688 9f77d0 45 API calls 66685->66688 66707 b06a37 66685->66707 66686 9f77d0 45 API calls 66689 b06aae 66686->66689 66687 9f77d0 45 API calls 66690 b06a6b 66687->66690 66691 b06a14 66688->66691 66692 9f77d0 45 API calls 66689->66692 66693 9f77d0 45 API calls 66690->66693 66694 9f77d0 45 API calls 66691->66694 66695 b06aba 66692->66695 66696 b06a77 66693->66696 66697 b06a20 66694->66697 66698 9f77d0 45 API calls 66695->66698 66699 9f77d0 45 API calls 66696->66699 66700 9f77d0 45 API calls 66697->66700 66701 b06ac9 66698->66701 66702 b06a83 66699->66702 66703 b06a2c 66700->66703 66704 b06ad8 66701->66704 66709 b06b06 GetCurrentProcess OpenProcessToken 66701->66709 66705 9f77d0 45 API calls 66702->66705 66706 9f77d0 45 API calls 66703->66706 66710 b8615a _ValidateLocalCookies 5 API calls 66704->66710 66708 b06a8e 66705->66708 66706->66707 66707->66687 66707->66708 66708->66686 66711 b06b20 GetTokenInformation 66709->66711 66712 b06b4c 66709->66712 66713 b06bd3 66710->66713 66711->66712 66712->66704 66714 b06b82 CloseHandle 66712->66714 66713->66567 66714->66704 66716 b2a2d4 GetLastError 66715->66716 66717 b2a31e GetEnvironmentVariableW 66715->66717 66716->66717 66718 b2a2df 66716->66718 66719 b2a3a2 66717->66719 66720 b2a35e 66717->66720 66722 b2a2e9 66718->66722 66764 a23200 45 API calls std::_Locinfo::_Locinfo_ctor 66718->66764 66727 b2a3ea 66719->66727 66728 9f7070 45 API calls 66719->66728 66721 b2a365 66720->66721 66765 a23200 45 API calls std::_Locinfo::_Locinfo_ctor 66720->66765 66723 b2a38a GetEnvironmentVariableW 66721->66723 66725 b2a30c GetUserNameW 66722->66725 66723->66719 66725->66717 66753 9f6e80 66727->66753 66728->66727 66730 b2a3ff 66731 9f6e80 45 API calls 66730->66731 66732 b2a415 66731->66732 66733 9f77d0 45 API calls 66732->66733 66734 b2a421 66733->66734 66735 9f77d0 45 API calls 66734->66735 66736 b2a42d 66735->66736 66737 b8615a _ValidateLocalCookies 5 API calls 66736->66737 66738 b066be 66737->66738 66738->66570 66740 9f6567 66739->66740 66741 9f656e 66740->66741 66742 9f7650 45 API calls 66740->66742 66741->66575 66743 9f65a0 std::_Locinfo::_Locinfo_ctor 66742->66743 66743->66575 66744->66580 66745->66583 66746->66636 66747->66644 66748->66659 66749->66664 66750->66668 66751->66661 66752->66665 66754 9f6ee0 66753->66754 66758 9f6e9f std::_Locinfo::_Locinfo_ctor 66753->66758 66755 9f6fe5 66754->66755 66756 9f6ef1 66754->66756 66766 9f7060 45 API calls std::_Locinfo::_Locinfo_ctor 66755->66766 66759 9f7650 45 API calls 66756->66759 66758->66730 66762 9f6f28 std::_Locinfo::_Locinfo_ctor 66759->66762 66763 9f6f98 std::_Locinfo::_Locinfo_ctor 66762->66763 66767 b8af1f 45 API calls 2 library calls 66762->66767 66763->66730 66764->66725 66765->66723 66766->66762 65987 b114d0 65988 9f9e50 57 API calls 65987->65988 65992 b11525 65988->65992 65989 b11f4f 65990 9f9b10 2 API calls 65989->65990 65991 b11f59 65990->65991 65992->65989 65993 9f9e50 57 API calls 65992->65993 65994 b11564 65993->65994 65994->65989 65995 9f9e50 57 API calls 65994->65995 65997 b11582 65995->65997 65996 b11681 65998 9f9e50 57 API calls 65996->65998 65997->65989 65997->65996 66057 af39b0 126 API calls 65997->66057 66038 b116be __Getctype 65998->66038 66000 b115b3 66001 a0b330 46 API calls 66000->66001 66002 b115c0 66001->66002 66006 a0b330 46 API calls 66002->66006 66003 b11bf5 66074 b30810 6 API calls 66003->66074 66004 b86199 std::_Facet_Register 3 API calls 66004->66038 66008 b11618 66006->66008 66007 b11c3d 66009 b11c43 66007->66009 66011 b11cf7 CreateThread 66007->66011 66012 b11cca CreateEventW 66007->66012 66058 b12090 126 API calls 66008->66058 66013 b11dac CloseHandle 66009->66013 66035 b11c4e 66009->66035 66014 b11d24 66011->66014 66015 b11d2b WaitForSingleObject GetExitCodeThread 66011->66015 66078 b2f930 312 API calls 66011->66078 66016 b11ce1 66012->66016 66013->66035 66014->66015 66017 b11d43 66015->66017 66018 b11d6b 66015->66018 66016->66011 66017->66009 66021 b11d59 CloseHandle 66017->66021 66018->66009 66022 b11d7a CloseHandle 66018->66022 66019 b11dd8 66023 adc9e0 14 API calls 66019->66023 66020 b11dce CloseHandle 66020->66019 66021->66009 66022->66009 66034 b11e0c 66023->66034 66024 b11e8b 66026 b8f5b6 ___vcrt_freefls@4 14 API calls 66024->66026 66029 b11e9f 66024->66029 66025 b117cc 66026->66029 66027 b11f43 66075 a02970 RaiseException 66027->66075 66030 b8615a _ValidateLocalCookies 5 API calls 66029->66030 66031 b11f2f 66030->66031 66034->66024 66034->66027 66051 b2f6d0 66034->66051 66035->66019 66035->66020 66036 9f9e50 57 API calls 66036->66038 66037 aefde0 58 API calls 66037->66038 66038->65989 66038->66003 66038->66004 66038->66025 66038->66027 66038->66035 66038->66036 66038->66037 66040 a0b330 46 API calls 66038->66040 66048 b11a75 __Getctype 66038->66048 66049 af4920 166 API calls 66038->66049 66059 b2f7b0 66038->66059 66065 af39b0 126 API calls 66038->66065 66066 b2f850 CreateFileW 66038->66066 66073 aef300 47 API calls __Getctype 66038->66073 66039 aefde0 58 API calls 66039->66048 66040->66038 66042 b11a9e FindFirstFileW 66043 b11ae2 FindClose 66042->66043 66042->66048 66043->66048 66045 a0b330 46 API calls 66045->66048 66046 b2f850 313 API calls 66046->66048 66047 b11c57 66047->66035 66048->66038 66048->66039 66048->66042 66048->66045 66048->66046 66048->66047 66049->66038 66052 b2f710 66051->66052 66053 b2f745 66052->66053 66054 b2f734 FreeLibrary 66052->66054 66055 b2f788 CloseHandle 66053->66055 66056 b2f799 66053->66056 66054->66053 66055->66056 66056->66034 66057->66000 66058->65996 66060 b2f7b9 66059->66060 66061 b2f7be LoadLibraryW 66059->66061 66060->66038 66062 b2f7d7 66061->66062 66063 b2f7f1 66062->66063 66064 b2f7f7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 66062->66064 66063->66038 66064->66038 66065->66038 66068 b2f87d 66066->66068 66067 b2f8f9 66067->66038 66068->66067 66069 9f9b10 2 API calls 66068->66069 66070 b2f92b 66069->66070 66076 b2f940 312 API calls ___vcrt_freefls@4 66070->66076 66072 b2f939 66072->66038 66073->66038 66074->66007 66077 b30bd0 RaiseException 66074->66077 66075->65989 66076->66072 66768 b85d0d GetProcessHeap HeapAlloc 66769 b85d29 66768->66769 66770 b85d25 66768->66770 66778 b85a9f 66769->66778 66772 b85d34 66773 b85d50 66772->66773 66774 b85d44 66772->66774 66792 b85bab 15 API calls __Getctype 66773->66792 66776 b85d5d GetProcessHeap HeapFree 66774->66776 66777 b85d6e 66774->66777 66776->66770 66779 b85ab9 LoadLibraryExA 66778->66779 66780 b85aac DecodePointer 66778->66780 66781 b85ad2 66779->66781 66782 b85b4a 66779->66782 66780->66772 66793 b85b4f GetProcAddress EncodePointer 66781->66793 66782->66772 66784 b85ae2 66784->66782 66794 b85b4f GetProcAddress EncodePointer 66784->66794 66786 b85af9 66786->66782 66795 b85b4f GetProcAddress EncodePointer 66786->66795 66788 b85b10 66788->66782 66796 b85b4f GetProcAddress EncodePointer 66788->66796 66790 b85b27 66790->66782 66791 b85b2e DecodePointer 66790->66791 66791->66782 66792->66774 66793->66784 66794->66786 66795->66788 66796->66790 66797 ab1fb0 GetSystemDirectoryW 66798 ab20bb 66797->66798 66799 ab1fff 66797->66799 66800 b8615a _ValidateLocalCookies 5 API calls 66798->66800 66799->66798 66801 9f9e50 57 API calls 66799->66801 66802 ab210b 66800->66802 66803 ab200f 66801->66803 66804 ab2113 66803->66804 66806 ab2019 66803->66806 66805 9f9b10 2 API calls 66804->66805 66807 ab211d 66805->66807 66808 ab2043 66806->66808 66809 ab2035 66806->66809 66810 b86199 std::_Facet_Register 3 API calls 66807->66810 66823 9f99c0 46 API calls 3 library calls 66808->66823 66822 9f9390 56 API calls 66809->66822 66812 ab2272 66810->66812 66824 a078a0 45 API calls std::_Facet_Register 66812->66824 66813 ab2041 66817 a0a950 144 API calls 66813->66817 66815 ab22ba 66818 ab2082 66817->66818 66819 a0a950 144 API calls 66818->66819 66820 ab20a9 _wcschr 66819->66820 66820->66798 66821 ab20bf LoadLibraryExW 66820->66821 66821->66798 66822->66813 66823->66813 66824->66815 66079 b83814 66105 b83575 66079->66105 66081 b83824 66082 b83881 66081->66082 66089 b838a5 66081->66089 66114 b837b2 6 API calls 2 library calls 66082->66114 66084 b8388c RaiseException 66085 b83a7a 66084->66085 66086 b8391d LoadLibraryExA 66087 b8397e 66086->66087 66088 b83930 GetLastError 66086->66088 66090 b83989 FreeLibrary 66087->66090 66094 b83990 66087->66094 66091 b83959 66088->66091 66092 b83943 66088->66092 66089->66086 66089->66087 66089->66094 66100 b83a4c 66089->66100 66090->66094 66115 b837b2 6 API calls 2 library calls 66091->66115 66092->66087 66092->66091 66093 b839ee GetProcAddress 66096 b839fe GetLastError 66093->66096 66093->66100 66094->66093 66094->66100 66098 b83a11 66096->66098 66097 b83964 RaiseException 66097->66085 66098->66100 66116 b837b2 6 API calls 2 library calls 66098->66116 66117 b837b2 6 API calls 2 library calls 66100->66117 66102 b83a32 RaiseException 66103 b83575 ___delayLoadHelper2@8 6 API calls 66102->66103 66104 b83a49 66103->66104 66104->66100 66106 b83581 66105->66106 66107 b835a7 66105->66107 66118 b8361b GetModuleHandleW GetProcAddress GetProcAddress DloadGetSRWLockFunctionPointers 66106->66118 66107->66081 66109 b835a2 66120 b835a8 GetModuleHandleW GetProcAddress GetProcAddress 66109->66120 66110 b83586 66110->66109 66119 b83744 VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 66110->66119 66113 b837ed 66113->66081 66114->66084 66115->66097 66116->66102 66117->66085 66118->66110 66119->66109 66120->66113 66121 addda0 66122 adddd9 66121->66122 66123 adde42 RegCreateKeyExW 66121->66123 66124 adddde GetModuleHandleW 66122->66124 66125 adde35 66122->66125 66126 adde3b 66123->66126 66127 addded 66124->66127 66128 adde06 GetProcAddress 66124->66128 66125->66123 66125->66126 66129 adde74 66126->66129 66131 adde6b RegCloseKey 66126->66131 66128->66126 66130 adde16 66128->66130 66130->66126 66131->66129 66132 ad7fe0 66133 ad8057 66132->66133 66134 ad8017 66132->66134 66135 b86662 6 API calls 66134->66135 66136 ad8021 66135->66136 66136->66133 66140 b8651a 45 API calls 66136->66140 66138 ad8043 66141 b86618 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 66138->66141 66140->66138 66141->66133 66825 aeec30 66826 9f6540 45 API calls 66825->66826 66827 aeecaa 66826->66827 66853 aef140 66827->66853 66830 aeecf3 66832 9f77d0 45 API calls 66830->66832 66831 9f77d0 45 API calls 66831->66830 66834 aeed2c 66832->66834 66833 aeedf0 66868 abd900 66833->66868 66834->66833 66836 aeed49 66834->66836 66837 aeed65 66834->66837 66879 9f6b00 45 API calls 66836->66879 66838 9f6540 45 API calls 66837->66838 66841 aeed58 66838->66841 66839 aeee1c 66842 b8615a _ValidateLocalCookies 5 API calls 66839->66842 66880 9f8e50 45 API calls 66841->66880 66843 aeee3c 66842->66843 66845 aeed8d 66846 9f6e80 45 API calls 66845->66846 66847 aeedac 66846->66847 66848 9f77d0 45 API calls 66847->66848 66849 aeedb8 66848->66849 66850 aeedd4 66849->66850 66851 9f77d0 45 API calls 66849->66851 66850->66833 66852 9f77d0 45 API calls 66850->66852 66851->66850 66852->66833 66854 aef1a8 66853->66854 66855 aef193 66853->66855 66857 aef1c5 66854->66857 66858 aef1b0 66854->66858 66856 9f7070 45 API calls 66855->66856 66866 aeece0 66856->66866 66860 aef1cd 66857->66860 66861 aef1e2 66857->66861 66859 9f7070 45 API calls 66858->66859 66859->66866 66862 9f7070 45 API calls 66860->66862 66863 aef1ea 66861->66863 66865 aef1ff 66861->66865 66862->66866 66864 9f7070 45 API calls 66863->66864 66864->66866 66865->66866 66867 9f7070 45 API calls 66865->66867 66866->66830 66866->66831 66867->66866 66869 abd939 66868->66869 66870 abd998 RegOpenKeyExW 66868->66870 66871 abd98b 66869->66871 66872 abd93e GetModuleHandleW 66869->66872 66873 abd991 66870->66873 66871->66870 66871->66873 66874 abd94d 66872->66874 66875 abd966 GetProcAddress 66872->66875 66876 abd9c0 66873->66876 66878 abd9b7 RegCloseKey 66873->66878 66874->66839 66875->66873 66877 abd976 66875->66877 66876->66839 66877->66873 66878->66876 66879->66841 66880->66845 66142 9f86d0 66147 b83cf9 66142->66147 66152 b83aca 45 API calls std::invalid_argument::invalid_argument 66147->66152 66149 b83d0a 66150 b87f9e Concurrency::cancel_current_task RaiseException 66149->66150 66151 b83d18 66150->66151 66152->66149
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    • SetEvent.KERNEL32(?,?,00000000,?,00000001), ref: 00B07F67
    • SetEvent.KERNEL32(?), ref: 00B07FC5
      • Part of subcall function 00B12AB0: DeleteFileW.KERNEL32(?,00000000,00000000,?,00000000,80004005,?,?,?,BACC40AC), ref: 00B12ADB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: EventInit_thread_footer$DeleteFileFindHeapProcessResource
    • String ID: %hu$A valid language was received from commnad line. This is:$AI_BOOTSTRAPPERLANGS$Advinst_Extract_$Code returned to Windows by setup:$Language of a related product is:$Language selected programatically for UI:$Language used for UI:$Languages of setup:$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$Software\Caphyon\Advanced Installer\
    • API String ID: 4144826820-297406034
    • Opcode ID: af476ce2e8cf0fab6abf153049822fd090c6c5520de0b5fafe0129c010443852
    • Instruction ID: 3010ccc72c1a964592c6200bebd07649fe73d3125fba2dba7b38f70692df6b79
    • Opcode Fuzzy Hash: af476ce2e8cf0fab6abf153049822fd090c6c5520de0b5fafe0129c010443852
    • Instruction Fuzzy Hash: 3BE2A370A00649DFDB00DBA8C849BAEBBF5FF45314F1482A9E455EB2D2DB749E04CB91

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 819 b2b350-b2b37d 820 b2b395-b2b39e call 9f9e50 819->820 821 b2b37f-b2b392 819->821 824 b2b3a4-b2b3e2 call 9f8e30 820->824 825 b2b56a-b2b5b9 call 9f9b10 call 9f9e50 820->825 835 b2b3e7-b2b402 824->835 836 b2b3e4 824->836 833 b2b769-b2b76e call 9f9b10 825->833 834 b2b5bf-b2b5d6 825->834 840 b2b773-b2b78a call 9f9b10 833->840 843 b2b5e0-b2b5f3 834->843 841 b2b525 835->841 842 b2b408-b2b414 835->842 836->835 853 b2b790-b2b799 840->853 854 b2b965-b2b96a 840->854 845 b2b527-b2b530 841->845 842->841 858 b2b41a-b2b426 842->858 846 b2b602-b2b606 843->846 847 b2b5f5-b2b5ff call 9f98a0 843->847 850 b2b532 845->850 851 b2b535-b2b54a 845->851 857 b2b60e-b2b613 846->857 847->846 850->851 855 b2b554-b2b567 851->855 856 b2b54c-b2b54f 851->856 860 b2b802-b2b807 853->860 861 b2b79b-b2b7bd call af0f40 SetWindowTextW call a559b0 853->861 856->855 863 b2b731 857->863 864 b2b619-b2b61b 857->864 866 b2b42b-b2b441 858->866 867 b2b428 858->867 860->854 865 b2b80d-b2b81a 860->865 883 b2b7c2-b2b7e2 GetDlgItem SendMessageW 861->883 870 b2b733-b2b74b 863->870 864->863 869 b2b621-b2b634 call b8f76b 864->869 871 b2b877-b2b87f 865->871 872 b2b81c-b2b84f GetDlgItem * 2 SendMessageW 865->872 886 b2b443-b2b445 866->886 887 b2b44a-b2b46b 866->887 867->866 869->840 891 b2b63a-b2b640 869->891 875 b2b755-b2b768 870->875 876 b2b74d-b2b750 870->876 880 b2b881-b2b8a1 EndDialog 871->880 881 b2b8a4-b2b8ac 871->881 877 b2b851-b2b853 872->877 878 b2b855-b2b859 872->878 876->875 885 b2b85a-b2b872 SendMessageW 877->885 878->885 881->854 882 b2b8b2-b2b8c5 GetDlgItem 881->882 888 b2b8c7-b2b8d3 GetWindowTextLengthW 882->888 889 b2b93c-b2b93f call 9f9710 882->889 890 b2b7e6-b2b7ff SetFocus 883->890 885->890 892 b2b515-b2b51e 886->892 901 b2b474-b2b4a2 call b02440 887->901 902 b2b46d-b2b46f 887->902 895 b2b8d9-b2b8eb 888->895 896 b2b96d-b2b98d call 9f9b10 call b2b9a0 888->896 900 b2b944-b2b962 KiUserCallbackDispatcher 889->900 891->840 897 b2b646-b2b659 call 9f9e50 891->897 892->845 898 b2b520-b2b523 892->898 903 b2b8f9-b2b907 GetWindowTextW 895->903 904 b2b8ed-b2b8f6 call 9f98a0 895->904 925 b2b99a-b2b99d 896->925 926 b2b98f-b2b997 call b86168 896->926 897->833 919 b2b65f-b2b687 897->919 898->845 929 b2b4a4-b2b4b3 call b86a15 901->929 930 b2b4b5-b2b4ef call 9f9e50 call 9febe0 call a0b330 901->930 902->892 910 b2b922-b2b924 903->910 911 b2b909-b2b90e 903->911 904->903 910->896 920 b2b926-b2b92c 910->920 917 b2b910-b2b912 911->917 918 b2b914-b2b920 call b8f76b 911->918 917->920 918->910 932 b2b696-b2b6b7 call b8f76b 919->932 933 b2b689-b2b693 call 9f98a0 919->933 920->896 923 b2b92e-b2b93a 920->923 923->900 926->925 943 b2b508-b2b50e 929->943 951 b2b4f1-b2b4f4 930->951 952 b2b4f9-b2b506 call b86a15 930->952 932->840 947 b2b6bd-b2b6c0 932->947 933->932 943->892 947->840 950 b2b6c6-b2b6dc call 9fe780 947->950 957 b2b702-b2b707 950->957 958 b2b6de-b2b6ef 950->958 951->952 952->943 961 b2b712-b2b723 957->961 962 b2b709-b2b70d call a0b330 957->962 959 b2b6f1-b2b6f4 958->959 960 b2b6f9-b2b6fd 958->960 959->960 960->843 963 b2b725-b2b728 961->963 964 b2b72d-b2b72f 961->964 962->961 963->964 964->870
    Strings
    • PackageCode, xrefs: 00B2B69B
    • SELECT `Value` FROM `Property` WHERE `Property` = '%s', xrefs: 00B2B3BE
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: PackageCode$SELECT `Value` FROM `Property` WHERE `Property` = '%s'
    • API String ID: 0-2409377028
    • Opcode ID: 8555520dd175609bb70e9c2f238223d02e62daf4ca16c527984b4761d77d5550
    • Instruction ID: 3f30ebf2c1a31ddadfa60e7be00965707f1ce07071e60b31f853baf6dc95b3ba
    • Opcode Fuzzy Hash: 8555520dd175609bb70e9c2f238223d02e62daf4ca16c527984b4761d77d5550
    • Instruction Fuzzy Hash: CF12D271A00219DFDB14DF68EC49FAEBBE8EF44310F1441A9F919AB2A2DB759D01CB50
    APIs
    • FindClose.KERNEL32(00000000), ref: 00A0AA5F
    • PathIsUNCW.SHLWAPI(00000001,*.*), ref: 00A0AAC3
    • FindFirstFileW.KERNEL32(00000001,?,*.*), ref: 00A0AD0C
    • GetFullPathNameW.KERNEL32(00000001,00000000,00000000,00000000), ref: 00A0AD26
    • GetFullPathNameW.KERNEL32(00000001,00000000,00000000,00000000), ref: 00A0AD5A
    • FindClose.KERNEL32(00000000), ref: 00A0ADCB
    • SetLastError.KERNEL32(0000007B), ref: 00A0ADD5
    • PathIsUNCW.SHLWAPI(?,?,BACC40AC,?,00000000), ref: 00A0B00E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Path$Find$CloseFullName$ErrorFileFirstLast
    • String ID: *.*$\\?\$\\?\UNC\
    • API String ID: 2310598285-1700010636
    • Opcode ID: b513c3d895995c42d2868f8f337e60dab246c6ba2c2abbf77d09bd09f13ce83b
    • Instruction ID: acea22e5675d618b95a1e8a61ebf705935d13dc710dd13ce1afb0a2d7d07e8cf
    • Opcode Fuzzy Hash: b513c3d895995c42d2868f8f337e60dab246c6ba2c2abbf77d09bd09f13ce83b
    • Instruction Fuzzy Hash: B262F431A0060A9FDB14DF68D989BAEB7B5FF94314F148668E815DB3E1DB31AD00CB91

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1214 b1eab0-b1eb0d GetCurrentProcess OpenProcessToken 1216 b1eb1c-b1eb3d GetTokenInformation 1214->1216 1217 b1eb0f-b1eb17 GetLastError 1214->1217 1219 b1eb6b-b1eb6f 1216->1219 1220 b1eb3f-b1eb48 GetLastError 1216->1220 1218 b1ebda-b1ebed 1217->1218 1221 b1ebfd-b1ec19 call b8615a 1218->1221 1222 b1ebef-b1ebf6 CloseHandle 1218->1222 1224 b1ebbe GetLastError 1219->1224 1225 b1eb71-b1eba0 AllocateAndInitializeSid 1219->1225 1223 b1eb4a-b1eb69 call b12c10 GetTokenInformation 1220->1223 1220->1224 1222->1221 1223->1219 1223->1224 1226 b1ebc4 1224->1226 1225->1226 1229 b1eba2-b1ebbc EqualSid FreeSid 1225->1229 1230 b1ebc6-b1ebd3 call b86a15 1226->1230 1229->1230 1230->1218
    APIs
    • GetCurrentProcess.KERNEL32 ref: 00B1EAF8
    • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00B1EB05
    • GetLastError.KERNEL32 ref: 00B1EB0F
    • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 00B1EB39
    • GetLastError.KERNEL32 ref: 00B1EB3F
    • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,?,?,?), ref: 00B1EB65
    • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00B1EB98
    • EqualSid.ADVAPI32(00000000,?), ref: 00B1EBA7
    • FreeSid.ADVAPI32(?), ref: 00B1EBB6
    • CloseHandle.KERNEL32(00000000), ref: 00B1EBF0
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Token$ErrorInformationLastProcess$AllocateCloseCurrentEqualFreeHandleInitializeOpen
    • String ID:
    • API String ID: 695978879-0
    • Opcode ID: 25f753f89b36aeb539f3ac9351253fa5056a9032785fad0f60d9f197fca4a747
    • Instruction ID: 97fd60df16a244ec721d1375533171bf561cacdc2fefcc00a27ee3d9c8ff07ba
    • Opcode Fuzzy Hash: 25f753f89b36aeb539f3ac9351253fa5056a9032785fad0f60d9f197fca4a747
    • Instruction Fuzzy Hash: E4413871904209EBDF109FA0CD89BEEBBF8FF08318F504055E912B32A0DB759A49DB64
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$HeapProcess
    • String ID:
    • API String ID: 275895251-0
    • Opcode ID: 168aa56858333730f103b008223c3debf89f48b38bb40d2a5a2bf61433704468
    • Instruction ID: f9df1818bb41378f5ea4c12d02ec28cd308d050351a050a8f1e0711a2d0d5643
    • Opcode Fuzzy Hash: 168aa56858333730f103b008223c3debf89f48b38bb40d2a5a2bf61433704468
    • Instruction Fuzzy Hash: 6062BE70A00649CFDB10CFA8C984BDEBBF5FF45314F1486A9E515AB291DB70AE85CB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1590 b14050-b14096 call 9f9e50 1593 b1414b-b14185 call 9f9b10 MsgWaitForMultipleObjectsEx 1590->1593 1594 b1409c-b140e6 GetLocaleInfoW call ad5030 1590->1594 1598 b141f1-b141fa 1593->1598 1599 b14187-b14199 1593->1599 1605 b140f6-b1412d GetLocaleInfoW call 9f8e30 1594->1605 1606 b140e8-b140f3 call 9f97c0 1594->1606 1601 b141a0-b141a3 1599->1601 1603 b141a5-b141cb PeekMessageW 1601->1603 1604 b141fb-b14204 1601->1604 1609 b141db-b141ef MsgWaitForMultipleObjectsEx 1603->1609 1610 b141cd-b141d9 TranslateMessage DispatchMessageW 1603->1610 1613 b14137-b1414a 1605->1613 1614 b1412f-b14132 1605->1614 1606->1605 1609->1598 1609->1601 1610->1609 1614->1613
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • GetLocaleInfoW.KERNEL32(?,00000002,00C1337C,00000000), ref: 00B140C1
    • GetLocaleInfoW.KERNEL32(?,00000002,00B13B85,-00000001,00000078,-00000001), ref: 00B140FD
    • MsgWaitForMultipleObjectsEx.USER32(00000001,?,000000FF,000005FF,00000004), ref: 00B14181
    • PeekMessageW.USER32(?,00000000), ref: 00B141C7
    • TranslateMessage.USER32(00000000), ref: 00B141D2
    • DispatchMessageW.USER32(00000000), ref: 00B141D9
    • MsgWaitForMultipleObjectsEx.USER32(00000001,00000000,000000FF,000005FF,00000004), ref: 00B141EB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Message$InfoInit_thread_footerLocaleMultipleObjectsWait$DispatchHeapPeekProcessTranslate
    • String ID: %d-%s
    • API String ID: 445213441-1781338863
    • Opcode ID: f4e635cfb0c9626aee84970442de1f86a22dbabca83107a07b3c7354de74a8d5
    • Instruction ID: dbb1c11e53d05f5cffd06240e218d920fe0b6c5c24ae551b69baf1870b80dea8
    • Opcode Fuzzy Hash: f4e635cfb0c9626aee84970442de1f86a22dbabca83107a07b3c7354de74a8d5
    • Instruction Fuzzy Hash: 0A510471A00209ABD710DF94CC49FAFBBE8FF49724F504669F614A72C0DB719945CBA0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1734 b2a240-b2a2d2 GetUserNameW 1735 b2a2d4-b2a2dd GetLastError 1734->1735 1736 b2a31e-b2a35c GetEnvironmentVariableW 1734->1736 1735->1736 1737 b2a2df-b2a2e7 1735->1737 1738 b2a3a2-b2a3ac 1736->1738 1739 b2a35e-b2a363 1736->1739 1744 b2a2e9-b2a2fd 1737->1744 1745 b2a2ff-b2a307 call a23200 1737->1745 1742 b2a3b7-b2a3bd 1738->1742 1743 b2a3ae-b2a3b5 1738->1743 1740 b2a365-b2a379 1739->1740 1741 b2a37b-b2a385 call a23200 1739->1741 1746 b2a38a-b2a39c GetEnvironmentVariableW 1740->1746 1741->1746 1748 b2a3c0-b2a3db 1742->1748 1743->1748 1749 b2a30c-b2a31c GetUserNameW 1744->1749 1745->1749 1746->1738 1751 b2a3ea-b2a449 call 9f6e80 * 2 call 9f77d0 * 2 call b8615a 1748->1751 1752 b2a3dd-b2a3e5 call 9f7070 1748->1752 1749->1736 1752->1751
    APIs
    • GetUserNameW.ADVAPI32(00000000,?), ref: 00B2A2CE
    • GetLastError.KERNEL32 ref: 00B2A2D4
    • GetUserNameW.ADVAPI32(00000000,?), ref: 00B2A31C
    • GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 00B2A352
    • GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000,00000000,00000000), ref: 00B2A39C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: EnvironmentNameUserVariable$ErrorLast
    • String ID: UserDomain
    • API String ID: 3567734997-2275544873
    • Opcode ID: 36cb19c6cd29f0cb1b7f557088eab20e1efd3cb95504b4757d4f90890e25b28e
    • Instruction ID: 0482367e55e3973774d38f87f55214cc2554bd24b08e80b759d04abc412707fb
    • Opcode Fuzzy Hash: 36cb19c6cd29f0cb1b7f557088eab20e1efd3cb95504b4757d4f90890e25b28e
    • Instruction Fuzzy Hash: 05612671A00218DFDF14DFA8D854BEEBBF4FF48304F144129E405A7680DB75AA49CBA5
    APIs
    • LoadLibraryW.KERNEL32(ComCtl32.dll,BACC40AC,00000000,?,00000000), ref: 00AF238E
    • GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00AF23B1
    • FreeLibrary.KERNEL32(00000000), ref: 00AF242F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Library$AddressFreeLoadProc
    • String ID: ComCtl32.dll$LoadIconMetric
    • API String ID: 145871493-764666640
    • Opcode ID: 31f2597153eb9c1a80d7d6da14bae7ee4f19dcef3dd5546670860a1c4d7f62fc
    • Instruction ID: 8aaa706f826b2299c9e8374cb2f7bae5b344371886fcc65d4378eeb9b873d974
    • Opcode Fuzzy Hash: 31f2597153eb9c1a80d7d6da14bae7ee4f19dcef3dd5546670860a1c4d7f62fc
    • Instruction Fuzzy Hash: A13196B1A00259ABDF158FA5DC44BBFBFF8EB48754F01422AF915A7280D7B98D04CB90
    APIs
    • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00AB1FF1
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • _wcschr.LIBVCRUNTIME ref: 00AB20AF
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    • LoadLibraryExW.KERNEL32(?,00000000,00000000,-00000010), ref: 00AB20C4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$DirectoryFindHeapLibraryLoadProcessResourceSystem_wcschr
    • String ID: Kernel32.dll
    • API String ID: 1122257418-1926710522
    • Opcode ID: 74c947cda6cb3d9d904189f41b40d9ef7290ef92abdf169082902c4de955796d
    • Instruction ID: 9aa294327bee3edec810190f1f154341ff5bb440f4d34dab416e68677e830024
    • Opcode Fuzzy Hash: 74c947cda6cb3d9d904189f41b40d9ef7290ef92abdf169082902c4de955796d
    • Instruction Fuzzy Hash: 68A17BB0900645EFE714DF68C818B9ABBF4FF04318F10865DE4199B681D7BAAA18CF91
    APIs
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B1CA6A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: DiskFreeSpace
    • String ID: \$\$\
    • API String ID: 1705453755-3791832595
    • Opcode ID: d38a5afa1057374d02f17f6b230d2709f6be9e2d099b4c4f637e9d9571ff3c01
    • Instruction ID: 21ec6c04082d817828565b5304acd691419988a6ee1840d0089ee873e084e8fb
    • Opcode Fuzzy Hash: d38a5afa1057374d02f17f6b230d2709f6be9e2d099b4c4f637e9d9571ff3c01
    • Instruction Fuzzy Hash: CB41F422DA02598ACB31DF2484416EBBBE4FF94354F954AAEE8CC93144E7308DC583C6
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000008,?,00A00DC7), ref: 00B85D12
    • HeapAlloc.KERNEL32(00000000), ref: 00B85D19
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B85D5F
    • HeapFree.KERNEL32(00000000), ref: 00B85D66
      • Part of subcall function 00B85BAB: GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,00B85D55,00000000), ref: 00B85BCF
      • Part of subcall function 00B85BAB: HeapAlloc.KERNEL32(00000000,?,00B85D55,00000000), ref: 00B85BD6
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$Process$Alloc$Free
    • String ID:
    • API String ID: 1864747095-0
    • Opcode ID: a10627c2e230d9dbd1a71da456140a4df22a7d2b306de11ecf358258dca05059
    • Instruction ID: c051c477a89fc41e46e23044ddcff5b10518d6717c6b8377508f9a73896c22a8
    • Opcode Fuzzy Hash: a10627c2e230d9dbd1a71da456140a4df22a7d2b306de11ecf358258dca05059
    • Instruction Fuzzy Hash: 93F03072644E1697CB753BB87C4CF5F2AE9EB8475171280A8F996C6264DE60C805CB60
    APIs
    • FindFirstFileW.KERNEL32(?,00000000,?,?,00000000), ref: 00AF444F
    • FindClose.KERNEL32(00000000), ref: 00AF44AE
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Find$AllocateCloseFileFirstHeap
    • String ID:
    • API String ID: 1673784098-0
    • Opcode ID: 071b4f123f5befb002268068c2542569506cf1d41bd819c4af91e6398ab1aa50
    • Instruction ID: 12ebda7b426071c44bfbcf754a2a23151e336cc5e5618ece2be1150f0d6b7a3b
    • Opcode Fuzzy Hash: 071b4f123f5befb002268068c2542569506cf1d41bd819c4af91e6398ab1aa50
    • Instruction Fuzzy Hash: 2931F074905618CBCB28DF94C888B7AB7B4FB48315F20829AEA59A7380D7315D44CB90
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$HeapProcess
    • String ID:
    • API String ID: 275895251-0
    • Opcode ID: 7e0e6ead53376437bfd6891197f3445d4688b3a4982f8a71d07c65dcded5b245
    • Instruction ID: 9e1b56f3ca45799218f8c9802b62fd5a2b0f1a0b840e099657e7059ebc2996e0
    • Opcode Fuzzy Hash: 7e0e6ead53376437bfd6891197f3445d4688b3a4982f8a71d07c65dcded5b245
    • Instruction Fuzzy Hash: 93E16B30A006099FDB14DFA8C888BEEB7F4FF44324F5485A9E915AB291EB74AD45CB50
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1201570d9616b56bf780742e28f7587a9c2ee9813efe9789150c0ec7afb0a7c4
    • Instruction ID: 56a681fd9ac7ab5f2d56019a5c0dd5369397e9dde67a1b41d4a1e9d1936fbaa4
    • Opcode Fuzzy Hash: 1201570d9616b56bf780742e28f7587a9c2ee9813efe9789150c0ec7afb0a7c4
    • Instruction Fuzzy Hash: 6E414B32A01649DBDF24DFA8C959BAEB3B4FF50320F548229F9159B2D1EB709E04CB50
    APIs
    • CreateNamedPipeW.KERNEL32(?,00000003,00000006,000000FF,00007F90,00007F90,00001388,00000000,?,BACC40AC,BACC40AC,?,?,?,00000000,00BF6015), ref: 00B2BBA8
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000,?,BACC40AC,BACC40AC,?,?,?,00000000,00BF6015,000000FF), ref: 00B2BBCA
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Create$FileNamedPipe
    • String ID:
    • API String ID: 1328467360-0
    • Opcode ID: 8af4b7706b205f05e2a92dcefd6a109f8b7313aaabe5868113d2ee9455032d59
    • Instruction ID: 5c95b7ce56e28a099ffee9eee1d929ab31deb2fa8cc4e6bc8813a770257681b6
    • Opcode Fuzzy Hash: 8af4b7706b205f05e2a92dcefd6a109f8b7313aaabe5868113d2ee9455032d59
    • Instruction Fuzzy Hash: D331F531584745AFD7208F14DC01F9ABBE4EB05720F10865EFDA95B6D0CB71A900CB54
    APIs
      • Part of subcall function 00AF2890: __Init_thread_footer.LIBCMT ref: 00AF2970
    • CoCreateInstance.COMBASE(00C131D8,00000000,00000001,00C2F490,000000B0), ref: 00B36DCE
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CreateInit_thread_footerInstance
    • String ID:
    • API String ID: 3436645735-0
    • Opcode ID: 42167a47190887f48de24a8c81bbb96a17fa314b931026f538de10e7cd8bb73d
    • Instruction ID: e6468eac2dfe9abfa31d126c4cab517e92043faacca3cf182d3d8c8b6811e3b5
    • Opcode Fuzzy Hash: 42167a47190887f48de24a8c81bbb96a17fa314b931026f538de10e7cd8bb73d
    • Instruction Fuzzy Hash: C511C071604745EFDB20CF58D804B9ABBF8EB05B14F10466EF8159B7C0C7B6A504CB90
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$CreateHeapInstanceProcess
    • String ID:
    • API String ID: 3807588171-0
    • Opcode ID: f4ffa1df6700c1a381870c55edaf65be3727a90e443d252ec905019d22e344f0
    • Instruction ID: 1c9d42dea51af4c08b12cb39181ac2878dd6a884b9ba739e086b90744caacb96
    • Opcode Fuzzy Hash: f4ffa1df6700c1a381870c55edaf65be3727a90e443d252ec905019d22e344f0
    • Instruction Fuzzy Hash: 926155B1500708CFE710CF68C44839ABBF4FF45318F248AADD58A9B782D7B5A609CB91

    Control-flow Graph

    APIs
    • RegOpenKeyExW.KERNEL32(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 00AF2C0E
    • RegQueryValueExW.KERNEL32(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 00AF2C55
    • RegQueryValueExW.KERNEL32(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 00AF2C74
    • RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 00AF2CA3
    • RegQueryValueExW.KERNEL32(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 00AF2D18
    • RegQueryValueExW.ADVAPI32(00000000,BuildBranch,00000000,00000000,?,?), ref: 00AF2D81
    • RegQueryValueExW.KERNEL32(00000000,ReleaseId,00000000,00000000,?,?), ref: 00AF2DE4
    • RegQueryValueExW.KERNEL32(00000000,CSDVersion,00000000,00000000,?,?), ref: 00AF2E36
    • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00AF2ED3
    • GetProcAddress.KERNEL32(00000000), ref: 00AF2EDA
    • __Init_thread_footer.LIBCMT ref: 00AF2EEE
    • GetCurrentProcess.KERNEL32(?), ref: 00AF2F11
    • IsWow64Process.KERNEL32(00000000), ref: 00AF2F18
    • RegCloseKey.ADVAPI32(00000000), ref: 00AF2F52
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: QueryValue$Process$AddressCloseCurrentHandleInit_thread_footerModuleOpenProcWow64
    • String ID: BuildBranch$CSDVersion$CurrentBuildNumber$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$IsWow64Process$ReleaseId$Software\Microsoft\Windows NT\CurrentVersion$co_release$kernel32$rs_prerelease
    • API String ID: 1906320730-525127412
    • Opcode ID: f63835decc02a851a2f658d0ee3e5c9d45585784feb40e43a32b638304a3b17c
    • Instruction ID: 8f9f9c0e6d7069a06ab8be3b1a2199b53359a6bfabcdf6b689846c2c55251bf3
    • Opcode Fuzzy Hash: f63835decc02a851a2f658d0ee3e5c9d45585784feb40e43a32b638304a3b17c
    • Instruction Fuzzy Hash: EAA15F7190062CDFDB20DF60DD49BAEBBF8FB04705F1141AAF549A6190EB749A88CF94

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 51 af2f80-af2ff8 RegOpenKeyExW 53 af2ffe-af302f RegQueryValueExW 51->53 54 af3262-af327b 51->54 57 af307f-af30aa RegQueryValueExW 53->57 58 af3031-af3043 call af9180 53->58 55 af328e-af32a9 call b8615a 54->55 56 af327d-af3284 RegCloseKey 54->56 56->55 57->54 59 af30b0-af30c1 57->59 67 af3045-af3052 58->67 68 af3054-af306b call af9180 58->68 62 af30cd-af30cf 59->62 63 af30c3-af30cb 59->63 62->54 66 af30d5-af30dc 62->66 63->62 63->63 69 af30e0-af30ee call af9180 66->69 70 af307a 67->70 75 af306d 68->75 76 af3072-af3078 68->76 77 af30f9-af3107 call af9180 69->77 78 af30f0-af30f4 69->78 70->57 75->76 76->70 83 af3109-af310d 77->83 84 af3112-af3120 call af9180 77->84 79 af3234 78->79 82 af323b-af3248 79->82 85 af325a-af325c 82->85 86 af324a 82->86 83->79 90 af312b-af3139 call af9180 84->90 91 af3122-af3126 84->91 85->54 85->69 87 af3250-af3258 86->87 87->85 87->87 94 af313b-af313f 90->94 95 af3144-af3152 call af9180 90->95 91->79 94->79 98 af315d-af316b call af9180 95->98 99 af3154-af3158 95->99 102 af316d-af3171 98->102 103 af3176-af3184 call af9180 98->103 99->79 102->79 106 af318f-af319d call af9180 103->106 107 af3186-af318a 103->107 110 af319f-af31a4 106->110 111 af31a9-af31b7 call af9180 106->111 107->79 112 af3231 110->112 115 af31b9-af31be 111->115 116 af31c0-af31ce call af9180 111->116 112->79 115->112 119 af31d7-af31e5 call af9180 116->119 120 af31d0-af31d5 116->120 123 af31ee-af31fc call af9180 119->123 124 af31e7-af31ec 119->124 120->112 127 af31fe-af3203 123->127 128 af3205-af3213 call af9180 123->128 124->112 127->112 131 af321c-af322a call af9180 128->131 132 af3215-af321a 128->132 131->82 135 af322c 131->135 132->112 135->112
    APIs
    • RegOpenKeyExW.KERNEL32(80000002,SYSTEM\CurrentControlSet\Control\ProductOptions,00000000,00020119,00000000), ref: 00AF2FF0
    • RegQueryValueExW.KERNEL32(00000000,ProductType,00000000,00000000,?), ref: 00AF302B
    • RegQueryValueExW.KERNEL32(00000000,ProductSuite,00000000,00000000,?,?), ref: 00AF30A6
    • RegCloseKey.KERNEL32(00000000), ref: 00AF327E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: QueryValue$CloseOpen
    • String ID: BackOffice$Blade$CommunicationServer$Compute Server$DataCenter$Embedded(Restricted)$EmbeddedNT$Enterprise$Personal$ProductSuite$ProductType$SYSTEM\CurrentControlSet\Control\ProductOptions$Security Appliance$ServerNT$Small Business$Small Business(Restricted)$Storage Server$Terminal Server$WinNT
    • API String ID: 1586453840-3149529848
    • Opcode ID: 5987c6c1b2c47a6734bfb1b3ca7e6f05ceb5e6dc7ea1348b9b291f30f2dc36e8
    • Instruction ID: 22b21827824b05026340ec9ef8b67e699cd217ad44a0b50e01f07a21411f3fd9
    • Opcode Fuzzy Hash: 5987c6c1b2c47a6734bfb1b3ca7e6f05ceb5e6dc7ea1348b9b291f30f2dc36e8
    • Instruction Fuzzy Hash: FA71F57270035D9BDF209BA4DD44BFEB265EB50344F1041B5FB06AB681EB34CE498B06

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 136 b14960-b1499f 137 b149a1-b149b5 call b86662 136->137 138 b149e4-b149ef 136->138 137->138 145 b149b7-b149e1 call b14e60 call b8651a call b86618 137->145 140 b149f1-b14a05 call b86662 138->140 141 b14a34-b14a5c call af2b00 138->141 140->141 151 b14a07-b14a31 call b15750 call b8651a call b86618 140->151 149 b14b01-b14b03 141->149 150 b14a62-b14a69 141->150 145->138 152 b14b08-b14b0e 149->152 155 b14a70-b14a76 150->155 151->141 156 b14b10-b14b13 152->156 157 b14b2e-b14b30 152->157 160 b14a96-b14a98 155->160 161 b14a78-b14a7b 155->161 163 b14b15-b14b1d 156->163 164 b14b2a-b14b2c 156->164 166 b14b33-b14b35 157->166 162 b14a9b-b14a9d 160->162 168 b14a92-b14a94 161->168 169 b14a7d-b14a85 161->169 170 b14c03 162->170 171 b14aa3-b14aaa call 9f9e50 162->171 163->157 172 b14b1f-b14b28 163->172 164->166 166->170 174 b14b3b-b14b44 call 9f9e50 166->174 168->162 169->160 176 b14a87-b14a90 169->176 179 b14c05-b14c27 call adc9e0 170->179 186 b14ab0-b14ace 171->186 187 b14c28-b14c2d call 9f9b10 171->187 172->152 172->164 174->187 189 b14b4a-b14b66 174->189 176->155 176->168 194 b14ad0-b14ad9 call 9f9390 186->194 195 b14adb-b14ae2 call 9f99c0 186->195 192 b14c32-b14c3f call a02970 187->192 197 b14b73-b14b7a call 9f99c0 189->197 198 b14b68-b14b71 call 9f9390 189->198 206 b14ae7-b14afc call af1c00 194->206 195->206 204 b14b7f-b14b91 call af1c00 197->204 198->204 212 b14b94-b14ba9 204->212 206->212 213 b14bb3-b14bbc 212->213 214 b14bab-b14bae 212->214 215 b14bff-b14c01 213->215 216 b14bbe 213->216 214->213 215->179 217 b14bc0-b14bc2 216->217 217->192 218 b14bc4-b14bc6 217->218 218->192 219 b14bc8-b14bda call 9fe780 218->219 219->170 222 b14bdc-b14bdf 219->222 222->192 223 b14be1-b14bf3 call 9fe780 222->223 223->170 226 b14bf5-b14bf8 223->226 226->215 227 b14bfa-b14bfd 226->227 227->217
    APIs
    • __Init_thread_footer.LIBCMT ref: 00B149DC
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
      • Part of subcall function 00A02970: RaiseException.KERNEL32(?,?,00000000,00000000,00B85A3C,C000008C,00000001,?,00B85A6D,00000000,?,009F91C7,00000000,BACC40AC,00000001,?), ref: 00A0297C
    • __Init_thread_footer.LIBCMT ref: 00B14A2C
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$EnterInit_thread_footerLeave$AllocateConditionExceptionHeapRaiseVariableWake
    • String ID: APPDATA$AppDataFolder$PROGRAMFILES$ProgramFiles$ProgramFiles64Folder$ProgramFilesFolder$ProgramW6432$SETUPEXEDIR$SHGetFolderPathW$Shell32.dll$Shlwapi.dll$System32Folder$SystemFolder$TempFolder$Windows 9x/ME/NT/2000/XP/Vista/Windows 7/Windows 8 x86/Windows 8.1 x86/Windows 10 x86$Windows XP/Vista/Windows 7/Windows 8 x64/Windows 8.1 x64/Windows 10 x64/Windows 11 x64$WindowsFolder$WindowsVolume$shfolder.dll
    • API String ID: 2519272855-3044903971
    • Opcode ID: 952491e4481a326fbf2d8aaef76aa1f75c4074eed749efbc3f5ceaf3592787f2
    • Instruction ID: 36346926011833b92b22ddd1f6bde6b0b3a37d6c941c1b5da364f97fb17de986
    • Opcode Fuzzy Hash: 952491e4481a326fbf2d8aaef76aa1f75c4074eed749efbc3f5ceaf3592787f2
    • Instruction Fuzzy Hash: D4710570905206CBDF10EBA8C846BFFB3E1EF20310F9545A9E916972D5E731D985C791

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 228 afdb40-afdb79 229 afdb7b-afdb84 call 9f9e50 228->229 230 afdbf2-afdbf9 228->230 237 afdb8a-afdba0 229->237 238 afdcf0-afdcf5 call 9f9b10 229->238 232 afdbff-afdc14 call 9f9e50 230->232 233 afdcd6-afdcd8 OutputDebugStringW 230->233 240 afdcfa-afdd04 call 9f9b10 232->240 241 afdc1a-afdc48 call a06990 GetActiveWindow 232->241 236 afdcde-afdcef 233->236 246 afdbc3-afdbe5 call b274c0 237->246 247 afdba2-afdba4 237->247 238->240 258 afdc4a-afdc52 GetForegroundWindow 241->258 259 afdc56-afdc75 call a9bda0 241->259 255 afdbef 246->255 256 afdbe7-afdbea 246->256 250 afdba7-afdbb0 247->250 250->250 253 afdbb2-afdbc0 call a0a950 250->253 253->246 255->230 256->255 258->259 262 afdc7a-afdc81 259->262 263 afdc8a-afdc9e 262->263 264 afdc83-afdc84 SetForegroundWindow 262->264 265 afdca8-afdcba 263->265 266 afdca0-afdca3 263->266 264->263 265->236 267 afdcbc-afdcd5 265->267 266->265
    APIs
    • GetActiveWindow.USER32 ref: 00AFDC3A
    • GetForegroundWindow.USER32(?,?,?,00BEC4C5,000000FF), ref: 00AFDC4A
    • OutputDebugStringW.KERNEL32(?,BACC40AC,?,?,?,00BEC4C5,000000FF,?,00B304CF,?,?,?,00000000), ref: 00AFDCD8
    • SetForegroundWindow.USER32(00000000), ref: 00AFDC84
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    Strings
    • %s , xrefs: 00AFEA4C, 00AFED81
    • AI_INST_PRODCODES=%s AI_INTANCE_LOCATION="%s" AI_INST_MAJORUPGRADE=1 , xrefs: 00AFEB95
    • "%s" TRANSFORMS="%s;%s;%s" AI_INST_MAJORUPGRADE=1 AI_NEWINST=1 , xrefs: 00AFE7B2
    • .mst, xrefs: 00AFE797, 00AFE7FE, 00AFECBE
    • "%s" TRANSFORMS="%s;%s" AI_INST_MAJORUPGRADE=1 AI_NEWINST=1 , xrefs: 00AFE818
    • REINSTALL=ALL REINSTALLMODE=vomus , xrefs: 00AFED93
    • majorupgrade-content.mst, xrefs: 00AFE756, 00AFEC4F
    • TRANSFORMS=:%s.mst MSINEWINSTANCE=1 , xrefs: 00AFE910
    • MSINEWINSTANCE=1 , xrefs: 00AFE8E6
    • .msi, xrefs: 00AFE747, 00AFEC40
    • TRANSFORMS=":%s.mst;%s" MSINEWINSTANCE=1 , xrefs: 00AFE8FF
    • TRANSFORMS="%s" AI_INST_MAJORUPGRADE=1, xrefs: 00AFE8B7
    • "%s" TRANSFORMS="%s;%s;%s" AI_INST_PRODCODES=%s AI_INTANCE_LOCATION="%s" AI_INST_MAJORUPGRADE=1 , xrefs: 00AFECDF
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$ForegroundInit_thread_footer$ActiveDebugHeapOutputProcessString
    • String ID: "%s" TRANSFORMS="%s;%s" AI_INST_MAJORUPGRADE=1 AI_NEWINST=1 $ "%s" TRANSFORMS="%s;%s;%s" AI_INST_MAJORUPGRADE=1 AI_NEWINST=1 $ "%s" TRANSFORMS="%s;%s;%s" AI_INST_PRODCODES=%s AI_INTANCE_LOCATION="%s" AI_INST_MAJORUPGRADE=1 $ %s $ AI_INST_PRODCODES=%s AI_INTANCE_LOCATION="%s" AI_INST_MAJORUPGRADE=1 $ MSINEWINSTANCE=1 $ REINSTALL=ALL REINSTALLMODE=vomus $ TRANSFORMS="%s" AI_INST_MAJORUPGRADE=1$ TRANSFORMS=":%s.mst;%s" MSINEWINSTANCE=1 $ TRANSFORMS=:%s.mst MSINEWINSTANCE=1 $.msi$.mst$majorupgrade-content.mst
    • API String ID: 1401059542-743168453
    • Opcode ID: 0838409d292fba9d0dbf4b003c76e7b01ef3c1f2ee09349777332f9b11e8f6ac
    • Instruction ID: d30103f9a35d62f4c70359cb1701c4df678dcac8e84964bfd949d1c62a2375ed
    • Opcode Fuzzy Hash: 0838409d292fba9d0dbf4b003c76e7b01ef3c1f2ee09349777332f9b11e8f6ac
    • Instruction Fuzzy Hash: F651DF71A002099FDB15DFACC848BAEBBF5EF45324F14829DE9199B391DB319D01CBA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1235 b064d0-b0650c call 9f9e50 1238 b06512-b0654a call b1ce80 1235->1238 1239 b0664f-b0670e call 9f9b10 call b064d0 call b2a240 1235->1239 1247 b06554-b06583 GetTickCount call b85347 call b86dd0 call 9f9e50 1238->1247 1248 b0654c-b0654f 1238->1248 1254 b06710-b06719 1239->1254 1247->1239 1264 b06589-b06610 call bacce0 call 9f8e30 call b1ce80 call b1cfc0 call 9f9650 1247->1264 1248->1247 1254->1254 1257 b0671b-b06740 call 9f7070 1254->1257 1262 b06742-b06756 call b86662 1257->1262 1263 b067a9-b067c6 call 9f6540 1257->1263 1262->1263 1270 b06758-b067a6 call 9f7070 call b8651a call b86618 1262->1270 1272 b067d1-b067d3 1263->1272 1273 b067c8-b067cf 1263->1273 1312 b06612-b06615 1264->1312 1313 b0661a-b0662f 1264->1313 1270->1263 1274 b067d6-b067e4 1272->1274 1273->1274 1277 b06865-b068af call b86199 1274->1277 1278 b067e6-b067eb 1274->1278 1290 b068b3-b068bc 1277->1290 1282 b067f0-b0680e 1278->1282 1286 b06810-b06816 1282->1286 1287 b06854-b0685d 1282->1287 1291 b06818-b0681e 1286->1291 1292 b0683a-b0683c 1286->1292 1287->1282 1295 b0685f 1287->1295 1290->1290 1296 b068be-b06908 call 9f7070 1290->1296 1297 b06820-b06823 1291->1297 1298 b06832 1291->1298 1299 b0683e-b06845 1292->1299 1300 b0684f 1292->1300 1295->1277 1310 b06910-b06919 1296->1310 1304 b06834 1297->1304 1305 b06825-b06830 1297->1305 1298->1304 1299->1300 1306 b06847-b0684c 1299->1306 1300->1287 1304->1292 1305->1297 1305->1298 1306->1300 1310->1310 1314 b0691b-b069ea call 9f7070 call 9f6540 * 4 call 9f77d0 * 2 1310->1314 1312->1313 1315 b06631-b06634 1313->1315 1316 b06639-b0664c 1313->1316 1331 b06a48-b06a57 1314->1331 1332 b069ec-b06a00 1314->1332 1315->1316 1333 b06a99-b06ad6 call 9f77d0 * 3 1331->1333 1334 b06a59-b06a96 call 9f77d0 * 4 call b86168 1331->1334 1335 b06a42 1332->1335 1336 b06a02-b06a3f call 9f77d0 * 4 call b86168 1332->1336 1355 b06ad8-b06ada 1333->1355 1356 b06adf-b06b1e GetCurrentProcess OpenProcessToken 1333->1356 1334->1333 1335->1331 1336->1335 1360 b06b93-b06bb1 1355->1360 1369 b06b20-b06b4a GetTokenInformation 1356->1369 1370 b06b5f 1356->1370 1363 b06bb3-b06bb6 1360->1363 1364 b06bbb-b06bd6 call b8615a 1360->1364 1363->1364 1369->1370 1373 b06b4c-b06b5d 1369->1373 1374 b06b64-b06b80 1370->1374 1373->1374 1374->1360 1375 b06b82-b06b89 CloseHandle 1374->1375 1375->1360
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • GetTickCount.KERNEL32 ref: 00B06554
    • __Xtime_get_ticks.LIBCPMT ref: 00B0655C
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B065A6
    • __Init_thread_footer.LIBCMT ref: 00B067A1
    • GetCurrentProcess.KERNEL32 ref: 00B06B06
    • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00B06B16
    • GetTokenInformation.KERNELBASE(00000000,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00B06B42
    • CloseHandle.KERNEL32(00000000), ref: 00B06B83
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footerProcess$Token$CloseCountCurrentHandleHeapInformationOpenTickUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@
    • String ID: \/:*?"<>|
    • API String ID: 3363527671-3830478854
    • Opcode ID: 5d91ae1ff62c0b7ec19974136abd862bd6f6f1b049f1e50c8d3ef391bf17048a
    • Instruction ID: 652145f7b36450f47128b4666f4f5478cf5cc93db3d35b3cbf702760512435b8
    • Opcode Fuzzy Hash: 5d91ae1ff62c0b7ec19974136abd862bd6f6f1b049f1e50c8d3ef391bf17048a
    • Instruction Fuzzy Hash: AC228D70900258DFDB10DFA8C859BAEBBB4EF45304F1481D9E509AB2D2DB74AE45CFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1376 b2f7b0-b2f7b7 1377 b2f7b9-b2f7bb 1376->1377 1378 b2f7be-b2f7d5 LoadLibraryW 1376->1378 1379 b2f7d7-b2f7e7 1378->1379 1380 b2f7ed-b2f7ef 1378->1380 1379->1380 1381 b2f7f1-b2f7f4 1380->1381 1382 b2f7f7-b2f849 GetProcAddress * 4 1380->1382
    APIs
    • LoadLibraryW.KERNEL32(?,?,00B1181B,?,?,?,?,?), ref: 00B2F7C5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: EndExtraction$ExtractAllFiles$GetTotalFilesSize$InitExtraction
    • API String ID: 1029625771-3462492388
    • Opcode ID: 814202103dd352c2bfd080fc77fd296990428a8ca42261cb723d43476c131775
    • Instruction ID: 8609945c4ff79807e64bec71ff12aa73f940bf5ea6d76b1e1f8fc952c30053ea
    • Opcode Fuzzy Hash: 814202103dd352c2bfd080fc77fd296990428a8ca42261cb723d43476c131775
    • Instruction Fuzzy Hash: FB014C7A900621ABCB159B64BD08B5E7BB0F794315701407FE916A3272C6354816CF94

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1615 b85a9f-b85aaa 1616 b85ab9-b85ad0 LoadLibraryExA 1615->1616 1617 b85aac-b85ab8 DecodePointer 1615->1617 1618 b85b4a 1616->1618 1619 b85ad2-b85ae7 call b85b4f 1616->1619 1620 b85b4c-b85b4e 1618->1620 1619->1618 1623 b85ae9-b85afe call b85b4f 1619->1623 1623->1618 1626 b85b00-b85b15 call b85b4f 1623->1626 1626->1618 1629 b85b17-b85b2c call b85b4f 1626->1629 1629->1618 1632 b85b2e-b85b48 DecodePointer 1629->1632 1632->1620
    APIs
    • DecodePointer.KERNEL32(?,?,?,00B85DE5,00C94C90,?,?,?,00A500E6,?,BACC40AC,?,?,?,00A981B7), ref: 00B85AB1
    • LoadLibraryExA.KERNEL32(atlthunk.dll,00000000,00000800,?,?,?,00B85DE5,00C94C90,?,?,?,00A500E6,?,BACC40AC,?,?), ref: 00B85AC6
    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00A981B7), ref: 00B85B42
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: DecodePointer$LibraryLoad
    • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
    • API String ID: 1423960858-1745123996
    • Opcode ID: 79af6b933021900a9aae1c9b588e4e56aacf9f3b5d7c1d4bec3d40a2a9993da7
    • Instruction ID: e945bd81f57cdb4d646a05b54ac75322448ba665fa0eb82e3b3d76e1b4e77605
    • Opcode Fuzzy Hash: 79af6b933021900a9aae1c9b588e4e56aacf9f3b5d7c1d4bec3d40a2a9993da7
    • Instruction Fuzzy Hash: FF0184306427047EDA35BB209D07F8A7B959B21B49F0400E0B846773F2EAA1AD09C79A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1633 b12810-b1284d 1634 b1285b-b1285d call b1c990 1633->1634 1635 b1284f-b12859 call 9f97c0 1633->1635 1638 b12862-b12867 1634->1638 1635->1634 1640 b12952-b12954 1638->1640 1641 b1286d-b12878 1638->1641 1644 b12973-b12977 1640->1644 1645 b12956 1640->1645 1642 b128a8-b128af 1641->1642 1643 b1287a-b12892 call af44f0 1641->1643 1651 b128b5-b128bc call 9f9e50 1642->1651 1652 b12939-b1294f 1642->1652 1658 b12894 1643->1658 1659 b12897-b128a2 1643->1659 1649 b1297d-b1297f 1644->1649 1650 b12a8f-b12aa2 1644->1650 1646 b12958-b1295a 1645->1646 1647 b1295c-b12971 call af4920 1645->1647 1646->1644 1646->1647 1647->1649 1655 b12982-b12989 call 9f9e50 1649->1655 1663 b128c2-b128e9 call a0a950 1651->1663 1664 b12aa5-b12aaf call 9f9b10 1651->1664 1655->1664 1665 b1298f-b129fc call 9f8e30 CreateFileW call aef300 1655->1665 1658->1659 1659->1640 1659->1642 1674 b12909-b1292f call b274c0 1663->1674 1675 b128eb-b128ed 1663->1675 1683 b12a1a-b12a25 1665->1683 1684 b129fe 1665->1684 1674->1652 1686 b12931-b12934 1674->1686 1677 b128f0-b128f9 1675->1677 1677->1677 1680 b128fb-b12904 call a0a950 1677->1680 1680->1674 1689 b12a28-b12a4f SetFilePointer SetEndOfFile 1683->1689 1687 b12a00-b12a06 1684->1687 1688 b12a08-b12a18 1684->1688 1686->1652 1687->1683 1687->1688 1688->1689 1690 b12a51-b12a58 CloseHandle 1689->1690 1691 b12a5f-b12a74 1689->1691 1690->1691 1692 b12a76-b12a79 1691->1692 1693 b12a7e-b12a89 1691->1693 1692->1693 1693->1650 1693->1655
    APIs
    • CreateFileW.KERNEL32(00000000,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00B129D1
    • SetFilePointer.KERNEL32(?,7FFFFFFF,00000000,00000000,?), ref: 00B12A30
    • SetEndOfFile.KERNEL32(?), ref: 00B12A39
    • CloseHandle.KERNEL32(?), ref: 00B12A52
    Strings
    • %sholder%d.aiph, xrefs: 00B129AD
    • Not enough disk space to extract file:, xrefs: 00B128DB
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$CloseCreateHandlePointer
    • String ID: %sholder%d.aiph$Not enough disk space to extract file:
    • API String ID: 22866420-929304071
    • Opcode ID: 9469138701e4edf25b35ef9cc42809434f51434750188c5e46b9d4d77a0e086f
    • Instruction ID: 6e06e7c12f2d792e924d4454b6d0873245c75c15bb522440588b19d7f4a9dd1d
    • Opcode Fuzzy Hash: 9469138701e4edf25b35ef9cc42809434f51434750188c5e46b9d4d77a0e086f
    • Instruction Fuzzy Hash: 6D81BF71A002099FDB10DF68CC45BAEBBE4EF45320F1446A9FA25E7291DB31AD51CB90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1694 b2f2f0-b2f33b call b12c10 1697 b2f347-b2f355 1694->1697 1698 b2f33d-b2f342 1694->1698 1700 b2f360-b2f381 1697->1700 1699 b2f4f1-b2f51b call b86a15 1698->1699 1702 b2f383-b2f389 1700->1702 1703 b2f38b-b2f3a2 SetFilePointer 1700->1703 1702->1703 1705 b2f3b2-b2f3c7 ReadFile 1703->1705 1706 b2f3a4-b2f3ac GetLastError 1703->1706 1707 b2f4ec 1705->1707 1708 b2f3cd-b2f3d4 1705->1708 1706->1705 1706->1707 1707->1699 1708->1707 1709 b2f3da-b2f3eb 1708->1709 1709->1700 1710 b2f3f1-b2f3fd 1709->1710 1711 b2f400-b2f404 1710->1711 1712 b2f411-b2f415 1711->1712 1713 b2f406-b2f40f 1711->1713 1714 b2f417-b2f41d 1712->1714 1715 b2f438-b2f43a 1712->1715 1713->1711 1713->1712 1714->1715 1716 b2f41f-b2f422 1714->1716 1717 b2f43d-b2f43f 1715->1717 1718 b2f434-b2f436 1716->1718 1719 b2f424-b2f42a 1716->1719 1720 b2f441-b2f444 1717->1720 1721 b2f454-b2f456 1717->1721 1718->1717 1719->1715 1722 b2f42c-b2f432 1719->1722 1720->1710 1723 b2f446-b2f44f 1720->1723 1724 b2f466-b2f48c SetFilePointer 1721->1724 1725 b2f458-b2f461 1721->1725 1722->1715 1722->1718 1723->1700 1724->1707 1726 b2f48e-b2f4a3 ReadFile 1724->1726 1725->1700 1726->1707 1727 b2f4a5-b2f4a9 1726->1727 1727->1707 1728 b2f4ab-b2f4b5 1727->1728 1729 b2f4b7-b2f4bd 1728->1729 1730 b2f4cf-b2f4d4 1728->1730 1729->1730 1731 b2f4bf-b2f4c7 1729->1731 1730->1699 1731->1730 1732 b2f4c9-b2f4cd 1731->1732 1732->1730 1733 b2f4d6-b2f4ea 1732->1733 1733->1699
    APIs
    • SetFilePointer.KERNEL32(?,-00000400,?,00000002,00000400,BACC40AC,?,?,?,?,?), ref: 00B2F396
    • GetLastError.KERNEL32(?,?,?,?), ref: 00B2F3A4
    • ReadFile.KERNEL32(?,00000000,00000400,000000FF,00000000,?,?,?,?), ref: 00B2F3BF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$ErrorLastPointerRead
    • String ID: ADVINSTSFX
    • API String ID: 64821003-4038163286
    • Opcode ID: 0bd2c1b12be742d745228a76fcdf6d169f5627d46598b5eef56de20528e4dce3
    • Instruction ID: 0ce06fa0f50df013d80bcf8fc45b24236f87f644852ec340ca25887d1949c6f9
    • Opcode Fuzzy Hash: 0bd2c1b12be742d745228a76fcdf6d169f5627d46598b5eef56de20528e4dce3
    • Instruction Fuzzy Hash: D861BF71A0012A9BDB10DF68D881BBFBBF6FF44720F2442B5E529A7381D7749942CB64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1764 addda0-adddd7 1765 adddd9-addddc 1764->1765 1766 adde42-adde59 RegCreateKeyExW 1764->1766 1767 adddde-adddeb GetModuleHandleW 1765->1767 1768 adde35-adde39 1765->1768 1769 adde5f-adde61 1766->1769 1770 addded-adde03 1767->1770 1771 adde06-adde14 GetProcAddress 1767->1771 1768->1766 1772 adde3b-adde40 1768->1772 1773 adde84-adde95 1769->1773 1774 adde63-adde69 1769->1774 1771->1772 1775 adde16-adde33 1771->1775 1772->1769 1776 adde6b-adde72 RegCloseKey 1774->1776 1777 adde74-adde81 1774->1777 1775->1769 1776->1777 1777->1773
    APIs
    • GetModuleHandleW.KERNEL32(Advapi32.dll,BACC40AC,?,?,?,00000000,?,Function_001BDD00,000000FF), ref: 00ADDDE3
    • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 00ADDE0C
    • RegCreateKeyExW.KERNEL32(?,00A07229,00000000,00000000,00000000,?,00000000,00000000,?,BACC40AC,?,?,?,00000000,?,Function_001BDD00), ref: 00ADDE59
    • RegCloseKey.ADVAPI32(00000000,?,?,?,00000000,?,Function_001BDD00,000000FF), ref: 00ADDE6C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressCloseCreateHandleModuleProc
    • String ID: Advapi32.dll$RegCreateKeyTransactedW
    • API String ID: 1765684683-2994018265
    • Opcode ID: 96f6a1d359655ba4eecbf144c193e4dac7e27967ca7b7062a9f00dd362425bbd
    • Instruction ID: 47552cab725c826d9d8695261b33a43a719b3f616094a55ad4df78cb9463eb9a
    • Opcode Fuzzy Hash: 96f6a1d359655ba4eecbf144c193e4dac7e27967ca7b7062a9f00dd362425bbd
    • Instruction Fuzzy Hash: 54318472604205FFEB248F44DC45FABBBA8FB54750F14852AF906DB290DB71E814C794

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1779 abd900-abd937 1780 abd939-abd93c 1779->1780 1781 abd998-abd9a5 RegOpenKeyExW 1779->1781 1782 abd98b-abd98f 1780->1782 1783 abd93e-abd94b GetModuleHandleW 1780->1783 1784 abd9ab-abd9ad 1781->1784 1782->1781 1787 abd991-abd996 1782->1787 1785 abd94d-abd963 1783->1785 1786 abd966-abd974 GetProcAddress 1783->1786 1788 abd9af-abd9b5 1784->1788 1789 abd9d0-abd9e1 1784->1789 1786->1787 1790 abd976-abd989 1786->1790 1787->1784 1791 abd9c0-abd9cd 1788->1791 1792 abd9b7-abd9be RegCloseKey 1788->1792 1790->1784 1791->1789 1792->1791
    APIs
    • GetModuleHandleW.KERNEL32(Advapi32.dll,BACC40AC,?,?,?,?,?,Function_001BDD00,000000FF,?,00AEEE1C,?,?,000000FF), ref: 00ABD943
    • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00ABD96C
    • RegOpenKeyExW.KERNEL32(?,BACC40AC,00000000,?,00000000,BACC40AC,?,?,?,?,?,Function_001BDD00,000000FF,?,00AEEE1C,?), ref: 00ABD9A5
    • RegCloseKey.ADVAPI32(00000000,?,?,?,Function_001BDD00,000000FF,?,00AEEE1C,?,?,000000FF), ref: 00ABD9B8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressCloseHandleModuleOpenProc
    • String ID: Advapi32.dll$RegOpenKeyTransactedW
    • API String ID: 823179699-3913318428
    • Opcode ID: 947711a4b4054eaa5f6fee2ed01c6840a8629f320e74376edc474f16515a37a1
    • Instruction ID: 016a1f0ed9acf35d43c2d9c66ba1621ec4147e5c4633ddc617c2ff78555f6bec
    • Opcode Fuzzy Hash: 947711a4b4054eaa5f6fee2ed01c6840a8629f320e74376edc474f16515a37a1
    • Instruction Fuzzy Hash: 4C21B032604209EFEB248F49DC45FAABBBCFB49750F00853AF819D7681E775A800CB60
    APIs
    • GetDlgItem.USER32(?,00000002), ref: 00B0D230
    • GetWindowRect.USER32(00000000,?), ref: 00B0D246
    • ShowWindow.USER32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00B0CFF7,?,00000000), ref: 00B0D25F
    • InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,00B0CFF7,?), ref: 00B0D26A
    • GetDlgItem.USER32(?,000003E9), ref: 00B0D27C
    • GetWindowRect.USER32(00000000,?), ref: 00B0D292
    • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206), ref: 00B0D2D8
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Rect$Item$InvalidateShow
    • String ID:
    • API String ID: 2147159307-0
    • Opcode ID: 5b37912bfd4a97960341066acd8fe90aac369f3519606d520af0f3ff47ff5344
    • Instruction ID: 42bb5ce5d70b7497cf749511edf4d2eda04a0fb691cd946dc43fddc58ace61f0
    • Opcode Fuzzy Hash: 5b37912bfd4a97960341066acd8fe90aac369f3519606d520af0f3ff47ff5344
    • Instruction Fuzzy Hash: 05217A70614300AFD304DF64DC49F2ABBE8EF89718F00865DF8599A291D770ED46CB56
    APIs
    • SetFilePointer.KERNEL32(?,?,?,00000000,BACC40AC,?,?,00000002,?,?,?,?,?,?,00000000,00BF0932), ref: 00B11047
    • GetLastError.KERNEL32(?,00000002), ref: 00B112D9
    • GetLastError.KERNEL32(?,00000002), ref: 00B11383
    • GetLastError.KERNEL32(?,00000002,?,?,?,?,?,?,00000000,00BF0932,000000FF,?,00B0FF4A,00000010), ref: 00B11056
      • Part of subcall function 00AF2230: FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,BACC40AC,00000008,00000000), ref: 00AF227B
      • Part of subcall function 00AF2230: GetLastError.KERNEL32 ref: 00AF2285
    • ReadFile.KERNEL32(?,00000000,00000008,80070057,00000000,?,00000002), ref: 00B11118
    • ReadFile.KERNEL32(?,BACC40AC,00000000,00000000,00000000,00000001,?,00000002), ref: 00B11195
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$File$Read$FormatMessagePointer
    • String ID:
    • API String ID: 3903527278-0
    • Opcode ID: 36140f670ad955a7f1284addebb17f44c2dd3e9426ac6569bbb1aaedaa8d1dd1
    • Instruction ID: c53c94e50cb3346a0b24b21b380447c440f9676f5b44e7a4d66a8a2b5b16e7f0
    • Opcode Fuzzy Hash: 36140f670ad955a7f1284addebb17f44c2dd3e9426ac6569bbb1aaedaa8d1dd1
    • Instruction Fuzzy Hash: E0D19071D00209DFDB00DFA8D885BEEB7B5FF44314F1486A9E925AB292EB709945CB90
    APIs
    • GetFileVersionInfoSizeW.KERNELBASE(?,BACC40AC,BACC40AC,?,00C94C50,?,?,00B13989,?,BACC40AC,?,?,?,00000000,00BF10D5), ref: 00B310E5
    • GetFileVersionInfoW.KERNELBASE(?,?,00000000,?,00000000,?,00C94C50,?,?,00B13989,?,BACC40AC,?,?,?,00000000), ref: 00B31133
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: FileInfoVersion$Size
    • String ID: ProductName$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
    • API String ID: 2104008232-2149928195
    • Opcode ID: c42390b2417be756556a992104394565cf66becdf54f2143afb31365e06f993f
    • Instruction ID: 1a33adfdc4073c7c28e3c2b978e0cf3fef625d5c45e91f6e85875b46222ead66
    • Opcode Fuzzy Hash: c42390b2417be756556a992104394565cf66becdf54f2143afb31365e06f993f
    • Instruction Fuzzy Hash: 0F717A719015099BDB14DFA8CC49BAFB7F8EF45315F2485AAE911E7291EB309D04CBA0
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • PathIsUNCW.SHLWAPI(?,?), ref: 00AF4736
    • _wcschr.LIBVCRUNTIME ref: 00AF4752
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$HeapPathProcess_wcschr
    • String ID: \\?\$\\?\UNC\
    • API String ID: 660126660-3019864461
    • Opcode ID: 477527559dba1d76a86929b26e39567e5ab7b2351db9fb87d849f53d824f2893
    • Instruction ID: da673aca0d05f06c173897450aca1ee66f69f7738d1a01fb43ed9aba082fe3a0
    • Opcode Fuzzy Hash: 477527559dba1d76a86929b26e39567e5ab7b2351db9fb87d849f53d824f2893
    • Instruction Fuzzy Hash: 5BC19E71A006499FDB00DBA8C985BAEF7F9FF49310F148269E515EB2D1EB749904CBA0
    APIs
    • PathIsUNCW.SHLWAPI(?,BACC40AC,?,00000010,?), ref: 00B0DF8A
      • Part of subcall function 00B1EAB0: GetCurrentProcess.KERNEL32 ref: 00B1EAF8
      • Part of subcall function 00B1EAB0: OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00B1EB05
      • Part of subcall function 00B1EAB0: GetLastError.KERNEL32 ref: 00B1EB0F
      • Part of subcall function 00B1EAB0: CloseHandle.KERNEL32(00000000), ref: 00B1EBF0
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Process$Init_thread_footer$CloseCurrentErrorFindHandleHeapLastOpenPathResourceToken
    • String ID: Extraction path set to:$[WindowsVolume]$\\?\
    • API String ID: 699919280-3538578949
    • Opcode ID: 8f8f3cfce56bd9d6acdeed0af5bb6e4bcbb5af0343ba8be1cc219cf6821b602f
    • Instruction ID: 6d5815eb067218a4cba9f92d54490a749e6f33bdbeced03acdbb1dc747501638
    • Opcode Fuzzy Hash: 8f8f3cfce56bd9d6acdeed0af5bb6e4bcbb5af0343ba8be1cc219cf6821b602f
    • Instruction Fuzzy Hash: 07C1A330A0064A9FDB14DFA8C945BAEFBF4EF44314F1482A8E525AB2D2DB70DD45CB91
    APIs
    • ConnectNamedPipe.KERNEL32(?,00000000,BACC40AC,?,000000FF,?,00000000,00BF62A6,000000FF,?,00B2C45A,000000FF,?,00000001), ref: 00B2C27A
    • GetLastError.KERNEL32(?,00B2C45A,000000FF,?,00000001), ref: 00B2C284
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • ReadFile.KERNEL32(?,?,00007F90,00000000,00000000,BACC40AC,?,000000FF,?,00000000,00BF62A6,000000FF,?,00B2C45A,000000FF,?), ref: 00B2C2C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$ConnectErrorFileHeapLastNamedPipeProcessRead
    • String ID: \\.\pipe\ToServer
    • API String ID: 2973225359-63420281
    • Opcode ID: 32ee99a2eafad08faf2dd57ad2f2a0e4fc4a391942a5117f4747b23fa5ffdea5
    • Instruction ID: 55c72fbdb9987875d3c1b6f43360a14616af515ca6d234aad41d7ff89b0a4c7b
    • Opcode Fuzzy Hash: 32ee99a2eafad08faf2dd57ad2f2a0e4fc4a391942a5117f4747b23fa5ffdea5
    • Instruction Fuzzy Hash: E171B171604609EFDB10CF58D805BAEBBE4FF44724F10866DF9299B380DBB5A900CB94
    APIs
    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,BACC40AC,?,00000010,?,00B09550,?), ref: 00B06266
    • SetFilePointer.KERNEL32(00000000,?,00000010,00000000), ref: 00B062AF
    • ReadFile.KERNEL32(00000000,BACC40AC,?,?,00000000,00000078,?), ref: 00B062ED
    • CloseHandle.KERNEL32(00000000), ref: 00B06339
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$CloseCreateHandlePointerRead
    • String ID:
    • API String ID: 4133201480-0
    • Opcode ID: 1e74f93bd3b2e7404118d16056195cdde8e4d1590b2156b6a5ea6ef6f2c1d461
    • Instruction ID: 87203e72032bfc75455a11f9457b4bc3b44223913cbd22f71f71835cc0ee81c6
    • Opcode Fuzzy Hash: 1e74f93bd3b2e7404118d16056195cdde8e4d1590b2156b6a5ea6ef6f2c1d461
    • Instruction Fuzzy Hash: 7A415D70900609EBDB11CB98CC89BEEFBF8EF45724F148299E411A72D1D7749D44CBA4
    APIs
    • __freea.LIBCMT ref: 00B9F0F1
      • Part of subcall function 00B9DC17: RtlAllocateHeap.NTDLL(00000000,00000000,00B9D0E1,?,00B9EE85,?,00000000,?,00B8F625,00000000,00B9D0E1,?,?,?,?,00B9CEDB), ref: 00B9DC49
    • __freea.LIBCMT ref: 00B9F106
    • __freea.LIBCMT ref: 00B9F116
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: __freea$AllocateHeap
    • String ID:
    • API String ID: 2243444508-0
    • Opcode ID: 1f161428751471ff498f4d2b48ddeb23c4c84115b65b82c797bdea906200c191
    • Instruction ID: fac313fb5ce06b5dda3f1e435c3c6d3178ade2925454a0250ad6a1b1b76f8f1a
    • Opcode Fuzzy Hash: 1f161428751471ff498f4d2b48ddeb23c4c84115b65b82c797bdea906200c191
    • Instruction Fuzzy Hash: 3A518F72600217ABEF259F64CC82EBB7AE9EB05364F1541B9FC08E7151EB71CD5087A0
    APIs
    • SetFilePointer.KERNEL32(?,?,?,00000000,BACC40AC,?,?), ref: 00B10B77
    • ReadFile.KERNEL32(?,00000000,00000018,?,00000000), ref: 00B10C84
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$PointerRead
    • String ID:
    • API String ID: 3154509469-0
    • Opcode ID: 73a1e83911c8e553c0b89c0e640a666ea5f2871dc9e8980cb11de9f7195aa444
    • Instruction ID: 2623ff423c09e70a5836996ad33d9ecf22f1e76411d62caa1531512026568875
    • Opcode Fuzzy Hash: 73a1e83911c8e553c0b89c0e640a666ea5f2871dc9e8980cb11de9f7195aa444
    • Instruction Fuzzy Hash: B8617D71D00609EFDB14DFA8C945BDDFBB4FB08720F10826AE925A7290DB75AA44CB90
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,BACC40AC,?,?,?,80004005,?,00000000), ref: 00B0E13E
    • GetLastError.KERNEL32(?,?,?,80004005,?,00000000), ref: 00B0E176
    • GetLastError.KERNEL32(?,?,?,?,80004005,?,00000000), ref: 00B0E20F
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$CreateFile
    • String ID:
    • API String ID: 1722934493-0
    • Opcode ID: ed9d95a433fc0fb85da8ea63134c730be75881dab243dfbd88a25d4f01f70c29
    • Instruction ID: c4cc16a692cb7aeb738b623b246c04b582d615e4c9bc5833179bf6bf3e2922c2
    • Opcode Fuzzy Hash: ed9d95a433fc0fb85da8ea63134c730be75881dab243dfbd88a25d4f01f70c29
    • Instruction Fuzzy Hash: FA51E471A006059FDB20DF68DC45BAAFBF5FF44320F148AA9E525A73D0EB31A905CB90
    APIs
    • PathIsUNCW.SHLWAPI(?,BACC40AC,?,?,7622E010,00000000,00BEAAC5,000000FF,?,00B332A7,00000000,.part,00000005), ref: 00AF496B
    • CreateDirectoryW.KERNEL32(000000FF,00000000,?,?,00C22A4C,00000001,?), ref: 00AF4A2A
    • GetLastError.KERNEL32 ref: 00AF4A38
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CreateDirectoryErrorLastPath
    • String ID:
    • API String ID: 953296794-0
    • Opcode ID: 38412932f70a00ec0c48667d9a5705d40836e77c4685df826f8d5cf649cbf193
    • Instruction ID: b6229df6c11e2da00dc5e2bc338e20e1ea0cb46c9cd4924839484dc95033f814
    • Opcode Fuzzy Hash: 38412932f70a00ec0c48667d9a5705d40836e77c4685df826f8d5cf649cbf193
    • Instruction Fuzzy Hash: 0C61B031E006099FDB10EFB8C985BAEFBF4EF58364F248259E525A72D1DB749904CB60
    APIs
    • LoadStringW.USER32(00000000,00000000,00000100,?), ref: 00A9BE43
    • LoadStringW.USER32(00AFDE11,00000000,00000100,?), ref: 00A9BEFC
    • MessageBoxW.USER32(00000000,00000000,00AFDE11,?), ref: 00A9BF19
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: LoadString$Message
    • String ID:
    • API String ID: 2278601591-0
    • Opcode ID: 175a07cea0e4b5ccb980241da46e0481765d24042193bd5e212135775f1d8cc6
    • Instruction ID: 19c53439689a3ac14761fd1e72354accf31cb8702e5390cbb988d453728ce824
    • Opcode Fuzzy Hash: 175a07cea0e4b5ccb980241da46e0481765d24042193bd5e212135775f1d8cc6
    • Instruction Fuzzy Hash: 194175B1A11209ABDF14DF59ED45BBEBBF8EB44714F10416EF919E3390E7758A008BA0
    APIs
    • GetCurrentProcess.KERNEL32(?,?,00B9C636,?,00B8AD12,?,?,BACC40AC,00B8AD12,?), ref: 00B9C64D
    • TerminateProcess.KERNEL32(00000000,?,00B9C636,?,00B8AD12,?,?,BACC40AC,00B8AD12,?), ref: 00B9C654
    • ExitProcess.KERNEL32 ref: 00B9C666
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: 1385e63f3ab2d6232dbe9184f3f96ba59e84ec41caae39aa3351d787f6254214
    • Instruction ID: 3915f5be3620aefbf4be7721098b799fc2ace5796ea333dcc422633bd4e28c8d
    • Opcode Fuzzy Hash: 1385e63f3ab2d6232dbe9184f3f96ba59e84ec41caae39aa3351d787f6254214
    • Instruction Fuzzy Hash: 97D09231000508AFCF012F64DD0DA5D3FAAEF44342B12A060BA8A4A032CF71A9A6DA98
    APIs
      • Part of subcall function 00B064D0: GetTickCount.KERNEL32 ref: 00B06554
      • Part of subcall function 00B064D0: __Xtime_get_ticks.LIBCPMT ref: 00B0655C
      • Part of subcall function 00B064D0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B065A6
      • Part of subcall function 00B2A240: GetUserNameW.ADVAPI32(00000000,?), ref: 00B2A2CE
      • Part of subcall function 00B2A240: GetLastError.KERNEL32 ref: 00B2A2D4
      • Part of subcall function 00B2A240: GetUserNameW.ADVAPI32(00000000,?), ref: 00B2A31C
      • Part of subcall function 00B2A240: GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 00B2A352
      • Part of subcall function 00B2A240: GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000,00000000,00000000), ref: 00B2A39C
    • __Init_thread_footer.LIBCMT ref: 00B067A1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: EnvironmentNameUserVariable$CountErrorInit_thread_footerLastTickUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@
    • String ID: \/:*?"<>|
    • API String ID: 2099558200-3830478854
    • Opcode ID: ebd82fbad54f45bda032f415d13f1bcb867ecb4187bc94c1c407ff51c64e097e
    • Instruction ID: e071886d598a2a2131b06ab67c31f8cbde2134fc974acabbef65f92589c4d396
    • Opcode Fuzzy Hash: ebd82fbad54f45bda032f415d13f1bcb867ecb4187bc94c1c407ff51c64e097e
    • Instruction Fuzzy Hash: B7D19D70900258CFDB14EFA4C895BAEBBB0BF55304F1481D9D405AB2D2DB756E49CFA1
    APIs
      • Part of subcall function 00BA2DAC: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 00BA2DD7
    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00BA30C3,?,00000000,?,?,?), ref: 00BA32DD
    • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00BA30C3,?,00000000,?,?,?), ref: 00BA331F
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CodeInfoPageValid
    • String ID:
    • API String ID: 546120528-0
    • Opcode ID: 8351f2972e7aa315910deb7f4f1ab7e81b8c1681253933c80d8dc316e613a7ac
    • Instruction ID: 455dd17da11a53a7ae48b374a4f18376515b97145977582ea8b2f234e52484ad
    • Opcode Fuzzy Hash: 8351f2972e7aa315910deb7f4f1ab7e81b8c1681253933c80d8dc316e613a7ac
    • Instruction Fuzzy Hash: 0D511470A087459EDF21CF39C8816AEFBF5EF46700F1484AEE0968B252DB74DA46CB54
    APIs
    • IsWindow.USER32(00000000), ref: 00B31931
    • EndDialog.USER32(00000000,00000001), ref: 00B31940
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: DialogWindow
    • String ID:
    • API String ID: 2634769047-0
    • Opcode ID: fd0a26400b9e10b90355a2ee80765e22511c13e4b608c5adbbbee659c1b7ae80
    • Instruction ID: db026aaf1c145f2e273d52630542b583128b14450343b8a0a86d1e3dfca881a6
    • Opcode Fuzzy Hash: fd0a26400b9e10b90355a2ee80765e22511c13e4b608c5adbbbee659c1b7ae80
    • Instruction Fuzzy Hash: D5518A70A01A49DFD711CF6CC948B4AFBF8FF49310F2486ADD4559B2A1D770AA05CB91
    APIs
    • GetLastError.KERNEL32(00B0C783,00000000), ref: 00B0CFA0
    • DestroyWindow.USER32(?), ref: 00B0D057
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: DestroyErrorLastWindow
    • String ID:
    • API String ID: 1182162058-0
    • Opcode ID: 6aae276b800b584cf905a3f9f26e0aef82f607ef686b3a958c83e85e7242cee4
    • Instruction ID: 602a7efdc3992bf77d0f43301759f6948b4241e047d26950eb918fc13fa4c4b1
    • Opcode Fuzzy Hash: 6aae276b800b584cf905a3f9f26e0aef82f607ef686b3a958c83e85e7242cee4
    • Instruction Fuzzy Hash: CB21B7B56101099BD7209F58EC05BAA7BA4EB54321F004267FD08C76D1D776EC65C7F1
    APIs
    • FreeLibrary.KERNEL32(00000000), ref: 00B2F735
    • CloseHandle.KERNEL32(?), ref: 00B2F789
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CloseFreeHandleLibrary
    • String ID:
    • API String ID: 10933145-0
    • Opcode ID: 8d7e786c9e72fdcab3c589d68b4f8bc2fa3b66bb8d93d3876fe72e8f3da8923b
    • Instruction ID: 120856bf464f492bd67bd1b3252b5b8e177be9d4dd9e70bfaa17695d29adf015
    • Opcode Fuzzy Hash: 8d7e786c9e72fdcab3c589d68b4f8bc2fa3b66bb8d93d3876fe72e8f3da8923b
    • Instruction Fuzzy Hash: 7A218E71604A02AFD705CF69ED4CB5ABBF8FB04714F00426AE829C73A0DB79A914CF94
    APIs
      • Part of subcall function 00B83CF9: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00B83D05
    • CloseHandle.KERNEL32(04EC4EC4,BACC40AC,?,00000000,Function_001BD890,000000FF,?,map/set too long,009F7DCF,?,?,BACC40AC), ref: 009F8713
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CloseHandlestd::invalid_argument::invalid_argument
    • String ID: map/set too long
    • API String ID: 563732297-558153379
    • Opcode ID: 3443ad80fcc39898c6442c81a9e34f9f432a695936096f1a02fb2d5a1d5e85b9
    • Instruction ID: 350574b39aa4f0dea61f33fb805cbe30513d5d0df8fe96d35913c66dbb1f27c0
    • Opcode Fuzzy Hash: 3443ad80fcc39898c6442c81a9e34f9f432a695936096f1a02fb2d5a1d5e85b9
    • Instruction Fuzzy Hash: DCF0F671644748ABD7219F08DC41B9ABBECEB05B10F10856AFD15D7780DBB5E900CBA8
    APIs
      • Part of subcall function 00AF2350: LoadLibraryW.KERNEL32(ComCtl32.dll,BACC40AC,00000000,?,00000000), ref: 00AF238E
      • Part of subcall function 00AF2350: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00AF23B1
      • Part of subcall function 00AF2350: FreeLibrary.KERNEL32(00000000), ref: 00AF242F
    • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 00AF0F84
    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00AF0F8F
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: LibraryMessageSend$AddressFreeLoadProc
    • String ID:
    • API String ID: 3032493519-0
    • Opcode ID: 6e84d8a0ee4b3698a90b27b5b0e1546008b5f2ba0a90bae741934c03740680e8
    • Instruction ID: c9c82ffb4470c45c8585f62e26fec81c920668d5f9c3b5fbbc1fae222e2575ba
    • Opcode Fuzzy Hash: 6e84d8a0ee4b3698a90b27b5b0e1546008b5f2ba0a90bae741934c03740680e8
    • Instruction Fuzzy Hash: F1F01C3278121C37F66421995C47F6BB64DD785B64E154266BB98AF2C2ECC67C0103D8
    APIs
    • LCMapStringEx.KERNEL32(?,00B9F030,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00BA033C
    • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00B9F030,?,?,00000000,?,00000000), ref: 00BA035A
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: String
    • String ID:
    • API String ID: 2568140703-0
    • Opcode ID: 439e2c0ac8bd0d88434bce8f94b6ba7eb7f230cb79089970054aaa5ca60e1486
    • Instruction ID: 529e254cbce57db54194d1777892e91362d6629097f0aac735e665c5b45168a1
    • Opcode Fuzzy Hash: 439e2c0ac8bd0d88434bce8f94b6ba7eb7f230cb79089970054aaa5ca60e1486
    • Instruction Fuzzy Hash: AFF07A3250051ABBCF126F91DC05EDE3FA6FF48360F058160FA1865020CB32D971EB94
    APIs
    • RtlFreeHeap.NTDLL(00000000,00000000,?,00BA221D,?,00000000,?,?,00BA24BE,?,00000007,?,?,00BA2B18,?,?), ref: 00B9DBF3
    • GetLastError.KERNEL32(?,?,00BA221D,?,00000000,?,?,00BA24BE,?,00000007,?,?,00BA2B18,?,?), ref: 00B9DBFE
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorFreeHeapLast
    • String ID:
    • API String ID: 485612231-0
    • Opcode ID: da85b354ca942838f6cc0624828949d0c988a6971644a90f3131900c651e4b3c
    • Instruction ID: cd066adf2232794458e3596d1b56ba4ac56d7c95a0fb08bf1751e5ae5dda255b
    • Opcode Fuzzy Hash: da85b354ca942838f6cc0624828949d0c988a6971644a90f3131900c651e4b3c
    • Instruction Fuzzy Hash: DBE08631100614ABDF123FB5EC0DB5E7BE8EB00755F0580A1F609861B1DB709884C794
    APIs
    • EnumResourceLanguagesW.KERNEL32(?,00000010,00000001,00B14020,?), ref: 00B13E8B
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: EnumLanguagesResource
    • String ID:
    • API String ID: 4141015960-0
    • Opcode ID: 4e686bd24f45a38860ddd3ab2daf0e5a58ef0676b0659d278575224c45a88a62
    • Instruction ID: 04e89bc1925001e52b915d6e9da5e88cb6af3758b77d6a75ea23b6e3c7aef027
    • Opcode Fuzzy Hash: 4e686bd24f45a38860ddd3ab2daf0e5a58ef0676b0659d278575224c45a88a62
    • Instruction Fuzzy Hash: 1661907190060A9FDB14DF68C885BDEBBF4FF08704F5042A9E914AB681E771E985CBA0
    APIs
    • GetCPInfo.KERNEL32(E8458D00,?,00BA30CF,00BA30C3,00000000), ref: 00BA2EB2
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Info
    • String ID:
    • API String ID: 1807457897-0
    • Opcode ID: b34c06901c516d58e312b7d902889675672d48f0c66096ce1ced9ee1d26f82bf
    • Instruction ID: 3c4bd95d6c72b0061113999a9a49ccbe9e55f8778d8b57aaaf1bc09fd98981ca
    • Opcode Fuzzy Hash: b34c06901c516d58e312b7d902889675672d48f0c66096ce1ced9ee1d26f82bf
    • Instruction Fuzzy Hash: F45129715082589EDB218B28CD84BFA7BF8EB56704F2405EDE49AD7182D2319E46DF20
    APIs
      • Part of subcall function 00AF2B00: __Init_thread_footer.LIBCMT ref: 00AF2B76
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
    • __Init_thread_footer.LIBCMT ref: 00AF2970
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$EnterInit_thread_footerLeave$ConditionVariableWake
    • String ID:
    • API String ID: 984842325-0
    • Opcode ID: c22762ad3e76bc908c39a631c1178e14e79eb2d098365fc27bba392960e0d091
    • Instruction ID: 3c2dedd2fd0c06c6bdd46904f25d7a159c43ca9f27ee5c71c50dd719bad47de4
    • Opcode Fuzzy Hash: c22762ad3e76bc908c39a631c1178e14e79eb2d098365fc27bba392960e0d091
    • Instruction Fuzzy Hash: 6C31D1B1940648DFDB10DF84EC9ABA9B3F4F700758F20466AFA114B3E0D7B6A904CB44
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,00000000,00B11B50,?,00000000,00000000,?,?), ref: 00B2F86D
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
      • Part of subcall function 00B2F940: WaitForSingleObject.KERNEL32(?,000000FF,BACC40AC,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 00B2F974
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AllocateCreateFileHeapObjectSingleWait
    • String ID:
    • API String ID: 1261966429-0
    • Opcode ID: c5e90c8ee7f79b4a5e0e867ba67b6d9a82e49ee3c6f418954016f6635d7caeb6
    • Instruction ID: bcf25e2947f58cef27da6509be37b0ba393e8c47249963c79b250e8c02b3a53b
    • Opcode Fuzzy Hash: c5e90c8ee7f79b4a5e0e867ba67b6d9a82e49ee3c6f418954016f6635d7caeb6
    • Instruction Fuzzy Hash: FD31F534604B119FD324DF28E888B2AB7F0FF88704F20896DE59A9B360D731E990CB55
    APIs
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
    • __Init_thread_footer.LIBCMT ref: 00AD8052
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
    • String ID:
    • API String ID: 2296764815-0
    • Opcode ID: 4c3cd97a336808e907bfaa83f58c0bccad957b2599628294c6371a11ff7a92a1
    • Instruction ID: bf29d7b40f49f18dc279742966c25b77828b9aedb9844c0051a91cfb20618bce
    • Opcode Fuzzy Hash: 4c3cd97a336808e907bfaa83f58c0bccad957b2599628294c6371a11ff7a92a1
    • Instruction Fuzzy Hash: 3A0184B1948684DBCB24DB58D94AB4DB3A4EB04720F1047BAE416833D1DB35E904D655
    APIs
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
      • Part of subcall function 00AF2BA0: RegOpenKeyExW.KERNEL32(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 00AF2C0E
      • Part of subcall function 00AF2BA0: RegQueryValueExW.KERNEL32(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 00AF2C55
      • Part of subcall function 00AF2BA0: RegQueryValueExW.KERNEL32(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 00AF2C74
      • Part of subcall function 00AF2BA0: RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 00AF2CA3
      • Part of subcall function 00AF2BA0: RegQueryValueExW.KERNEL32(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 00AF2D18
    • __Init_thread_footer.LIBCMT ref: 00AF2B76
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalQuerySectionValue$EnterLeave$ConditionInit_thread_footerOpenVariableWake
    • String ID:
    • API String ID: 3563064969-0
    • Opcode ID: fc60770e6374961dc0183ad238dc7cb7569e3e0eb27dba30c8f67ca18f58f9da
    • Instruction ID: 6975a909314e209b6784930b1c1787de672741884cb6ed1007c2face012685ac
    • Opcode Fuzzy Hash: fc60770e6374961dc0183ad238dc7cb7569e3e0eb27dba30c8f67ca18f58f9da
    • Instruction Fuzzy Hash: 0101D6B1A40648EFCB10EFA8DD4AB5973A4E704720F500369FD25977D4D734A9008B91
    APIs
      • Part of subcall function 00B87F9E: RaiseException.KERNEL32(E06D7363,00000001,00000003,BACC40AC,?,?,80004005,BACC40AC), ref: 00B87FFE
    • RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AllocateExceptionHeapRaise
    • String ID:
    • API String ID: 3789339297-0
    • Opcode ID: db524b8162af74083e424c28019566e85efd5d454aa6cba699b812e6ee467ef5
    • Instruction ID: 93622bffa7158983643ea43a3ffddb8a077e035220021ccecd68acf0824779f3
    • Opcode Fuzzy Hash: db524b8162af74083e424c28019566e85efd5d454aa6cba699b812e6ee467ef5
    • Instruction Fuzzy Hash: 99F08271648648BFC7059F54DC01F5ABBA8E704B14F108569B915866A0DB76A810DB48
    APIs
    • RtlAllocateHeap.NTDLL(00000000,00000000,00B9D0E1,?,00B9EE85,?,00000000,?,00B8F625,00000000,00B9D0E1,?,?,?,?,00B9CEDB), ref: 00B9DC49
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: d5bebced053103be0d9d721f9fa842672b553afb15b07a981430764f42fc26bd
    • Instruction ID: f79940a02fc62b01e8e303804eefd8966ff6504e14d5c696f7f30a9ffd251f1d
    • Opcode Fuzzy Hash: d5bebced053103be0d9d721f9fa842672b553afb15b07a981430764f42fc26bd
    • Instruction Fuzzy Hash: 8CE06D216446215ADF222B6B9D05B6B7AECDB413A1F1901F1AD559A1D0DBA0EC40C2A5
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: H_prolog3
    • String ID:
    • API String ID: 431132790-0
    • Opcode ID: 59b7106b3f724d3478103f7dfb38eb07a785aa96ac0c80e26d1a623dd3b37b33
    • Instruction ID: f219d3543c983ff70ecaae75623971085254a31f1e1c097928863db9f2ed59d9
    • Opcode Fuzzy Hash: 59b7106b3f724d3478103f7dfb38eb07a785aa96ac0c80e26d1a623dd3b37b33
    • Instruction Fuzzy Hash: C3E075B2C0020E9ADF00EFD4C452AEEBBF8EB08310F504466A245E6141EA745744CBA1
    APIs
    • CloseHandle.KERNEL32(?,BACC40AC,00000000,?,00000000,00BF6063,000000FF,?,00B0AC2C,?,00000000,00000000,?,0000000D,0000000E), ref: 00B2BC59
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 02cd562f3878bc53c0f92e3d426827119ddd299ab2b4c3fa5220b3ea194d42b3
    • Instruction ID: 01b12031851afdd1c554c1345737109ce563059535ce18e4279e3018d895a8bb
    • Opcode Fuzzy Hash: 02cd562f3878bc53c0f92e3d426827119ddd299ab2b4c3fa5220b3ea194d42b3
    • Instruction Fuzzy Hash: A2117071804A08DFD710CF68C944B5AB7F8FB05730F1087A9E425D76E0DB75A9048B80
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: 100$10000$100000$12000$120000$1500$15000$1500000$1800$2000$20000$200000$3000$30000$3000000$500$5000$6000$800$8000$AI_AppSearchEx$AI_ChainProductsPseudo$AI_CountRowAction$AI_DefaultActionCost$AI_DownloadPrereq$AI_ExtractPrereq$AI_Game$AI_GxInstall$AI_GxUninstall$AI_InstallPostPrerequisite$AI_InstallPrerequisite$AI_PreRequisite$AI_ProcessAccounts$AI_ProcessGroups$AI_ProcessTasks$AI_ScheduledTasks$AI_UninstallAccounts$AI_UninstallGroups$AI_UninstallTasks$AI_UserAccounts$AI_UserGroups$AI_XmlAttribute$AI_XmlElement$AI_XmlInstall$AI_XmlUninstall$AppId$AppSearch$BindImage$Complus$Component$Component_$CostFinalize$CostInitialize$CreateFolder$CreateFolders$CreateShortcuts$DuplicateFile$DuplicateFiles$Environment$Extension$Feature$Feature_$File$FileCost$FileSize$Font$IniFile$InstallFiles$InstallFinalize$InstallInitialize$InstallODBC$InstallServices$InstallValidate$Location$MIME$MoveFile$MoveFiles$MsiAssembly$MsiConfigureServices$MsiPublishAssemblies$MsiUnpublishAssemblies$ODBCDataSource$ODBCDriver$ODBCTranslator$Options$Patch$PatchFiles$PatchSize$ProcessComponents$ProgId$PublishComponent$PublishComponents$PublishFeatures$RegisterClassInfo$RegisterComPlus$RegisterExtensionInfo$RegisterFonts$RegisterMIMEInfo$RegisterProgIdInfo$RegisterTypeLibraries$Registry$RemoveDuplicateFiles$RemoveEnvironmentStrings$RemoveExistingProducts$RemoveFile$RemoveFiles$RemoveFolders$RemoveIniFile$RemoveIniValues$RemoveODBC$RemoveRegistry$RemoveRegistryValues$RemoveShortcuts$SelfReg$SelfRegModules$SelfUnregModules$ServiceControl$ServiceInstall$Shortcut$StartServices$StopServices$TypeLib$UnpublishComponents$UnpublishFeatures$UnregisterClassInfo$UnregisterComPlus$UnregisterExtensionInfo$UnregisterFonts$UnregisterMIMEInfo$UnregisterProgIdInfo$WriteEnvironmentStrings$WriteIniValues$WriteRegistryValues$~
    • API String ID: 0-2910470256
    • Opcode ID: 5a181b063e75179eb9e893afcb10ef3eed322267aa33427089643cf1c8d545a2
    • Instruction ID: 0fa3e2f82dfac5bee5624dc4ed26f06854fe6cd104fcc5c11d779814e9822d9a
    • Opcode Fuzzy Hash: 5a181b063e75179eb9e893afcb10ef3eed322267aa33427089643cf1c8d545a2
    • Instruction Fuzzy Hash: 3F33FB70A553C9E9DF40E7B4991E76F39509B92748F6442BCF2A02B3E2CFB50B029359
    APIs
    • VariantClear.OLEAUT32(?), ref: 00A1420A
    • VariantClear.OLEAUT32(?), ref: 00A1423C
    • VariantClear.OLEAUT32(?), ref: 00A1435F
    • VariantClear.OLEAUT32(?), ref: 00A1438E
    • SysFreeString.OLEAUT32(00000000), ref: 00A14395
    • SysAllocString.OLEAUT32(00000000), ref: 00A143E8
    • VariantClear.OLEAUT32(?), ref: 00A14476
    • VariantClear.OLEAUT32(?), ref: 00A144A8
    • VariantClear.OLEAUT32(?), ref: 00A14609
    • VariantClear.OLEAUT32(?), ref: 00A1463C
    • SysFreeString.OLEAUT32(00000000), ref: 00A14647
    • SysAllocString.OLEAUT32(00000000), ref: 00A1468A
    • SysFreeString.OLEAUT32(00000000), ref: 00A14845
      • Part of subcall function 00A15120: VariantClear.OLEAUT32(?), ref: 00A15129
    • VariantClear.OLEAUT32(?), ref: 00A147FB
    • VariantClear.OLEAUT32(?), ref: 00A14837
    • SysAllocString.OLEAUT32(00000000), ref: 00A14869
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ClearVariant$String$AllocFree
    • String ID: GetFontHeight$MessageBox$MsiEvaluateCondition$MsiGetBinaryPath$MsiGetBinaryPathIndirect$MsiGetBytesCountText$MsiGetFormattedError$MsiGetProperty$MsiPublishEvents$MsiResolveFormatted$MsiSetProperty
    • API String ID: 1305860026-3153392536
    • Opcode ID: cb43d4466f3f0cf4edc63eaf8fc5420b838854dc2204f75014fef44ecbe0ff63
    • Instruction ID: 483b7b73046013c47a03ff30e85ba4d9c5f9a6d39124f5f0928a510ceb2574ab
    • Opcode Fuzzy Hash: cb43d4466f3f0cf4edc63eaf8fc5420b838854dc2204f75014fef44ecbe0ff63
    • Instruction Fuzzy Hash: E9924A70D10218DFDB20DFA8CC84BDEBBB4BF49314F104299E559A7291EB74AA85CF94
    APIs
    • CreateFileW.KERNEL32(00C96078,C0000000,00000003,00000000,00000004,00000080,00000000,BACC40AC,00C96054,00C9606C,?), ref: 00B27837
    • GetLastError.KERNEL32 ref: 00B27854
    • OutputDebugStringW.KERNEL32(00000000,00000020), ref: 00B278CF
    • OutputDebugStringW.KERNEL32(00000000,?,0000001C), ref: 00B279CB
    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0000001C), ref: 00B27A3C
    • WriteFile.KERNEL32(00000000,00C95920,00000000,00000000,00000000,?,0000001C), ref: 00B27A6C
    • WriteFile.KERNEL32(00000000,000000FF,?,00000000,00000000,00C158A8,00000002), ref: 00B27B17
    • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00B27B20
    • FlushFileBuffers.KERNEL32(00000000,?,0000001C), ref: 00B27A71
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    • OutputDebugStringW.KERNEL32(00000000,?,0000001D), ref: 00B27C12
    • WriteFile.KERNEL32(00000000,00000000,00000002,?,00000000,?,0000001D), ref: 00B27C98
    • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 00B27CA3
    • WriteFile.KERNEL32(00000000,000000FF,?,00000000,00000000,00C158A8,00000002,?,?,CPU: ,00000005), ref: 00B27D17
    • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00B27D20
    • WriteFile.KERNEL32(00000000,000000FF,?,00000000,00000000,00C158A8,00000002), ref: 00B27DA5
    • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00B27DAE
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$BuffersFlushWrite$DebugOutputString$Init_thread_footer$CreateErrorFindHeapLastPointerProcessResource
    • String ID: CPU: $LOGGER->Creating LOG file at:$LOGGER->Reusing LOG file at:$LOGGER->failed to create LOG at:$OS Version: %u.%u.%u SP%u (%s) [%s]$server$workstation$x64$x86
    • API String ID: 4051163352-1312762833
    • Opcode ID: 7755080779673285f46ce137680cc30d122a10e0d70c96f7003a33601dc8baad
    • Instruction ID: 89d4478f16ef9662dbb467f37c701349dadafbf5dcb1a711fe6c03b27c671922
    • Opcode Fuzzy Hash: 7755080779673285f46ce137680cc30d122a10e0d70c96f7003a33601dc8baad
    • Instruction Fuzzy Hash: 00128E70A01619DFDB00DF68DC49BAEBBB5FF44314F1482A8E819AB2A1DB70DD45CB94
    APIs
    • VariantClear.OLEAUT32(?), ref: 00A135FA
    • VariantClear.OLEAUT32(?), ref: 00A1362C
    • VariantClear.OLEAUT32(?), ref: 00A13726
    • VariantClear.OLEAUT32(?), ref: 00A13755
    • SysFreeString.OLEAUT32(00000000), ref: 00A1375C
    • SysAllocString.OLEAUT32(00000000), ref: 00A137A3
    • VariantClear.OLEAUT32(?), ref: 00A13827
    • VariantClear.OLEAUT32(?), ref: 00A13859
    • VariantClear.OLEAUT32(?), ref: 00A13959
    • VariantClear.OLEAUT32(?), ref: 00A1398C
    • SysFreeString.OLEAUT32(00000000), ref: 00A13997
    • SysAllocString.OLEAUT32(00000000), ref: 00A139DD
    • VariantClear.OLEAUT32(?), ref: 00A13A5A
    • VariantClear.OLEAUT32(?), ref: 00A13A8C
    • VariantClear.OLEAUT32(?), ref: 00A13BAC
    • VariantClear.OLEAUT32(?), ref: 00A13BDB
    • SysFreeString.OLEAUT32(00000000), ref: 00A13BE2
    • SysAllocString.OLEAUT32(00000000), ref: 00A13C35
    • VariantClear.OLEAUT32(?), ref: 00A13CBA
    • VariantClear.OLEAUT32(?), ref: 00A13CEC
    • VariantClear.OLEAUT32(?), ref: 00A13DDD
    • VariantClear.OLEAUT32(?), ref: 00A13E0A
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ClearVariant$String$AllocFree
    • String ID:
    • API String ID: 1305860026-0
    • Opcode ID: bbb682fe40184fce6d2d11083d8816f98dd68c89e8d0bc1e8cdff74eb496b7e5
    • Instruction ID: 39fb668287ea18fa583646fb01dcd307f3c90b877eae23da50b5488b53b05e84
    • Opcode Fuzzy Hash: bbb682fe40184fce6d2d11083d8816f98dd68c89e8d0bc1e8cdff74eb496b7e5
    • Instruction Fuzzy Hash: 4E429E71900248DFCF10DFA8C948BEEBBB5FF48314F148269E415E7291EB74AA45CBA5
    APIs
      • Part of subcall function 009FF5F0: EnterCriticalSection.KERNEL32(00C96250,BACC40AC,00000000,?,?,?,?,?,?,009FEE50,00BAF68D,000000FF), ref: 009FF62D
      • Part of subcall function 009FF5F0: LoadCursorW.USER32(00000000,00007F00), ref: 009FF6A8
      • Part of subcall function 009FF5F0: LoadCursorW.USER32(00000000,00007F00), ref: 009FF74E
    • SysFreeString.OLEAUT32(00000000), ref: 009FF233
    • SysAllocString.OLEAUT32(00000000), ref: 009FF264
    • GetWindowLongW.USER32(?,000000EC), ref: 009FF33B
    • GetWindowLongW.USER32(?,000000EC), ref: 009FF34B
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 009FF356
    • NtdllDefWindowProc_W.NTDLL(?,?,00000001,?), ref: 009FF364
    • GetWindowLongW.USER32(?,000000EB), ref: 009FF372
    • GetWindowTextLengthW.USER32(?), ref: 009FF396
    • GetWindowTextW.USER32(?,00000000,00000001), ref: 009FF405
    • SetWindowTextW.USER32(?,00C1337C), ref: 009FF411
    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 009FF448
    • GlobalLock.KERNEL32(00000000), ref: 009FF456
    • GlobalUnlock.KERNEL32(?), ref: 009FF47A
    • SetWindowLongW.USER32(?,000000EB,00000000), ref: 009FF501
    • SysFreeString.OLEAUT32(00000000), ref: 009FF516
    • NtdllDefWindowProc_W.NTDLL(?,?,?,00000000), ref: 009FF55D
    • SysFreeString.OLEAUT32(00000000), ref: 009FF585
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Long$String$FreeGlobalText$AllocCursorLoadNtdllProc_$CriticalEnterLengthLockSectionUnlock
    • String ID:
    • API String ID: 4180494407-0
    • Opcode ID: 3fa99c9304e969b88f8b83ed01022c8a1462a83ce26b5b2654e52fe756145b10
    • Instruction ID: b23cb4ab21ee139af9fee57e7f1764f2d96cb8ff481fafe801403a3c85d0022f
    • Opcode Fuzzy Hash: 3fa99c9304e969b88f8b83ed01022c8a1462a83ce26b5b2654e52fe756145b10
    • Instruction Fuzzy Hash: F3D1B07190020AEFDB10DFA4CC58BBFBBB8EF45714F144169FA11A7290D7799A05CBA1
    APIs
    • GetWindowLongW.USER32(?,000000EB), ref: 00A08D83
    • ShowWindow.USER32(00000000,?), ref: 00A08DA2
    • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00A08DB0
    • GetWindowRect.USER32(00000000,?), ref: 00A08DC7
    • ShowWindow.USER32(00000000,?), ref: 00A08DE8
    • SetWindowLongW.USER32(?,000000EB,?), ref: 00A08DFF
      • Part of subcall function 00A02970: RaiseException.KERNEL32(?,?,00000000,00000000,00B85A3C,C000008C,00000001,?,00B85A6D,00000000,?,009F91C7,00000000,BACC40AC,00000001,?), ref: 00A0297C
    • ShowWindow.USER32(?,?), ref: 00A08F43
    • GetWindowLongW.USER32(?,000000EB), ref: 00A08F79
    • ShowWindow.USER32(?,?), ref: 00A08F96
    • GetWindowRect.USER32(?,?), ref: 00A08FBB
    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00A090F8
    • GetWindowRect.USER32(?,?), ref: 00A091B5
    • GetWindowRect.USER32(?,?), ref: 00A09207
    • SendMessageW.USER32(00000000,0000000B,00000001,00000000), ref: 00A09243
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$LongRectShow$MessageSend$ExceptionRaise
    • String ID:
    • API String ID: 1022490566-0
    • Opcode ID: e2be5280794569ee3f80e12e52483295bddb6190f87ea92b7bff269e11fd839b
    • Instruction ID: 1e257ef807564ff85c3d5d073341e03abf42319ef888637783d7358c68828d83
    • Opcode Fuzzy Hash: e2be5280794569ee3f80e12e52483295bddb6190f87ea92b7bff269e11fd839b
    • Instruction Fuzzy Hash: 0F127C71604609AFDB25CF68E884BAEBBF5FF89304F004A1DF496972A1DB30E945CB51
    APIs
    • GetWindowLongW.USER32(?,000000EC), ref: 009FECCB
    • GetWindowLongW.USER32(00000004,000000EC), ref: 009FECDB
    • SetWindowLongW.USER32(00000004,000000EC,00000000), ref: 009FECE6
    • NtdllDefWindowProc_W.NTDLL(00000004,?,00000001,?), ref: 009FECF4
    • GetWindowLongW.USER32(00000004,000000EB), ref: 009FED02
    • GetWindowTextLengthW.USER32(00000004), ref: 009FED26
    • GetWindowTextW.USER32(00000004,00000000,00000001), ref: 009FED95
    • SetWindowTextW.USER32(00000004,00C1337C), ref: 009FEDA1
    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 009FEDD8
    • GlobalLock.KERNEL32(00000000), ref: 009FEDE6
    • GlobalUnlock.KERNEL32(?), ref: 009FEE0A
    • SetWindowLongW.USER32(00000004,000000EB,00000000), ref: 009FEE6F
    • NtdllDefWindowProc_W.NTDLL(00000004,?,00000000,00000000), ref: 009FEEBD
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Long$GlobalText$NtdllProc_$AllocLengthLockUnlock
    • String ID:
    • API String ID: 2673961051-0
    • Opcode ID: fb47ab1ad208a21660169bd934257255b2857d5fd3a41a7b9b3ad1eefc9ecbf6
    • Instruction ID: 63f1e05e33bc768c50045f0d4a46e5ef8cecf63c1dc9e53fa1db13665a5e4c8e
    • Opcode Fuzzy Hash: fb47ab1ad208a21660169bd934257255b2857d5fd3a41a7b9b3ad1eefc9ecbf6
    • Instruction Fuzzy Hash: 45A1D071901209EBDB10DF68DC48BBFBBB9EF45310F144659FA15A72A1DB389901CBA1
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • FindFirstFileW.KERNEL32(?,?,?,00000001), ref: 00AFC452
    • FindClose.KERNEL32(00000000), ref: 00AFC480
    • FindClose.KERNEL32(00000000), ref: 00AFC509
    Strings
    • No acceptable version found. It must be installed from package., xrefs: 00AFC8D6
    • An acceptable version was found., xrefs: 00AFC8CF
    • No acceptable version found. It must be downloaded., xrefs: 00AFC8DD
    • No acceptable version found. Operating System not supported., xrefs: 00AFC8EB
    • No acceptable version found. It is already downloaded and it will be installed., xrefs: 00AFC8F2
    • Not selected for install., xrefs: 00AFC900
    • No acceptable version found., xrefs: 00AFC8F9
    • No acceptable version found. It must be downloaded manually from a site., xrefs: 00AFC8E4
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Find$CloseInit_thread_footer$FileFirstHeapProcess
    • String ID: An acceptable version was found.$No acceptable version found.$No acceptable version found. It is already downloaded and it will be installed.$No acceptable version found. It must be downloaded manually from a site.$No acceptable version found. It must be downloaded.$No acceptable version found. It must be installed from package.$No acceptable version found. Operating System not supported.$Not selected for install.
    • API String ID: 544434140-749633484
    • Opcode ID: 81f26c1579a1c32cc182f5bcf8aaf14ff121340b3c3949b4713fb3e98bc94f40
    • Instruction ID: 0b3387f19b7e7e38c764ac6160733cf570bf9258bdaf7d632e70e72ec5da961c
    • Opcode Fuzzy Hash: 81f26c1579a1c32cc182f5bcf8aaf14ff121340b3c3949b4713fb3e98bc94f40
    • Instruction Fuzzy Hash: 9AF18B7090060D8FDB10DF69CA487AEFBB1EF45320F148698E559EB392EB349A44CF91
    APIs
    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00A4FC1B
    • SendMessageW.USER32(00000000,00000439,00000000,0000002C), ref: 00A4FC2B
    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00A4FC40
    • SendMessageW.USER32(00000000,00000418,00000000,0000012C), ref: 00A4FC51
    • GetWindowTextLengthW.USER32(?), ref: 00A4FC54
    • SendMessageW.USER32(?,000000D6,-00000001,00000000), ref: 00A4FC64
    • GetWindowRect.USER32(?,?), ref: 00A4FC92
      • Part of subcall function 00A512B0: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,00A4FDEC,00000000,BACC40AC,?,?), ref: 00A51328
      • Part of subcall function 00A00DB0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00A00DE6
    • SendMessageW.USER32(00000000,00000412,00000000), ref: 00A4FCF4
    • SendMessageW.USER32(00000000,00000411,00000001,0000002C), ref: 00A4FD04
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$Window$LengthLongRectText
    • String ID: ,
    • API String ID: 2970668393-3772416878
    • Opcode ID: 6702fc74a617cefbeabc9b28c8fc584e6dde79fd2be83d3ced11640dc0f4fd60
    • Instruction ID: a25d600da7da2b4f426479e1d307615dc49b60ea900ae38dc6ab1721b0989896
    • Opcode Fuzzy Hash: 6702fc74a617cefbeabc9b28c8fc584e6dde79fd2be83d3ced11640dc0f4fd60
    • Instruction Fuzzy Hash: D5A11671A002089FDB14DFA9CD95BAEBBF9FF48300F50462AE516EB291DB74A905CB50
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: $/$AI_BTN_HIDE_TEXT_
    • API String ID: 0-2260284092
    • Opcode ID: 1564908a637397765251322257ef243b910630d2bef1289f7d8af89fdfaedac3
    • Instruction ID: 6d60ddfcf254c2a480144e4a7be9e69f0ed381615929cc6b34c99d035b830c42
    • Opcode Fuzzy Hash: 1564908a637397765251322257ef243b910630d2bef1289f7d8af89fdfaedac3
    • Instruction Fuzzy Hash: 4D925970D00258CFDB15DFA8C955BDDBBB4AF55304F1482DAE4097B292EB706A88CFA1
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • _wcschr.LIBVCRUNTIME ref: 00B1A6D9
    • GetLogicalDriveStringsW.KERNEL32(00000064,?), ref: 00B1A82E
    • GetDriveTypeW.KERNEL32(?), ref: 00B1A84A
    • Wow64DisableWow64FsRedirection.KERNEL32(00000000,00000000), ref: 00B1AA37
    • Wow64RevertWow64FsRedirection.KERNEL32(00000000,00000000), ref: 00B1AAC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Wow64$DriveInit_thread_footerRedirection$DisableHeapLogicalProcessRevertStringsType_wcschr
    • String ID: ]%!
    • API String ID: 2638324580-1069524040
    • Opcode ID: a4b86265a82f46871f03d14ad0960c0a35f3f4b0a66e6fe44d6737f85c70404a
    • Instruction ID: bd2ddc4a24baefb93ed3fef33a89dcc3df16c3bd4a7bb388244ece2364c19f16
    • Opcode Fuzzy Hash: a4b86265a82f46871f03d14ad0960c0a35f3f4b0a66e6fe44d6737f85c70404a
    • Instruction Fuzzy Hash: 7EF1C030901659CFDB24DB68C884BEDB7F4EF44310F5482E9E45AAB291DB70AE84CF91
    APIs
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00AD2C80
    • SendMessageW.USER32(?,00000443,00000000), ref: 00AD2CEA
    • MulDiv.KERNEL32(?,00000000), ref: 00AD2D21
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSendWindow
    • String ID: NumberValidationTipMsg$NumberValidationTipTitle$Segoe UI
    • API String ID: 701072176-2319862951
    • Opcode ID: e32c96f0514b7faadad1cf2f3e5a97cc326a13fb806725141bf0a1e8609d99bb
    • Instruction ID: 3a59a016d11db60eb0063b5a58f7154e64bd55198e96bc2a15d1368bdb327001
    • Opcode Fuzzy Hash: e32c96f0514b7faadad1cf2f3e5a97cc326a13fb806725141bf0a1e8609d99bb
    • Instruction Fuzzy Hash: 52C1AD71A00709AFEB14DF64CC55BEEB7B1FF89300F008299E556A72D1DB74AA49CB90
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • GetACP.KERNEL32(?,?,?,?,?,?,00B993AE,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00BA3C41
    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00B993AE,?,?,?,00000055,?,-00000050,?,?), ref: 00BA3C6C
    • _wcschr.LIBVCRUNTIME ref: 00BA3D00
    • _wcschr.LIBVCRUNTIME ref: 00BA3D0E
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00BA3DCF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
    • String ID: utf8
    • API String ID: 4147378913-905460609
    • Opcode ID: dfe319e4e7684dbde184fb8eac081bdfeb450694332fabeffd3a7c9accbf5a8e
    • Instruction ID: 64645dbcccfdbad9f1d295c7a913104de1ef59089b9a7b1dc85519b751cd8ccc
    • Opcode Fuzzy Hash: dfe319e4e7684dbde184fb8eac081bdfeb450694332fabeffd3a7c9accbf5a8e
    • Instruction Fuzzy Hash: 5B71D671A08305AADB24AB79CC86BAAB3E9EF46B50F1444BAF545D7181FB70DE40C760
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: __floor_pentium4
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
    • API String ID: 4168288129-2761157908
    • Opcode ID: b481e5488f695aae3bd4a800d0cd9c9dc6c283a0f868bd90f81b2a411148afba
    • Instruction ID: 1fb2c5ac144406488266c8818bbcaf1b9c413bcc7dafc8763f640966052f8bd7
    • Opcode Fuzzy Hash: b481e5488f695aae3bd4a800d0cd9c9dc6c283a0f868bd90f81b2a411148afba
    • Instruction Fuzzy Hash: 10D22771E082298FDB65CE28CD807EAB7F5EB46304F1445EAD44DE7240EB38AE859F51
    APIs
    • FindFirstFileW.KERNEL32(?,00000000,-00000010,?,BACC40AC,?,00000000,00000000), ref: 00B2FBF1
    • FindNextFileW.KERNEL32(?,00000000), ref: 00B2FC0C
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: FileFind$FirstNext
    • String ID:
    • API String ID: 1690352074-0
    • Opcode ID: 799d0c101d834913b369949587db09b0fedaaa418db4164097679267203c7dbd
    • Instruction ID: 5fe0e0786911eaf72160b039970db7e453831b79b37d1ed0d5fa8f1b0dd43fd8
    • Opcode Fuzzy Hash: 799d0c101d834913b369949587db09b0fedaaa418db4164097679267203c7dbd
    • Instruction Fuzzy Hash: E9716B7190164D9FDB10DFA8CD58BAEBBB4FF04314F2482A9E815AB291DB349A08CB51
    APIs
    • IsProcessorFeaturePresent.KERNEL32(0000000C,00B85BBD,00000000,?,00B85D55,00000000), ref: 00B85CA3
    • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,?,00B85D55,00000000), ref: 00B85CCA
    • HeapAlloc.KERNEL32(00000000,?,00B85D55,00000000), ref: 00B85CD1
    • InitializeSListHead.KERNEL32(00000000,?,00B85D55,00000000), ref: 00B85CDE
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00B85D55,00000000), ref: 00B85CF3
    • HeapFree.KERNEL32(00000000,?,00B85D55,00000000), ref: 00B85CFA
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
    • String ID:
    • API String ID: 1475849761-0
    • Opcode ID: f7cd711b5e23283011d7bc7a0b2996b735e478c8ca6250c885b9912547a7b3c3
    • Instruction ID: f37a66760675009e475e370a124ba29f68a4dbf5e9e88af55ccd040b7b1991ac
    • Opcode Fuzzy Hash: f7cd711b5e23283011d7bc7a0b2996b735e478c8ca6250c885b9912547a7b3c3
    • Instruction Fuzzy Hash: 67F06835641A019BD7605F69AC0CF1E77E8FB98716F028479FA82D3260DF70D405CB60
    APIs
    • GetLocaleInfoW.KERNEL32(?,2000000B,00BA462D,00000002,00000000,?,?,?,00BA462D,?,00000000), ref: 00BA43A8
    • GetLocaleInfoW.KERNEL32(?,20001004,00BA462D,00000002,00000000,?,?,?,00BA462D,?,00000000), ref: 00BA43D1
    • GetACP.KERNEL32(?,?,00BA462D,?,00000000), ref: 00BA43E6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID: ACP$OCP
    • API String ID: 2299586839-711371036
    • Opcode ID: fc05bd5a9308f14b472db2f38b59241a4d6eee37e0d7c98d663a902d3a26c3e4
    • Instruction ID: de9cbb79ccdf222a1a77c4b7cdffa52ae952595c90b96fe21c632de3efff816e
    • Opcode Fuzzy Hash: fc05bd5a9308f14b472db2f38b59241a4d6eee37e0d7c98d663a902d3a26c3e4
    • Instruction Fuzzy Hash: 5421AF32608101ABDF349F94C941B9F72EAEFD6B54B5A84F4E94AD7200E7B2DD41C398
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00BA45F0
    • IsValidCodePage.KERNEL32(00000000), ref: 00BA4639
    • IsValidLocale.KERNEL32(?,00000001), ref: 00BA4648
    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00BA4690
    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00BA46AF
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
    • String ID:
    • API String ID: 415426439-0
    • Opcode ID: c79d9e366ef42a9f4662d297722e40c8ab09e75f0129cd860e8cec4757a6485c
    • Instruction ID: f62b534f1649c7459a52b55499f2039be98e221925eae541bb0c50beb054626e
    • Opcode Fuzzy Hash: c79d9e366ef42a9f4662d297722e40c8ab09e75f0129cd860e8cec4757a6485c
    • Instruction Fuzzy Hash: 5A516D71904205ABDF10DFA9CC85BAEB7F8FF9A700F1444A9E915E7191EBB09A04CB61
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: _strrchr
    • String ID:
    • API String ID: 3213747228-0
    • Opcode ID: 61616e26537ace8c997b701a72d866b1042ed0193a591e10dac063b8da873d44
    • Instruction ID: 60428563e496bedc178e36f34f1d42004f1d7e85a580dfe5304d9b0355a6c911
    • Opcode Fuzzy Hash: 61616e26537ace8c997b701a72d866b1042ed0193a591e10dac063b8da873d44
    • Instruction Fuzzy Hash: 38B12572A042459FDF25CF69C8827EEBBE5EF59340F1581FAE815AB242D274DD01CBA0
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • FindFirstFileW.KERNEL32(?,00000000,?,?,00000000), ref: 00AF3BA8
    • FindFirstFileW.KERNEL32(?,00000000,0000002A,?,00000000,?,?,00000000), ref: 00AF3C45
    • FindClose.KERNEL32(00000000,?,00000000,?,?,00000000), ref: 00AF3C6B
    • FindClose.KERNEL32(00000000,?,00000000,?,?,00000000), ref: 00AF3CB5
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Find$CloseFileFirstInit_thread_footer$HeapProcess
    • String ID:
    • API String ID: 3625725927-0
    • Opcode ID: ffb791c0f20d43b7e4537e09f516581654298eea583eb08518480c4ff890b218
    • Instruction ID: 4912e90d22f82deed922eb07ce9952082a9b11ee0d9fc6d658801998153144b2
    • Opcode Fuzzy Hash: ffb791c0f20d43b7e4537e09f516581654298eea583eb08518480c4ff890b218
    • Instruction Fuzzy Hash: 96A1C272A001099FDF14DFA8CC49BBEB7F4FF44324F14866AE915D7280E7B59A048B90
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ec6551e537fb68310dbf9e1477edc96571fc23b8d09dd2e59f05f77b5be81245
    • Instruction ID: 33c3f042f9f5eee76f4e3848493532ee286ac177bee42a324377c3462743f324
    • Opcode Fuzzy Hash: ec6551e537fb68310dbf9e1477edc96571fc23b8d09dd2e59f05f77b5be81245
    • Instruction Fuzzy Hash: A7818B71901218DFDB60DF68CC89B99B7F4EF44314F5482D9E818AB292DB709E84CF91
    APIs
    • FindResourceW.KERNEL32(00000000,?,00000017,BACC40AC,?,?,?,?,?,?,00000000,Function_001C791D,000000FF), ref: 00A8AB88
    • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,Function_001C791D,000000FF), ref: 00A8AB9B
    • LockResource.KERNEL32(00000000,?,?,?,?,?,?,00000000,Function_001C791D,000000FF), ref: 00A8ABAA
    • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,Function_001C791D,000000FF), ref: 00A8ABBA
      • Part of subcall function 00AF1480: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,BACC40AC,00000000,00000000,?,?,00A8ABD5), ref: 00AF14D4
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Resource$ByteCharFindLoadLockMultiSizeofWide
    • String ID:
    • API String ID: 203124936-0
    • Opcode ID: cfe9bd7da6dbbbb014a3ee2d42e669d8d800f2c7fd33f878a92795b0d6faa24f
    • Instruction ID: 2b6cf15c843a72a4d9382c3e9a0412087450eae64e7ea79258feacedde823db6
    • Opcode Fuzzy Hash: cfe9bd7da6dbbbb014a3ee2d42e669d8d800f2c7fd33f878a92795b0d6faa24f
    • Instruction Fuzzy Hash: 8C31E6B1D04709ABE720AFB4DD45BAFF7B4EB54710F00462AE955A73C0EB70A904C7A1
    APIs
    • FindFirstFileW.KERNEL32(?,?,00000000,?), ref: 00B1B88C
    • FindClose.KERNEL32(00000000), ref: 00B1B9D7
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Find$AllocateCloseFileFirstHeap
    • String ID: %d.%d.%d.%d
    • API String ID: 1673784098-3491811756
    • Opcode ID: 06493c3c3110ec7240b4c8074344e8b25745c1fd9a713cb3cd421e7924d811d7
    • Instruction ID: 29e033b282acc05eda4a066eb142224e371c3d829cdc1f75d293e961ba324e91
    • Opcode Fuzzy Hash: 06493c3c3110ec7240b4c8074344e8b25745c1fd9a713cb3cd421e7924d811d7
    • Instruction Fuzzy Hash: AB615A71905219DFDF20DF68C849BADBBB4EF44314F1082D9E919AB291DB369A84CF90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: AI_CONTROL_VISUAL_STYLE$AI_CONTROL_VISUAL_STYLE_EX$AI_NO_BORDER_HOVER$AI_NO_BORDER_NORMAL
    • API String ID: 0-932585912
    • Opcode ID: 60ce9bf19a6b5ccfafba556a3d0cf30ee70513368a342d6a8886da5ecbbfe1d3
    • Instruction ID: 3f7ffe705899e4255b9d03e7b7a3a241f4a915c2250620adb7fc98ce370debd5
    • Opcode Fuzzy Hash: 60ce9bf19a6b5ccfafba556a3d0cf30ee70513368a342d6a8886da5ecbbfe1d3
    • Instruction Fuzzy Hash: 03D19F70D0021CDFDB04DFA9CC45BAEBBF1BF85304F1081A9E455AB285D778AA09DBA1
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BA3FE7
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BA4031
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BA40F7
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: InfoLocale$ErrorLast
    • String ID:
    • API String ID: 661929714-0
    • Opcode ID: e1058f5c84ceef2f5b314485f46abf21827b193557e9e9db9b1feca3799f74cf
    • Instruction ID: 0b63a2f0efe388d620e16eb8c447f6ee158babf7667e5345e51dedb633dd8f0c
    • Opcode Fuzzy Hash: e1058f5c84ceef2f5b314485f46abf21827b193557e9e9db9b1feca3799f74cf
    • Instruction Fuzzy Hash: 4861B3716181079FDF289F29CC82BBABBE8EF55300F1041FAE905D6681EBB4D981DB50
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer
    • String ID: &$</a>$<a>
    • API String ID: 1385522511-4150034113
    • Opcode ID: d6bd4d0eb5a05cb74a977ff8e6446ec196ab8dae9b9f12b1b964b2a0b1fcdc98
    • Instruction ID: c1ebc5034264ffbe7e2c5155a94a2bd56a04196b89c3f0e1019234c99c26ad56
    • Opcode Fuzzy Hash: d6bd4d0eb5a05cb74a977ff8e6446ec196ab8dae9b9f12b1b964b2a0b1fcdc98
    • Instruction Fuzzy Hash: 78923570D012A9DFDB20DFA8C944BDDBBB4AF59304F1085E9E509B7291DB745A88CF60
    APIs
    • IsWindow.USER32(00000004), ref: 00A088DE
    • GetWindowLongW.USER32(00000004,000000FC), ref: 00A088F7
    • SetWindowLongW.USER32(00000004,000000FC,?), ref: 00A08909
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Long
    • String ID:
    • API String ID: 847901565-0
    • Opcode ID: b65b010cc837f1499d80880e09490995b799fa942f2c5fe6b7676cd9589323ad
    • Instruction ID: 282973cba63285f735865748ed4694be2b208f2c3858cd2093196a8f66c58deb
    • Opcode Fuzzy Hash: b65b010cc837f1499d80880e09490995b799fa942f2c5fe6b7676cd9589323ad
    • Instruction Fuzzy Hash: 2F419CB0600A46EFDB14DF64D908B5AFBF8FF04354F004269E464976E0DB7AE914CB91
    APIs
    • GetWindowLongW.USER32(00000003,000000FC), ref: 00A0C546
    • SetWindowLongW.USER32(00000003,000000FC,?), ref: 00A0C558
    • DeleteCriticalSection.KERNEL32(?,BACC40AC,?,?,?,?,00BB19C4,000000FF), ref: 00A0C583
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: LongWindow$CriticalDeleteSection
    • String ID:
    • API String ID: 1978754570-0
    • Opcode ID: 69d55fe34adf2e042a89df58986f926720044a62f7bf6807d5090cbb83b4c959
    • Instruction ID: 59dc2d16bf4d05edc5b9442372bbde34d6157f6f32dd11c3b26ba6a1c84652ed
    • Opcode Fuzzy Hash: 69d55fe34adf2e042a89df58986f926720044a62f7bf6807d5090cbb83b4c959
    • Instruction Fuzzy Hash: 1731CDB4A00646EBCF20DF28DD48B9EBBE8BB05320F104359F814A76E1D771EA15DB90
    APIs
    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00B8AE0B
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00B8AE15
    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00B8AE22
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$DebuggerPresent
    • String ID:
    • API String ID: 3906539128-0
    • Opcode ID: 069c3cfe7c7acca903acefcd4328dd9e7449dc1b9662dc9a995d2599ddac8453
    • Instruction ID: c9a864bafdf4d9e17fd854b6bc59854cb58af944aced96543e21eec6b57a301f
    • Opcode Fuzzy Hash: 069c3cfe7c7acca903acefcd4328dd9e7449dc1b9662dc9a995d2599ddac8453
    • Instruction Fuzzy Hash: A031B375901218ABCB21EF64D88978DBBF8AF08310F6045EAE41CA7261EB709F85CF45
    APIs
    • GetWindowLongW.USER32(?,000000FC), ref: 00A01689
    • SetWindowLongW.USER32(?,000000FC,?), ref: 00A01697
    • DestroyWindow.USER32(?,?,?,?,?,?,80004003,?,00000001,?,?,00000001,?,?,00C1383C), ref: 00A016C3
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Long$Destroy
    • String ID:
    • API String ID: 3055081903-0
    • Opcode ID: f25919a08f2fd0f78dd0e3bfd1215d7421de6e08cdbf8a60cb0bfc8ca20167c2
    • Instruction ID: 00c8f6773a52a11ee8b9b5da6eb4bb0b653c9b55b8f54cb56186c0cc2a37c03b
    • Opcode Fuzzy Hash: f25919a08f2fd0f78dd0e3bfd1215d7421de6e08cdbf8a60cb0bfc8ca20167c2
    • Instruction Fuzzy Hash: BDF0B731004A119BDB655B28FD08F9ABAE5BB05721F148B1DF4AA825F0DB65E845DB10
    APIs
    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00A1774D
    • SendMessageW.USER32(?,0000102B,0000009B,?), ref: 00A17932
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: a063aec26a17ac55bb34a1c89c9131722f63b7c13caaf8c8fe28c7d001cb5a5e
    • Instruction ID: a4bc0afd9c7d04fd71278c9fff587625960e6088d244a268c7252115a00448bd
    • Opcode Fuzzy Hash: a063aec26a17ac55bb34a1c89c9131722f63b7c13caaf8c8fe28c7d001cb5a5e
    • Instruction Fuzzy Hash: 55A1E571A04206AFDB18DF24C995BEDFBF5FB14300F14826AE45ADB291D734EA85CB90
    APIs
    • FindFirstFileW.KERNEL32(?,00000000,?,?,00000003,BACC40AC,00000000,?,00000000), ref: 00B0E48E
    • FindClose.KERNEL32(00000000,?,00000000), ref: 00B0E4D9
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: 07b1ba457b4f4db39351ec778663cf97afe379e76edb8ef0eece2781acdf72c8
    • Instruction ID: ecdca90102d067ca79d5026b8b36896ffd4ebdcbadcac43e795ffcb90fee601e
    • Opcode Fuzzy Hash: 07b1ba457b4f4db39351ec778663cf97afe379e76edb8ef0eece2781acdf72c8
    • Instruction Fuzzy Hash: 4651707190060ADFDB21DF68C888BAEBBF4FF44318F104999E925AB381D7749A05CF91
    APIs
    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,BACC40AC,00000008,00000000), ref: 00AF227B
    • GetLastError.KERNEL32 ref: 00AF2285
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorFormatLastMessage
    • String ID:
    • API String ID: 3479602957-0
    • Opcode ID: c0312f9f8eef1e0eda5963ad5aac5713b8ae680b1ea208be4d89799e2a8c17f4
    • Instruction ID: bcace2c3a9c605975579406070bb134b1843ee78c5d1f39e46e97e19d20ac7b5
    • Opcode Fuzzy Hash: c0312f9f8eef1e0eda5963ad5aac5713b8ae680b1ea208be4d89799e2a8c17f4
    • Instruction Fuzzy Hash: BB319371A00219ABDB10DF99DC05BAEBBF8FB44714F10452EF518E73C0DBB599048B95
    APIs
    • GetWindowLongW.USER32(00000000,000000FC), ref: 00A5007F
    • SetWindowLongW.USER32(00000000,000000FC,?), ref: 00A5008D
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: LongWindow
    • String ID:
    • API String ID: 1378638983-0
    • Opcode ID: 569cf7389cffa08b826aedf0933c9ab1e2c334b37596af82e6ec87b303e89454
    • Instruction ID: 5cbfed782a8d290c86444bee727e74850d03fb0cbb7bfdac4c4bef2a8e8823c5
    • Opcode Fuzzy Hash: 569cf7389cffa08b826aedf0933c9ab1e2c334b37596af82e6ec87b303e89454
    • Instruction Fuzzy Hash: E8315971900605EFCB20DF69D944F9EFBF4FB04320F148269E824A76E1D775A954CB90
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,BACC40AC,?,00000000,00000000,00000000,00BF351D,000000FF), ref: 00B1E678
    • FindClose.KERNEL32(00000000,?,BACC40AC,?,00000000,00000000,00000000,00BF351D,000000FF), ref: 00B1E6C2
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: 4facbbe59ac1b0580de271f23a67f833a07d94c68cc926b03a46366fea754587
    • Instruction ID: 197e6907a3fd904f7d7c351d8d56b49c36ac5b551b00c02ebb082a436f8c757a
    • Opcode Fuzzy Hash: 4facbbe59ac1b0580de271f23a67f833a07d94c68cc926b03a46366fea754587
    • Instruction Fuzzy Hash: CD21A171900548DFDB10EF68DC49BAEB7B8EF84724F544269E825972D0DB309A08CB94
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: 2
    • API String ID: 0-450215437
    • Opcode ID: f80b93e4318b0e5d5462c18e1275ebe3d62dab458fe0826b170f3988e9eb9342
    • Instruction ID: 38e72257805320458cf97e2cb0a0354861f2fb4c6fa0b9327973e6e9bf4b24b0
    • Opcode Fuzzy Hash: f80b93e4318b0e5d5462c18e1275ebe3d62dab458fe0826b170f3988e9eb9342
    • Instruction Fuzzy Hash: 2F32BFB1A04B118BCB14DF29E98156BB7E6BF94308F14493EF5C6D7281EA34E948C793
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BA423A
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID:
    • API String ID: 3736152602-0
    • Opcode ID: c8e17042f07d394ebd2c4d521b2aafa980e45a871c37093ce5a03bd94b69a276
    • Instruction ID: 482f4f022000b74d64976e8cee4f4d9bf39794b578c2260a3908703f4cfd9b62
    • Opcode Fuzzy Hash: c8e17042f07d394ebd2c4d521b2aafa980e45a871c37093ce5a03bd94b69a276
    • Instruction Fuzzy Hash: B0218372528206AFDF28AE29DC42BBA77E8EF86310B1040BAFD05D6241EBB4DD05C750
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • EnumSystemLocalesW.KERNEL32(00BA3F93,00000001,00000000,?,-00000050,?,00BA45C4,00000000,?,?,?,00000055,?), ref: 00BA3EDF
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: 173514eac05684485e97a5c9c635487d378572b38f7cccd0da484e260b2470bd
    • Instruction ID: e56981762c910c45834d7031e874be40724555cd6f8feed8d6d95b9f03f0e8ad
    • Opcode Fuzzy Hash: 173514eac05684485e97a5c9c635487d378572b38f7cccd0da484e260b2470bd
    • Instruction Fuzzy Hash: 25112936A087019FDB189F39C89167ABBE2FF81758B14442DF98787A40E3716A42C740
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00BA4290,00000000,00000000,?), ref: 00BA4441
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID:
    • API String ID: 3736152602-0
    • Opcode ID: a33e5f4dead7a2173f81d9f527cf093736958a8d8dbec7af063905767fd6d4d7
    • Instruction ID: c49dfb220694c1625d5b9d38db633f0226e14477f4ebe7d88301a27f9af6d9ec
    • Opcode Fuzzy Hash: a33e5f4dead7a2173f81d9f527cf093736958a8d8dbec7af063905767fd6d4d7
    • Instruction Fuzzy Hash: 16F02D32914111BBDF285725CC457BE77E4EB85754F0544A4ED95A3240EFB4FE42C6A0
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00BA3DCF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID: utf8
    • API String ID: 3736152602-905460609
    • Opcode ID: 721e5b5299229d14095b37e139842cdcdd840f9f76a839be7bd714715ef5c0e5
    • Instruction ID: e3020232857bf360a2ade23e06f9e27e0b24e6cf1c5f3eb9ac16f6a7e2e75ab9
    • Opcode Fuzzy Hash: 721e5b5299229d14095b37e139842cdcdd840f9f76a839be7bd714715ef5c0e5
    • Instruction Fuzzy Hash: 50F0C832A11105ABCB28AB39DC4ABBE73E8DF45750F1140B9BA46D7241EA74AD05C750
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • EnumSystemLocalesW.KERNEL32(00BA41E6,00000001,?,?,-00000050,?,00BA4588,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00BA3F52
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: 7067eacbe44447b476d567fade0c6b20b4126978d7aaa69317b9ef8a5df96428
    • Instruction ID: 9957d0c733ac581706d78c4d07ac4b37c163c5db7eaa3b3a6f4a89ccfa47c7c2
    • Opcode Fuzzy Hash: 7067eacbe44447b476d567fade0c6b20b4126978d7aaa69317b9ef8a5df96428
    • Instruction Fuzzy Hash: CAF0F6366083046FDB245F399CC1A7ABBE5FF81B68F4584ACF9458B690D7B29D42C610
    APIs
      • Part of subcall function 00B9A89A: EnterCriticalSection.KERNEL32(-00C95108,?,00B9CE16,009F9F56,00C89668,0000000C,00B9D0E1,?), ref: 00B9A8A9
    • EnumSystemLocalesW.KERNEL32(00B9FBFC,00000001,00C897A8,0000000C,00BA002B,00000000), ref: 00B9FC41
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalEnterEnumLocalesSectionSystem
    • String ID:
    • API String ID: 1272433827-0
    • Opcode ID: 22f84db852cb6a85d5490c0272ad4c6be55be9d40386caf8fef5e6c39383222c
    • Instruction ID: 09079525762a0cd26508906aedc4cccb83d8bad8dca4f9e8d8cb4ba977df9e9b
    • Opcode Fuzzy Hash: 22f84db852cb6a85d5490c0272ad4c6be55be9d40386caf8fef5e6c39383222c
    • Instruction Fuzzy Hash: B3F037B6A50205EFDB00EFA8E842BACBBF0EB44721F1081AAF404DB2A1CB7549418B54
    APIs
      • Part of subcall function 00B9D836: GetLastError.KERNEL32(?,00000008,00B9F453), ref: 00B9D83A
      • Part of subcall function 00B9D836: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00B9D8DC
    • EnumSystemLocalesW.KERNEL32(00BA3D7B,00000001,?,?,?,00BA45E6,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00BA3E59
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: e96194a51f05354ac608ef0eb27685b0e6ec322bfa496dad958744708fbc58cc
    • Instruction ID: 9b8d5331b8e6c04a60c1b7ec6fad001117b9785f9f5ce091dc16e7abcb7a5413
    • Opcode Fuzzy Hash: e96194a51f05354ac608ef0eb27685b0e6ec322bfa496dad958744708fbc58cc
    • Instruction Fuzzy Hash: 47F0553A30020597CB04AF3AD84576ABFD0EFC2B50B0A40A9FA098B260C7319943C760
    APIs
    • NtdllDefWindowProc_W.NTDLL(?,-00002000,?,?,00A0FD16,?,?,?,?,?,?,?,?,00A15411,?,?), ref: 00A11640
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: NtdllProc_Window
    • String ID:
    • API String ID: 4255912815-0
    • Opcode ID: 0e767cf8f8a72a3ea2423027c3ce6524426cf8a7a74c0e3044648026fb65fe3c
    • Instruction ID: 43825ad9f7cf21bd0ddb3ca9adb9f6a71e293aa2333c6b5ca28490df57f86d68
    • Opcode Fuzzy Hash: 0e767cf8f8a72a3ea2423027c3ce6524426cf8a7a74c0e3044648026fb65fe3c
    • Instruction Fuzzy Hash: 21F05830104181DEE3448F54C898BA9BBAAFB4538AF4C45F6E2A8C55A1C23A8E84DE10
    APIs
    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00B99F14,?,20001004,00000000,00000002,?,?,00B99516), ref: 00BA01BA
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: d8c69f2cbfc3df65b2e1db04e14c83a5da2cae9236d3bd778ba3af6d3f2efac0
    • Instruction ID: 46211ca3818ef02a6cf6b083794df1e1a895f5c1fa6c25347aa168f011c3ef97
    • Opcode Fuzzy Hash: d8c69f2cbfc3df65b2e1db04e14c83a5da2cae9236d3bd778ba3af6d3f2efac0
    • Instruction Fuzzy Hash: 1AE04F31515518BBCF123F61DC04BEE7EA5EF45760F018060FD45A5121CB318921AAD4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: 1
    • API String ID: 0-2212294583
    • Opcode ID: df452b81a4ae5ed29d11c32b08c81259c73d0d54b512e16dc1746d3661b90f98
    • Instruction ID: 5996ef7d5fbd8ad9226db8aae98e4e39c7d5dc9a3d603cd644cc3cf513efb332
    • Opcode Fuzzy Hash: df452b81a4ae5ed29d11c32b08c81259c73d0d54b512e16dc1746d3661b90f98
    • Instruction Fuzzy Hash: CAD104B0505B86EFE709CF64C5587CAFBF4BB05308F14824DD4685B281D3BAA658DBD1
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 60179cadf2a73e4acb5adfe04ad106e66877190d97820f38112b7cb41a975170
    • Instruction ID: 2ba0bcf9ebc87c913e9441ad3293291bd188ff4d18c94946923e705833387d59
    • Opcode Fuzzy Hash: 60179cadf2a73e4acb5adfe04ad106e66877190d97820f38112b7cb41a975170
    • Instruction Fuzzy Hash: 7402C472A102159FDB18DF68C885BAEB7F5EB58310F15426EE815E7391EB31AD04CBA0
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8946584d937198e9c5ee5660420c7c1d59923a6e37ca30c4d153176cea3fa053
    • Instruction ID: 82451b4d27c3d81b5433b233ad9cc61b90abb4c3ef2df1c8e6cad334dc420d05
    • Opcode Fuzzy Hash: 8946584d937198e9c5ee5660420c7c1d59923a6e37ca30c4d153176cea3fa053
    • Instruction Fuzzy Hash: 4BE19B74A00606CFCB28EF68C580AAEB7F1FF45710B244699E4769B2B1E770ED42CB51
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8d5ffbd466cba5f462ba001dc336896042cf0834f3aa64ecef15a2589dacdb26
    • Instruction ID: 09b6407c9087040c2143e4d43edfe650b9d596bdbfd71331d599e23a7594bfa2
    • Opcode Fuzzy Hash: 8d5ffbd466cba5f462ba001dc336896042cf0834f3aa64ecef15a2589dacdb26
    • Instruction Fuzzy Hash: 0CB1A571E001199FCB18DF5CC991AAEBBF5EF98340F548169E905EB395EB70AD01CB90
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5ca3fcc2ea209e883589c373435a2f6d4694b8531974e170d0edc7f5054e2973
    • Instruction ID: fea83af7c9b364608cf0a77e679362337de6ca814eb6f486a9d00e62b90e017d
    • Opcode Fuzzy Hash: 5ca3fcc2ea209e883589c373435a2f6d4694b8531974e170d0edc7f5054e2973
    • Instruction Fuzzy Hash: 6CC1DE70A00646CFCB25EF68C4906BEBBE1EF15314F2846A9E4A6973B2D730EC45CB55
    Memory Dump Source
    • Source File: 00000000.00000003.2190220570.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, Offset: 006CC000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_3_6cc000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b020bbd38188765a5bac1f25dbfdf7699e7eb530306fe0c68414d7b619941983
    • Instruction ID: b0ee60fee72e24e3e66cf59a6a3e26d66e8cbb6a6ad4aa410442c739ab04bdf9
    • Opcode Fuzzy Hash: b020bbd38188765a5bac1f25dbfdf7699e7eb530306fe0c68414d7b619941983
    • Instruction Fuzzy Hash: 0341456194E7C21FD7539B34A9AAB90BFB0AB13610F0D85DFC4C48F5E3D6946619C312
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 770715a4aa328dd82597caeaa001d758df78994585dc71d2706f6ad95872f071
    • Instruction ID: 0585820241df66ade7ddc355f183ef256e1c2fe77eb22debd57edde0e0fce1e1
    • Opcode Fuzzy Hash: 770715a4aa328dd82597caeaa001d758df78994585dc71d2706f6ad95872f071
    • Instruction Fuzzy Hash: BD71F8B0805B48DFE761CF68C95478ABFF0BB05314F108A5EC4A99B391D3B96648DF91
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 36310eb4a256f07c6cffaf1665b37ed3c8e5b7b74aba2bb3fdd12a255edd226e
    • Instruction ID: a57638fb3ad8aff5dbe0ee5b3014fa93ed27506be06c981e6e3f4551b8113af7
    • Opcode Fuzzy Hash: 36310eb4a256f07c6cffaf1665b37ed3c8e5b7b74aba2bb3fdd12a255edd226e
    • Instruction Fuzzy Hash: 2241F6B0905749EED704CF69C50878AFBF0BB19318F20865DD4589BB81D3BAA619CFD1
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 00f682f24fc0d282d3410f6ebe71a78182bf7ee7f06324e3db12eb38bd27afa9
    • Instruction ID: 667822729b09c99e7248848dddc6370d0dd7fadfb953c4137c0df5aa8fb24bca
    • Opcode Fuzzy Hash: 00f682f24fc0d282d3410f6ebe71a78182bf7ee7f06324e3db12eb38bd27afa9
    • Instruction Fuzzy Hash: ED31D0B0405B84CFE721CF69C55878BBFF0BB05728F108A4DD4A64BB91D3BAA548CB91
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2a3b87984966dad9e1141c5555a0e94b5a9be595ff7adcf0af53af22ed230ef6
    • Instruction ID: 385e47aef1bdf0263846f91bb7c756f4dc25de91a6975b32d9e818a2bc9d6b67
    • Opcode Fuzzy Hash: 2a3b87984966dad9e1141c5555a0e94b5a9be595ff7adcf0af53af22ed230ef6
    • Instruction Fuzzy Hash: 882158B0804788DFDB10CF58C944B8ABBF4FB09324F1186AED4559B791E3B9AA44CF94
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c15df7e99a406af5ae0b203d7ab5be82be98657c85ed7ca4e88a543b6a0d9bdc
    • Instruction ID: ddf5ddbc7670376c870bd0b2fef04db56498631a71e402f996d2eec439e07dc2
    • Opcode Fuzzy Hash: c15df7e99a406af5ae0b203d7ab5be82be98657c85ed7ca4e88a543b6a0d9bdc
    • Instruction Fuzzy Hash: FF216DB0804788DFD710CF58C94478ABBF4FB0A324F11869ED455AB791E3B9AA44CF90
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 23331813631094e39c45ff29ef6c3485030f8f4af3782655994aa05615191d5d
    • Instruction ID: 01d18453b20a50036b35cdf956b8815f9945c4772ed173783e82a45a7ade4628
    • Opcode Fuzzy Hash: 23331813631094e39c45ff29ef6c3485030f8f4af3782655994aa05615191d5d
    • Instruction Fuzzy Hash: 691100B1905248DFCB44CF58C544789BBF4FB09728F20869EE8189B381D3769A06DF84
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 53d55dbc7befab1462941653f93551db49e582fd117fd3c7d9640c03956ee69d
    • Instruction ID: 0f8d4ccbbe41463f568317951fa2745a6375a5ff6b75eb3bd6534f6777fddba4
    • Opcode Fuzzy Hash: 53d55dbc7befab1462941653f93551db49e582fd117fd3c7d9640c03956ee69d
    • Instruction Fuzzy Hash: EFE08C32919228EBCB14DB9AC908D8AF3ECEB46B10B1100AAF501D3200C674DE00C7D0
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 144c5401b694974f51f95ed054cfd58255e5e3608f4b0faf65206ff88c737fe7
    • Instruction ID: 4c2b46f80cc4abf1916e33858f91b01898967fb6bde9524ea8e10430e7f57f86
    • Opcode Fuzzy Hash: 144c5401b694974f51f95ed054cfd58255e5e3608f4b0faf65206ff88c737fe7
    • Instruction Fuzzy Hash: AFC08C7404690057CE298A2482713A433E4E3A2782F9024DCC4020BA42C91E9C82D788
    APIs
    • LocalFree.KERNEL32(?,00000000,00000000,0000005C,Everyone,10000000,00000000,?,00000000), ref: 00B32FA9
    • LocalFree.KERNEL32(?,00000000,00000000,0000005C,Everyone,10000000,00000000,?,00000000), ref: 00B32FB9
    • GetLastError.KERNEL32(?,00000000), ref: 00B32FF7
    • LocalAlloc.KERNEL32(00000040,00000014,?,00000000), ref: 00B33036
    • GetLastError.KERNEL32(?,00000000), ref: 00B33050
    • LocalFree.KERNEL32(?,?,00000000), ref: 00B33061
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,BACC40AC,7622F530,?,?), ref: 00B33100
    • GetLastError.KERNEL32 ref: 00B3311E
    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 00B3314B
    • GetLastError.KERNEL32 ref: 00B33155
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B331DA
    • GetLastError.KERNEL32 ref: 00B331E4
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B3321C
    • SystemTimeToFileTime.KERNEL32(00000000,00C1341C), ref: 00B3323D
    • CompareFileTime.KERNEL32(00C1341C,?), ref: 00B3324F
    • PathFileExistsW.SHLWAPI(?,00000005), ref: 00B332EC
    • CreateFileW.KERNEL32(?,C0000000,00000000,0000000C,00000002,00000080,00000000,00000001,S-1-1-0,10000000,00000001), ref: 00B33387
    • GetLastError.KERNEL32 ref: 00B33397
    • CloseHandle.KERNEL32(00000000), ref: 00B3339F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: FileTime$ErrorLast$Local$FreeSystem$Create$AllocCloseCompareExistsHandlePath
    • String ID: .part$S-1-1-0$S-1-5-18
    • API String ID: 1123205858-2727065896
    • Opcode ID: 854d81922872e0b99aacd496f49dd46e76a35582784837ea597cc5a2dc8bfba4
    • Instruction ID: 39cdcdb1b474b961572e496b5fac46f3932799f1e8c21e31f4405c2f2d419a1e
    • Opcode Fuzzy Hash: 854d81922872e0b99aacd496f49dd46e76a35582784837ea597cc5a2dc8bfba4
    • Instruction Fuzzy Hash: 14128B70A007449FDB21CF68C848BABBBF4FF44B04F24456DE552976A0DB71EA48CB50
    Strings
    • Unable to find file , xrefs: 00B24B43
    • Unable to get a temp file for script output, temp path: , xrefs: 00B24C1F
    • Unable to retrieve PowerShell output from file: , xrefs: 00B24E6F
    • txt, xrefs: 00B24BE3
    • powershell.exe -NonInteractive -NoLogo -ExecutionPolicy Unrestricted -WindowStyle Hidden -Command "$host.UI.RawUI.BufferSize = new, xrefs: 00B24C6F
    • Unable to retrieve exit code from process., xrefs: 00B24E92
    • ps1, xrefs: 00B24BB6, 00B24BC8, 00B24BD2
    • Unable to create process: , xrefs: 00B24D15
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: Unable to create process: $Unable to find file $Unable to get a temp file for script output, temp path: $Unable to retrieve PowerShell output from file: $Unable to retrieve exit code from process.$powershell.exe -NonInteractive -NoLogo -ExecutionPolicy Unrestricted -WindowStyle Hidden -Command "$host.UI.RawUI.BufferSize = new$ps1$txt
    • API String ID: 0-4129021124
    • Opcode ID: 00cdb8993cbbf9a1645d9559e7be13fbb01de5eb08f160d2ccf4653d067a86d4
    • Instruction ID: c0cfb38eb3a230e80ac45e1af71c7d94e1e83c254672357615e3ac00a2aede0b
    • Opcode Fuzzy Hash: 00cdb8993cbbf9a1645d9559e7be13fbb01de5eb08f160d2ccf4653d067a86d4
    • Instruction Fuzzy Hash: C2C1CD70D00659EFDB10DBA8DD05BAEBBF4FF04314F108298E518AB691DB70AA44CF90
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • GetModuleHandleW.KERNEL32(kernel32,BACC40AC,?,?,00000000), ref: 00ADA3B3
    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00ADA3FB
    • __Init_thread_footer.LIBCMT ref: 00ADA40E
    • GetProcAddress.KERNEL32(00000000,SetDllDirectory), ref: 00ADA456
    • __Init_thread_footer.LIBCMT ref: 00ADA469
    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00ADA4B1
    • __Init_thread_footer.LIBCMT ref: 00ADA4C4
      • Part of subcall function 00AB1FB0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00AB1FF1
      • Part of subcall function 00AB1FB0: _wcschr.LIBVCRUNTIME ref: 00AB20AF
    Strings
    • kernel32, xrefs: 00ADA3AE
    • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00ADA327, 00ADA32F
    • SetDllDirectory, xrefs: 00ADA450
    • kernel32.dll, xrefs: 00ADA60D
    • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00ADA340, 00ADA34F
    • SetDefaultDllDirectories, xrefs: 00ADA4AB
    • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00ADA347
    • SetSearchPathMode, xrefs: 00ADA3F5
    • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00ADA322
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$AddressProc$DirectoryHandleHeapModuleProcessSystem_wcschr
    • String ID: @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$SetDefaultDllDirectories$SetDllDirectory$SetSearchPathMode$kernel32$kernel32.dll
    • API String ID: 1258094593-3455668873
    • Opcode ID: 2e548cb771ed43b8c2d073620a4fe23f6c9d3cc6bd683e071bd708bdbd16ebfc
    • Instruction ID: 42d39686c59fd78aedafb885310ed93cf5ba490fcda60c298e64e107c267dbf0
    • Opcode Fuzzy Hash: 2e548cb771ed43b8c2d073620a4fe23f6c9d3cc6bd683e071bd708bdbd16ebfc
    • Instruction Fuzzy Hash: E5A13AF09082289FDF10DF54E989B9EBBB4FF01718F50429AE4196BB91D7B05948CFA1
    APIs
    • LoadLibraryW.KERNEL32(Advapi32.dll,BACC40AC,00000000,00000000), ref: 00B32AA1
    • GetLastError.KERNEL32 ref: 00B32ACF
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
    • GetProcAddress.KERNEL32(00000000,ConvertStringSidToSidW), ref: 00B32AE5
    • FreeLibrary.KERNEL32(00000000), ref: 00B32AFE
    • GetLastError.KERNEL32 ref: 00B32B0B
    • GetLastError.KERNEL32 ref: 00B32CF9
    • GetLastError.KERNEL32 ref: 00B32D5E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ErrorLast$Library$AddressAllocateFreeHeapLoadProc
    • String ID: Advapi32.dll$ConvertStringSidToSidW
    • API String ID: 3460774402-1129428314
    • Opcode ID: c4bc456bcf80f8651d7a6096f00f9db60ae6b9f7b1d26224c47a791ac033d53e
    • Instruction ID: 709dde68393a664bb49bff786420ec64f3cbaf04d3e91285c0e997ddf7af390e
    • Opcode Fuzzy Hash: c4bc456bcf80f8651d7a6096f00f9db60ae6b9f7b1d26224c47a791ac033d53e
    • Instruction Fuzzy Hash: 63F159B1C01219ABDF10DF94C945BEEBBF4FF08314F208269E915B7290D770AA59CBA1
    APIs
    • IsWindow.USER32(?), ref: 00A01770
    • lstrcmpW.KERNEL32(?,#32770), ref: 00A017D1
    • GetWindowLongW.USER32(?,000000F0), ref: 00A01871
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Longlstrcmp
    • String ID: #32770
    • API String ID: 2734850466-463685578
    • Opcode ID: 085c151dafb6e680a4dfa04c7060f84a96a801504ec22b1ff4ad96d9811102df
    • Instruction ID: 6ae7430a8b6bd6c41126f0eb2b4bbf58f6d6911ce3838e570d21aff9776cd19a
    • Opcode Fuzzy Hash: 085c151dafb6e680a4dfa04c7060f84a96a801504ec22b1ff4ad96d9811102df
    • Instruction Fuzzy Hash: EBE17B70A01219EFDB15CFA8E988FEDBBB5AF49714F148159E801AB2E0D774AD44CB60
    APIs
    • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,BACC40AC,?,?,00000000,?,?,?,?,?,?,BACC40AC,00BB8E95,000000FF), ref: 00A2D74D
    • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A2D753
    • LoadLibraryW.KERNEL32(combase.dll,CoIncrementMTAUsage,?,?,?,?,?,?,BACC40AC,00BB8E95,000000FF,?,00A445FA,00C1B84C,BACC40AC,BACC40AC), ref: 00A2D783
    • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A2D789
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
    • API String ID: 2574300362-2454113998
    • Opcode ID: b5bf326511c977adb9b04cfee17185d38c5f81fd8af15df65d8a38c1c34899e9
    • Instruction ID: 2a7e312f58b506792d2054ccffdbac8bcefc02b50046856d4b25fd9904004490
    • Opcode Fuzzy Hash: b5bf326511c977adb9b04cfee17185d38c5f81fd8af15df65d8a38c1c34899e9
    • Instruction Fuzzy Hash: 8CA17871A00219EFDF15EFACD885BEDBBB4EF19310F144179E411A72A2EB749A44CB60
    APIs
    • GetWindowLongW.USER32(00000000,000000F0), ref: 00A4A49E
    • SetWindowLongW.USER32(00000000,000000F0,00C80000), ref: 00A4A4CC
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00A4A4E1
    • GetWindowLongW.USER32(00000000,000000EC), ref: 00A4A518
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A4A545
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00A4A559
    • GetWindowLongW.USER32(?,000000F0), ref: 00A4A57B
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A4A592
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00A4A5A6
    • GetWindowRect.USER32(?,?), ref: 00A4A5F6
    • GetWindowLongW.USER32(?,000000EC), ref: 00A4A61C
    • GetWindowRect.USER32(?,?), ref: 00A4A66A
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000604,?,?), ref: 00A4A6A0
    • SetWindowTextW.USER32(?,?), ref: 00A4A6E1
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Long$Rect$Text
    • String ID:
    • API String ID: 445026432-0
    • Opcode ID: c3fe515911e7775d3b94b38b9fda91e7ba175f356d4ddca3a679e0c6f91adfc4
    • Instruction ID: 367e501a17d756dc101b753fa9f77201040dc669467a56d65b5695a1614b4fdd
    • Opcode Fuzzy Hash: c3fe515911e7775d3b94b38b9fda91e7ba175f356d4ddca3a679e0c6f91adfc4
    • Instruction Fuzzy Hash: CC916D75A00609AFDB04DFA8DD49FEDBBB5FF48310F204229F426A72A4DB35A911CB50
    APIs
    • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,BACC40AC,?,?,?,?,?,?,?,BACC40AC,00BB64A5,000000FF,?,00A2371A,00C174D0), ref: 00A23467
    • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A2346D
    • LoadLibraryW.KERNEL32(combase.dll,CoIncrementMTAUsage,?,?,?,?,?,BACC40AC,00BB64A5,000000FF,?,00A2371A,00C174D0,BACC40AC,BACC40AC), ref: 00A2349E
    • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A234A4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
    • API String ID: 2574300362-2454113998
    • Opcode ID: e97c6f6b50e4ab41e4e2b8363181374432f63163005d1f7f23b3afa0a5d4bbbc
    • Instruction ID: f4110ab208947a07e5386f48bece6071f7f4c710e5638677c84a19999ef4e034
    • Opcode Fuzzy Hash: e97c6f6b50e4ab41e4e2b8363181374432f63163005d1f7f23b3afa0a5d4bbbc
    • Instruction Fuzzy Hash: 6C818F72900218EFDF15EFA8D885BEEBBB4EF0A310F144179E415B7291DB749A44CB60
    APIs
    • RegOpenKeyExW.ADVAPI32(80000002,Software\JavaSoft\Java Development Kit\,00000000,?,?,BACC40AC,?,?), ref: 00B1EC83
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,?,?,?), ref: 00B1EE19
    • RegQueryValueExW.ADVAPI32(?,JavaHome,00000000,00000000,00000000,?,?,?,?), ref: 00B1EE75
    • RegQueryValueExW.ADVAPI32(?,JavaHome,00000000,00000000,00000000,?), ref: 00B1EEC5
    • RegCloseKey.ADVAPI32(?), ref: 00B1EF05
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: OpenQueryValue$Close
    • String ID: JavaHome$Software\JavaSoft\Java Development Kit\$Software\JavaSoft\Java Runtime Environment\
    • API String ID: 2529929805-1079072530
    • Opcode ID: 4137147f854f499347925eac6c09f87bdf781bb1618578f07a09d56e0cdc4d26
    • Instruction ID: b8ea1b79c74305a6fc4cc62e2e5397158424f261e0a6ea0cb13d92446bb973e3
    • Opcode Fuzzy Hash: 4137147f854f499347925eac6c09f87bdf781bb1618578f07a09d56e0cdc4d26
    • Instruction Fuzzy Hash: C4026C709012699BDB20DF28CC88BEEB7B4EF44304F5042E9E819A7291DB75AEC5CF50
    APIs
    • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,BACC40AC,?,?,00C96054), ref: 00B281F8
    • LoadLibraryW.KERNEL32(Shell32.dll,?,00C96054), ref: 00B28207
    • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00B2821B
    • SHGetPathFromIDListW.SHELL32(?,00000000), ref: 00B2829A
    • SHGetMalloc.SHELL32(?), ref: 00B282D7
    • PathFileExistsW.SHLWAPI(?,ADVINST_LOGS,0000000C,?,00000000), ref: 00B2832A
    • CreateDirectoryW.KERNEL32(?,?,Everyone,10000000,00000000,?,00000000), ref: 00B283B5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Path$AddressCreateDirectoryExistsFileFolderFromLibraryListLoadLocationMallocProcSpecial
    • String ID: ADVINST_LOGS$Everyone$SHGetSpecialFolderPathW$Shell32.dll
    • API String ID: 1254244429-1733115844
    • Opcode ID: cb1ef7ec99210fc36a210530f31fe67e75272f8393d12034fc7b1abd0d36b46b
    • Instruction ID: 8b732cabd856368ed91c1813daed2ad3932f187bac484b4e672f35543c95e32e
    • Opcode Fuzzy Hash: cb1ef7ec99210fc36a210530f31fe67e75272f8393d12034fc7b1abd0d36b46b
    • Instruction Fuzzy Hash: 00B1CD70D01619DFDB10DFA8D949BAEFBF4EF54310F248299E419B72A0EB749A04CB60
    APIs
    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00A1C95F
    • SendMessageW.USER32(00000000,00000439,00000000,0000002C), ref: 00A1C973
    • SendMessageW.USER32(00000000,00000421,00000003,?), ref: 00A1C988
    • SendMessageW.USER32(00000000,00000418,00000000,0000012C), ref: 00A1C99D
    • GetWindowTextLengthW.USER32(?), ref: 00A1C9A4
    • SendMessageW.USER32(?,000000D6,-00000001,00000000), ref: 00A1C9B4
      • Part of subcall function 00A00DB0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00A00DE6
    • GetWindowRect.USER32(?,?), ref: 00A1C9E6
    • SendMessageW.USER32(00000000,00000412,00000000), ref: 00A1CA48
    • SendMessageW.USER32(00000000,00000411,00000001,0000002C), ref: 00A1CA58
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$Window$LengthLongRectText
    • String ID: ,$tooltips_class32
    • API String ID: 2970668393-3856767331
    • Opcode ID: 947d782bbb350096fa00f7bfae6ca9cd86d0145daaa897c309146373b1b1e8de
    • Instruction ID: e2459df71c66247a2ee09e09529b1e5179b67bebdeb31294099209bfdff1d828
    • Opcode Fuzzy Hash: 947d782bbb350096fa00f7bfae6ca9cd86d0145daaa897c309146373b1b1e8de
    • Instruction Fuzzy Hash: F1914C71A40208AFEB14DFA4DD99FEEBBF9FB08300F10452AE516EA290D774A905CB50
    APIs
    • InitializeCriticalSection.KERNEL32(00C9611C,BACC40AC,?,?,00000000,?,?,?,?,?,00000000,00BEB407,000000FF), ref: 00AF84B3
    • EnterCriticalSection.KERNEL32(?,BACC40AC,?,?,00000000,?,?,?,?,?,00000000,00BEB407,000000FF), ref: 00AF84C5
    • GetCurrentProcess.KERNEL32(?,?,00000000,?,?,?,?,?,00000000,00BEB407,000000FF), ref: 00AF84D2
    • GetCurrentThread.KERNEL32 ref: 00AF84DD
    • GetModuleHandleW.KERNEL32(00000000,*** Stack Trace (x86) ***,0000001F,00000000,?,00C1337C,00000000,?,?,?,?,?,00000000,00BEB407,000000FF), ref: 00AF86BE
    • LeaveCriticalSection.KERNEL32(?,00C1337C,00000000,?,?,?,?,?,00000000,00BEB407,000000FF), ref: 00AF879A
    Strings
    • <--------------------MORE--FRAMES-------------------->, xrefs: 00AF8662
    • [0x%.8Ix] , xrefs: 00AF86C5
    • MODULE_BASE_ADDRESS, xrefs: 00AF870B
    • *** Stack Trace (x86) ***, xrefs: 00AF85B7
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$Current$EnterHandleInitializeLeaveModuleProcessThread
    • String ID: *** Stack Trace (x86) ***$<--------------------MORE--FRAMES-------------------->$MODULE_BASE_ADDRESS$[0x%.8Ix]
    • API String ID: 3051236879-315745733
    • Opcode ID: 34000614f56cb0ab9fde1211d64405a54b6d042fce22a25bc127c656db0ce0b7
    • Instruction ID: edb69f701066f5670c56ae77cfb9bc0cc8406beae999d5487550f17783a44091
    • Opcode Fuzzy Hash: 34000614f56cb0ab9fde1211d64405a54b6d042fce22a25bc127c656db0ce0b7
    • Instruction Fuzzy Hash: E2A159719003889FDF25DFA4CC49BEE7BB8AF45308F404168FA49AB291DBB55B09CB51
    APIs
    • InitializeCriticalSection.KERNEL32(00C96054,BACC40AC,?,00000010), ref: 00B274FC
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    • EnterCriticalSection.KERNEL32(00000010,BACC40AC,?,00000010), ref: 00B27509
    • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00B2753B
    • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00B27544
    • WriteFile.KERNEL32(00000000,00B13C07,6054B9EC,00BF500D,00000000,00C1334C,00000001,?,?,000000FF,00000000), ref: 00B275C6
    • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00B275CF
    • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B27605
    • FlushFileBuffers.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B2760E
    • WriteFile.KERNEL32(00000000,?,?,?,00000000,00C158A8,00000002,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B2766F
    • FlushFileBuffers.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B27678
    • LeaveCriticalSection.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00B276A8
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$BuffersFlushWrite$CriticalSection$AllocateEnterFindHeapInitializeLeaveResource
    • String ID:
    • API String ID: 201293332-0
    • Opcode ID: 1c0be4991e00009ae7d38ac210fec8601231ea47643d3decbe1e45a262d82d0c
    • Instruction ID: b913b0cca7764c2e89d6a596aa1e26bd63590d6875b84750f09c268210e01d7e
    • Opcode Fuzzy Hash: 1c0be4991e00009ae7d38ac210fec8601231ea47643d3decbe1e45a262d82d0c
    • Instruction Fuzzy Hash: EB61CB30900644EFDB01DF68DC49BAEBBB4FF45314F1481A9F945A72A1DB709918DFA4
    APIs
      • Part of subcall function 00AB1FB0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00AB1FF1
      • Part of subcall function 00AB1FB0: _wcschr.LIBVCRUNTIME ref: 00AB20AF
    • GetLastError.KERNEL32(BACC40AC,?,?,?,000000FF,?,00B04196,?,?), ref: 00B1F8ED
    • GetProcAddress.KERNEL32(00000000,GetPackagePath), ref: 00B1FA7A
    • GetProcAddress.KERNEL32(00000000,GetPackagePath), ref: 00B1FADE
    • FreeLibrary.KERNEL32(00000000,?,?,000000FF,?,00B04196,?,?), ref: 00B1FBD2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressProc$DirectoryErrorFreeLastLibrarySystem_wcschr
    • String ID: GetPackagePath$Kernel32.dll$neutral$x64$x86
    • API String ID: 3734293021-4043905686
    • Opcode ID: ad98b27d5fa6e8a74cc0d6827988e6b36bbc8f2a322e35d467e089b7e67d6345
    • Instruction ID: bf4b4f9bec32e47740699e37deda24179f1adf17b8e099c2c52849c912e136a2
    • Opcode Fuzzy Hash: ad98b27d5fa6e8a74cc0d6827988e6b36bbc8f2a322e35d467e089b7e67d6345
    • Instruction Fuzzy Hash: 35C16E70A0120ADFDB04DFA8C894BAEBBF1FF49314F1482A9E515AB391DB749944CF90
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: _wcschr
    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKLM
    • API String ID: 2691759472-1956487666
    • Opcode ID: 084029de4866359f09f3700c6046948607ff5e9558403d83435f7c5c98badcbb
    • Instruction ID: e552cdd0c98cbdcf893da2e901600019dabdc54837aaef7b42b5f60b444b4028
    • Opcode Fuzzy Hash: 084029de4866359f09f3700c6046948607ff5e9558403d83435f7c5c98badcbb
    • Instruction Fuzzy Hash: A941C472E50615AFDF106B58DC02BAAB7F8EB00721F1406B9BC14E26D0EB71DD54DAA1
    APIs
    • EnterCriticalSection.KERNEL32(00C96250,BACC40AC,00000000,?,?,?,?,?,?,009FEE50,00BAF68D,000000FF), ref: 009FF62D
    • LoadCursorW.USER32(00000000,00007F00), ref: 009FF6A8
    • LoadCursorW.USER32(00000000,00007F00), ref: 009FF74E
    • LeaveCriticalSection.KERNEL32(00C96250), ref: 009FF7A3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalCursorLoadSection$EnterLeave
    • String ID: 0$AtlAxWin140$AtlAxWinLic140$WM_ATLGETCONTROL$WM_ATLGETHOST
    • API String ID: 3727441302-283551416
    • Opcode ID: 8bcc646fb071281436a9aa79d04c6fd38543dcfa0064d347943a3aa369f5559f
    • Instruction ID: f00537ccf97e06591b8b674248bc9cccd9f581ea55dd1cc83e1cdd3773ef8b51
    • Opcode Fuzzy Hash: 8bcc646fb071281436a9aa79d04c6fd38543dcfa0064d347943a3aa369f5559f
    • Instruction Fuzzy Hash: 805117B0D11359AFDB11DF94D958BEEBFF8EF08718F10412AE404B7290DBB55A498BA0
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • CreateThread.KERNEL32(00000000,00000000,00A229B0,00C17458,00000000,?), ref: 00A2292A
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00A22943
    • CloseHandle.KERNEL32(00000000), ref: 00A22959
    • CoInitializeEx.COMBASE(00000000,00000000), ref: 00A22A09
    • GetProcessHeap.KERNEL32(?,00000000), ref: 00A22B0B
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 00A22B11
    • GetProcessHeap.KERNEL32(?,00000000), ref: 00A22B90
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 00A22B96
    • CoUninitialize.COMBASE ref: 00A22CEA
    • Concurrency::cancel_current_task.LIBCPMT ref: 00A22D6B
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$Process$FreeInit_thread_footer$CloseConcurrency::cancel_current_taskCreateHandleInitializeObjectSingleThreadUninitializeWait
    • String ID:
    • API String ID: 1779960141-0
    • Opcode ID: 4ff195c9319a7d34eb80230742fcde5effcbfabdf2c9bc02a707086b84b9b71e
    • Instruction ID: 6d6c15dd39257e26135dddb4abafa0bcda377e72ccf3ce187020d69dc62de62f
    • Opcode Fuzzy Hash: 4ff195c9319a7d34eb80230742fcde5effcbfabdf2c9bc02a707086b84b9b71e
    • Instruction Fuzzy Hash: B9F16D70D00258EFDF14DFA8D944BEEBBB8BF45304F248169E805AB291DB749A44CBA1
    APIs
    • VariantClear.OLEAUT32(?), ref: 00A131EA
    • VariantClear.OLEAUT32(?), ref: 00A1321C
    • VariantClear.OLEAUT32(?), ref: 00A13316
    • VariantClear.OLEAUT32(?), ref: 00A13345
    • SysFreeString.OLEAUT32(00000000), ref: 00A1334C
    • SysAllocString.OLEAUT32(00000000), ref: 00A13393
    • VariantClear.OLEAUT32(?), ref: 00A1341A
    • VariantClear.OLEAUT32(?), ref: 00A1344C
    • VariantClear.OLEAUT32(?), ref: 00A13527
    • VariantClear.OLEAUT32(?), ref: 00A13556
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ClearVariant$String$AllocFree
    • String ID:
    • API String ID: 1305860026-0
    • Opcode ID: dea92f1a408ed02225bf22fad21fe744ba31c1bd4a7d660aef012d920632a7a9
    • Instruction ID: 90fe4f83a7d741707370db89d2a9555fae7026e0399ae019a59334ba34039ecb
    • Opcode Fuzzy Hash: dea92f1a408ed02225bf22fad21fe744ba31c1bd4a7d660aef012d920632a7a9
    • Instruction Fuzzy Hash: 08C16C71A00249DFCF10DFA8C844BEEBBB4FF48314F148269E515E7291E778AA45CBA5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: __aulldiv
    • String ID: :$f$f$f$p$p$p
    • API String ID: 3732870572-1434680307
    • Opcode ID: 1178b61a47e1ee776f98a502f026b2fc81aeec6fb9dce8e8658e4671826c8299
    • Instruction ID: 6bcdbeaa2a271d3f1ed8b8f1ad960cd9ff4c194980dee5d4a4fdfc9cd7424868
    • Opcode Fuzzy Hash: 1178b61a47e1ee776f98a502f026b2fc81aeec6fb9dce8e8658e4671826c8299
    • Instruction Fuzzy Hash: D602B035A20208DFDF20AFA9D4856EDBBF6FF51B14FA441A6D414BB281D7309E84CB60
    APIs
    • __Init_thread_footer.LIBCMT ref: 00A89E78
    • GetProcessHeap.KERNEL32(?,?,00000000,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?), ref: 00A89F76
    • HeapFree.KERNEL32(00000000,?,?,00000000,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?), ref: 00A89F7C
    • GetProcessHeap.KERNEL32(?,?,00000000,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?), ref: 00A89FBB
    • HeapFree.KERNEL32(00000000,?,?,00000000,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?), ref: 00A89FC1
    • __Init_thread_footer.LIBCMT ref: 00A8A0D1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$FreeInit_thread_footerProcess
    • String ID: Int32$StateImage%d
    • API String ID: 901118941-2108925653
    • Opcode ID: 0b05593040c62f1257eb0094e096b98ff2adbe3ba3c387756c9d1b21462bfa2a
    • Instruction ID: 27943f2551a24621bf2e5534ea8dc1cfbc36d82b9adc9e956b8c2d6ba1816815
    • Opcode Fuzzy Hash: 0b05593040c62f1257eb0094e096b98ff2adbe3ba3c387756c9d1b21462bfa2a
    • Instruction Fuzzy Hash: C8029AB1D01248DFDB04DFA8C948BDEBBB4FF19314F24826AE415AB291D775AA04CF91
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • ResetEvent.KERNEL32(?,?,?), ref: 00B22C4A
    • SetEvent.KERNEL32(?,?,?,?,?,00000001,08000000,?,?,?), ref: 00B22C83
    • ResetEvent.KERNEL32(?,?,?,?,?,00000001,08000000,?,?,?), ref: 00B22E19
    • SetEvent.KERNEL32(?,?,?,?,?,?,00000001,08000000,?,?,?), ref: 00B22E4B
    • ResetEvent.KERNEL32(?,?,?,?,?,?,00000001,08000000), ref: 00B22F26
    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,00000001,08000000), ref: 00B22F43
    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,00000001,08000000), ref: 00B22F4A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Event$Reset$Init_thread_footerObjectSingleWait$HeapProcess
    • String ID: FTP Server
    • API String ID: 3860647947-688436434
    • Opcode ID: 485d810e2c37f8c6de0e8b45f2e54d68bc2700c3f164266e477d8053980103af
    • Instruction ID: 69dca1e128d682c8d52172a9dcbf683bfe04fbfe7eff9e5c83f4ca6c02ccc126
    • Opcode Fuzzy Hash: 485d810e2c37f8c6de0e8b45f2e54d68bc2700c3f164266e477d8053980103af
    • Instruction Fuzzy Hash: B6D19D70900259EFDF00DF68D988BAEBBF5EF49314F1582A9E818EB291D774D905CB90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: Enabled$Progress$PropertyValue$Text$TimeRemaining$Visible
    • API String ID: 0-2691827946
    • Opcode ID: 3c7d0c4ca570215ddc0eb889fab398440235dfbaa199ee515af21bd9f0f21ee2
    • Instruction ID: 97c3038443289e0a1b0653682e6d9e84837d8c568801016d08e5ba078bea385c
    • Opcode Fuzzy Hash: 3c7d0c4ca570215ddc0eb889fab398440235dfbaa199ee515af21bd9f0f21ee2
    • Instruction Fuzzy Hash: 3FB17DB1A00344DFDB14DF48E944B9EBBF1FB85320F5086AEE8259B391D7759A00DB91
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,ps1,ps1,00000003,?,00B04998), ref: 00B249F3
    • WriteFile.KERNEL32(00000000,0000FEFF,00000002,?,00000000), ref: 00B24A37
    • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 00B24A54
    • CloseHandle.KERNEL32(00000000), ref: 00B24A6E
    • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 00B24AAD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$CloseHandleInit_thread_footerWrite$CreateFindHeapProcessResource
    • String ID: Unable to get temp file $Unable to save script file $ps1
    • API String ID: 2821137686-4253966538
    • Opcode ID: b36afc12d802ec329144dc529d880ff74e4df374389a91d9211d71995fd7f1b2
    • Instruction ID: 800157506c40557d685afe934db889257fca0dd611c04a0c2a0012debd660d15
    • Opcode Fuzzy Hash: b36afc12d802ec329144dc529d880ff74e4df374389a91d9211d71995fd7f1b2
    • Instruction Fuzzy Hash: 57510470A00659EFDB10CB68DD49BEEBBF8EF05314F148298E505AB6D2D7749E04CBA4
    APIs
    • GetSystemDefaultLangID.KERNEL32 ref: 00B13CBE
    • GetUserDefaultLangID.KERNEL32 ref: 00B13CCB
    • LoadLibraryW.KERNEL32(kernel32.dll), ref: 00B13CDD
    • GetProcAddress.KERNEL32(00000000,GetSystemDefaultUILanguage), ref: 00B13CF1
    • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 00B13D06
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressDefaultLangProc$LibraryLoadSystemUser
    • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll
    • API String ID: 667524283-3528650308
    • Opcode ID: 6ea4d5e14c689ef0286b0a2aad9b6412c9133e9aef30f17e6779e8bbd1625e89
    • Instruction ID: 1fdfec9e88e02c75f003ba46bd2ec92df95734077ae3bd5cae4a751661233d81
    • Opcode Fuzzy Hash: 6ea4d5e14c689ef0286b0a2aad9b6412c9133e9aef30f17e6779e8bbd1625e89
    • Instruction Fuzzy Hash: A541A1716043119BC744EF28E4907BAB7E1EF98745F91196EF886C7290EB34DA84CB52
    APIs
    • _ValidateLocalCookies.LIBCMT ref: 00B89847
    • ___except_validate_context_record.LIBVCRUNTIME ref: 00B8984F
    • _ValidateLocalCookies.LIBCMT ref: 00B898D8
    • __IsNonwritableInCurrentImage.LIBCMT ref: 00B89903
    • _ValidateLocalCookies.LIBCMT ref: 00B89958
    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00B8996E
    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00B89983
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record___vcrt_initialize_locks___vcrt_uninitialize_locks
    • String ID: csm
    • API String ID: 1385549066-1018135373
    • Opcode ID: 6ab58b510bb2996fca97dea22067f030803ac6923d682ea9f68a163fee518b33
    • Instruction ID: b0c9adf9d6a2b96b53d1db787ea81a947b1a0245d3c9873945d34b89fdf0d6b7
    • Opcode Fuzzy Hash: 6ab58b510bb2996fca97dea22067f030803ac6923d682ea9f68a163fee518b33
    • Instruction Fuzzy Hash: E5419334A00209EBDF10FF68C881AAE7BE5EF46354F1881D5E815AB3B2D735D905DB91
    APIs
    • GetWindowLongW.USER32(?,000000F0), ref: 00A559F7
    • GetWindowRect.USER32(?,?), ref: 00A55A18
    • GetWindow.USER32(?,00000004), ref: 00A55A52
    • GetWindowRect.USER32(?,?), ref: 00A55A60
    • GetWindowLongW.USER32(00000000,000000F0), ref: 00A55A6D
    • MonitorFromWindow.USER32(?,00000002), ref: 00A55A85
    • GetMonitorInfoW.USER32(00000000,?), ref: 00A55A9F
    • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015,?,00000004), ref: 00A55B4D
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$LongMonitorRect$FromInfo
    • String ID:
    • API String ID: 2882702216-0
    • Opcode ID: e43465d03594b12ae8938cae78dcb2621e6e83ad0e207374146e13fb9bbae52d
    • Instruction ID: 5cb0aa566de042ec1099a48e5880b3ac22b08e946e27d7e26642a2f8f86a8d5e
    • Opcode Fuzzy Hash: e43465d03594b12ae8938cae78dcb2621e6e83ad0e207374146e13fb9bbae52d
    • Instruction Fuzzy Hash: 26515C72D00519AFDB14CBB8CD49F9EBBB9FB48711F25422AE915B3294DB30AD05CB90
    APIs
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,00000000,?), ref: 00ADA069
    • CloseHandle.KERNEL32(00000000), ref: 00ADA090
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
      • Part of subcall function 00ADBC00: FindResourceW.KERNEL32(00000000,00000001,00000006,?,00000000,?,?,80070057,BACC40AC,?,?,00000000,00BAD670,000000FF,?,00B2338D), ref: 00ADBC3D
      • Part of subcall function 00ADBC00: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000), ref: 00ADBC6E
    • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,?), ref: 00ADA105
    • CloseHandle.KERNEL32(00000000), ref: 00ADA157
      • Part of subcall function 00ADBA20: WideCharToMultiByte.KERNEL32(00000003,00000000,00B03DCA,000000FF,00000000,00000000,00000000,00000000,?,?,?,00B03DCA,?,?), ref: 00ADBA3C
      • Part of subcall function 00ADBA20: WideCharToMultiByte.KERNEL32(00000003,00000000,00B03DCA,000000FF,?,-00000001,00000000,00000000,?,?,?,00B03DCA,?,?), ref: 00ADBA73
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ByteCharMultiWide$CloseFileHandleInit_thread_footer$CreateFindHeapProcessResourceWrite
    • String ID: .bat$EXE$open
    • API String ID: 4275363648-2898749727
    • Opcode ID: 3be365f88ae9202bc0457d38bfd41c1ec2707285f1168175b04607f859c2b0c1
    • Instruction ID: f1b6c18b3f27170855463c003c0b3d1737e9078f8a4c422f3d43a2020d739fda
    • Opcode Fuzzy Hash: 3be365f88ae9202bc0457d38bfd41c1ec2707285f1168175b04607f859c2b0c1
    • Instruction Fuzzy Hash: 41A17A70901648EFDB10CFA8CD48B9DFBB4FF55314F24829AE015AB2A1DB749A48CF51
    APIs
    • SendMessageW.USER32(?,000000C5,?,00000000), ref: 00A1B771
    • SendMessageW.USER32(?,0000043A,00000000,00000074), ref: 00A1B7D5
    • lstrcpynW.KERNEL32(?,?,00000020), ref: 00A1B847
    • MulDiv.KERNEL32(?,00000048,00000000), ref: 00A1B884
    • SendMessageW.USER32(?,00000444,00000000,00000074), ref: 00A1B8B6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$lstrcpyn
    • String ID: ?$t
    • API String ID: 3928028829-1995845436
    • Opcode ID: d8ea4b4c8cba5478d629322369c382f2c3fc42ed3f3f2fe3fc897c645221ab48
    • Instruction ID: e6202a54aff2ab6d98fcb27941fe2d0a864fe20ba0f0a50e19985e19186580f0
    • Opcode Fuzzy Hash: d8ea4b4c8cba5478d629322369c382f2c3fc42ed3f3f2fe3fc897c645221ab48
    • Instruction Fuzzy Hash: 3E915E71614340AFE721DB64CC49F9EBBE8BF88300F044A2AF699D71A1DB74E545CB52
    APIs
    • __Init_thread_footer.LIBCMT ref: 00A06CEF
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    • CreateFileW.KERNEL32(00000000,40000000,00000001,00000000,00000002,00000080,00000000,?), ref: 00A06D43
    • CloseHandle.KERNEL32(00000000), ref: 00A06D92
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
    • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,00000000,?), ref: 00A06DF6
    • CloseHandle.KERNEL32(00000000,?), ref: 00A06E1C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$CloseEnterFileHandleLeave$ConditionCreateInit_thread_footerVariableWakeWrite
    • String ID: aix$html
    • API String ID: 2030708724-2369804267
    • Opcode ID: d6de319aadde462177ce52b0d6f342774662a7f1af2ce72855579adb5efbd742
    • Instruction ID: 55dceadb92a5ce52cbb9e2d84f10ce9d8525622cfbe72e91da6708e16f2de256
    • Opcode Fuzzy Hash: d6de319aadde462177ce52b0d6f342774662a7f1af2ce72855579adb5efbd742
    • Instruction Fuzzy Hash: 90517DB0900648DFDB10DFA4ED59B9EBBF4EB45708F1041A9E401AB3D1D7B56A09CB91
    APIs
    • __Init_thread_footer.LIBCMT ref: 00AD2500
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    • GetProcAddress.KERNEL32(SetWindowTheme), ref: 00AD253D
    • __Init_thread_footer.LIBCMT ref: 00AD2554
    • SendMessageW.USER32(000000EF,00001036,00010000,00010000), ref: 00AD257F
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
      • Part of subcall function 00AB1FB0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00AB1FF1
      • Part of subcall function 00AB1FB0: _wcschr.LIBVCRUNTIME ref: 00AB20AF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$EnterInit_thread_footerLeave$AddressConditionDirectoryMessageProcSendSystemVariableWake_wcschr
    • String ID: SetWindowTheme$UxTheme.dll$explorer
    • API String ID: 3852524043-3123591815
    • Opcode ID: 0c619fc15bb5780d8a3263289433d95a41bfb303620bc8a2807bc69d1af484d8
    • Instruction ID: 0e62b77c9fcc548d1f748d5508e19324fa2da361cb3f8601a69b459919229eda
    • Opcode Fuzzy Hash: 0c619fc15bb5780d8a3263289433d95a41bfb303620bc8a2807bc69d1af484d8
    • Instruction Fuzzy Hash: 2F21F7B1A40204EBCB20DF64ED0AF9DB7A4EB11B60F114327F521A73E8D775A901CB51
    APIs
    • SysFreeString.OLEAUT32(?), ref: 00A24D55
    • SysFreeString.OLEAUT32(00000000), ref: 00A24DCA
    • GetProcessHeap.KERNEL32(?,00000000,00000000), ref: 00A24E30
    • HeapFree.KERNEL32(00000000,?,00000000,00000000), ref: 00A24E36
    • GetProcessHeap.KERNEL32(?,00000000,?,00000000,00000000,00000000,BACC40AC,?,00000000), ref: 00A24E66
    • HeapFree.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000000,BACC40AC,?,00000000), ref: 00A24E6C
    • SysFreeString.OLEAUT32(00000000), ref: 00A24E84
    • SysFreeString.OLEAUT32(?), ref: 00A24F2B
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Free$HeapString$Process
    • String ID:
    • API String ID: 1565486995-0
    • Opcode ID: bcd2914243332cf5569dd57a1dcd730292bfdd6dd70dcd46c91760ea652e4841
    • Instruction ID: 6712f74ec6ed469cee1b46127a8ca0024c4da95f8d30846c7fa0d90541d360ca
    • Opcode Fuzzy Hash: bcd2914243332cf5569dd57a1dcd730292bfdd6dd70dcd46c91760ea652e4841
    • Instruction Fuzzy Hash: DD917971D00269DFDF10DFA8D945BEEBBB8FF09710F144169E821A7291D7789A04CBA1
    APIs
    • GetWindowRect.USER32(?,?), ref: 00A0980A
    • GetWindow.USER32(?,00000005), ref: 00A09817
    • GetWindow.USER32(00000000,00000002), ref: 00A09952
      • Part of subcall function 00A09660: GetWindowRect.USER32(?,?), ref: 00A0968C
      • Part of subcall function 00A09660: GetWindowRect.USER32(?,?), ref: 00A0969C
    • GetWindowRect.USER32(?,?), ref: 00A098AB
    • GetWindowRect.USER32(00000000,?), ref: 00A098BB
    • GetWindowRect.USER32(00000000,?), ref: 00A098D5
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Rect
    • String ID:
    • API String ID: 3200805268-0
    • Opcode ID: 5dcb3da4ba8e3b39b11689585867520ff6a5ed4751f9952eba598e93cd88cb36
    • Instruction ID: 6366762408b6b1a6cff1246069c602762a54bb84f56dec9839cc4bc3c6f42318
    • Opcode Fuzzy Hash: 5dcb3da4ba8e3b39b11689585867520ff6a5ed4751f9952eba598e93cd88cb36
    • Instruction Fuzzy Hash: B7419E305047059BC721DF25D980E6BF7F9BF96704F504A1DF085936A2EB30E988CB52
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,00B85D55,00000000), ref: 00B85BCF
    • HeapAlloc.KERNEL32(00000000,?,00B85D55,00000000), ref: 00B85BD6
      • Part of subcall function 00B85CA1: IsProcessorFeaturePresent.KERNEL32(0000000C,00B85BBD,00000000,?,00B85D55,00000000), ref: 00B85CA3
    • InterlockedPopEntrySList.KERNEL32(00000000,00000000,?,00B85D55,00000000), ref: 00B85BE6
    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00B85D55,00000000), ref: 00B85C0D
    • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,00B85D55,00000000), ref: 00B85C21
    • InterlockedPopEntrySList.KERNEL32(00000000,?,00B85D55,00000000), ref: 00B85C34
    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00B85D55,00000000), ref: 00B85C47
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
    • String ID:
    • API String ID: 2460949444-0
    • Opcode ID: 260da578c84ef6838c54e4185f3953e8fb0c03e1ff30eba1ffb14b2ffae4fa30
    • Instruction ID: b3e25648c0f4e447d558821ab931f9e11538adabcbea994a352cb05ff4702d83
    • Opcode Fuzzy Hash: 260da578c84ef6838c54e4185f3953e8fb0c03e1ff30eba1ffb14b2ffae4fa30
    • Instruction Fuzzy Hash: 74118271601F11ABD7312B64AC88F2E66DDEB44789F1644A2FA41E6260DE60CC04CFB4
    APIs
      • Part of subcall function 00B22140: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,00B2029A,?,BACC40AC,?,?,?,000000FF,?), ref: 00B22154
      • Part of subcall function 00B22140: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00B2029A,?,BACC40AC,?,?,?,000000FF,?,00B1FC64), ref: 00B22171
      • Part of subcall function 00B22140: GetLastError.KERNEL32(?,BACC40AC,?,?,?,000000FF,?,00B1FC64,?,?,00000000,00000000,BACC40AC,?,?), ref: 00B221D0
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • ResetEvent.KERNEL32(?,00000000,00BF38DD), ref: 00B2036A
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00B20389
    • WaitForSingleObject.KERNEL32(BACC40AC,000000FF), ref: 00B20390
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Event$CreateInit_thread_footerObjectSingleWait$ErrorFindHeapLastProcessResetResource
    • String ID: GET$attachment$filename
    • API String ID: 818129584-3911147371
    • Opcode ID: 255b8a0b3c15ad513b8c74b6daf808a772c11f0c9593abb59a5a7999b0c349e6
    • Instruction ID: 57fcaafb4cbdf2e363f0c34f4e6f44a02f9f5ff63fac21f57d3a8ff99b4b8e82
    • Opcode Fuzzy Hash: 255b8a0b3c15ad513b8c74b6daf808a772c11f0c9593abb59a5a7999b0c349e6
    • Instruction Fuzzy Hash: 30029E70901259DFDB10EFA8D944BAEBBF4FF15314F1481A9E419AB292DB70AE04CF91
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • _wcschr.LIBVCRUNTIME ref: 00B36F6B
    • _wcschr.LIBVCRUNTIME ref: 00B3701D
    • _wcschr.LIBVCRUNTIME ref: 00B3703C
      • Part of subcall function 009F9390: FindResourceW.KERNEL32(00000000,?,00000006,?,00000001,?,00A069F0,-00000010,?,00A0AA9D,*.*), ref: 009F93B7
    • _wcschr.LIBVCRUNTIME ref: 00B370E2
    • GetTickCount.KERNEL32 ref: 00B3728A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: _wcschr$Init_thread_footer$CountFindHeapProcessResourceTick
    • String ID: 0123456789AaBbCcDdEeFf
    • API String ID: 2181188311-3822820098
    • Opcode ID: 008c0f2d293d298e3a7547a0bae167b3a868f34e2644837e324ec5c790518d4b
    • Instruction ID: c5f1e7ad1110bb0447acf59129e9b6c77867f22f9701683d12534f54b95e547a
    • Opcode Fuzzy Hash: 008c0f2d293d298e3a7547a0bae167b3a868f34e2644837e324ec5c790518d4b
    • Instruction Fuzzy Hash: 1FD124B1A04A098FDB20CF68C888BAEB7F1FF45310F24869DE46597291DB34ED45CB90
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,BACC40AC), ref: 00AF0A69
    • ReadFile.KERNEL32(00000000,00000000,00001000,?,00000000), ref: 00AF0AEC
    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00AF0B39
    • GetFileSize.KERNEL32(00000000,00000000), ref: 00AF0B42
    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00AF0BA5
    • CloseHandle.KERNEL32(00000000), ref: 00AF0CF7
    • ReadFile.KERNEL32(?,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00AF0D7F
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$Read$CloseCreateHandlePointerSize
    • String ID:
    • API String ID: 4181610692-0
    • Opcode ID: 06f40f44e9a08581b4a283550b3c1fc4812f9711a81aa0a3862a4fb248c6d0f2
    • Instruction ID: fbe5372be072a022f5cf4c21c15049964ccb7f4d3bb53ec79ce9c1feb31c959b
    • Opcode Fuzzy Hash: 06f40f44e9a08581b4a283550b3c1fc4812f9711a81aa0a3862a4fb248c6d0f2
    • Instruction Fuzzy Hash: 60C17C70E0130CDFDF24DFA4C944FAEBBB5AF44704F208259E555AB292DB74AA49CB90
    APIs
      • Part of subcall function 00AF29D0: __Init_thread_footer.LIBCMT ref: 00AF2AA2
    • GetTempPathW.KERNEL32(00000104,?), ref: 00B30CC9
    • GetTempFileNameW.KERNEL32(?,shim_clone,00000000,?), ref: 00B30CFA
    • Wow64DisableWow64FsRedirection.KERNEL32(00000000,?), ref: 00B30D2D
    • CopyFileW.KERNEL32(?,?,00000000), ref: 00B30D4F
    • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00B30D7E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Wow64$FileRedirectionTemp$CopyDisableInit_thread_footerNamePathRevert
    • String ID: shim_clone
    • API String ID: 885488785-3944563459
    • Opcode ID: 2350cb0319933b660719a72d914a3045e33b872b72a1fc038c09737ce1d143ba
    • Instruction ID: 1ffb39a3d5590e93c099a0599e4c80ae597b72958f7b3203066902a421ce91a6
    • Opcode Fuzzy Hash: 2350cb0319933b660719a72d914a3045e33b872b72a1fc038c09737ce1d143ba
    • Instruction Fuzzy Hash: 4A512570A402189FDB24EF64CC65BAEB7F9EF84700F6481E9E905971C1DB70AE44CB94
    APIs
    • Wow64DisableWow64FsRedirection.KERNEL32(00000000,BACC40AC,?,?), ref: 00B1E307
    • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,BACC40AC,00BF344D), ref: 00B1E37F
    • GetLastError.KERNEL32 ref: 00B1E390
    • WaitForSingleObject.KERNEL32(00BF344D,000000FF), ref: 00B1E3AC
    • GetExitCodeProcess.KERNEL32(00BF344D,00000000), ref: 00B1E3BD
    • CloseHandle.KERNEL32(00BF344D), ref: 00B1E3C7
    • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00B1E3E2
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Wow64$ProcessRedirection$CloseCodeCreateDisableErrorExitHandleLastObjectRevertSingleWait
    • String ID:
    • API String ID: 1153077990-0
    • Opcode ID: 3e473abf3b367203464b2621d69c9e687127e1739781280c694aced24dc9820b
    • Instruction ID: 57e7b872de16263c1e56dd1b8ffc33c4927a1db15cf3aefe73b5ca6fb7e1bb91
    • Opcode Fuzzy Hash: 3e473abf3b367203464b2621d69c9e687127e1739781280c694aced24dc9820b
    • Instruction Fuzzy Hash: F9419D31E00389EBDB11CFA4DD047EEBBF8EF49304F14865AE864A7190DB749A84CB60
    APIs
    • LoadLibraryW.KERNEL32(Shlwapi.dll,?,00000010,?,00000000,00B16881,00000000,BACC40AC,?,00000010,00000000), ref: 00B30EAB
    • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 00B30EC1
    • FreeLibrary.KERNEL32(00000000), ref: 00B30EFA
    • FreeLibrary.KERNEL32(00000000,?,00000010,?,00000000,00B16881,00000000,BACC40AC,?,00000010,00000000), ref: 00B30F16
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Library$Free$AddressLoadProc
    • String ID: DllGetVersion$Shlwapi.dll
    • API String ID: 1386263645-2240825258
    • Opcode ID: 9de0059d561d7c7627d458e6356138d599b0679b39c724ef1af42098f7a3d769
    • Instruction ID: 81ecb8ecafa4ae52d08adb7ba731f6712555dfc3b5a7010a837d2f17b7babbde
    • Opcode Fuzzy Hash: 9de0059d561d7c7627d458e6356138d599b0679b39c724ef1af42098f7a3d769
    • Instruction Fuzzy Hash: 5C2180766142018BC314BF29A88576FB7E4FFD9714F8105AEF889D3212EB25D80987A2
    APIs
    • FreeLibrary.KERNEL32(00000000,?,00B9FEDF,00B9D0E1,0000000C,?,00000000,00000000,?,00BA0109,00000021,FlsSetValue,00C0CF80,00C0CF88,?), ref: 00B9FE93
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: FreeLibrary
    • String ID: api-ms-$ext-ms-
    • API String ID: 3664257935-537541572
    • Opcode ID: 2a88a206529bf7aa2e23096bd152ebdd863790d18ec4ef5ad6460b79675d15f5
    • Instruction ID: 1f3fe23f4ca24ae2bd88e1fdd561d90d35572f84051fc19819e71d15ced1ab7a
    • Opcode Fuzzy Hash: 2a88a206529bf7aa2e23096bd152ebdd863790d18ec4ef5ad6460b79675d15f5
    • Instruction Fuzzy Hash: 0D219375A01A16ABCF22AB649C44B6F3799EF41774F1501B0E915E72A2DB30ED05C6D0
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0610cfe5c6a2870737ba03efd1d2a2f2cfd5d71993853fa9f5853a0b7c87e4b7
    • Instruction ID: dd8e8d3b6275295d63a39ab6f0699f5636e2a47c0903ca31b3211bc778a874e6
    • Opcode Fuzzy Hash: 0610cfe5c6a2870737ba03efd1d2a2f2cfd5d71993853fa9f5853a0b7c87e4b7
    • Instruction Fuzzy Hash: F1D1C1B1E00649DFCB14DF69C945BAEBBF4FB58310F148269E815AB391DB31AE01CB91
    APIs
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A1F7CD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: ' AND `Control_`='$AiTabPage$ControlEvent$`Dialog_`='
    • API String ID: 3850602802-1655181372
    • Opcode ID: 8970ec894aff98bcbc4aae533f5f23f4f144874ae3831354e209b16ec47befa5
    • Instruction ID: 6ae68b0cfcc9ebf8019774864000578de37a7d1b55533434682c6d41fc904bbd
    • Opcode Fuzzy Hash: 8970ec894aff98bcbc4aae533f5f23f4f144874ae3831354e209b16ec47befa5
    • Instruction Fuzzy Hash: 53F17875900288DFDF04DF68C899BEEBBB1BF48304F1501A8ED159B292DB75AA45CB90
    APIs
    • GetShortPathNameW.KERNEL32(BACC40AC,00000000,00000000), ref: 00B03D1F
    • GetShortPathNameW.KERNEL32(?,?,?), ref: 00B03D8D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: NamePathShort
    • String ID: neutral$x64$x86
    • API String ID: 1295925010-1541741584
    • Opcode ID: 0a244dc6ccf37a37eab3110ec6ee7b49672785fc217e6d5e63e10cc24b0e65ce
    • Instruction ID: e6be52c91a08acfd411fb8f3048c3787c7678126f8988556039c3e6eefb89fcd
    • Opcode Fuzzy Hash: 0a244dc6ccf37a37eab3110ec6ee7b49672785fc217e6d5e63e10cc24b0e65ce
    • Instruction Fuzzy Hash: BAB1B271A00208EFDB00DFA4C859BDEBFF4EF44324F148299E515AB2D1DB75AA44CBA0
    APIs
    • EnterCriticalSection.KERNEL32(00C96250,BACC40AC,00000000,00C9626C), ref: 00A02573
    • LeaveCriticalSection.KERNEL32(00C96250), ref: 00A025D7
    • LoadCursorW.USER32(009F0000,?), ref: 00A02630
    • LeaveCriticalSection.KERNEL32(00C96250), ref: 00A026C8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$Leave$CursorEnterLoad
    • String ID: ATL:%p
    • API String ID: 2080323225-4171052921
    • Opcode ID: 12fa39c639e9b220206b94956ad1aa61df4a1b394ae736b99b9c8c04fc350e6e
    • Instruction ID: 997faabb1142f6d80c457c821023384fa68191d515d2f987c0811a0819cbd7f1
    • Opcode Fuzzy Hash: 12fa39c639e9b220206b94956ad1aa61df4a1b394ae736b99b9c8c04fc350e6e
    • Instruction Fuzzy Hash: AB91E171900B489FDB24CF69D948BAAF7F4FF48720F10862EE89597690E731B984CB50
    APIs
    • __Init_thread_footer.LIBCMT ref: 009F8975
    • __Init_thread_footer.LIBCMT ref: 009F89EF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer
    • String ID: </a>$<a href="$<a>
    • API String ID: 1385522511-4210067781
    • Opcode ID: 4fd48e3166ddc69b5dbb78a2f3544d641d56fd16684775a17470020a6cb86306
    • Instruction ID: f0bf0c46959684d6fb241f07eef71dc02d9541db93f1c5c9b036508ed8337577
    • Opcode Fuzzy Hash: 4fd48e3166ddc69b5dbb78a2f3544d641d56fd16684775a17470020a6cb86306
    • Instruction Fuzzy Hash: 0FA1A3B0A00709EFCF44DF68D859BAEB7B5FF45314F10426AE511AB2E2EB70A945CB50
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • SHGetSpecialFolderLocation.SHELL32(00000000,00000011,?,?,BACC40AC,00000000,?), ref: 00AF266C
    • SHGetMalloc.SHELL32(?), ref: 00AF2695
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$FolderHeapLocationMallocProcessSpecial
    • String ID: %s, %.2u %s %.4u %.2u:%.2u:%.2u GMT$C:\$C:\FAKE_DIR\
    • API String ID: 3216538967-785558474
    • Opcode ID: 932cd20ad2659b56aebab6bf0a44fdc894e71edc8253ebafd16d7e0e594ef4d5
    • Instruction ID: 11d69904e866178a66c628188376c8783e1a6f7936bf0e47b5d9721963f76cae
    • Opcode Fuzzy Hash: 932cd20ad2659b56aebab6bf0a44fdc894e71edc8253ebafd16d7e0e594ef4d5
    • Instruction Fuzzy Hash: 8F717CB1900258AFDF10DF94DC49BAEBBF8FF08704F00451AFA19AB691D7B4A904DB94
    APIs
    • CoCreateInstance.COMBASE(00C137FC,00000000,00000001,00C13E84,?), ref: 00A00EE0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CreateInstance
    • String ID: :${
    • API String ID: 542301482-3766677574
    • Opcode ID: c58f854159cc556f9a402843e5f471d1869b32e7ab221fd465be69f5071d5a05
    • Instruction ID: 47fbd4541821e40feeaf968657dc35b6483c414c5c0f837cb1e1eaa6bb3a0191
    • Opcode Fuzzy Hash: c58f854159cc556f9a402843e5f471d1869b32e7ab221fd465be69f5071d5a05
    • Instruction Fuzzy Hash: 31619E74A0028A9BDF248FA8E854FFEB7B4AB09714F14446AE841FB2C0D775DD80DB60
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID:
    • String ID: APPDATA$AppDataFolder$PROGRAMFILES$ProgramFilesFolder
    • API String ID: 0-3551742416
    • Opcode ID: f6a035532aae1b798d4a79a193f57378f7f900f3d121d69c9831f376c25da376
    • Instruction ID: 9ca9e493abc734cd627af533ae82254e5d2f4e0178ec2d03c66eb132ce4d3ab7
    • Opcode Fuzzy Hash: f6a035532aae1b798d4a79a193f57378f7f900f3d121d69c9831f376c25da376
    • Instruction Fuzzy Hash: 9121C332A001159BCB14AF68D844BFAB3E4FF55720F5046AAE916E7690EB31DD85C790
    APIs
    • FreeLibrary.KERNEL32(00000000,?,?,00B8A84D,00000000,00000FA0,00C95084,00000000,?,00B8A978,00000004,InitializeCriticalSectionEx,00C0A0E0,00C0A0E8,00000000), ref: 00B8A81C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: FreeLibrary
    • String ID: api-ms-
    • API String ID: 3664257935-2084034818
    • Opcode ID: 16aab3e3b73ca6fd6f3aa36805a1ee8ed0c8ee7fdefaa882ea7965f9f2c09c74
    • Instruction ID: c7ec40993a7d8e04aca752dc780aba35344849c432f77efdfbe8cb318ae5ad6e
    • Opcode Fuzzy Hash: 16aab3e3b73ca6fd6f3aa36805a1ee8ed0c8ee7fdefaa882ea7965f9f2c09c74
    • Instruction Fuzzy Hash: 6C11A735A41625ABEB226B689C4075E37E4DF01774F1541A2E911A71E0EB70ED05C7E2
    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BACC40AC,?,?,00000000,00C06426,000000FF,?,00B9C662,?,?,00B9C636,?), ref: 00B9C6C4
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B9C6D6
    • FreeLibrary.KERNEL32(00000000,?,00000000,00C06426,000000FF,?,00B9C662,?,?,00B9C636,?), ref: 00B9C6F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: 11d89163d4eb15e36c71185f2cb1c0fe2ec695b85a22e91b1032349b6ae54502
    • Instruction ID: b9652de94d034f6f6a17bea97ac3cca951e5ec09ff7f7fa83145ac71a41cd613
    • Opcode Fuzzy Hash: 11d89163d4eb15e36c71185f2cb1c0fe2ec695b85a22e91b1032349b6ae54502
    • Instruction Fuzzy Hash: 9B016D31904619EFDB119F94DC45BBEBFB8FB04B15F018636E811E32D0DBB49904CA94
    APIs
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
    • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 00AF7A1E
    • GetProcAddress.KERNEL32(00000000), ref: 00AF7A25
    • __Init_thread_footer.LIBCMT ref: 00AF7A3C
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$AddressConditionInit_thread_footerLibraryLoadProcVariableWake
    • String ID: Dbghelp.dll$SymFromAddr
    • API String ID: 3268644551-642441706
    • Opcode ID: 948700d20f71f5c1f49ee536e1dc2543b438a387241f7697a8465056ea938c2e
    • Instruction ID: 2fbbb40980657dac7f049b9cd2ab033e43d2d8f097b904ea33984400a139d4a4
    • Opcode Fuzzy Hash: 948700d20f71f5c1f49ee536e1dc2543b438a387241f7697a8465056ea938c2e
    • Instruction Fuzzy Hash: B101DFB1A40754EFC720DF98ED4AB1CB7A4EB08B30F11426AF815837E0D735A900CB11
    APIs
    • std::_Lockit::_Lockit.LIBCPMT ref: 00AEBD04
    • std::_Lockit::_Lockit.LIBCPMT ref: 00AEBD24
    • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEBD4C
    • std::_Facet_Register.LIBCPMT ref: 00AEBE2B
    • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEBE55
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
    • String ID:
    • API String ID: 459529453-0
    • Opcode ID: 1df5357ca0f364ddcbf2b86c5bd62761aeaa4a19e7ba982df4346b1eb4b86026
    • Instruction ID: 1108d5254afbd8779e99f1fa0e5fc7b51e2e5b4f01eca616838bb01ae8a2695c
    • Opcode Fuzzy Hash: 1df5357ca0f364ddcbf2b86c5bd62761aeaa4a19e7ba982df4346b1eb4b86026
    • Instruction Fuzzy Hash: 74C1E571E10259DFDB18DF69C8847AEBBF5EF44710F148269E805AB391DB70AE05CBA0
    APIs
    • VariantClear.OLEAUT32(?), ref: 00A13ECD
    • VariantClear.OLEAUT32(?), ref: 00A13EFF
    • MessageBoxW.USER32(00000000,00000000,00000000,?), ref: 00A140C4
    • VariantClear.OLEAUT32(?), ref: 00A14117
    • VariantClear.OLEAUT32(?), ref: 00A14146
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ClearVariant$Message
    • String ID:
    • API String ID: 167562128-0
    • Opcode ID: ddf1f6087e208ffbbaa8e943953275dc9d4969227f96d13069ef1f4d82aa4375
    • Instruction ID: 04d10a21c3d302ec8bc51b0c153808e5bcab34d4a8685d43ea8c670b85295137
    • Opcode Fuzzy Hash: ddf1f6087e208ffbbaa8e943953275dc9d4969227f96d13069ef1f4d82aa4375
    • Instruction Fuzzy Hash: 27A16875900219EFCB10DFA8C884BDEFBB5FF48314F258259E404AB391E774AA85CB95
    APIs
    • SendMessageW.USER32(?,00000318,00000000,00000004), ref: 00A1DEF7
    • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00A1DF1F
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A1DF37
    • SendMessageW.USER32(?,0000130A,00000000,?), ref: 00A1DF68
    • SendMessageW.USER32(00000000,00000136,?,?), ref: 00A1E055
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 99ff4def138034691e3b0fb0991d7b26936880fd164b46a09b85bf1843a8abd3
    • Instruction ID: 37b49bd2b4c6b5f6990d165a83acfbc5a4a142e781582dd39a629492be2de160
    • Opcode Fuzzy Hash: 99ff4def138034691e3b0fb0991d7b26936880fd164b46a09b85bf1843a8abd3
    • Instruction Fuzzy Hash: 98611572910618AFDB159FE4DD49FEEBBB9FF48710F11011AF619AB2A0C7706A42CB50
    APIs
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,BACC40AC,?,?,00000000,?,?,?,?,00BF6FED,000000FF,?,00B11C3D), ref: 00B30850
    • CreateThread.KERNEL32(00000000,00000000,00B30BD0,?,00000000,?), ref: 00B30886
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00B3098F
    • GetExitCodeThread.KERNEL32(00000000,?), ref: 00B3099A
    • CloseHandle.KERNEL32(00000000), ref: 00B309BA
      • Part of subcall function 00A02970: RaiseException.KERNEL32(?,?,00000000,00000000,00B85A3C,C000008C,00000001,?,00B85A6D,00000000,?,009F91C7,00000000,BACC40AC,00000001,?), ref: 00A0297C
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CreateThread$CloseCodeEventExceptionExitHandleObjectRaiseSingleWait
    • String ID:
    • API String ID: 3595790897-0
    • Opcode ID: b7a29616e40adb6652379d575eab5033891e92e0f2e42fd7d72e520ed84d7dd8
    • Instruction ID: 735c361a5c7316b79704dbd10e13bfc85d22f0eb4c82acb16e7a31000edb0c27
    • Opcode Fuzzy Hash: b7a29616e40adb6652379d575eab5033891e92e0f2e42fd7d72e520ed84d7dd8
    • Instruction Fuzzy Hash: F5517A74A00709DFDB20DF68C894BAEBBF4FF48714F2586A9E956A7351D730A844CB50
    APIs
    • SetFocus.USER32(00000000), ref: 00A16E08
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A16E50
    • SendMessageW.USER32(?,0000102C,000000FF,0000F000), ref: 00A16E73
    • SendMessageW.USER32(?,0000102B,000000FF,?), ref: 00A16E9F
    • SetFocus.USER32(00000000), ref: 00A16EB2
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$Focus
    • String ID:
    • API String ID: 3982298024-0
    • Opcode ID: 7752b7663e85c5b7a91977d118e0bded7df84c917ccb079c4c1c6a7eeaba5637
    • Instruction ID: eba64b0e96d5dee58e6214ec5b60dd5042a30dcfc1b78eb4696fcdffd5c53945
    • Opcode Fuzzy Hash: 7752b7663e85c5b7a91977d118e0bded7df84c917ccb079c4c1c6a7eeaba5637
    • Instruction Fuzzy Hash: 8B411C75900608DFDB24DF64CC45BAAB7F4FB48710F10466AE825977A1DB70A950CF50
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00A47A99
    • CoInitializeEx.COMBASE(00000000,00000002), ref: 00A47AA9
    • SendMessageW.USER32(?,000005FA,?,00000000), ref: 00A47BC1
      • Part of subcall function 00A56040: EnterCriticalSection.KERNEL32(BACC40AC,BACC40AC), ref: 00A56080
      • Part of subcall function 00A56040: GetCurrentThreadId.KERNEL32 ref: 00A56093
      • Part of subcall function 00A56040: LeaveCriticalSection.KERNEL32(?), ref: 00A56111
      • Part of subcall function 00A50100: SetLastError.KERNEL32(0000000E,?,00A47B2F,?,?,00C1C530,00000000), ref: 00A50118
    • GetLastError.KERNEL32(?,?,00C1C530,00000000), ref: 00A47B33
    • ShowWindow.USER32(?,0000000A,?,?,00C1C530,00000000), ref: 00A47B45
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalCurrentErrorLastSectionThread$EnterInitializeLeaveMessageSendShowWindow
    • String ID:
    • API String ID: 2782539745-0
    • Opcode ID: 2c62411f4838b814d0ba613fa22d90917b8905dc2b7e4721fc40c667b92b815a
    • Instruction ID: cf7a3bb5b9090920e27a4e3c87063a0b31492d3c89405f87f5de6ff616f65ea7
    • Opcode Fuzzy Hash: 2c62411f4838b814d0ba613fa22d90917b8905dc2b7e4721fc40c667b92b815a
    • Instruction Fuzzy Hash: 2431EE71D00248EBDB10EFA4CD4ABDEBBB4FF50308F108259E411AB2D0DBB95A09CB91
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Variant$Clear$Init
    • String ID:
    • API String ID: 3740757921-0
    • Opcode ID: 66e46c1a4fd966a19e8e9d48b0dabaa2d1e25f5bb4d19e58e0cbb3262a78cfe2
    • Instruction ID: 2a69506b5a288a2e40c03fe7c7a2b880d8de88c84a31a465e78d7fa3ead91c7b
    • Opcode Fuzzy Hash: 66e46c1a4fd966a19e8e9d48b0dabaa2d1e25f5bb4d19e58e0cbb3262a78cfe2
    • Instruction Fuzzy Hash: 79311A71D0524CEFDB05CFA8C944BDEBBF8EF49304F10859AE410A7290D7B5AA04CBA1
    APIs
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A2472A
    • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00A24730
    • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 00A24753
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00BB6756,000000FF), ref: 00A2477B
    • HeapFree.KERNEL32(00000000,00000000,00000000,?,?,?,00BB6756,000000FF), ref: 00A24781
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$FreeProcess$FormatMessage
    • String ID:
    • API String ID: 1606019998-0
    • Opcode ID: 65a8cea1ca907cf4017bc152cd4b18db7641230d4d4d1cbff1be8db17f428b11
    • Instruction ID: 873b057e33431c1fbd0db0e58f1c62ec622d4579e61b16f453964d4910c40d44
    • Opcode Fuzzy Hash: 65a8cea1ca907cf4017bc152cd4b18db7641230d4d4d1cbff1be8db17f428b11
    • Instruction Fuzzy Hash: EC1182B1A04219ABEB10EF94DC06BAFBBFCEB04B04F100569F910AB2C1D7F5990487A1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: _wcschr
    • String ID: realm
    • API String ID: 2691759472-4204190682
    • Opcode ID: b8a61ec4023a5bab807a8b52e0b148273d413d5d0abdd0a4ebe3f7de20736e5f
    • Instruction ID: 3bdafcdbce4b697bdbab48e39bdaa3208653034103b8ca8c93d79ae8c0ab569f
    • Opcode Fuzzy Hash: b8a61ec4023a5bab807a8b52e0b148273d413d5d0abdd0a4ebe3f7de20736e5f
    • Instruction Fuzzy Hash: 37F19F31A00619DFDB00DFA8D848BAEBBF9EF55320F148299E8199B791DB74DD44CB90
    APIs
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
      • Part of subcall function 00AD2040: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,?,?,000000EF,?,00A10168,00000000,80004005), ref: 00AD20AB
      • Part of subcall function 00AD2040: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00AD20DB
    • SendMessageW.USER32(?,00001036,00000004,00000004), ref: 00A15FDC
    • SendMessageW.USER32(?,00001036,00000400,00000400), ref: 00A15FF3
    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00A1604F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$AllocateHeapWindow
    • String ID: QuickSelectionList
    • API String ID: 3168177373-3633591268
    • Opcode ID: 56cf13956d1282458ebb6a3c5f4a87cb99af755ef94f07383f4b3fd0bd3db54b
    • Instruction ID: 1a5472787cf52b1cfcbbff51a5aaea5ca602be9d17c8b6359f6af05366f299eb
    • Opcode Fuzzy Hash: 56cf13956d1282458ebb6a3c5f4a87cb99af755ef94f07383f4b3fd0bd3db54b
    • Instruction Fuzzy Hash: 42818971A006099FCB14DF68C894BEEB7F5FF88324F10465DE556A7290DB71A944CFA0
    APIs
      • Part of subcall function 00AF0F40: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 00AF0F84
      • Part of subcall function 00AF0F40: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00AF0F8F
    • GetCurrentThreadId.KERNEL32 ref: 00A49B3C
    • SendMessageW.USER32(00000000,00000127,00030003,00000000), ref: 00A49BC5
    Strings
    • AI_HIDE_CAPTION_ICON_AND_TEXT_ALL, xrefs: 00A49A69
    • AI_HIDE_CAPTION_ICON_AND_TEXT, xrefs: 00A49AE0
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$CurrentThread
    • String ID: AI_HIDE_CAPTION_ICON_AND_TEXT$AI_HIDE_CAPTION_ICON_AND_TEXT_ALL
    • API String ID: 2377075789-1831360935
    • Opcode ID: df9c13685bd18a91c2f3a863ba8d5b7060d0700bca0eac3a27258c65a1f2f0ff
    • Instruction ID: e5107f28b2c965b0a12e570f86783e5db1881791b86eedd862906fa6542b0080
    • Opcode Fuzzy Hash: df9c13685bd18a91c2f3a863ba8d5b7060d0700bca0eac3a27258c65a1f2f0ff
    • Instruction Fuzzy Hash: 8181B431A14208DFCF15EF74C995BAEBBB5FF44300F1441A9E905AB292DB70AE08CB91
    APIs
    • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00A1DD72
    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00A1DD7A
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
      • Part of subcall function 00A1F780: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A1F7CD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$AllocateHeap
    • String ID: SysTabControl32$TabHost
    • API String ID: 4003639188-2872506973
    • Opcode ID: cb5353f8dd53a2846d28e83b576714bbe5306ce09e7e68700b344999a6efe84e
    • Instruction ID: 14702517d7b4ed42fd5f274472e554a25ca1c331ac2b577848893c08d030f4b3
    • Opcode Fuzzy Hash: cb5353f8dd53a2846d28e83b576714bbe5306ce09e7e68700b344999a6efe84e
    • Instruction Fuzzy Hash: 71519D35A00605AFDB14DF68C844FAEBBF4FF89310F104269E915AB391DB75AC00CBA4
    APIs
    • GetWindowRect.USER32(?,?), ref: 00A4C4EE
    • SetWindowPos.USER32(?,00000000,?,?,?,00000008,00000604), ref: 00A4C6C1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Rect
    • String ID: AiDlgHeight$AiDlgWeight
    • API String ID: 3200805268-871102398
    • Opcode ID: c47cb7086387857f1193bb0613805b8e1e770003aa29d726f2d96a3aae3bdde8
    • Instruction ID: 25536d2b37f6281914065b6e17f4d62eb2c5ec5744fce6cc41bf6766b096e107
    • Opcode Fuzzy Hash: c47cb7086387857f1193bb0613805b8e1e770003aa29d726f2d96a3aae3bdde8
    • Instruction Fuzzy Hash: 03617D71D01209EFCF04DFA8C949B9EFBB5EF48314F148269E815AB291D774AA05CF91
    APIs
    • WaitForSingleObject.KERNEL32(?,000000FF,BACC40AC,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 00B2F974
      • Part of subcall function 00AF5170: MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,?,?,80004005,80004005,?,?,?,00000000,00BEA8AD,000000FF), ref: 00AF5188
      • Part of subcall function 00AF5170: MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,-00000001,?,?,80004005,80004005,?,?,?,00000000,00BEA8AD,000000FF), ref: 00AF51BB
      • Part of subcall function 00A02970: RaiseException.KERNEL32(?,?,00000000,00000000,00B85A3C,C000008C,00000001,?,00B85A6D,00000000,?,009F91C7,00000000,BACC40AC,00000001,?), ref: 00A0297C
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ByteCharMultiWide$AllocateExceptionHeapObjectRaiseSingleWait
    • String ID: *.*$.jar$.pack
    • API String ID: 2917691982-3892993289
    • Opcode ID: 24739bc2991c30020262dd0c2662d155acae6ba5796660ba715b0829e175a1e7
    • Instruction ID: 9211e341db5ce11453c26d042f3c6099728d81b3e5e2e72972093cc62ffb91b0
    • Opcode Fuzzy Hash: 24739bc2991c30020262dd0c2662d155acae6ba5796660ba715b0829e175a1e7
    • Instruction Fuzzy Hash: D7517170A0061A9FDB10DFA9D848BAEB7F4FF45314F1482B9E429EB291DB34D904CB90
    APIs
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
      • Part of subcall function 00A8B6E0: __Init_thread_footer.LIBCMT ref: 00A8B77E
    • __Init_thread_footer.LIBCMT ref: 00A89B3E
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    • __Init_thread_footer.LIBCMT ref: 00A89C2B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$Init_thread_footer$EnterLeave$ConditionVariableWake
    • String ID: ImagePath$String
    • API String ID: 375937472-2295709137
    • Opcode ID: 00edd8af1d5a89591a410d824cebfbd327459e844ab7912b32af038ed63b2854
    • Instruction ID: 803c3b3713bdf7273b5b8ee3b92e23856494ddfce1acc3e7b3dfa241b41b4b7c
    • Opcode Fuzzy Hash: 00edd8af1d5a89591a410d824cebfbd327459e844ab7912b32af038ed63b2854
    • Instruction Fuzzy Hash: 006180B0C00249EFDB11EFA8DA497DEBBF4FB15704F144169E411A72D1D7755A08CB92
    APIs
    • LoadLibraryW.KERNEL32(combase.dll,RoOriginateLanguageException), ref: 00A24B92
    • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00A24B98
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: RoOriginateLanguageException$combase.dll
    • API String ID: 2574300362-3996158991
    • Opcode ID: 8fb0b2f9bd5fcc1b50e373d1758b1c6459f283e86de0ff8aa0e1090573b01ab6
    • Instruction ID: 5f03b7bbeecda44c9c922f4103dae6660f5e70470a395403d0df3e69e3ac51aa
    • Opcode Fuzzy Hash: 8fb0b2f9bd5fcc1b50e373d1758b1c6459f283e86de0ff8aa0e1090573b01ab6
    • Instruction Fuzzy Hash: 1F317C31904219EEDB14DFACD945BAEB7B4EB08310F10853AE825A62D0D7799B44CB51
    APIs
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,00B2029A,?,BACC40AC,?,?,?,000000FF,?), ref: 00B22154
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00B2029A,?,BACC40AC,?,?,?,000000FF,?,00B1FC64), ref: 00B22171
    • GetLastError.KERNEL32(?,BACC40AC,?,?,?,000000FF,?,00B1FC64,?,?,00000000,00000000,BACC40AC,?,?), ref: 00B221D0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CreateEvent$ErrorLast
    • String ID: AdvancedInstaller
    • API String ID: 1131763895-1372594473
    • Opcode ID: 5b28933ffa2c765f49c042e341bc4443fb00e19236c778a2bfb151b4f412f17c
    • Instruction ID: f65fe6849d651b35c832b1f0f4bdeccf2c47ac152fba366165955d2b44c2421a
    • Opcode Fuzzy Hash: 5b28933ffa2c765f49c042e341bc4443fb00e19236c778a2bfb151b4f412f17c
    • Instruction Fuzzy Hash: A0118E71340612BBE724DB21EC89F5ABBE4FF44705F114425F609EB690CB70B861CBA4
    APIs
    • SendMessageW.USER32(?,00001037,00000000,00000000), ref: 00A10118
    • SendMessageW.USER32(?,00001036,00000000,00000000), ref: 00A1012D
      • Part of subcall function 009F9B10: RtlAllocateHeap.NTDLL(?,00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,?,00C89A1C,?,00B2BB18,80004005,BACC40AC), ref: 009F9B5A
      • Part of subcall function 00AD2040: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,?,?,000000EF,?,00A10168,00000000,80004005), ref: 00AD20AB
      • Part of subcall function 00AD2040: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00AD20DB
    • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00A1025E
    • SendMessageW.USER32(?,00001061,00000000,00000005), ref: 00A1035A
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$AllocateHeapWindow
    • String ID:
    • API String ID: 3168177373-0
    • Opcode ID: a4573cb0aa6b561c742aa060ea3370968cd0ec301e80d2644864017e26ed2ece
    • Instruction ID: 779a06fb2d9fc92f4ee17c26717afb14abef3eeafffdacf914df5d52ff7d372d
    • Opcode Fuzzy Hash: a4573cb0aa6b561c742aa060ea3370968cd0ec301e80d2644864017e26ed2ece
    • Instruction Fuzzy Hash: 29B19371A00209DFDB14DFA8C988FEEFBB5FF48314F104259E515AB290DBB5A984CB90
    APIs
    • SendMessageW.USER32(?,0000110A,00000004,?), ref: 00A18258
    • SendMessageW.USER32(?,0000110A,00000001,00000000), ref: 00A18287
    • SendMessageW.USER32(?,0000110A,00000004,?), ref: 00A18443
    • SendMessageW.USER32(?,0000110A,00000001,00000000), ref: 00A18466
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 441a39dbc671513344b38aaca18cccf7f037c60cc49650c7e583ba9d8a5b3068
    • Instruction ID: f1646418cfc2a8291b75152a009d34615bea43a523fc5facfb418b0831870a3e
    • Opcode Fuzzy Hash: 441a39dbc671513344b38aaca18cccf7f037c60cc49650c7e583ba9d8a5b3068
    • Instruction Fuzzy Hash: AEA16D72A00208DFCF15DF68C984BEEB7F5BF48710F194569E911AB291DB34E881CBA0
    APIs
    • FindResourceW.KERNEL32(00000000,00002781,00000017), ref: 00A66E7B
    • LoadResource.KERNEL32(00000000,00000000), ref: 00A66E89
    • LockResource.KERNEL32(00000000), ref: 00A66E94
    • SizeofResource.KERNEL32(00000000,00000000), ref: 00A66EA3
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Resource$FindLoadLockSizeof
    • String ID:
    • API String ID: 3473537107-0
    • Opcode ID: 7d30e006de3aa604d898896679c44b51cb65bc66a5fed3da9edd07b63738afc9
    • Instruction ID: bdd8c123d449997ab91f24a5e2bc298aae5c83dc3d781613f6cd46a9f04af8df
    • Opcode Fuzzy Hash: 7d30e006de3aa604d898896679c44b51cb65bc66a5fed3da9edd07b63738afc9
    • Instruction Fuzzy Hash: 6B91AE70D05288EFDF01DFA8D949BDEBBF5EF55304F1480A9E405AB292DBB45A08CB61
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID:
    • API String ID: 1473721057-0
    • Opcode ID: 847bbcd4cb15ce5fe47ad280a12fc3f8e328ada7fc69c7d94f9547dbb934560c
    • Instruction ID: 2f4b95d05ef3084ad37d06c96f00ff75f8b29f43fcfca374be2536d1266619a3
    • Opcode Fuzzy Hash: 847bbcd4cb15ce5fe47ad280a12fc3f8e328ada7fc69c7d94f9547dbb934560c
    • Instruction Fuzzy Hash: B581CF71A00308DFDB10DFA8C944B9EFBB4EF49714F248269E815AB391E774AA45CB91
    APIs
    • SysFreeString.OLEAUT32(00000000), ref: 00A046F0
    • SysFreeString.OLEAUT32(00000000), ref: 00A04731
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: FreeString
    • String ID:
    • API String ID: 3341692771-0
    • Opcode ID: a8a38cfc555fc016351c427cd81216dbba9498d1134da8b98b2a477ef87c0b10
    • Instruction ID: ed6f4ec79ede5e2585494f754c3f41dd57dd30ad95eceac566c58f49f1ccbac4
    • Opcode Fuzzy Hash: a8a38cfc555fc016351c427cd81216dbba9498d1134da8b98b2a477ef87c0b10
    • Instruction Fuzzy Hash: 09617E72A04249EFDB10CF58E844BAABBB8FB49721F10456AFD1597390D7769D10CBA0
    APIs
    • SendMessageW.USER32(?,00001036,00010000,00000000), ref: 00AD22AB
    • GetWindowRect.USER32(00000000), ref: 00AD2301
      • Part of subcall function 00A8FCF0: GetWindowRect.USER32(?,?), ref: 00A8FD8B
      • Part of subcall function 00A8FCF0: GetWindowRect.USER32(?,?), ref: 00A8FDA3
    • SendMessageW.USER32(?,00001026,00000000,000000FF), ref: 00AD2400
    • SendMessageW.USER32(?,0000108A,00000000,00000011), ref: 00AD2413
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageRectSendWindow
    • String ID:
    • API String ID: 2814762282-0
    • Opcode ID: 2fb22eb2ed06a65dd060b18b374cbcefdef84fede8f35bc839f24d4895bd8351
    • Instruction ID: 36e4edd72de3d69470b761bfc23a8ef72f792daac50ede33b832aefd18325dec
    • Opcode Fuzzy Hash: 2fb22eb2ed06a65dd060b18b374cbcefdef84fede8f35bc839f24d4895bd8351
    • Instruction Fuzzy Hash: 7B513771D00748ABDB25DFA8CD49BDEBBF8EF59710F10431AE815A7291EB706A81CB50
    APIs
    • GetWindowRect.USER32(?,?), ref: 00A8FD8B
    • GetWindowRect.USER32(?,?), ref: 00A8FDA3
    • GetWindowRect.USER32(?,?), ref: 00A8FE10
    • GetWindowLongW.USER32(?,000000EC), ref: 00A8FE34
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Window$Rect$Long
    • String ID:
    • API String ID: 3486571012-0
    • Opcode ID: c82276cf730e1715b86074afc9d7025202e73006803de02d09cb4c793de6e3e0
    • Instruction ID: 745a5e0fa1d8e1a10503f3fc6be89d3c038a900d0d9694532a9d959fb3cd73a6
    • Opcode Fuzzy Hash: c82276cf730e1715b86074afc9d7025202e73006803de02d09cb4c793de6e3e0
    • Instruction Fuzzy Hash: BF4169326083059FC714EF14D888F6BB7E8FF99704F054A2EF94597211EB30E9458B92
    APIs
    • IsWindow.USER32(?), ref: 009FFD30
    • GetDlgItem.USER32(?,?), ref: 009FFD55
    • SendMessageW.USER32(00000001,?,?,00000001), ref: 009FFE1F
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ItemMessageSendWindow
    • String ID:
    • API String ID: 799199299-0
    • Opcode ID: 7659df62f7329e50bd065cadb4814e20cbdd5104859301f670a409b0a74a6849
    • Instruction ID: a046db4a09b838518e073d9c5ee09fa467d4340122e95a9e08aae81e566a6f63
    • Opcode Fuzzy Hash: 7659df62f7329e50bd065cadb4814e20cbdd5104859301f670a409b0a74a6849
    • Instruction Fuzzy Hash: 17418036300209DFC7198F68E8A8F76B7A9FF45311F04487AE64AC65A2D732EC55DB60
    APIs
    • WideCharToMultiByte.KERNEL32(00000003,00000000,?,?,?,?,00000000,00000000), ref: 00B0C70F
    • GetLastError.KERNEL32(?,?,00000000,00000000), ref: 00B0C71C
    • WideCharToMultiByte.KERNEL32(00000003,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00B0C739
    • WideCharToMultiByte.KERNEL32(00000003,00000000,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00B0C75B
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ByteCharMultiWide$ErrorLast
    • String ID:
    • API String ID: 1717984340-0
    • Opcode ID: 5c8d6f803e3677191dd002927af5ebf065c95560cebd50fc10ecfba6afe9091c
    • Instruction ID: cba99f4728ed07a55929f1cba6bb1647cea5a00f09003424dc17e0ce9c20cdb9
    • Opcode Fuzzy Hash: 5c8d6f803e3677191dd002927af5ebf065c95560cebd50fc10ecfba6afe9091c
    • Instruction Fuzzy Hash: F02125B67403067BE7205F54EC82F6A7F9DEF54B44F204229FA01571C0EBA17D198A64
    APIs
    • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,?,?,80004005,80004005,?,?,?,00000000,00BEA8AD,000000FF), ref: 00AF5188
    • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,-00000001,?,?,80004005,80004005,?,?,?,00000000,00BEA8AD,000000FF), ref: 00AF51BB
    • GetStdHandle.KERNEL32(000000F5,?,BACC40AC,00000000,00BAD840,000000FF,?,80070057,?,-00000001,?,?,80004005,80004005,?,?), ref: 00AF5226
    • SetConsoleTextAttribute.KERNEL32(00000000,?,BACC40AC,00000000,00BAD840,000000FF,?,80070057,?,-00000001,?,?,80004005,80004005,?,?), ref: 00AF522D
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: ByteCharMultiWide$AttributeConsoleHandleText
    • String ID:
    • API String ID: 3849414675-0
    • Opcode ID: a1f165946865aee43667b8c95f1b4df9160891d2e4ff7342c7b14c7472e6100c
    • Instruction ID: 3407dd06f76e5f5b9e17b6cf8fbdedeaec355eeef6ac45917c6eb679b196a4da
    • Opcode Fuzzy Hash: a1f165946865aee43667b8c95f1b4df9160891d2e4ff7342c7b14c7472e6100c
    • Instruction Fuzzy Hash: 9221A472704615AFD6109B98DC89F6EF769EF85720F208329F725D72D0CB316901CBA4
    APIs
    • WaitForSingleObject.KERNEL32(00000001,?,BACC40AC,?,?,00000000,00BAD670,000000FF,?,00B312A8,00000000,80004005,?,00C94C50,?,?), ref: 00B312F7
    • GetExitCodeThread.KERNEL32(00000001,80004005,?,?,00000000,00BAD670,000000FF,?,00B312A8,00000000), ref: 00B31311
    • TerminateThread.KERNEL32(00000001,00000000,?,?,00000000,00BAD670,000000FF,?,00B312A8,00000000), ref: 00B31329
    • CloseHandle.KERNEL32(00000001,?,?,00000000,00BAD670,000000FF,?,00B312A8,00000000,80004005,?,00C94C50,?,?,00B13989), ref: 00B31332
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Thread$CloseCodeExitHandleObjectSingleTerminateWait
    • String ID:
    • API String ID: 3774109050-0
    • Opcode ID: 6fc55ca722dc75614bf9313ac903634d993232635c30bc4f890514e49b93a5e0
    • Instruction ID: 015d226864f8168961fb345b9000db16c74891822c4414a3106ebc3ad942e3ea
    • Opcode Fuzzy Hash: 6fc55ca722dc75614bf9313ac903634d993232635c30bc4f890514e49b93a5e0
    • Instruction Fuzzy Hash: A5017171504B05EFDB208F58DC05B6AB7FCFB08714F108A6DE86692AA0DB75A804CB58
    APIs
    • SleepConditionVariableCS.KERNELBASE(?,00B86687,00000064), ref: 00B8670D
    • LeaveCriticalSection.KERNEL32(00C94CD8,?,?,00B86687,00000064,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B86717
    • WaitForSingleObjectEx.KERNEL32(?,00000000,?,00B86687,00000064,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B86728
    • EnterCriticalSection.KERNEL32(00C94CD8,?,00B86687,00000064,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8672F
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
    • String ID:
    • API String ID: 3269011525-0
    • Opcode ID: 077cb3386533db05ec2e69e827085e03d888886d0199e90ab5ca078c92441ee9
    • Instruction ID: 219499dc444621266c300b8d1b8ec80253cc6d7a04b32113dcce063520b814cc
    • Opcode Fuzzy Hash: 077cb3386533db05ec2e69e827085e03d888886d0199e90ab5ca078c92441ee9
    • Instruction Fuzzy Hash: 22E01235542534BFCE152F95ED0DF9E3F28EB04B55B024061F94566170CF611825CBE4
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • DeleteFileW.KERNEL32(?), ref: 00B303FA
    • DeleteFileW.KERNEL32(?,?,?,?,00000000), ref: 00B3052F
      • Part of subcall function 00B1F280: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,BACC40AC,00000001,75B4EB20,00000000), ref: 00B1F2CF
      • Part of subcall function 00B1F280: ReadFile.KERNEL32(00000000,?,000003FF,?,00000000,?,80000000,00000003,00000000,00000003,00000080,00000000,BACC40AC,00000001,75B4EB20,00000000), ref: 00B1F305
      • Part of subcall function 00B1C7E0: LoadStringW.USER32(000000A1,?,00000514,BACC40AC), ref: 00B1C836
    Strings
    • --verbose --log-file="%s" --remove-pack-file "%s" "%s", xrefs: 00B303AE
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: File$DeleteInit_thread_footer$CreateHeapLoadProcessReadString
    • String ID: --verbose --log-file="%s" --remove-pack-file "%s" "%s"
    • API String ID: 3544038457-3685554107
    • Opcode ID: 93ed29a1b118d5c1f293380bac1e8a19ef225c5b01df404def330cd51519dab2
    • Instruction ID: 93c87a4d4e40cc4350fc83d02b4d2bdd9e55c7cd0ece58646dc77758329fd467
    • Opcode Fuzzy Hash: 93ed29a1b118d5c1f293380bac1e8a19ef225c5b01df404def330cd51519dab2
    • Instruction Fuzzy Hash: 4491B231A006099FDB00EF68C854BAEBBF5EF55314F1482A9E915DB2A2DB34DD04CF90
    APIs
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000004), ref: 00A5EB86
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000004), ref: 00A5EB8C
      • Part of subcall function 00A60530: GetProcessHeap.KERNEL32(?,?,BACC40AC,00000000,?,00000000), ref: 00A605EA
      • Part of subcall function 00A60530: HeapFree.KERNEL32(00000000,?,?,BACC40AC,00000000,?,00000000), ref: 00A605F0
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A5ED97
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A5ED9D
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID:
    • API String ID: 3859560861-0
    • Opcode ID: 9c5b9d6c39e69a7411703c387db8177d4cc8a062e0615d26625a3eb4af9eeea1
    • Instruction ID: 65d8225f487a7691fb4273973cf00c215f589cbe7f294a166a75fe581a9a8990
    • Opcode Fuzzy Hash: 9c5b9d6c39e69a7411703c387db8177d4cc8a062e0615d26625a3eb4af9eeea1
    • Instruction Fuzzy Hash: 47F17E70D00249DFDB18DFA8C945BEEBBB4FF15314F204199E811AB291DB74AE48CB91
    APIs
      • Part of subcall function 009F9E50: GetProcessHeap.KERNEL32 ref: 009F9EA5
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9ED7
      • Part of subcall function 009F9E50: __Init_thread_footer.LIBCMT ref: 009F9F62
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00BF13BF,000000FF), ref: 00B272D3
    • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00BF13BF,000000FF), ref: 00B27361
    Strings
    • << Advanced Installer (x86) Log >>, xrefs: 00B2723F
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Init_thread_footer$CloseCriticalDeleteHandleHeapProcessSection
    • String ID: << Advanced Installer (x86) Log >>
    • API String ID: 3699736680-396061572
    • Opcode ID: 19e83ed10b5aae8e162732b87873b8dd81d0a919e7a82cff2a7bbc9d57eec8e5
    • Instruction ID: 6c8e4c37f63dcf4e74f7232697c109f2df3a8e715105e49bce61b86ba0e357f8
    • Opcode Fuzzy Hash: 19e83ed10b5aae8e162732b87873b8dd81d0a919e7a82cff2a7bbc9d57eec8e5
    • Instruction Fuzzy Hash: 9661FF70905689DFDB00CF68D98879EFBF0EF85714F1482ADE4099B391DB75AA08CB94
    APIs
      • Part of subcall function 00B86662: EnterCriticalSection.KERNEL32(00C94CD8,?,?,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B8666D
      • Part of subcall function 00B86662: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9EF6,00C95904,BACC40AC,?,?,00BADE0D,000000FF,?,00B2BABC,BACC40AC), ref: 00B866AA
    • __Init_thread_footer.LIBCMT ref: 00A3D28D
      • Part of subcall function 00B86618: EnterCriticalSection.KERNEL32(00C94CD8,?,?,009F9F67,00C95904,00C06640), ref: 00B86622
      • Part of subcall function 00B86618: LeaveCriticalSection.KERNEL32(00C94CD8,?,009F9F67,00C95904,00C06640), ref: 00B86655
      • Part of subcall function 00B86618: RtlWakeAllConditionVariable.NTDLL ref: 00B866CC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
    • String ID: ItemData$Windows.UI.Xaml.Controls.ListViewItem
    • API String ID: 2296764815-2445763458
    • Opcode ID: f3dcda0e5ce2aae1136063492d774e04619508d2406a11814f8b87fc7d23f918
    • Instruction ID: a57a2017c6a3eed6bba8395accf557ded12984a26252bfd3f3fb1ad3ae0a1f69
    • Opcode Fuzzy Hash: f3dcda0e5ce2aae1136063492d774e04619508d2406a11814f8b87fc7d23f918
    • Instruction Fuzzy Hash: 0271D270805289EFDB01CFA8D9047DEBBF0BF15304F148269E4156B2D1D7B99B08CBA2
    APIs
    • PathIsUNCW.SHLWAPI(?,BACC40AC,00000000,00000000), ref: 00AE3D11
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Path
    • String ID: \\?\$\\?\UNC\
    • API String ID: 2875597873-3019864461
    • Opcode ID: e776a5bc2ae8b18a6e26038019e041adefa797b380ee249cbd0955ec224b4912
    • Instruction ID: 1b84f934c244dc86963863f70c537922daa7bd96d5ce8bdec2d161586054ac05
    • Opcode Fuzzy Hash: e776a5bc2ae8b18a6e26038019e041adefa797b380ee249cbd0955ec224b4912
    • Instruction Fuzzy Hash: 7451CF71D00644DBDF14DF69D889BAEB7F5FF84704F20851DE8016B291EB75AA48CBA0
    APIs
    • GetTempPathW.KERNEL32(00000104,?,BACC40AC,?,?,00C96054), ref: 00B2858F
    • CreateDirectoryW.KERNEL32(?,00000000,?,00C96054), ref: 00B285F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CreateDirectoryPathTemp
    • String ID: ADVINST_LOGS
    • API String ID: 2885754953-2492584244
    • Opcode ID: 6fcb303ddf67c8c5ea6e487ea7dd47087be8b47d55d947c06b277999e79832a9
    • Instruction ID: 9d67a48bd683a55292e1c07f7d3bbd18fbe7215ba5d7f7aec199d4667f3c509b
    • Opcode Fuzzy Hash: 6fcb303ddf67c8c5ea6e487ea7dd47087be8b47d55d947c06b277999e79832a9
    • Instruction Fuzzy Hash: AC51B275941229CBCB209F28D848BBAB3F4FF14714F2446EEE85997291EF748D81CB90
    APIs
    • RegCloseKey.ADVAPI32(00000000,00000000,?,00000002,00C1337C,00000000,00000000,80000001,00000001,00000000,AppEvents\Schemes\Apps\Explorer\Navigating\.Current,00000033,BACC40AC), ref: 00A07280
      • Part of subcall function 00ADDDA0: GetModuleHandleW.KERNEL32(Advapi32.dll,BACC40AC,?,?,?,00000000,?,Function_001BDD00,000000FF), ref: 00ADDDE3
    • CloseHandle.KERNEL32(?,BACC40AC), ref: 00A072B9
    Strings
    • AppEvents\Schemes\Apps\Explorer\Navigating\.Current, xrefs: 00A07178
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: CloseHandle$Module
    • String ID: AppEvents\Schemes\Apps\Explorer\Navigating\.Current
    • API String ID: 1412095732-2431777889
    • Opcode ID: 41a6945232fcdd96377cf3d27d8a158ae3344f4052ea80921adc75691ca4ac17
    • Instruction ID: 32de59f877a60840e403e3fe1d80b407bee4a8814610231e6db7dfaf028fd612
    • Opcode Fuzzy Hash: 41a6945232fcdd96377cf3d27d8a158ae3344f4052ea80921adc75691ca4ac17
    • Instruction Fuzzy Hash: 98516870D1424CEADF20EFA4C959BEEFBB4BF14304F108199E455B7281DBB46A48CBA5
    APIs
      • Part of subcall function 00B30BE0: GetTempPathW.KERNEL32(00000104,?), ref: 00B30CC9
      • Part of subcall function 00B30BE0: GetTempFileNameW.KERNEL32(?,shim_clone,00000000,?), ref: 00B30CFA
      • Part of subcall function 00B30BE0: Wow64DisableWow64FsRedirection.KERNEL32(00000000,?), ref: 00B30D2D
    • GetLastError.KERNEL32(?,00000010), ref: 00B3102E
    • DeleteFileW.KERNEL32(?), ref: 00B31041
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: FileTempWow64$DeleteDisableErrorLastNamePathRedirection
    • String ID: Shlwapi.dll
    • API String ID: 145603228-1687636465
    • Opcode ID: 21f0040ec3b2d8502c62b6291b056fdabf34f9108d4f39ed44e576c1b90cd46f
    • Instruction ID: 1cf0419bbe350f45d70ce569fdc8f255d4be1ed070b0bbef7a3c83745c886c5b
    • Opcode Fuzzy Hash: 21f0040ec3b2d8502c62b6291b056fdabf34f9108d4f39ed44e576c1b90cd46f
    • Instruction Fuzzy Hash: 073161B1900249EBDB15DFA9D844BEEBBFCEF08350F24459AE801A3250DB359A45CBA1
    APIs
    • OpenEventW.KERNEL32(00000000,00000000,00000001,_pbl_evt,00000008,?,?,00C2A350,00000001,BACC40AC,?), ref: 00B420FE
    • CreateEventW.KERNEL32(00000000,00000001,00000001,?), ref: 00B4211B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Event$CreateOpen
    • String ID: _pbl_evt
    • API String ID: 2335040897-4023232351
    • Opcode ID: df43acbed1169fd7bf01f55b39aacb10b1166d2e37d0cd147dd5ee11b5d81be3
    • Instruction ID: b7069a1af4763354480c1fb3285265d87b0240a4cb6d077455663143f16bcdfe
    • Opcode Fuzzy Hash: df43acbed1169fd7bf01f55b39aacb10b1166d2e37d0cd147dd5ee11b5d81be3
    • Instruction Fuzzy Hash: 48313871D00208EFDB10DFA8D955BEEB7F8EF08714F508169E911B7290DBB46A09CBA5
    APIs
    • std::_Lockit::_Lockit.LIBCPMT ref: 00AE689B
    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AE68FE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
    • String ID: bad locale name
    • API String ID: 3988782225-1405518554
    • Opcode ID: 7f0791dbaa69d66524e2fa8a49258b6eb95600e98173f3cadbfc5ee9856d6995
    • Instruction ID: 8e46e6bcf965303fc95e2a23f560669bfa6e42e986d79a86f9b503a5296aad97
    • Opcode Fuzzy Hash: 7f0791dbaa69d66524e2fa8a49258b6eb95600e98173f3cadbfc5ee9856d6995
    • Instruction Fuzzy Hash: FE21E070905784DFD720CF69C80475ABFE4AF15714F14869DE486C7B82D7B6EA04C7A1
    APIs
    • GetProcessHeap.KERNEL32(?,?), ref: 00A5E08B
    • HeapFree.KERNEL32(00000000,?,?), ref: 00A5E091
    • GetProcessHeap.KERNEL32(?,?), ref: 00A5E160
    • HeapFree.KERNEL32(00000000,?,?), ref: 00A5E166
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID:
    • API String ID: 3859560861-0
    • Opcode ID: c00b688a89b3ee09ea4adc010a313da67641bdd455432c9726d511f632004049
    • Instruction ID: 381f7b7e01ffc1b790d652804b30dd6310869ec5e1f634192ca0579fb0bd37f9
    • Opcode Fuzzy Hash: c00b688a89b3ee09ea4adc010a313da67641bdd455432c9726d511f632004049
    • Instruction Fuzzy Hash: 4AD18E70900208DFDF14DFA8C954BEEFBB5BF55304F2442A9D805AB292DB74AE49CB91
    APIs
      • Part of subcall function 00AD2470: __Init_thread_footer.LIBCMT ref: 00AD2500
      • Part of subcall function 00AD2470: GetProcAddress.KERNEL32(SetWindowTheme), ref: 00AD253D
      • Part of subcall function 00AD2470: __Init_thread_footer.LIBCMT ref: 00AD2554
      • Part of subcall function 00AD2470: SendMessageW.USER32(000000EF,00001036,00010000,00010000), ref: 00AD257F
    • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00AD1FC0
    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00AD1FC8
      • Part of subcall function 00A00DB0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00A00DE6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$Init_thread_footer$AddressLongProcWindow
    • String ID: SysListView32
    • API String ID: 93031011-78025650
    • Opcode ID: e935f36ad9ac49b8232601bd4cd73f3a10eeeb86bd4ba6d8e3725f1e49c6d401
    • Instruction ID: cc3c4dee3447a1bfb437e86724c95135a9d2b378efec6b8a0ecca711ecddec32
    • Opcode Fuzzy Hash: e935f36ad9ac49b8232601bd4cd73f3a10eeeb86bd4ba6d8e3725f1e49c6d401
    • Instruction Fuzzy Hash: 42118B71301210BFE624AB15CC05F6BFBA9FFC9750F05421AFA45AB2A0C6B1AC00CBE1
    APIs
    • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00AD2A23
    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00AD2A2B
      • Part of subcall function 00A00DB0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00A00DE6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID: RichEdit20W
    • API String ID: 312131281-4173859555
    • Opcode ID: fe2792e7c609372b064d2490e68e9d70b1a393306d0592dff751bfa12e3ac905
    • Instruction ID: 7eafaafab6b1a688b0fbbd83e5950910bf4e7b97d6b9773e5218d0af8f6a4dcd
    • Opcode Fuzzy Hash: fe2792e7c609372b064d2490e68e9d70b1a393306d0592dff751bfa12e3ac905
    • Instruction Fuzzy Hash: 93016D31301214BFD6149F15DC04F5BFBE9FBC9750F15421AFA48A73A0C6B1AC01CAA1
    APIs
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?), ref: 00A31E5F
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00A31E65
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?), ref: 00A31F0F
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00A31F15
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID:
    • API String ID: 3859560861-0
    • Opcode ID: 57c2b0615ab58ed9f9e08fd513f55d038dc4c1c4b1128f93c0ec22a44805e57d
    • Instruction ID: 60e9488d3fe6701c50630b7a47367359bada65ec95da7b67bc3ff8fa7ad1fa3b
    • Opcode Fuzzy Hash: 57c2b0615ab58ed9f9e08fd513f55d038dc4c1c4b1128f93c0ec22a44805e57d
    • Instruction Fuzzy Hash: 2AB17B71D00268DEDB20DB28CD45BEEBBB5EF51314F1042EAE419A7292DB749B84CF91
    APIs
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?), ref: 00A30A0F
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00A30A15
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?), ref: 00A30ABF
    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00A30AC5
    Memory Dump Source
    • Source File: 00000000.00000002.2191336021.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
    • Associated: 00000000.00000002.2191261202.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191481023.0000000000C08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191555373.0000000000C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191603888.0000000000C93000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191616200.0000000000C94000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000C97000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191627581.0000000000CB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9f0000_R2T8ccXCek.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID:
    • API String ID: 3859560861-0
    • Opcode ID: 22f63c644bdb544d4152447847bd595f3fcef1999608c9070bfa4270792b40b7
    • Instruction ID: 5148a5fb79facafaed65838c6a588a54ea18e1d9d4c9e329acb41023a1ef27cc
    • Opcode Fuzzy Hash: 22f63c644bdb544d4152447847bd595f3fcef1999608c9070bfa4270792b40b7
    • Instruction Fuzzy Hash: DE916B70D01368DEEB20DB28CC55BDEBBB5AF51304F1442E9E409A7292DB749B88CF52